news 28 Posted September 24, 2009 This is a multi-part message in MIME format... ------------=_1253803710-13155-2013 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Advisory MDVA-2009:169 http://www.mandriva.com/security/ _______________________________________________________________________ Package : drakxtools Date : September 24, 2009 Affected: 2009.0, Enterprise Server 5.0 _______________________________________________________________________ Problem Description: These updated packages fix a bug preventing the use of firefox if the user had seen the help of drak3d in the drak3d session before first running firefox (bug #29775). These updated packages also adds support for VirtIO devices. Last but not least it ensures we have a recent enough perl-Gtk2 binding (eg: after failed KDE3 upgrade (bug #51870)). _______________________________________________________________________ References: https://qa.mandriva.com/53797 _______________________________________________________________________ Updated Packages: Mandriva Linux 2009.0: f3afb0019f28076ea8397123cab904f6 2009.0/i586/drakx-finish-install-11.71.10-2.1mdv2009.0.i586.rpm 891d1f2fe15dbcda69dadf2f367ae4eb 2009.0/i586/drakxtools-11.71.10-2.1mdv2009.0.i586.rpm 05acda1995114d4934bea6d2f4f98996 2009.0/i586/drakxtools-backend-11.71.10-2.1mdv2009.0.i586.rpm 706ac0deb5f686b264c975306f31fa2c 2009.0/i586/drakxtools-curses-11.71.10-2.1mdv2009.0.i586.rpm 8b64118387e3e2fdb8cf493a7acde867 2009.0/i586/drakxtools-http-11.71.10-2.1mdv2009.0.i586.rpm 7c22d95ba6d2375076e0a298c92458ea 2009.0/i586/harddrake-11.71.10-2.1mdv2009.0.i586.rpm ff31121dbb77f5964b593a7ad29f6c8b 2009.0/i586/harddrake-ui-11.71.10-2.1mdv2009.0.i586.rpm ef24139fde204a3a170a2003317d51c5 2009.0/SRPMS/drakxtools-11.71.10-2.1mdv2009.0.src.rpm Mandriva Linux 2009.0/X86_64: 87096919195658e0e66f6bdd4eeb5389 2009.0/x86_64/drakx-finish-install-11.71.10-2.1mdv2009.0.x86_64.rpm a7e41e1b141e367684781bf419e7e238 2009.0/x86_64/drakxtools-11.71.10-2.1mdv2009.0.x86_64.rpm a5f44141823edc5946991809cf67ff77 2009.0/x86_64/drakxtools-backend-11.71.10-2.1mdv2009.0.x86_64.rpm 57bfe85af31fe2c55f2d6b99224f2060 2009.0/x86_64/drakxtools-curses-11.71.10-2.1mdv2009.0.x86_64.rpm 3171c9bc49a0b009a6d8845f62615016 2009.0/x86_64/drakxtools-http-11.71.10-2.1mdv2009.0.x86_64.rpm d38adc54edbcb242c37d698b7f5f0b74 2009.0/x86_64/harddrake-11.71.10-2.1mdv2009.0.x86_64.rpm ea8c10af92cfa277ffaee54f58680c6f 2009.0/x86_64/harddrake-ui-11.71.10-2.1mdv2009.0.x86_64.rpm ef24139fde204a3a170a2003317d51c5 2009.0/SRPMS/drakxtools-11.71.10-2.1mdv2009.0.src.rpm Mandriva Enterprise Server 5: 4f622b8963b58b99ab8f84cddde6471d mes5/i586/drakx-finish-install-11.71.10-2.1mdvmes5.i586.rpm b93e7526d1223d1fdd0d7b3f2f47ec7c mes5/i586/drakxtools-11.71.10-2.1mdvmes5.i586.rpm 22cfe32ef14f5c3046df33825ec3534b mes5/i586/drakxtools-backend-11.71.10-2.1mdvmes5.i586.rpm 922b749f0ce220bb43837e33134b764f mes5/i586/drakxtools-curses-11.71.10-2.1mdvmes5.i586.rpm e268167e29c4616e6dc57230e96b8c61 mes5/i586/drakxtools-http-11.71.10-2.1mdvmes5.i586.rpm c1561916de1d5680c677a7ac1d2e4ee1 mes5/i586/harddrake-11.71.10-2.1mdvmes5.i586.rpm 0d4ab99b38596584d18b7a57eaa195d5 mes5/i586/harddrake-ui-11.71.10-2.1mdvmes5.i586.rpm fad252ee38235b49312b138948c3e773 mes5/SRPMS/drakxtools-11.71.10-2.1mdvmes5.src.rpm Mandriva Enterprise Server 5/X86_64: f9e3544330987fdd8efb02936bd09895 mes5/x86_64/drakx-finish-install-11.71.10-2.1mdvmes5.x86_64.rpm 09a7d1bff8bb015289644e6c905762fa mes5/x86_64/drakxtools-11.71.10-2.1mdvmes5.x86_64.rpm 27b51e13f0e076638eed7d125abe3b13 mes5/x86_64/drakxtools-backend-11.71.10-2.1mdvmes5.x86_64.rpm 6715e6455af6d34a0f57c2b849d31726 mes5/x86_64/drakxtools-curses-11.71.10-2.1mdvmes5.x86_64.rpm 1a90dc0a2f35dbabc7b3c812699c8097 mes5/x86_64/drakxtools-http-11.71.10-2.1mdvmes5.x86_64.rpm 5672b5463cea883870bbc4822268026a mes5/x86_64/harddrake-11.71.10-2.1mdvmes5.x86_64.rpm 5d0b2591e43653f6af37e6d739fa5a87 mes5/x86_64/harddrake-ui-11.71.10-2.1mdvmes5.x86_64.rpm fad252ee38235b49312b138948c3e773 mes5/SRPMS/drakxtools-11.71.10-2.1mdvmes5.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFKu1nYmqjQ0CJFipgRAv+YAKCeRy7t2kTVRdO7jUVW/A0i/gpm6gCgvVVn Mn4hOMnJl+dchsmcjQdjvYg= =h0jv -----END PGP SIGNATURE----- ------------=_1253803710-13155-2013 Content-Type: text/plain; name="message-footer.txt" Content-Disposition: inline; filename="message-footer.txt" Content-Transfer-Encoding: 8bit To unsubscribe, send a email to sympa ( -at -) mandrivalinux.org with this subject : unsubscribe security-announce _______________________________________________________ Want to buy your Pack or Services from Mandriva? Go to http://www.mandrivastore.com Join the Club : http://www.mandrivaclub.com _______________________________________________________ ------------=_1253803710-13155-2013-- Share this post Link to post