news 28 Posted December 30, 2009 This is a multi-part message in MIME format... ------------=_1262201430-24326-2807 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Advisory MDVA-2009:269 http://www.mandriva.com/security/ _______________________________________________________________________ Package : gvfs Date : December 30, 2009 Affected: 2010.0 _______________________________________________________________________ Problem Description: Nautilus would sometimes crash, caused by corrupted gvfs metadata. This updates gvfs to the new fixed version. _______________________________________________________________________ References: https://qa.mandriva.com/56538 _______________________________________________________________________ Updated Packages: Mandriva Linux 2010.0: 07617bfe5590cedf42faff74e675cb16 2010.0/i586/gvfs-1.4.3-1.1mdv2010.0.i586.rpm 5a66a1bd8fcaf9690f1e4d964eb115e3 2010.0/i586/gvfs-archive-1.4.3-1.1mdv2010.0.i586.rpm 751285d53796da94bf64d30523eeec8e 2010.0/i586/gvfs-fuse-1.4.3-1.1mdv2010.0.i586.rpm 220dfd543b22c88e3d08290b262e8f9b 2010.0/i586/gvfs-gphoto2-1.4.3-1.1mdv2010.0.i586.rpm 679dd28cb027f54d384c15cb814fb454 2010.0/i586/gvfs-iphone-1.4.3-1.1mdv2010.0.i586.rpm bc9fca7c7b3b2773edd52aa4fd4b4976 2010.0/i586/gvfs-obexftp-1.4.3-1.1mdv2010.0.i586.rpm fd3597ac52d7f997b35632a9a248c593 2010.0/i586/gvfs-smb-1.4.3-1.1mdv2010.0.i586.rpm b5085baa51ed39f0741f86632e6ff44f 2010.0/i586/libgvfs0-1.4.3-1.1mdv2010.0.i586.rpm f4f536e546078174eedc89fd139db850 2010.0/i586/libgvfs-devel-1.4.3-1.1mdv2010.0.i586.rpm 4936f62217ddf769df83344106be45c6 2010.0/SRPMS/gvfs-1.4.3-1.1mdv2010.0.src.rpm Mandriva Linux 2010.0/X86_64: fa730a56d5bc30a234653568b7051a94 2010.0/x86_64/gvfs-1.4.3-1.1mdv2010.0.x86_64.rpm 2455f45ea95190896001a363e1e6d70d 2010.0/x86_64/gvfs-archive-1.4.3-1.1mdv2010.0.x86_64.rpm 3e1c4b23b74abf0aafa4c37d473aa029 2010.0/x86_64/gvfs-fuse-1.4.3-1.1mdv2010.0.x86_64.rpm 94183958a4680be74947458f299ace1d 2010.0/x86_64/gvfs-gphoto2-1.4.3-1.1mdv2010.0.x86_64.rpm 79e8e8a4b09d0608c5efa519cdc3ccb5 2010.0/x86_64/gvfs-iphone-1.4.3-1.1mdv2010.0.x86_64.rpm 92dd5c8928a7c03bda2745eb4ec88f50 2010.0/x86_64/gvfs-obexftp-1.4.3-1.1mdv2010.0.x86_64.rpm 2a71a500a8d3da4a1a3c849e23ddcd1f 2010.0/x86_64/gvfs-smb-1.4.3-1.1mdv2010.0.x86_64.rpm f1a7811715a2b8c3faab39a7eedd9d2c 2010.0/x86_64/lib64gvfs0-1.4.3-1.1mdv2010.0.x86_64.rpm e37c937590323fda19850a74ad91be83 2010.0/x86_64/lib64gvfs-devel-1.4.3-1.1mdv2010.0.x86_64.rpm 4936f62217ddf769df83344106be45c6 2010.0/SRPMS/gvfs-1.4.3-1.1mdv2010.0.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFLO3+ZmqjQ0CJFipgRAlqBAJ4lxvSZaqPs3SeFVMcTKt6KSi+h/gCfXF8N jKOZOxgtvFJFw/5d/tGCG44= =pyjF -----END PGP SIGNATURE----- ------------=_1262201430-24326-2807 Content-Type: text/plain; name="message-footer.txt" Content-Disposition: inline; filename="message-footer.txt" Content-Transfer-Encoding: 8bit To unsubscribe, send a email to sympa ( -at -) mandrivalinux.org with this subject : unsubscribe security-announce _______________________________________________________ Want to buy your Pack or Services from Mandriva? Go to http://www.mandrivastore.com Join the Club : http://www.mandrivaclub.com _______________________________________________________ ------------=_1262201430-24326-2807-- Share this post Link to post