From: Mandrake Linux Security Team <security@linux-mandrake.com> To: security-announce@linux-mandrake.com Subject: [Security Announce] MDKA-2002:004 - 8.2 package updates Date: 5 Apr 2002 21:20:07 -0000 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ________________________________________________________________________ Mandrake Linux Update Advisory ________________________________________________________________________ Package name: Various Advisory ID: MDKA-2002:004 Date: April 5th, 2002 Affected versions: 8.2 ________________________________________________________________________ Problem Description: A few packages are being provided as bugfix updates to the Mandrake Linux 8.2 release. Specifically: aspell/kde-i18n: Danish and Slovanian languages were mistakenly omitted from the CDs. jmcce: The jmcce package was mistakenly omitted from the 8.2 Download Edition. e2fsprogs: The new version fixes some memory leaks in the e2fsck journaling code, and in the ismounted code checking for a swap device. nss_ldap: The previous package did not give out a list of supplementary groups which the user is also a member of. This new package is rebuilt with ids-uid and RFC2307bis support. Xtart: The released Xtart package used an old method of initiating X which did not provide a complete environment for consolehelper; as a result any applications, like Mandrake Control Center, that requires consolehelper to gain root access fails. drakxtools: There were various problems with printerdrake and HP Multi-Function devices. These issues are corrected with the new drakxtools package. ________________________________________________________________________ Updated Packages: Mandrake Linux 8.2: fdcfb20ee5bb43906ce21d03360183c7 8.2/RPMS/Xtart-1.1-2.1mdk.i586.rpm 0041a2a4a380a043f6f78ab78ff7447b 8.2/RPMS/aspell-da-1.4.21-1mdk.i586.rpm a71bfbd2f905dda53f6acbeaaa857f99 8.2/RPMS/drakxtools-1.1.7-98.1mdk.i586.rpm 115ee432de480e0bc2f301e8b14ee626 8.2/RPMS/drakxtools-http-1.1.7-98.1mdk.i586.rpm 22dbee0ad124df72f04807ee0708347f 8.2/RPMS/drakxtools-newt-1.1.7-98.1mdk.i586.rpm 253780af866608d2d126b99d16989c38 8.2/RPMS/e2fsprogs-1.27-1.1mdk.i586.rpm b1b318e282d670037d3ff175fdf0eb7f 8.2/RPMS/jmcce-1.3-10mdk.i586.rpm ce2afa09dbdef781b8da227742fc6624 8.2/RPMS/kde-i18n-da-2.2.2-2mdk.noarch.rpm 14e20cc1ac15b827fb7e7d72fb79af62 8.2/RPMS/kde-i18n-sl-2.2.2-1mdk.noarch.rpm de26d383355f040bc8b1ade4db7a3005 8.2/RPMS/libext2fs2-1.27-1.1mdk.i586.rpm 0459320945a795c638ee3f484b89e594 8.2/RPMS/libext2fs2-devel-1.27-1.1mdk.i586.rpm 6dc393325ea9b982e24761cbae760db4 8.2/RPMS/nss_ldap-173-2.1mdk.i586.rpm d79cb75acecc91c40e81a61173e857ad 8.2/SRPMS/Xtart-1.1-2.1mdk.src.rpm 798414049f4475c38a01fb3303bd5bae 8.2/SRPMS/aspell-da-1.4.21-1mdk.src.rpm 50636c8316f929c3da07fcb8a8bf1f89 8.2/SRPMS/drakxtools-1.1.7-98.1mdk.src.rpm 7aa20199787545344754372ce5d3a26c 8.2/SRPMS/e2fsprogs-1.27-1.1mdk.src.rpm bb9a2dd24675bd424dfa7b85e5fa70e3 8.2/SRPMS/jmcce-1.3-10mdk.src.rpm ed3e7148019726e5e02f97e5d3fbee25 8.2/SRPMS/kde-i18n-da-2.2.2-2mdk.src.rpm 1c87f5c0b40450821b8c6378b3ff7469 8.2/SRPMS/kde-i18n-sl-2.2.2-1mdk.src.rpm 8f5ca4f81321e35ce3e7799aa3de44fe 8.2/SRPMS/nss_ldap-173-2.1mdk.src.rpm ________________________________________________________________________ Bug IDs fixed (see https://qa.mandrakesoft.com for more information): ________________________________________________________________________ To upgrade automatically, use MandrakeUpdate. The verification of md5 checksums and GPG signatures is performed automatically for you. If you want to upgrade manually, download the updated package from one of our FTP server mirrors and upgrade with "rpm -Fvh *.rpm". A list of FTP mirrors can be obtained from: http://www.mandrakesecure.net/en/ftp.php Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig <filename> You can obtain the GPG public key of the Mandrake Linux Security Team from: https://www.mandrakesecure.net/RPM-GPG-KEYS Please be aware that sometimes it takes the mirrors a few hours to update. You can view other update advisories for Mandrake Linux at: http://www.mandrakesecure.net/en/advisories/ MandrakeSoft has several security-related mailing list services that anyone can subscribe to. Information on these lists can be obtained by visiting: http://www.mandrakesecure.net/en/mlist.php If you want to report vulnerabilities, please contact security@linux-mandrake.com ________________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team <security@linux-mandrake.com> - -----BEGIN PGP PUBLIC KEY BLOCK----- Version: GnuPG v1.0.5 (GNU/Linux) Comment: For info see http://www.gnupg.org mQGiBDlp594RBAC2tDozI3ZgQsE7XwxurJCJrX0L5vx7SDByR5GHDdWekGhdiday L4nfUax+SeR9SCoCgTgPW1xB8vtQc8/sinJlMjp9197a2iKM0FOcPlkpa3HcOdt7 WKJqQhlMrHvRcsivzcgqjH44GBBJIT6sygUF8k0lU6YnMHj5MPc/NGWt8wCg9vKo P0l5QVAFSsHtqcU9W8cc7wMEAJzQsAlnvPXDBfBLEH6u7ptWFdp0GvbSuG2wRaPl hynHvRiE01ZvwbJZXsPsKm1z7uVoW+NknKLunWKB5axrNXDHxCYJBzY3jTeFjsqx PFZkIEAQphLTkeXXelAjQ5u9tEshPswEtMvJvUgNiAfbzHfPYmq8D6x5xOw1IySg 2e/LBACxr2UJYCCB2BZ3p508mAB0RpuLGukq+7UWiOizy+kSskIBg2O7sQkVY/Cs iyGEo4XvXqZFMY39RBdfm2GY+WB/5NFiTOYJRKjfprP6K1YbtsmctsX8dG+foKsD LLFs7OuVfaydLQYp1iiN6D+LJDSMPM8/LCWzZsgr9EKJ8NXiyrQ6TGludXggTWFu ZHJha2UgU2VjdXJpdHkgVGVhbSA8c2VjdXJpdHlAbGludXgtbWFuZHJha2UuY29t PohWBBMRAgAWBQI5aefeBAsKBAMDFQMCAxYCAQIXgAAKCRCaqNDQIkWKmK6LAKCy /NInDsaMSI+WHwrquwC5PZrcnQCeI+v3gUDsNfQfiKBvQSANu1hdulqIRgQQEQIA BgUCOtNVGQAKCRBZ5w3um0pAJJWQAKDUoL5He+mKbfrMaTuyU5lmRyJ0fwCgoFAP WdvQlu/kFjphF740XeOwtOqIRgQQEQIABgUCOu8A6QAKCRBynDnb9lq3CnpjAJ4w Pk0SEE9U4r40IxWpwLU+wrWVugCdFfSPllPpZRCiaC7HwbFcfExRmPa5AQ0EOWnn 7xAEAOQlTVY4TiNo5V/iP0J1xnqjqlqZsU7yEBKo/gZz6/+hx75RURe1ebiJ9F77 9FQbpJ9Epz1KLSXvq974rnVb813zuGdmgFyk+ryA/rTR2RQ8h+EoNkwmATzRxBXV Jb57fFQjxOu4eNjZAtfII/YXb0uyXXrdr5dlJ/3eXrcO4p0XAAMFBACCxo6Z269s +A4v8C6Ui12aarOQcCDlV8cVG9LkyatU3FNTlnasqwo6EkaP572448weJWwN6SCX Vl+xOYLiK0hL/6Jb/O9Agw75yUVdk+RMM2I4fNEi+y4hmfMh2siBv8yEkEvZjTcl 3TpkTfzYky85tu433wmKaLFOv0WjBFSikohGBBgRAgAGBQI5aefvAAoJEJqo0NAi RYqYid0AoJgeWzXrEdIClBOSW5Q6FzqJJyaqAKC0Y9YI3UFlE4zSIGjcFlLJEJGX lA== =0ahQ - -----END PGP PUBLIC KEY BLOCK----- -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQE8rhUHmqjQ0CJFipgRApzEAJ4nco78I2lvP+uM3PAmXCI+pWBFsgCgiDSm 3UCG+qaZX2eu6v0Ig8RDgjM= =H3zR -----END PGP SIGNATURE-----