---

Mandrakelinux Advisories: perl-MIME-tools, netatalk, MySQL…


Mandrakelinux Security Update Advisory


Package name: perl-MIME-tools
Advisory ID: MDKSA-2004:123
Date: November 1st, 2004
Affected versions: 10.0, 10.1, 9.2, Corporate Server 2.1


Problem Description:

There’s a bug in MIME-tools, where it mis-parses things like
boundary=””. Some viruses use an empty boundary, which may allow
unapproved parts through MIMEDefang.

The updated packages are patched to fix this problem.

As well, the Updated perl-MIME-tools requires MIME::Base64
version 3.03. Since MIME::Base64 is integrated in the perl package
on Mandakelinux, these updates now provide the newer version.


References:


http://lists.roaringpenguin.com/pipermail/mimedefang/2004-October/024959.html


Updated Packages:

Mandrakelinux 10.0:
d278882284c3883d1cfa31940d7da937
10.0/RPMS/perl-5.8.3-5.1.100mdk.i586.rpm
2769a4030ba0ab283e976559c75a6b90
10.0/RPMS/perl-base-5.8.3-5.1.100mdk.i586.rpm
c5ba0bbe1251056c88a2148208c01314
10.0/RPMS/perl-devel-5.8.3-5.1.100mdk.i586.rpm
3d0f1a43934ec2845d09693956931572
10.0/RPMS/perl-doc-5.8.3-5.1.100mdk.i586.rpm
0fb9ebc38b5e217dc652428d15da9094
10.0/RPMS/perl-MIME-tools-5.415-1.0.100mdk.noarch.rpm
71339cbf22986868ef9397e23a0773b0
10.0/SRPMS/perl-5.8.3-5.1.100mdk.src.rpm
447551691963d906919f92a80ba5f4d7
10.0/SRPMS/perl-MIME-tools-5.415-1.0.100mdk.src.rpm

Mandrakelinux 10.0/AMD64:
10a20606840674bfd2ffe7b6c6f1707b
amd64/10.0/RPMS/perl-5.8.3-5.1.100mdk.amd64.rpm
560e79ba8cea968ca06f504bd74be04b
amd64/10.0/RPMS/perl-base-5.8.3-5.1.100mdk.amd64.rpm
7f9d8d26bbe8b72b485356c20053590d
amd64/10.0/RPMS/perl-devel-5.8.3-5.1.100mdk.amd64.rpm
d40dea320e9441854af7059e86f9e4da
amd64/10.0/RPMS/perl-doc-5.8.3-5.1.100mdk.amd64.rpm
e2136dddff55d5a48b04247997bf599f
amd64/10.0/RPMS/perl-MIME-tools-5.415-1.0.100mdk.noarch.rpm
71339cbf22986868ef9397e23a0773b0
amd64/10.0/SRPMS/perl-5.8.3-5.1.100mdk.src.rpm
447551691963d906919f92a80ba5f4d7
amd64/10.0/SRPMS/perl-MIME-tools-5.415-1.0.100mdk.src.rpm

Mandrakelinux 10.1:
4ee65c401fcb1f7e9e445dfae0cde9b9
10.1/RPMS/perl-5.8.5-3.1.101mdk.i586.rpm
de5f7cb7a5d9d7059779582761d98318
10.1/RPMS/perl-base-5.8.5-3.1.101mdk.i586.rpm
27b69c2804d9531d4eb4dbed31813732
10.1/RPMS/perl-devel-5.8.5-3.1.101mdk.i586.rpm
26dbf1cb9d0ffd6d7a402c07aa749251
10.1/RPMS/perl-doc-5.8.5-3.1.101mdk.i586.rpm
1fbeed384ad6c39ca80de7dee2b62400
10.1/RPMS/perl-MIME-tools-5.415-1.0.101mdk.noarch.rpm
a900cfda5596a33ee321ed270837b0e0
10.1/SRPMS/perl-5.8.5-3.1.101mdk.src.rpm
33b061fe528a62a9bb5315cd37ba55e8
10.1/SRPMS/perl-MIME-tools-5.415-1.0.101mdk.src.rpm

Mandrakelinux 10.1/X86_64:
f75cb59f2c0658a2cbe5357a09d8d07d
x86_64/10.1/RPMS/perl-5.8.5-3.1.101mdk.x86_64.rpm
802509f65ba952bd07325bd6f2b0d3a0
x86_64/10.1/RPMS/perl-base-5.8.5-3.1.101mdk.x86_64.rpm
9325c49c6f77d90483437f6f47e55b9d
x86_64/10.1/RPMS/perl-devel-5.8.5-3.1.101mdk.x86_64.rpm
d484a0e660829aa32a302138db94f66e
x86_64/10.1/RPMS/perl-doc-5.8.5-3.1.101mdk.x86_64.rpm
b13178dab9710e61910a4af762e7d6a3
x86_64/10.1/RPMS/perl-MIME-tools-5.415-1.0.101mdk.noarch.rpm
a900cfda5596a33ee321ed270837b0e0
x86_64/10.1/SRPMS/perl-5.8.5-3.1.101mdk.src.rpm
33b061fe528a62a9bb5315cd37ba55e8
x86_64/10.1/SRPMS/perl-MIME-tools-5.415-1.0.101mdk.src.rpm

Corporate Server 2.1:
fc3e3f06637d571a281e639aa4490e76
corporate/2.1/RPMS/perl-5.8.0-14.2.C21mdk.i586.rpm
e039f009751fad2b77d160b67ca75218
corporate/2.1/RPMS/perl-base-5.8.0-14.2.C21mdk.i586.rpm
cceb9017b7c5d62a6846f24931c0d777
corporate/2.1/RPMS/perl-devel-5.8.0-14.2.C21mdk.i586.rpm
fb9beebfa93a3eebc86bb9012cdff1c4
corporate/2.1/RPMS/perl-doc-5.8.0-14.2.C21mdk.i586.rpm
9b484ca12bfdda17787f94d5da96613d
corporate/2.1/RPMS/perl-MIME-tools-5.415-1.0.C21mdk.noarch.rpm
19dc7a7ac3e12a653901c5119315d10f
corporate/2.1/SRPMS/perl-5.8.0-14.2.C21mdk.src.rpm
5987507b55b00b66ec461c0bdf994ee1
corporate/2.1/SRPMS/perl-MIME-tools-5.415-1.0.C21mdk.src.rpm

Corporate Server 2.1/x86_64:
f9d3fbf772cb558c945abe442b1e99be
x86_64/corporate/2.1/RPMS/perl-5.8.0-14.2.C21mdk.x86_64.rpm
32731b18b86678988d56b63342bb8c32
x86_64/corporate/2.1/RPMS/perl-base-5.8.0-14.2.C21mdk.x86_64.rpm

c54830d6c0beac9699d36c875a91a4ae
x86_64/corporate/2.1/RPMS/perl-devel-5.8.0-14.2.C21mdk.x86_64.rpm

595fcf030bbebf23a2be36fc36fc7dde
x86_64/corporate/2.1/RPMS/perl-doc-5.8.0-14.2.C21mdk.x86_64.rpm
e31b6cfb93edab14b43076d4e9596c4c
x86_64/corporate/2.1/RPMS/perl-MIME-tools-5.415-1.0.C21mdk.noarch.rpm

19dc7a7ac3e12a653901c5119315d10f
x86_64/corporate/2.1/SRPMS/perl-5.8.0-14.2.C21mdk.src.rpm
5987507b55b00b66ec461c0bdf994ee1
x86_64/corporate/2.1/SRPMS/perl-MIME-tools-5.415-1.0.C21mdk.src.rpm

Mandrakelinux 9.2:
4e0dda0496ac2227496a10301d148add
9.2/RPMS/perl-5.8.1-0.RC4.3.1.92mdk.i586.rpm
44fb5ff7b4478e81d726c7f74883dcdf
9.2/RPMS/perl-base-5.8.1-0.RC4.3.1.92mdk.i586.rpm
b0c3828bd61669878065117e34283104
9.2/RPMS/perl-devel-5.8.1-0.RC4.3.1.92mdk.i586.rpm
fe0b5b68eb8fabf63a56d132da860c5c
9.2/RPMS/perl-doc-5.8.1-0.RC4.3.1.92mdk.i586.rpm
b7a8db45f13d78babcf7dbb28fd1c3b9
9.2/RPMS/perl-MIME-tools-5.415-1.0.92mdk.noarch.rpm
4979228b456acf79ea08749c63dd8c12
9.2/SRPMS/perl-5.8.1-0.RC4.3.1.92mdk.src.rpm
a2cb97e745ebf53551b18f771664b9e5
9.2/SRPMS/perl-MIME-tools-5.415-1.0.92mdk.src.rpm

Mandrakelinux 9.2/AMD64:
7f2ce1931161337b3b910a73df00d269
amd64/9.2/RPMS/perl-5.8.1-0.RC4.3.1.92mdk.amd64.rpm
e79be61ff5029e04c5a7953ad87edcd6
amd64/9.2/RPMS/perl-base-5.8.1-0.RC4.3.1.92mdk.amd64.rpm
cf1c03ee01613bc2f787963345966072
amd64/9.2/RPMS/perl-devel-5.8.1-0.RC4.3.1.92mdk.amd64.rpm
1c6c7de92d04bd820edd19eeb15ad999
amd64/9.2/RPMS/perl-doc-5.8.1-0.RC4.3.1.92mdk.amd64.rpm
8f92a60447dcb0fc66d548ca3a667648
amd64/9.2/RPMS/perl-MIME-tools-5.415-1.0.92mdk.noarch.rpm
4979228b456acf79ea08749c63dd8c12
amd64/9.2/SRPMS/perl-5.8.1-0.RC4.3.1.92mdk.src.rpm
a2cb97e745ebf53551b18f771664b9e5
amd64/9.2/SRPMS/perl-MIME-tools-5.415-1.0.92mdk.src.rpm


To upgrade automatically use MandrakeUpdate or urpmi. The
verification of md5 checksums and GPG signatures is performed
automatically for you.

All packages are signed by Mandrakesoft for security. You can
obtain the GPG public key of the Mandrakelinux Security Team by
executing:

gpg –recv-keys –keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandrakelinux at:

http://www.mandrakesoft.com/security/advisories

If you want to report vulnerabilities, please contact

security_linux-mandrake.com

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team


Mandrakelinux Security Update Advisory


Package name: netatalk
Advisory ID: MDKSA-2004:121
Date: November 1st, 2004
Affected versions: 10.0, 10.1, 9.2, Corporate Server 2.1


Problem Description:

The etc2ps.sh script, part of the netatalk package, creates
files in /tmp with predicatable names which could allow a local
attacker to use symbolic links to point to a valid file on the
filesystem which could lead to the overwriting of arbitrary files
if etc2ps.sh is executed by someone with enough privilege.

The updated packages are patched to prevent this problem.


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0974


Updated Packages:

Mandrakelinux 10.0:
4ce3756d43716be6821269eef25f82c0
10.0/RPMS/netatalk-1.6.4-1.1.100mdk.i586.rpm
59ca7a79a2e6685791e03bafcf61acc7
10.0/RPMS/netatalk-devel-1.6.4-1.1.100mdk.i586.rpm
1b132e2b84a2486676eaa86501ae762c
10.0/SRPMS/netatalk-1.6.4-1.1.100mdk.src.rpm

Mandrakelinux 10.0/AMD64:
c92dd42a1b1ff1ad9a1586cdb0245a5a
amd64/10.0/RPMS/netatalk-1.6.4-1.1.100mdk.amd64.rpm
97331e055754a796e90a1779f2bebbb5
amd64/10.0/RPMS/netatalk-devel-1.6.4-1.1.100mdk.amd64.rpm
1b132e2b84a2486676eaa86501ae762c
amd64/10.0/SRPMS/netatalk-1.6.4-1.1.100mdk.src.rpm

Mandrakelinux 10.1:
3fd55bd3b38abb459abc432d61b317a3
10.1/RPMS/netatalk-2.0-0beta2.3.1.101mdk.i586.rpm
2e7f7add5982ab63b881421465d4c37f
10.1/RPMS/netatalk-devel-2.0-0beta2.3.1.101mdk.i586.rpm
602615d65ae34e5e1da29bcebfe19f96
10.1/SRPMS/netatalk-2.0-0beta2.3.1.101mdk.src.rpm

Mandrakelinux 10.1/X86_64:
c000e90061aaa97b3ab07e93b326a0f9
x86_64/10.1/RPMS/netatalk-2.0-0beta2.3.1.101mdk.x86_64.rpm
bd24d4eee231988c0a0d7d9c50b6accb
x86_64/10.1/RPMS/netatalk-devel-2.0-0beta2.3.1.101mdk.x86_64.rpm

602615d65ae34e5e1da29bcebfe19f96
x86_64/10.1/SRPMS/netatalk-2.0-0beta2.3.1.101mdk.src.rpm

Corporate Server 2.1:
95c81937a581763fa82469a7a74dccaa
corporate/2.1/RPMS/netatalk-1.6.2-2.1.C21mdk.i586.rpm
73a2742b87e26cadb0ee3784b5a80eb8
corporate/2.1/RPMS/netatalk-devel-1.6.2-2.1.C21mdk.i586.rpm
3cfea962d1d2d83b329e367a5fa054ff
corporate/2.1/SRPMS/netatalk-1.6.2-2.1.C21mdk.src.rpm

Corporate Server 2.1/x86_64:
8312c749319643c5176f26279fa016a0
x86_64/corporate/2.1/RPMS/netatalk-1.6.2-2.1.C21mdk.x86_64.rpm
6ecbd6075522822e5d88df4b0fdf90f5
x86_64/corporate/2.1/RPMS/netatalk-devel-1.6.2-2.1.C21mdk.x86_64.rpm

3cfea962d1d2d83b329e367a5fa054ff
x86_64/corporate/2.1/SRPMS/netatalk-1.6.2-2.1.C21mdk.src.rpm

Mandrakelinux 9.2:
6b85ea8cd82a8cc10c5431d41853a89b
9.2/RPMS/netatalk-1.6.3-4.1.92mdk.i586.rpm
4adfdcaef8e4264db889b2f97a628e29
9.2/RPMS/netatalk-devel-1.6.3-4.1.92mdk.i586.rpm
7cb04faaacc7a689f47d83ec7204b173
9.2/SRPMS/netatalk-1.6.3-4.1.92mdk.src.rpm

Mandrakelinux 9.2/AMD64:
9ad364504c8288cb659a762341aee089
amd64/9.2/RPMS/netatalk-1.6.3-4.1.92mdk.amd64.rpm
03fb757d32760b3428db35c182fcdf15
amd64/9.2/RPMS/netatalk-devel-1.6.3-4.1.92mdk.amd64.rpm
7cb04faaacc7a689f47d83ec7204b173
amd64/9.2/SRPMS/netatalk-1.6.3-4.1.92mdk.src.rpm


To upgrade automatically use MandrakeUpdate or urpmi. The
verification of md5 checksums and GPG signatures is performed
automatically for you.

All packages are signed by Mandrakesoft for security. You can
obtain the GPG public key of the Mandrakelinux Security Team by
executing:

gpg –recv-keys –keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandrakelinux at:

http://www.mandrakesoft.com/security/advisories

If you want to report vulnerabilities, please contact

security_linux-mandrake.com

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team
<security linux-mandrake.com>


Mandrakelinux Security Update Advisory


Package name: MySQL
Advisory ID: MDKSA-2004:119
Date: November 1st, 2004
Affected versions: 10.0, 10.1, 9.2, Corporate Server 2.1


Problem Description:

A number of problems have been discovered in the MySQL database
server:

Jeroen van Wolffelaar discovered an insecure temporary file
vulnerability in the mysqlhotcopy script when using the scp method
(CAN-2004-0457).

Oleksandr Byelkin discovered that the “ALTER TABLE … RENAME”
would check the CREATE/INSERT rights of the old table rather than
the new one (CAN-2004-0835).

Lukasz Wojtow discovered a buffer overrun in the
mysql_real_connect function (CAN-2004-0836).

Dean Ellis discovered that multiple threads ALTERing the same
(or different) MERGE tables to change the UNION can cause the
server to crash or stall (CAN-2004-0837).

The updated MySQL packages have been patched to protect against
these issues.


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0457
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0835
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0836
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0837
http://bugs.mysql.com/bug.php?id=3270
http://bugs.mysql.com/bug.php?id=4017
http://bugs.mysql.com/bug.php?id=2408


Updated Packages:

Mandrakelinux 10.0:
f680ccd6ecdd9abc77496c71ce02d70b
10.0/RPMS/MySQL-4.0.18-1.2.100mdk.i586.rpm
30c0c2b64243f1b9ac300eb52062d303
10.0/RPMS/MySQL-Max-4.0.18-1.2.100mdk.i586.rpm
8618a5f416cf30cd527be1f42763210f
10.0/RPMS/MySQL-bench-4.0.18-1.2.100mdk.i586.rpm
b6d07c7d09e405e174311024e098de1b
10.0/RPMS/MySQL-client-4.0.18-1.2.100mdk.i586.rpm
b28337d115d733eb280d7fe5659bcc5a
10.0/RPMS/MySQL-common-4.0.18-1.2.100mdk.i586.rpm
66536b18fc371f756a61496d90340a7b
10.0/RPMS/libmysql12-4.0.18-1.2.100mdk.i586.rpm
befe1dbf68fcbc0b9300af93ec9b9d57
10.0/RPMS/libmysql12-devel-4.0.18-1.2.100mdk.i586.rpm
188e63d83d403f4c4c11ae7487cf45ac
10.0/SRPMS/MySQL-4.0.18-1.2.100mdk.src.rpm

Mandrakelinux 10.0/AMD64:
491712aed8839a408cd2e3a5ca088668
amd64/10.0/RPMS/MySQL-4.0.18-1.2.100mdk.amd64.rpm
d579b376ed0da8d42dc1adb1a472a923
amd64/10.0/RPMS/MySQL-Max-4.0.18-1.2.100mdk.amd64.rpm
b0b056e3a247c2187a09eec2b5c666a3
amd64/10.0/RPMS/MySQL-bench-4.0.18-1.2.100mdk.amd64.rpm
44fc8c891ea9e75ed10918c52e29ddd7
amd64/10.0/RPMS/MySQL-client-4.0.18-1.2.100mdk.amd64.rpm
df20d5582e78629ff86e27499a72b0b7
amd64/10.0/RPMS/MySQL-common-4.0.18-1.2.100mdk.amd64.rpm
79af2d7adb19e2a0df48c8d0765914fe
amd64/10.0/RPMS/lib64mysql12-4.0.18-1.2.100mdk.amd64.rpm
a5e44db419bb47f1169deb3af54f9d48
amd64/10.0/RPMS/lib64mysql12-devel-4.0.18-1.2.100mdk.amd64.rpm
188e63d83d403f4c4c11ae7487cf45ac
amd64/10.0/SRPMS/MySQL-4.0.18-1.2.100mdk.src.rpm

Mandrakelinux 10.1:
0241fc97ccebf80f02f573404cc7f01b
10.1/RPMS/MySQL-4.0.20-3.1.101mdk.i586.rpm
fb27d0a9d916a63d4c8143c7ae181ef0
10.1/RPMS/MySQL-Max-4.0.20-3.1.101mdk.i586.rpm
758d3b52cf32d0fb1114199eb7e65247
10.1/RPMS/MySQL-bench-4.0.20-3.1.101mdk.i586.rpm
1df5f23ef2ea4f9456323dc7925d0790
10.1/RPMS/MySQL-client-4.0.20-3.1.101mdk.i586.rpm
61d8e14939e9dcc9bf8b9207e7a4bd60
10.1/RPMS/MySQL-common-4.0.20-3.1.101mdk.i586.rpm
ee21d69bf2275f8933ca0c91c5af5b98
10.1/RPMS/libmysql12-4.0.20-3.1.101mdk.i586.rpm
9c64006cb87de169f43ad8f78b1b1c47
10.1/RPMS/libmysql12-devel-4.0.20-3.1.101mdk.i586.rpm
a3b194caf4c67c8fa6f881d5577aabba
10.1/SRPMS/MySQL-4.0.20-3.1.101mdk.src.rpm

Mandrakelinux 10.1/X86_64:
214a6acbb0fb3e8398111a6d30ac4082
x86_64/10.1/RPMS/MySQL-4.0.20-3.1.101mdk.x86_64.rpm
72ad37fa4cd99254d399e725c44b5681
x86_64/10.1/RPMS/MySQL-Max-4.0.20-3.1.101mdk.x86_64.rpm
c98fd317bc3a2387801c440626459f4e
x86_64/10.1/RPMS/MySQL-bench-4.0.20-3.1.101mdk.x86_64.rpm
3141d5e2fa8ca10f94c3501e10e0d00f
x86_64/10.1/RPMS/MySQL-client-4.0.20-3.1.101mdk.x86_64.rpm
57f74802dbc5a4912dd926ec748d53a4
x86_64/10.1/RPMS/MySQL-common-4.0.20-3.1.101mdk.x86_64.rpm
ab48d1099a5077e763b9d11c373369b4
x86_64/10.1/RPMS/lib64mysql12-4.0.20-3.1.101mdk.x86_64.rpm
2f0846107ddaa0d7c6c389add0dbd6d5
x86_64/10.1/RPMS/lib64mysql12-devel-4.0.20-3.1.101mdk.x86_64.rpm

a3b194caf4c67c8fa6f881d5577aabba
x86_64/10.1/SRPMS/MySQL-4.0.20-3.1.101mdk.src.rpm

Corporate Server 2.1:
6a3d3652bcf1b9b213cb12b22abfa297
corporate/2.1/RPMS/MySQL-3.23.56-1.6.C21mdk.i586.rpm
c819f40d6afef344e3fbfd50f13e4adb
corporate/2.1/RPMS/MySQL-Max-3.23.56-1.6.C21mdk.i586.rpm
c3bf86fe33f2e1f80ba53817fe23ed60
corporate/2.1/RPMS/MySQL-bench-3.23.56-1.6.C21mdk.i586.rpm
2296ca45f742f6ad4fe0f12827bc7e69
corporate/2.1/RPMS/MySQL-client-3.23.56-1.6.C21mdk.i586.rpm
7cdd06d76012d329ffb1b8c05af8ce22
corporate/2.1/RPMS/libmysql10-3.23.56-1.6.C21mdk.i586.rpm
6b8784affa68c19199753877a7127c93
corporate/2.1/RPMS/libmysql10-devel-3.23.56-1.6.C21mdk.i586.rpm
537ee31b2c8b6c0c006d07bea8aad1a8
corporate/2.1/SRPMS/MySQL-3.23.56-1.6.C21mdk.src.rpm

Corporate Server 2.1/x86_64:
b308f0d13fabf30b0c73b6a62bae42d2
x86_64/corporate/2.1/RPMS/MySQL-3.23.56-1.6.C21mdk.x86_64.rpm
d1681268b5c2d3d5865585d517001aff
x86_64/corporate/2.1/RPMS/MySQL-Max-3.23.56-1.6.C21mdk.x86_64.rpm

d508c3f565f294d319e8da215a622eeb
x86_64/corporate/2.1/RPMS/MySQL-bench-3.23.56-1.6.C21mdk.x86_64.rpm

20219356f5a1256eb5d4543e30fa3ce4
x86_64/corporate/2.1/RPMS/MySQL-client-3.23.56-1.6.C21mdk.x86_64.rpm

aac8add3fe8beee70f9b3048a7372ab0
x86_64/corporate/2.1/RPMS/libmysql10-3.23.56-1.6.C21mdk.x86_64.rpm

cb7d3ebab5149514909633609b47fab1
x86_64/corporate/2.1/RPMS/libmysql10-devel-3.23.56-1.6.C21mdk.x86_64.rpm

537ee31b2c8b6c0c006d07bea8aad1a8
x86_64/corporate/2.1/SRPMS/MySQL-3.23.56-1.6.C21mdk.src.rpm

Mandrakelinux 9.2:
8a874159baa33853754001a99e1cdd10
9.2/RPMS/MySQL-4.0.15-1.2.92mdk.i586.rpm
ea88058a50c8f170c35b070f8843d1dd
9.2/RPMS/MySQL-Max-4.0.15-1.2.92mdk.i586.rpm
686a188b99e75f2e44c7be5fc49313bb
9.2/RPMS/MySQL-bench-4.0.15-1.2.92mdk.i586.rpm
077b2f4785ec2af1a0886baf0dd5742d
9.2/RPMS/MySQL-client-4.0.15-1.2.92mdk.i586.rpm
e2622344b092c71e68f6be668d2b00a1
9.2/RPMS/MySQL-common-4.0.15-1.2.92mdk.i586.rpm
a1a485e1de88013571f6c2ea0417f1f8
9.2/RPMS/libmysql12-4.0.15-1.2.92mdk.i586.rpm
46b3cfd41057fd6ad674555f1cd2e786
9.2/RPMS/libmysql12-devel-4.0.15-1.2.92mdk.i586.rpm
d040b231845bf2035905fcdeec142650
9.2/SRPMS/MySQL-4.0.15-1.2.92mdk.src.rpm

Mandrakelinux 9.2/AMD64:
e8a1259267471c9f47b812aa80782a7f
amd64/9.2/RPMS/MySQL-4.0.15-1.2.92mdk.amd64.rpm
4545590ffd9eb4995807a4c37762d966
amd64/9.2/RPMS/MySQL-Max-4.0.15-1.2.92mdk.amd64.rpm
e85c26267ae0847e982b848bcae82715
amd64/9.2/RPMS/MySQL-bench-4.0.15-1.2.92mdk.amd64.rpm
f1ea2226a633f792d70ecb4508a50bc2
amd64/9.2/RPMS/MySQL-client-4.0.15-1.2.92mdk.amd64.rpm
4aa99ef449ebe42466adbdbf99e2f588
amd64/9.2/RPMS/MySQL-common-4.0.15-1.2.92mdk.amd64.rpm
b92a3b4fa52f27e9e92b9d8691f6bf9e
amd64/9.2/RPMS/lib64mysql12-4.0.15-1.2.92mdk.amd64.rpm
410e1737c0cff17eba69081894c91bcd
amd64/9.2/RPMS/lib64mysql12-devel-4.0.15-1.2.92mdk.amd64.rpm
d040b231845bf2035905fcdeec142650
amd64/9.2/SRPMS/MySQL-4.0.15-1.2.92mdk.src.rpm


To upgrade automatically use MandrakeUpdate or urpmi. The
verification of md5 checksums and GPG signatures is performed
automatically for you.

All packages are signed by Mandrakesoft for security. You can
obtain the GPG public key of the Mandrakelinux Security Team by
executing:

gpg –recv-keys –keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandrakelinux at:

http://www.mandrakesoft.com/security/advisories

If you want to report vulnerabilities, please contact

security_linux-mandrake.com

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team
<security linux-mandrake.com>


Mandrakelinux Security Update Advisory


Package name: mpg123
Advisory ID: MDKSA-2004:120
Date: November 1st, 2004
Affected versions: 10.0, 10.1, Corporate Server 2.1


Problem Description:

Carlos Barros discovered two buffer overflow vulnerabilities in
mpg123; the first in the getauthfromURL() function and the second
in the http_open() function. These vulnerabilities could be
exploited to possibly execute arbitrary code with the privileges of
the user running mpg123.

The provided packages are patched to fix these issues, as well
additional boundary checks that were lacking have been included
(thanks to the Gentoo Linux Sound Team for these additional
fixes).


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0891

http://www.barrossecurity.com/advisories/mpg123_getauthfromurl_bof_advisory.txt


Updated Packages:

Mandrakelinux 10.0:
e182221a9da782a235dd6ff3db6d5df0
10.0/RPMS/mpg123-0.59r-22.1.100mdk.i586.rpm
c4d8be742f4e6299c7661d6c66a20d53
10.0/SRPMS/mpg123-0.59r-22.1.100mdk.src.rpm

Mandrakelinux 10.0/AMD64:
79de393feac1cb0b307085f3af8d3fdc
amd64/10.0/RPMS/mpg123-0.59r-22.1.100mdk.amd64.rpm
c4d8be742f4e6299c7661d6c66a20d53
amd64/10.0/SRPMS/mpg123-0.59r-22.1.100mdk.src.rpm

Mandrakelinux 10.1:
65f24310894911afebb9172aec3eb7a4
10.1/RPMS/mpg123-0.59r-22.1.101mdk.i586.rpm
ed8c0715a350da0d8b8736f78e52de80
10.1/SRPMS/mpg123-0.59r-22.1.101mdk.src.rpm

Mandrakelinux 10.1/X86_64:
405f3bfd2b7f8379b0fdc4880b1b84ff
x86_64/10.1/RPMS/mpg123-0.59r-22.1.101mdk.x86_64.rpm
ed8c0715a350da0d8b8736f78e52de80
x86_64/10.1/SRPMS/mpg123-0.59r-22.1.101mdk.src.rpm

Corporate Server 2.1:
0484f705c2ae6dd6ee6c7183cf5bcc3b
corporate/2.1/RPMS/mpg123-0.59r-21.2.C21mdk.i586.rpm
0c38f64a2b5492824947d5aeaddb190a
corporate/2.1/SRPMS/mpg123-0.59r-21.2.C21mdk.src.rpm

Corporate Server 2.1/x86_64:
1974ef15ef340f0c38a9dba8ecc9723f
x86_64/corporate/2.1/RPMS/mpg123-0.59r-21.2.C21mdk.x86_64.rpm
0c38f64a2b5492824947d5aeaddb190a
x86_64/corporate/2.1/SRPMS/mpg123-0.59r-21.2.C21mdk.src.rpm


To upgrade automatically use MandrakeUpdate or urpmi. The
verification of md5 checksums and GPG signatures is performed
automatically for you.

All packages are signed by Mandrakesoft for security. You can
obtain the GPG public key of the Mandrakelinux Security Team by
executing:

gpg –recv-keys –keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandrakelinux at:

http://www.mandrakesoft.com/security/advisories

If you want to report vulnerabilities, please contact

security_linux-mandrake.com

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team
<security linux-mandrake.com>


Mandrakelinux Security Update Advisory


Package name: perl-Archive-Zip
Advisory ID: MDKSA-2004:118
Date: November 1st, 2004
Affected versions: 10.1


Problem Description:

Recently, it was noticed that several antivirus programs miss
viruses that are contained in ZIP archives with manipulated
directory data. The global archive directory of these ZIP file have
been manipulated to indicate zero file sizes.

Archive::Zip produces files of zero length when decompressing
this type of ZIP file. This causes AV products that use
Archive::ZIP to fail to detect viruses in manipulated ZIP archives.
One of these products is amavisd-new.

The updated packages are patched to fix this problem.


References:

http://rt.cpan.org/NoAuth/Bug.html?id=8077


Updated Packages:

Mandrakelinux 10.1:
1b0b561bb9766e70bcfd481e25605617
10.1/RPMS/perl-Archive-Zip-1.14-1.0.101mdk.noarch.rpm
c6766a6f3ac0cce36a72e06a1b5f3070
10.1/SRPMS/perl-Archive-Zip-1.14-1.0.101mdk.src.rpm

Mandrakelinux 10.1/X86_64:
527e70bd67497e63ce949ac195d8f28b
x86_64/10.1/RPMS/perl-Archive-Zip-1.14-1.0.101mdk.noarch.rpm
c6766a6f3ac0cce36a72e06a1b5f3070
x86_64/10.1/SRPMS/perl-Archive-Zip-1.14-1.0.101mdk.src.rpm


To upgrade automatically use MandrakeUpdate or urpmi. The
verification of md5 checksums and GPG signatures is performed
automatically for you.

All packages are signed by Mandrakesoft for security. You can
obtain the GPG public key of the Mandrakelinux Security Team by
executing:

gpg –recv-keys –keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandrakelinux at:

http://www.mandrakesoft.com/security/advisories

If you want to report vulnerabilities, please contact

security_linux-mandrake.com

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team
<security linux-mandrake.com>


Mandrakelinux Security Update Advisory


Package name: gaim
Advisory ID: MDKSA-2004:117
Date: November 1st, 2004
Affected versions: 10.1


Problem Description:

A vulnerability in the MSN protocol handler in the gaim instant
messenger application was discovered. When receiving unexpected
sequences of MSNSLP messages, it is possible that an attacker could
trigger an internal buffer overflow which could lead to a crash or
even code execution as the user running gaim.

The updated packages are patched to fix this problem. This
problem does not affect Mandrakelinux 10.0 installations.


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0891


Updated Packages:

Mandrakelinux 10.1:
6b2e6e52fc0e1da0bb75b7301850387e
10.1/RPMS/gaim-0.82.1-2.1.101mdk.i586.rpm
6846eac8a14b5ff6a0a88aa5aad13edf
10.1/RPMS/gaim-devel-0.82.1-2.1.101mdk.i586.rpm
00936e0fc7426aa731249074d09157d9
10.1/RPMS/gaim-festival-0.82.1-2.1.101mdk.i586.rpm
9da5d5523a8b36fc269302f846c90326
10.1/RPMS/gaim-gevolution-0.82.1-2.1.101mdk.i586.rpm
66486b28ed9c1ae2a3c51d83098211e6
10.1/RPMS/gaim-perl-0.82.1-2.1.101mdk.i586.rpm
5fbd3315fa9d0b044f46c3293506d7ef
10.1/RPMS/gaim-tcl-0.82.1-2.1.101mdk.i586.rpm
9234881322236a36a3b150ecaa161fbf
10.1/RPMS/libgaim-remote0-0.82.1-2.1.101mdk.i586.rpm
ff323c8ca35ac7f7d06bf1dc559b0971
10.1/RPMS/libgaim-remote0-devel-0.82.1-2.1.101mdk.i586.rpm
f397ccb1e39cf3db656e5375d1d238b5
10.1/SRPMS/gaim-0.82.1-2.1.101mdk.src.rpm

Mandrakelinux 10.1/X86_64:
0df2813a1751c7a768c4fdff3a191443
x86_64/10.1/RPMS/gaim-0.82.1-2.1.101mdk.x86_64.rpm
39e701d2adf67e1c74bd8b131ede3d5e
x86_64/10.1/RPMS/gaim-devel-0.82.1-2.1.101mdk.x86_64.rpm
22216a8ac0776d8de42d6f5a7de3b427
x86_64/10.1/RPMS/gaim-festival-0.82.1-2.1.101mdk.x86_64.rpm
020f9285bcca532427cfcfd052d96235
x86_64/10.1/RPMS/gaim-gevolution-0.82.1-2.1.101mdk.x86_64.rpm
4de10661d941c2a9dc7f1a64071f868f
x86_64/10.1/RPMS/gaim-perl-0.82.1-2.1.101mdk.x86_64.rpm
92e8ce4e22e77c1235915a0ee68df2ab
x86_64/10.1/RPMS/gaim-tcl-0.82.1-2.1.101mdk.x86_64.rpm
5bf30cddc4f32809a346c2cadef3913a
x86_64/10.1/RPMS/lib64gaim-remote0-0.82.1-2.1.101mdk.x86_64.rpm
38797f001f6811fca52e32319d14923c
x86_64/10.1/RPMS/lib64gaim-remote0-devel-0.82.1-2.1.101mdk.x86_64.rpm

f397ccb1e39cf3db656e5375d1d238b5
x86_64/10.1/SRPMS/gaim-0.82.1-2.1.101mdk.src.rpm


To upgrade automatically use MandrakeUpdate or urpmi. The
verification of md5 checksums and GPG signatures is performed
automatically for you.

All packages are signed by Mandrakesoft for security. You can
obtain the GPG public key of the Mandrakelinux Security Team by
executing:

gpg –recv-keys –keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandrakelinux at:

http://www.mandrakesoft.com/security/advisories

If you want to report vulnerabilities, please contact

security_linux-mandrake.com

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team
<security linux-mandrake.com>


Mandrakelinux Security Update Advisory


Package name: mod_ssl/apache2-mod_ssl
Advisory ID: MDKSA-2004:122
Date: November 1st, 2004
Affected versions: 10.0, 10.1, 9.2, Corporate Server 2.1, Multi
Network Firewall 8.2


Problem Description:

A vulnerability in mod_ssl was discovered by Hartmut Keil. After
a renegotiation, mod_ssl would fail to ensure that the requested
cipher suite is actually negotiated. The provided packages have
been patched to prevent this problem.


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0885


Updated Packages:

Mandrakelinux 10.0:
429d438717b8bfdd0ac366da8f3e7e89
10.0/RPMS/apache2-2.0.48-6.7.100mdk.i586.rpm
6edd259a81c690a6a1299271a10de8ab
10.0/RPMS/apache2-common-2.0.48-6.7.100mdk.i586.rpm
ddbbe0d19ccdcbcf7a4a4d823676faea
10.0/RPMS/apache2-devel-2.0.48-6.7.100mdk.i586.rpm
9a1425b21544ff9bd81dcc3386c81631
10.0/RPMS/apache2-manual-2.0.48-6.7.100mdk.i586.rpm
27cd57beaf5db175693d01366046691b
10.0/RPMS/apache2-mod_cache-2.0.48-6.7.100mdk.i586.rpm
6141d95d82f2c2f38838b72c3ac7806a
10.0/RPMS/apache2-mod_dav-2.0.48-6.7.100mdk.i586.rpm
48ac206a447c0c25fa9e617639474c77
10.0/RPMS/apache2-mod_deflate-2.0.48-6.7.100mdk.i586.rpm
c6f94930e3b5055ad1073ee949110f57
10.0/RPMS/apache2-mod_disk_cache-2.0.48-6.7.100mdk.i586.rpm
56746abbceb15245aef8573bfa1b7a54
10.0/RPMS/apache2-mod_file_cache-2.0.48-6.7.100mdk.i586.rpm
69bad52d4f96fccb86631a656f50f4eb
10.0/RPMS/apache2-mod_ldap-2.0.48-6.7.100mdk.i586.rpm
e325fadb04ae542e22ae363ce496eb18
10.0/RPMS/apache2-mod_mem_cache-2.0.48-6.7.100mdk.i586.rpm
9d717c63ca90fd26cac4a3cf61cf269f
10.0/RPMS/apache2-mod_proxy-2.0.48-6.7.100mdk.i586.rpm
d9f0228462bd4b7f041dbd94aae68125
10.0/RPMS/apache2-mod_ssl-2.0.48-6.7.100mdk.i586.rpm
7193c375c5dcccc1e51637ec318aea7e
10.0/RPMS/apache2-modules-2.0.48-6.7.100mdk.i586.rpm
38c0cb64d7c75e071c08832c7fd49c3a
10.0/RPMS/apache2-source-2.0.48-6.7.100mdk.i586.rpm
20194ed8af9f9a691b23732058a739b9
10.0/RPMS/libapr0-2.0.48-6.7.100mdk.i586.rpm
e53dbfcd27032f209a1d60a7cd5b5cbf
10.0/RPMS/mod_ssl-2.8.16-1.3.100mdk.i586.rpm
ea8e6ebb5defc2e6465356bccb9d6678
10.0/SRPMS/apache2-2.0.48-6.7.100mdk.src.rpm
8074914686563633c3948fd4143f7b09
10.0/SRPMS/mod_ssl-2.8.16-1.3.100mdk.src.rpm

Mandrakelinux 10.0/AMD64:
146b8d20ad0fec83efbf0a09a3a0dbe0
amd64/10.0/RPMS/apache2-2.0.48-6.7.100mdk.amd64.rpm
936e446e2416dddbb4b189e35aa72279
amd64/10.0/RPMS/apache2-common-2.0.48-6.7.100mdk.amd64.rpm
b62c10d878316695bcd8cb6209a85224
amd64/10.0/RPMS/apache2-devel-2.0.48-6.7.100mdk.amd64.rpm
390b1b48fc06b57951521037835cd804
amd64/10.0/RPMS/apache2-manual-2.0.48-6.7.100mdk.amd64.rpm
7a5affc7e9672730518d1f53982d1db5
amd64/10.0/RPMS/apache2-mod_cache-2.0.48-6.7.100mdk.amd64.rpm
0e9243c8847f717e9f59954f23c571da
amd64/10.0/RPMS/apache2-mod_dav-2.0.48-6.7.100mdk.amd64.rpm
cc345abfdea330abda80f2bb85288cc9
amd64/10.0/RPMS/apache2-mod_deflate-2.0.48-6.7.100mdk.amd64.rpm
2a22ea878c5741dd375ad394bc87f1f5
amd64/10.0/RPMS/apache2-mod_disk_cache-2.0.48-6.7.100mdk.amd64.rpm

babacc68efe1bc11a221013fc0910ba0
amd64/10.0/RPMS/apache2-mod_file_cache-2.0.48-6.7.100mdk.amd64.rpm

122f0049f13e32db6a499c1ba937cd31
amd64/10.0/RPMS/apache2-mod_ldap-2.0.48-6.7.100mdk.amd64.rpm
4a92da61ce77dc5a28e6315068687537
amd64/10.0/RPMS/apache2-mod_mem_cache-2.0.48-6.7.100mdk.amd64.rpm

78996c9106336896f83c3f882afa8640
amd64/10.0/RPMS/apache2-mod_proxy-2.0.48-6.7.100mdk.amd64.rpm
4edb7510fa7225422933db88968890cd
amd64/10.0/RPMS/apache2-mod_ssl-2.0.48-6.7.100mdk.amd64.rpm
b109c1ac9ca2f0fe66e42944b543ccaa
amd64/10.0/RPMS/apache2-modules-2.0.48-6.7.100mdk.amd64.rpm
46169f035e89af16def0ad29b1c7b327
amd64/10.0/RPMS/apache2-source-2.0.48-6.7.100mdk.amd64.rpm
c358fa7df7e0b50818e25f2f8f7866a2
amd64/10.0/RPMS/lib64apr0-2.0.48-6.7.100mdk.amd64.rpm
951ddb8c42310629b23d9eabb188c6b5
amd64/10.0/RPMS/mod_ssl-2.8.16-1.3.100mdk.amd64.rpm
ea8e6ebb5defc2e6465356bccb9d6678
amd64/10.0/SRPMS/apache2-2.0.48-6.7.100mdk.src.rpm
8074914686563633c3948fd4143f7b09
amd64/10.0/SRPMS/mod_ssl-2.8.16-1.3.100mdk.src.rpm

Mandrakelinux 10.1:
e714fa9784281c66b72817bb5deecf6b
10.1/RPMS/apache2-2.0.50-7.1.101mdk.i586.rpm
efcbecb46dabc550023ad708e5b5356d
10.1/RPMS/apache2-common-2.0.50-7.1.101mdk.i586.rpm
dea9db9c1c01e0983faf48f07472e19f
10.1/RPMS/apache2-devel-2.0.50-7.1.101mdk.i586.rpm
d9b7e5a6031fbf5267c2049248fef0c7
10.1/RPMS/apache2-manual-2.0.50-7.1.101mdk.i586.rpm
3f920325b94a6ebebca013340eb8e04a
10.1/RPMS/apache2-mod_cache-2.0.50-7.1.101mdk.i586.rpm
592da78980d07502c3624f796ae6fbe8
10.1/RPMS/apache2-mod_dav-2.0.50-7.1.101mdk.i586.rpm
5e98d536e68aeeec4478883c5cddd2c4
10.1/RPMS/apache2-mod_deflate-2.0.50-7.1.101mdk.i586.rpm
ddf6aedfdd0e69201d96d370a75bcba5
10.1/RPMS/apache2-mod_disk_cache-2.0.50-7.1.101mdk.i586.rpm
6d4607217579d55ba1b6e16c34b21531
10.1/RPMS/apache2-mod_file_cache-2.0.50-7.1.101mdk.i586.rpm
58edbcd2e6a6303596f61b6fceaf631e
10.1/RPMS/apache2-mod_ldap-2.0.50-7.1.101mdk.i586.rpm
84ce3ae0a05d5511195b675a52ee3d99
10.1/RPMS/apache2-mod_mem_cache-2.0.50-7.1.101mdk.i586.rpm
e98c611a98dae2a92591fec63979a363
10.1/RPMS/apache2-mod_proxy-2.0.50-7.1.101mdk.i586.rpm
66c51a72f1933c5146715dcf95c2a3c6
10.1/RPMS/apache2-mod_ssl-2.0.50-4.1.101mdk.i586.rpm
df78cfe3bde7549a7e140baa297d0960
10.1/RPMS/apache2-modules-2.0.50-7.1.101mdk.i586.rpm
06161835b5ef8166608d446e1e5adbb9
10.1/RPMS/apache2-source-2.0.50-7.1.101mdk.i586.rpm
5efa55982a850f076b9b59716d32f0c4
10.1/RPMS/apache2-worker-2.0.50-7.1.101mdk.i586.rpm
5b57e055e2d7b527f1319ca8f9f1f634
10.1/RPMS/mod_ssl-2.8.19-1.1.101mdk.i586.rpm
1e7f77b7dfda5fffcadc105983f8d057
10.1/SRPMS/apache2-2.0.50-7.1.101mdk.src.rpm
f570d037a621f96459b1277a751321f0
10.1/SRPMS/apache2-mod_ssl-2.0.50-4.1.101mdk.src.rpm
7d747fde6e998c9493280925420bab7d
10.1/SRPMS/mod_ssl-2.8.19-1.1.101mdk.src.rpm

Mandrakelinux 10.1/X86_64:
af7afd1cd53cb0f6f21e00dbb05af085
x86_64/10.1/RPMS/apache2-2.0.50-7.1.101mdk.x86_64.rpm
bc53536922c2faa9a05186e2329c0051
x86_64/10.1/RPMS/apache2-common-2.0.50-7.1.101mdk.x86_64.rpm
e7ab3c9911988c2c7c7d7907c61e82c3
x86_64/10.1/RPMS/apache2-devel-2.0.50-7.1.101mdk.x86_64.rpm
1d4a7e7283de77ff88b34c2f63e107de
x86_64/10.1/RPMS/apache2-manual-2.0.50-7.1.101mdk.x86_64.rpm
abe578e53cd5b8ef6455049469018300
x86_64/10.1/RPMS/apache2-mod_cache-2.0.50-7.1.101mdk.x86_64.rpm
286510a60cdb51e587bb52a1a9fb1540
x86_64/10.1/RPMS/apache2-mod_dav-2.0.50-7.1.101mdk.x86_64.rpm
abf36d8698ff3380a7df6823655f6084
x86_64/10.1/RPMS/apache2-mod_deflate-2.0.50-7.1.101mdk.x86_64.rpm

87f875b72cb4c0781d4a5dba06d3ac1c
x86_64/10.1/RPMS/apache2-mod_disk_cache-2.0.50-7.1.101mdk.x86_64.rpm

16ade85a7672e70db7e64fd22031dad9
x86_64/10.1/RPMS/apache2-mod_file_cache-2.0.50-7.1.101mdk.x86_64.rpm

98fcd424d243b2e67caa9525c1ef2bbb
x86_64/10.1/RPMS/apache2-mod_ldap-2.0.50-7.1.101mdk.x86_64.rpm
a8b126818e61e244b264af9af4a0300c
x86_64/10.1/RPMS/apache2-mod_mem_cache-2.0.50-7.1.101mdk.x86_64.rpm

e0b056b71173248fe4dda59b8e369179
x86_64/10.1/RPMS/apache2-mod_proxy-2.0.50-7.1.101mdk.x86_64.rpm
deb6381ca4d8b3f661e23189b3147c0b
x86_64/10.1/RPMS/apache2-mod_ssl-2.0.50-4.1.101mdk.x86_64.rpm
ee24aeecfa66282cfdddf36868289d66
x86_64/10.1/RPMS/apache2-modules-2.0.50-7.1.101mdk.x86_64.rpm
3787cc810380a875b017c5dd61dfa753
x86_64/10.1/RPMS/apache2-source-2.0.50-7.1.101mdk.x86_64.rpm
85d018473eccf002f3952aa373ad011b
x86_64/10.1/RPMS/apache2-worker-2.0.50-7.1.101mdk.x86_64.rpm
ec2086cc14f5d8dfe69d7d3997839dc3
x86_64/10.1/RPMS/mod_ssl-2.8.19-1.1.101mdk.x86_64.rpm
1e7f77b7dfda5fffcadc105983f8d057
x86_64/10.1/SRPMS/apache2-2.0.50-7.1.101mdk.src.rpm
f570d037a621f96459b1277a751321f0
x86_64/10.1/SRPMS/apache2-mod_ssl-2.0.50-4.1.101mdk.src.rpm
7d747fde6e998c9493280925420bab7d
x86_64/10.1/SRPMS/mod_ssl-2.8.19-1.1.101mdk.src.rpm

Corporate Server 2.1:
bbb22f7a803e1e8576c01b1625b9fe59
corporate/2.1/RPMS/mod_ssl-2.8.10-5.5.C21mdk.i586.rpm
35924170ec84967c32030c56085ba4c9
corporate/2.1/SRPMS/mod_ssl-2.8.10-5.5.C21mdk.src.rpm

Corporate Server 2.1/x86_64:
0fb53bcb355dcf8c3b0a6ef7f9b77c73
x86_64/corporate/2.1/RPMS/mod_ssl-2.8.10-5.5.C21mdk.x86_64.rpm
35924170ec84967c32030c56085ba4c9
x86_64/corporate/2.1/SRPMS/mod_ssl-2.8.10-5.5.C21mdk.src.rpm

Mandrakelinux 9.2:
b312c6619e75753289727e7f54e99cd6
9.2/RPMS/apache2-2.0.47-6.10.92mdk.i586.rpm
f06a2e2d1eb60941b2ff4d01d85318da
9.2/RPMS/apache2-common-2.0.47-6.10.92mdk.i586.rpm
51ea641f34b2f69942ad7721c03bcd5e
9.2/RPMS/apache2-devel-2.0.47-6.10.92mdk.i586.rpm
d76190eb798cee44c4310ceae6b3bb4c
9.2/RPMS/apache2-manual-2.0.47-6.10.92mdk.i586.rpm
fad309f79c12f0d596ad0fb00dcca2f1
9.2/RPMS/apache2-mod_cache-2.0.47-6.10.92mdk.i586.rpm
4785ab184520460d1a97c3655cd18d92
9.2/RPMS/apache2-mod_dav-2.0.47-6.10.92mdk.i586.rpm
29844a272f63fe05b339efba4fa56fbe
9.2/RPMS/apache2-mod_deflate-2.0.47-6.10.92mdk.i586.rpm
51f8fcede09e49a3d4d674368c900adc
9.2/RPMS/apache2-mod_disk_cache-2.0.47-6.10.92mdk.i586.rpm
ce9fab1d93818c2f14bca5202b215b53
9.2/RPMS/apache2-mod_file_cache-2.0.47-6.10.92mdk.i586.rpm
5c28f8dc9e753f8d11a6870e4ec0877a
9.2/RPMS/apache2-mod_ldap-2.0.47-6.10.92mdk.i586.rpm
87a1c68f6c5294343aeadf53737f7b90
9.2/RPMS/apache2-mod_mem_cache-2.0.47-6.10.92mdk.i586.rpm
9f114f43426e496f63abb49e3697121c
9.2/RPMS/apache2-mod_proxy-2.0.47-6.10.92mdk.i586.rpm
900730bdc0e7c427c8566d3549a25854
9.2/RPMS/apache2-mod_ssl-2.0.47-6.10.92mdk.i586.rpm
de5b05c49ad0e05d0894594014c1196a
9.2/RPMS/apache2-modules-2.0.47-6.10.92mdk.i586.rpm
45cc0029100e385f54474f0aa9e7223c
9.2/RPMS/apache2-source-2.0.47-6.10.92mdk.i586.rpm
4e1957d8592e62098ff4be7e2b1006c2
9.2/RPMS/libapr0-2.0.47-6.10.92mdk.i586.rpm
8fc7c6d3324a88309a6fd3dcc53f5495
9.2/RPMS/mod_ssl-2.8.15-1.3.92mdk.i586.rpm
9d7c85949ee82104c2e9aa3f8c7eeb5a
9.2/SRPMS/apache2-2.0.47-6.10.92mdk.src.rpm
1b1ca90dfaad56a8e9b72996e7326eee
9.2/SRPMS/mod_ssl-2.8.15-1.3.92mdk.src.rpm

Mandrakelinux 9.2/AMD64:
543d639dacd77a9120ce5d18ab8182d6
amd64/9.2/RPMS/apache2-2.0.47-6.10.92mdk.amd64.rpm
d0eafc19c3cfbdb8eead634b5af006e7
amd64/9.2/RPMS/apache2-common-2.0.47-6.10.92mdk.amd64.rpm
ca61c7be7085ea9c27cb67e4406ce0be
amd64/9.2/RPMS/apache2-devel-2.0.47-6.10.92mdk.amd64.rpm
b986b2fc9d5ae3e3926c7fcf521866e4
amd64/9.2/RPMS/apache2-manual-2.0.47-6.10.92mdk.amd64.rpm
d423e61363e56cd7557ce0a7bf4ff4f9
amd64/9.2/RPMS/apache2-mod_cache-2.0.47-6.10.92mdk.amd64.rpm
cdfc95e2f7d1f62e8941a660a1890832
amd64/9.2/RPMS/apache2-mod_dav-2.0.47-6.10.92mdk.amd64.rpm
53ca615e3fd661236bc517e4fa34ecfc
amd64/9.2/RPMS/apache2-mod_deflate-2.0.47-6.10.92mdk.amd64.rpm
f55acf23c9f4d390f416be8a1b056494
amd64/9.2/RPMS/apache2-mod_disk_cache-2.0.47-6.10.92mdk.amd64.rpm

e5f68ec4b8c51b1b505baad44601fd87
amd64/9.2/RPMS/apache2-mod_file_cache-2.0.47-6.10.92mdk.amd64.rpm

e0ab7918f345fca17d9da8ac3f6b07bd
amd64/9.2/RPMS/apache2-mod_ldap-2.0.47-6.10.92mdk.amd64.rpm
999e91d7acc4203c577f6a6314231a9b
amd64/9.2/RPMS/apache2-mod_mem_cache-2.0.47-6.10.92mdk.amd64.rpm

8a0b12128fc41bfa487ba4587f075545
amd64/9.2/RPMS/apache2-mod_proxy-2.0.47-6.10.92mdk.amd64.rpm
83724c0485d7fea735b8b7a7a64cb33d
amd64/9.2/RPMS/apache2-mod_ssl-2.0.47-6.10.92mdk.amd64.rpm
25fb5ebb5493ef1ba22bd66dc244999d
amd64/9.2/RPMS/apache2-modules-2.0.47-6.10.92mdk.amd64.rpm
80baf78003f6a137704c3c3675d9292c
amd64/9.2/RPMS/apache2-source-2.0.47-6.10.92mdk.amd64.rpm
6a58f3643d9406be341b797af29e509b
amd64/9.2/RPMS/lib64apr0-2.0.47-6.10.92mdk.amd64.rpm
c7fc3129993f2832d57004b80d614925
amd64/9.2/RPMS/mod_ssl-2.8.15-1.3.92mdk.amd64.rpm
9d7c85949ee82104c2e9aa3f8c7eeb5a
amd64/9.2/SRPMS/apache2-2.0.47-6.10.92mdk.src.rpm
1b1ca90dfaad56a8e9b72996e7326eee
amd64/9.2/SRPMS/mod_ssl-2.8.15-1.3.92mdk.src.rpm

Multi Network Firewall 8.2:
5f789e741db0885e7d73fccd4022b387
mnf8.2/RPMS/mod_ssl-2.8.7-3.5.M82mdk.i586.rpm
5b471a15f2d5b9b70f85c561d75226f8
mnf8.2/SRPMS/mod_ssl-2.8.7-3.5.M82mdk.src.rpm


To upgrade automatically use MandrakeUpdate or urpmi. The
verification of md5 checksums and GPG signatures is performed
automatically for you.

All packages are signed by Mandrakesoft for security. You can
obtain the GPG public key of the Mandrakelinux Security Team by
executing:

gpg –recv-keys –keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandrakelinux at:

http://www.mandrakesoft.com/security/advisories

If you want to report vulnerabilities, please contact

security_linux-mandrake.com

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team
<security linux-mandrake.com>

Get the Free Newsletter!

Subscribe to Developer Insider for top news, trends, & analysis