dcsimg
Linux Today: Linux News On Internet Time.





Mandrake Linux Advisory: Various Packages

Apr 05, 2002, 23:30 (0 Talkback[s])
                    Mandrake Linux Update Advisory
________________________________________________________________________

Package name:           Various
Advisory ID:            MDKA-2002:004
Date:                   April 5th, 2002
Affected versions:      8.2
________________________________________________________________________

Problem Description:

 A few packages are being provided as bugfix updates to the Mandrake
 Linux 8.2 release.  Specifically:

 aspell/kde-i18n: Danish and Slovanian languages were mistakenly
 omitted from the CDs.

 jmcce: The jmcce package was mistakenly omitted from the 8.2 Download
 Edition.

 e2fsprogs: The new version fixes some memory leaks in the e2fsck
 journaling code, and in the ismounted code checking for a swap device.

 nss_ldap: The previous package did not give out a list of supplementary
 groups which the user is also a member of.  This new package is rebuilt
 with ids-uid and RFC2307bis support.

 Xtart: The released Xtart package used an old method of initiating X
 which did not provide a complete environment for consolehelper; as a
 result any applications, like Mandrake Control Center, that requires
 consolehelper to gain root access fails.

 drakxtools: There were various problems with printerdrake and HP
 Multi-Function devices.  These issues are corrected with the new
 drakxtools package.
________________________________________________________________________

Updated Packages:

 Mandrake Linux 8.2:
 fdcfb20ee5bb43906ce21d03360183c7  8.2/RPMS/Xtart-1.1-2.1mdk.i586.rpm
 0041a2a4a380a043f6f78ab78ff7447b  8.2/RPMS/aspell-da-1.4.21-1mdk.i586.rpm
 a71bfbd2f905dda53f6acbeaaa857f99  8.2/RPMS/drakxtools-1.1.7-98.1mdk.i586.rpm
 115ee432de480e0bc2f301e8b14ee626  8.2/RPMS/drakxtools-http-1.1.7-98.1mdk.i586.rpm
 22dbee0ad124df72f04807ee0708347f  8.2/RPMS/drakxtools-newt-1.1.7-98.1mdk.i586.rpm
 253780af866608d2d126b99d16989c38  8.2/RPMS/e2fsprogs-1.27-1.1mdk.i586.rpm
 b1b318e282d670037d3ff175fdf0eb7f  8.2/RPMS/jmcce-1.3-10mdk.i586.rpm
 ce2afa09dbdef781b8da227742fc6624  8.2/RPMS/kde-i18n-da-2.2.2-2mdk.noarch.rpm
 14e20cc1ac15b827fb7e7d72fb79af62  8.2/RPMS/kde-i18n-sl-2.2.2-1mdk.noarch.rpm
 de26d383355f040bc8b1ade4db7a3005  8.2/RPMS/libext2fs2-1.27-1.1mdk.i586.rpm
 0459320945a795c638ee3f484b89e594  8.2/RPMS/libext2fs2-devel-1.27-1.1mdk.i586.rpm
 6dc393325ea9b982e24761cbae760db4  8.2/RPMS/nss_ldap-173-2.1mdk.i586.rpm
 d79cb75acecc91c40e81a61173e857ad  8.2/SRPMS/Xtart-1.1-2.1mdk.src.rpm
 798414049f4475c38a01fb3303bd5bae  8.2/SRPMS/aspell-da-1.4.21-1mdk.src.rpm
 50636c8316f929c3da07fcb8a8bf1f89  8.2/SRPMS/drakxtools-1.1.7-98.1mdk.src.rpm
 7aa20199787545344754372ce5d3a26c  8.2/SRPMS/e2fsprogs-1.27-1.1mdk.src.rpm
 bb9a2dd24675bd424dfa7b85e5fa70e3  8.2/SRPMS/jmcce-1.3-10mdk.src.rpm
 ed3e7148019726e5e02f97e5d3fbee25  8.2/SRPMS/kde-i18n-da-2.2.2-2mdk.src.rpm
 1c87f5c0b40450821b8c6378b3ff7469  8.2/SRPMS/kde-i18n-sl-2.2.2-1mdk.src.rpm
 8f5ca4f81321e35ce3e7799aa3de44fe  8.2/SRPMS/nss_ldap-173-2.1mdk.src.rpm
________________________________________________________________________

Bug IDs fixed (see https://qa.mandrakesoft.com for more information):

To upgrade automatically, use MandrakeUpdate.  The verification of md5
checksums and GPG signatures is performed automatically for you.

If you want to upgrade manually, download the updated package from one 
of our FTP server mirrors and upgrade with "rpm -Fvh *.rpm".  A list of
FTP mirrors can be obtained from:

  http://www.mandrakesecure.net/en/ftp.php

Please verify the update prior to upgrading to ensure the integrity of
the downloaded package.  You can do this with the command:

  rpm --checksig 

You can obtain the GPG public key of the Mandrake Linux Security Team
from:

  https://www.mandrakesecure.net/RPM-GPG-KEYS

Please be aware that sometimes it takes the mirrors a few hours to 
update.

You can view other update advisories for Mandrake Linux at:

  http://www.mandrakesecure.net/en/advisories/

MandrakeSoft has several security-related mailing list services that
anyone can subscribe to.  Information on these lists can be obtained by
visiting:

  http://www.mandrakesecure.net/en/mlist.php

If you want to report vulnerabilities, please contact

  security@linux-mandrake.com

________________________________________________________________________

Type Bits/KeyID     Date       User ID
pub  1024D/22458A98 2000-07-10 Linux Mandrake Security Team
  <<a href="mailto:ecurity@linux-mandrake.com">security@linux-mandrake.com>


- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.0.5 (GNU/Linux)
Comment: For info see http://www.gnupg.org
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=0ahQ
- -----END PGP PUBLIC KEY BLOCK-----
________________________________________________________________________