Red Hat Bug Fix Advisory: malformed name and version in perl-Chart package fixed

Date: Mon, 30 Oct 2000 13:26 -0500
From: bugzilla@redhat.com
To: redhat-watch-list@redhat.com
Subject: [RHBA-2000:097-02] malformed name and version in
perl-Chart package fixed

                   Red Hat, Inc. Bug Fix Advisory

Synopsis:          kpackage dumps core when choosing file list or installing package
Advisory ID:       RHBA-2000:097-01
Issue date:        2000-10-30
Updated on:        2000-10-30
Product:           Red Hat Linux
Keywords:          kpackage segfault core dump crash kde
Cross references:  N/A

1. Topic:

A bugfix release of kpackage is avaiable. It fixes a
segmentation fault when choosing “file list” and when installing or
uninstalling a package.

2. Relevant releases/architectures:

Red Hat Linux 7.0 – i386

3. Problem description:

kpackage crashes when trying to install or uninstall certain
packages or to display the file list.

4. Solution:

For each RPM for your particular architecture, run:

rpm -Fvh [filename]

where filename is the name of the RPM.

5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla
for more info):

10788 – kpackage crashes when trying to uninstall certain
16590 – dumps core when choosing file list
18192 – kpackage crashes when listing file
18199 – segmentation fault after installing a package
18582 – Kpackage crashes when removing or listing installed
18612 – kpackage and netscape crashing in linux 7.0
19086 – problems whit Kpackage and gnorpm!
19365 – kpackage reports errors and crashes
19499 – kpackage 1.3.10-5 “Collapses” When Trying to View Instaled

6. RPMs required:

Red Hat Linux 7.0:





7. Verification:

MD5 sum                           Package Name

6dc8c73b9e976ea6a9acdf6c86231d22 7.0/SRPMS/kpackage-1.3.10-7.src.rpm
c632cd7315691f0a64376e12dadc1500 7.0/SRPMS/kpackage-1.3.10-7j1.src.rpm
e9e04b5f38f0c35905f79d853fd5c258 7.0/i386/kpackage-1.3.10-7.i386.rpm
faff52d867be2ce95d881f16a6c026d0 7.0/i386/kpackage-1.3.10-7j1.i386.rpm

These packages are GPG signed by Red Hat, Inc. for security. Our
key is available at:

You can verify each package with the following command:
rpm –checksig <filename>

If you only wish to verify that each package has not been
corrupted or tampered with, examine only the md5sum with the
following command:
rpm –checksig –nogpg <filename>

8. References:


Copyright(c) 2000 Red Hat, Inc.

Get the Free Newsletter!

Subscribe to Developer Insider for top news, trends, & analysis