dcsimg
Linux Today: Linux News On Internet Time.





More on LinuxToday


Mandrakelinux Advisories: perl-MIME-tools, netatalk, MySQL...

Nov 02, 2004, 22:45 (0 Talkback[s])

Mandrakelinux Security Update Advisory


Package name: perl-MIME-tools
Advisory ID: MDKSA-2004:123
Date: November 1st, 2004
Affected versions: 10.0, 10.1, 9.2, Corporate Server 2.1


Problem Description:

There's a bug in MIME-tools, where it mis-parses things like boundary="". Some viruses use an empty boundary, which may allow unapproved parts through MIMEDefang.

The updated packages are patched to fix this problem.

As well, the Updated perl-MIME-tools requires MIME::Base64 version 3.03. Since MIME::Base64 is integrated in the perl package on Mandakelinux, these updates now provide the newer version.


References:

http://lists.roaringpenguin.com/pipermail/mimedefang/2004-October/024959.html


Updated Packages:

Mandrakelinux 10.0:
d278882284c3883d1cfa31940d7da937 10.0/RPMS/perl-5.8.3-5.1.100mdk.i586.rpm
2769a4030ba0ab283e976559c75a6b90 10.0/RPMS/perl-base-5.8.3-5.1.100mdk.i586.rpm
c5ba0bbe1251056c88a2148208c01314 10.0/RPMS/perl-devel-5.8.3-5.1.100mdk.i586.rpm
3d0f1a43934ec2845d09693956931572 10.0/RPMS/perl-doc-5.8.3-5.1.100mdk.i586.rpm
0fb9ebc38b5e217dc652428d15da9094 10.0/RPMS/perl-MIME-tools-5.415-1.0.100mdk.noarch.rpm
71339cbf22986868ef9397e23a0773b0 10.0/SRPMS/perl-5.8.3-5.1.100mdk.src.rpm
447551691963d906919f92a80ba5f4d7 10.0/SRPMS/perl-MIME-tools-5.415-1.0.100mdk.src.rpm

Mandrakelinux 10.0/AMD64:
10a20606840674bfd2ffe7b6c6f1707b amd64/10.0/RPMS/perl-5.8.3-5.1.100mdk.amd64.rpm
560e79ba8cea968ca06f504bd74be04b amd64/10.0/RPMS/perl-base-5.8.3-5.1.100mdk.amd64.rpm
7f9d8d26bbe8b72b485356c20053590d amd64/10.0/RPMS/perl-devel-5.8.3-5.1.100mdk.amd64.rpm
d40dea320e9441854af7059e86f9e4da amd64/10.0/RPMS/perl-doc-5.8.3-5.1.100mdk.amd64.rpm
e2136dddff55d5a48b04247997bf599f amd64/10.0/RPMS/perl-MIME-tools-5.415-1.0.100mdk.noarch.rpm
71339cbf22986868ef9397e23a0773b0 amd64/10.0/SRPMS/perl-5.8.3-5.1.100mdk.src.rpm
447551691963d906919f92a80ba5f4d7 amd64/10.0/SRPMS/perl-MIME-tools-5.415-1.0.100mdk.src.rpm

Mandrakelinux 10.1:
4ee65c401fcb1f7e9e445dfae0cde9b9 10.1/RPMS/perl-5.8.5-3.1.101mdk.i586.rpm
de5f7cb7a5d9d7059779582761d98318 10.1/RPMS/perl-base-5.8.5-3.1.101mdk.i586.rpm
27b69c2804d9531d4eb4dbed31813732 10.1/RPMS/perl-devel-5.8.5-3.1.101mdk.i586.rpm
26dbf1cb9d0ffd6d7a402c07aa749251 10.1/RPMS/perl-doc-5.8.5-3.1.101mdk.i586.rpm
1fbeed384ad6c39ca80de7dee2b62400 10.1/RPMS/perl-MIME-tools-5.415-1.0.101mdk.noarch.rpm
a900cfda5596a33ee321ed270837b0e0 10.1/SRPMS/perl-5.8.5-3.1.101mdk.src.rpm
33b061fe528a62a9bb5315cd37ba55e8 10.1/SRPMS/perl-MIME-tools-5.415-1.0.101mdk.src.rpm

Mandrakelinux 10.1/X86_64:
f75cb59f2c0658a2cbe5357a09d8d07d x86_64/10.1/RPMS/perl-5.8.5-3.1.101mdk.x86_64.rpm
802509f65ba952bd07325bd6f2b0d3a0 x86_64/10.1/RPMS/perl-base-5.8.5-3.1.101mdk.x86_64.rpm
9325c49c6f77d90483437f6f47e55b9d x86_64/10.1/RPMS/perl-devel-5.8.5-3.1.101mdk.x86_64.rpm
d484a0e660829aa32a302138db94f66e x86_64/10.1/RPMS/perl-doc-5.8.5-3.1.101mdk.x86_64.rpm
b13178dab9710e61910a4af762e7d6a3 x86_64/10.1/RPMS/perl-MIME-tools-5.415-1.0.101mdk.noarch.rpm
a900cfda5596a33ee321ed270837b0e0 x86_64/10.1/SRPMS/perl-5.8.5-3.1.101mdk.src.rpm
33b061fe528a62a9bb5315cd37ba55e8 x86_64/10.1/SRPMS/perl-MIME-tools-5.415-1.0.101mdk.src.rpm

Corporate Server 2.1:
fc3e3f06637d571a281e639aa4490e76 corporate/2.1/RPMS/perl-5.8.0-14.2.C21mdk.i586.rpm
e039f009751fad2b77d160b67ca75218 corporate/2.1/RPMS/perl-base-5.8.0-14.2.C21mdk.i586.rpm
cceb9017b7c5d62a6846f24931c0d777 corporate/2.1/RPMS/perl-devel-5.8.0-14.2.C21mdk.i586.rpm
fb9beebfa93a3eebc86bb9012cdff1c4 corporate/2.1/RPMS/perl-doc-5.8.0-14.2.C21mdk.i586.rpm
9b484ca12bfdda17787f94d5da96613d corporate/2.1/RPMS/perl-MIME-tools-5.415-1.0.C21mdk.noarch.rpm
19dc7a7ac3e12a653901c5119315d10f corporate/2.1/SRPMS/perl-5.8.0-14.2.C21mdk.src.rpm
5987507b55b00b66ec461c0bdf994ee1 corporate/2.1/SRPMS/perl-MIME-tools-5.415-1.0.C21mdk.src.rpm

Corporate Server 2.1/x86_64:
f9d3fbf772cb558c945abe442b1e99be x86_64/corporate/2.1/RPMS/perl-5.8.0-14.2.C21mdk.x86_64.rpm
32731b18b86678988d56b63342bb8c32 x86_64/corporate/2.1/RPMS/perl-base-5.8.0-14.2.C21mdk.x86_64.rpm
c54830d6c0beac9699d36c875a91a4ae x86_64/corporate/2.1/RPMS/perl-devel-5.8.0-14.2.C21mdk.x86_64.rpm
595fcf030bbebf23a2be36fc36fc7dde x86_64/corporate/2.1/RPMS/perl-doc-5.8.0-14.2.C21mdk.x86_64.rpm
e31b6cfb93edab14b43076d4e9596c4c x86_64/corporate/2.1/RPMS/perl-MIME-tools-5.415-1.0.C21mdk.noarch.rpm
19dc7a7ac3e12a653901c5119315d10f x86_64/corporate/2.1/SRPMS/perl-5.8.0-14.2.C21mdk.src.rpm
5987507b55b00b66ec461c0bdf994ee1 x86_64/corporate/2.1/SRPMS/perl-MIME-tools-5.415-1.0.C21mdk.src.rpm

Mandrakelinux 9.2:
4e0dda0496ac2227496a10301d148add 9.2/RPMS/perl-5.8.1-0.RC4.3.1.92mdk.i586.rpm
44fb5ff7b4478e81d726c7f74883dcdf 9.2/RPMS/perl-base-5.8.1-0.RC4.3.1.92mdk.i586.rpm
b0c3828bd61669878065117e34283104 9.2/RPMS/perl-devel-5.8.1-0.RC4.3.1.92mdk.i586.rpm
fe0b5b68eb8fabf63a56d132da860c5c 9.2/RPMS/perl-doc-5.8.1-0.RC4.3.1.92mdk.i586.rpm
b7a8db45f13d78babcf7dbb28fd1c3b9 9.2/RPMS/perl-MIME-tools-5.415-1.0.92mdk.noarch.rpm
4979228b456acf79ea08749c63dd8c12 9.2/SRPMS/perl-5.8.1-0.RC4.3.1.92mdk.src.rpm
a2cb97e745ebf53551b18f771664b9e5 9.2/SRPMS/perl-MIME-tools-5.415-1.0.92mdk.src.rpm

Mandrakelinux 9.2/AMD64:
7f2ce1931161337b3b910a73df00d269 amd64/9.2/RPMS/perl-5.8.1-0.RC4.3.1.92mdk.amd64.rpm
e79be61ff5029e04c5a7953ad87edcd6 amd64/9.2/RPMS/perl-base-5.8.1-0.RC4.3.1.92mdk.amd64.rpm
cf1c03ee01613bc2f787963345966072 amd64/9.2/RPMS/perl-devel-5.8.1-0.RC4.3.1.92mdk.amd64.rpm
1c6c7de92d04bd820edd19eeb15ad999 amd64/9.2/RPMS/perl-doc-5.8.1-0.RC4.3.1.92mdk.amd64.rpm
8f92a60447dcb0fc66d548ca3a667648 amd64/9.2/RPMS/perl-MIME-tools-5.415-1.0.92mdk.noarch.rpm
4979228b456acf79ea08749c63dd8c12 amd64/9.2/SRPMS/perl-5.8.1-0.RC4.3.1.92mdk.src.rpm
a2cb97e745ebf53551b18f771664b9e5 amd64/9.2/SRPMS/perl-MIME-tools-5.415-1.0.92mdk.src.rpm


To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandrakesoft for security. You can obtain the GPG public key of the Mandrakelinux Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandrakelinux at:

http://www.mandrakesoft.com/security/advisories

If you want to report vulnerabilities, please contact

security_linux-mandrake.com

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team


Mandrakelinux Security Update Advisory


Package name: netatalk
Advisory ID: MDKSA-2004:121
Date: November 1st, 2004
Affected versions: 10.0, 10.1, 9.2, Corporate Server 2.1


Problem Description:

The etc2ps.sh script, part of the netatalk package, creates files in /tmp with predicatable names which could allow a local attacker to use symbolic links to point to a valid file on the filesystem which could lead to the overwriting of arbitrary files if etc2ps.sh is executed by someone with enough privilege.

The updated packages are patched to prevent this problem.


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0974


Updated Packages:

Mandrakelinux 10.0:
4ce3756d43716be6821269eef25f82c0 10.0/RPMS/netatalk-1.6.4-1.1.100mdk.i586.rpm
59ca7a79a2e6685791e03bafcf61acc7 10.0/RPMS/netatalk-devel-1.6.4-1.1.100mdk.i586.rpm
1b132e2b84a2486676eaa86501ae762c 10.0/SRPMS/netatalk-1.6.4-1.1.100mdk.src.rpm

Mandrakelinux 10.0/AMD64:
c92dd42a1b1ff1ad9a1586cdb0245a5a amd64/10.0/RPMS/netatalk-1.6.4-1.1.100mdk.amd64.rpm
97331e055754a796e90a1779f2bebbb5 amd64/10.0/RPMS/netatalk-devel-1.6.4-1.1.100mdk.amd64.rpm
1b132e2b84a2486676eaa86501ae762c amd64/10.0/SRPMS/netatalk-1.6.4-1.1.100mdk.src.rpm

Mandrakelinux 10.1:
3fd55bd3b38abb459abc432d61b317a3 10.1/RPMS/netatalk-2.0-0beta2.3.1.101mdk.i586.rpm
2e7f7add5982ab63b881421465d4c37f 10.1/RPMS/netatalk-devel-2.0-0beta2.3.1.101mdk.i586.rpm
602615d65ae34e5e1da29bcebfe19f96 10.1/SRPMS/netatalk-2.0-0beta2.3.1.101mdk.src.rpm

Mandrakelinux 10.1/X86_64:
c000e90061aaa97b3ab07e93b326a0f9 x86_64/10.1/RPMS/netatalk-2.0-0beta2.3.1.101mdk.x86_64.rpm
bd24d4eee231988c0a0d7d9c50b6accb x86_64/10.1/RPMS/netatalk-devel-2.0-0beta2.3.1.101mdk.x86_64.rpm
602615d65ae34e5e1da29bcebfe19f96 x86_64/10.1/SRPMS/netatalk-2.0-0beta2.3.1.101mdk.src.rpm

Corporate Server 2.1:
95c81937a581763fa82469a7a74dccaa corporate/2.1/RPMS/netatalk-1.6.2-2.1.C21mdk.i586.rpm
73a2742b87e26cadb0ee3784b5a80eb8 corporate/2.1/RPMS/netatalk-devel-1.6.2-2.1.C21mdk.i586.rpm
3cfea962d1d2d83b329e367a5fa054ff corporate/2.1/SRPMS/netatalk-1.6.2-2.1.C21mdk.src.rpm

Corporate Server 2.1/x86_64:
8312c749319643c5176f26279fa016a0 x86_64/corporate/2.1/RPMS/netatalk-1.6.2-2.1.C21mdk.x86_64.rpm
6ecbd6075522822e5d88df4b0fdf90f5 x86_64/corporate/2.1/RPMS/netatalk-devel-1.6.2-2.1.C21mdk.x86_64.rpm
3cfea962d1d2d83b329e367a5fa054ff x86_64/corporate/2.1/SRPMS/netatalk-1.6.2-2.1.C21mdk.src.rpm

Mandrakelinux 9.2:
6b85ea8cd82a8cc10c5431d41853a89b 9.2/RPMS/netatalk-1.6.3-4.1.92mdk.i586.rpm
4adfdcaef8e4264db889b2f97a628e29 9.2/RPMS/netatalk-devel-1.6.3-4.1.92mdk.i586.rpm
7cb04faaacc7a689f47d83ec7204b173 9.2/SRPMS/netatalk-1.6.3-4.1.92mdk.src.rpm

Mandrakelinux 9.2/AMD64:
9ad364504c8288cb659a762341aee089 amd64/9.2/RPMS/netatalk-1.6.3-4.1.92mdk.amd64.rpm
03fb757d32760b3428db35c182fcdf15 amd64/9.2/RPMS/netatalk-devel-1.6.3-4.1.92mdk.amd64.rpm
7cb04faaacc7a689f47d83ec7204b173 amd64/9.2/SRPMS/netatalk-1.6.3-4.1.92mdk.src.rpm


To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandrakesoft for security. You can obtain the GPG public key of the Mandrakelinux Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandrakelinux at:

http://www.mandrakesoft.com/security/advisories

If you want to report vulnerabilities, please contact

security_linux-mandrake.com

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team <security linux-mandrake.com>


Mandrakelinux Security Update Advisory


Package name: MySQL
Advisory ID: MDKSA-2004:119
Date: November 1st, 2004
Affected versions: 10.0, 10.1, 9.2, Corporate Server 2.1


Problem Description:

A number of problems have been discovered in the MySQL database server:

Jeroen van Wolffelaar discovered an insecure temporary file vulnerability in the mysqlhotcopy script when using the scp method (CAN-2004-0457).

Oleksandr Byelkin discovered that the "ALTER TABLE ... RENAME" would check the CREATE/INSERT rights of the old table rather than the new one (CAN-2004-0835).

Lukasz Wojtow discovered a buffer overrun in the mysql_real_connect function (CAN-2004-0836).

Dean Ellis discovered that multiple threads ALTERing the same (or different) MERGE tables to change the UNION can cause the server to crash or stall (CAN-2004-0837).

The updated MySQL packages have been patched to protect against these issues.


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0457 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0835 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0836 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0837 http://bugs.mysql.com/bug.php?id=3270 http://bugs.mysql.com/bug.php?id=4017 http://bugs.mysql.com/bug.php?id=2408


Updated Packages:

Mandrakelinux 10.0:
f680ccd6ecdd9abc77496c71ce02d70b 10.0/RPMS/MySQL-4.0.18-1.2.100mdk.i586.rpm
30c0c2b64243f1b9ac300eb52062d303 10.0/RPMS/MySQL-Max-4.0.18-1.2.100mdk.i586.rpm
8618a5f416cf30cd527be1f42763210f 10.0/RPMS/MySQL-bench-4.0.18-1.2.100mdk.i586.rpm
b6d07c7d09e405e174311024e098de1b 10.0/RPMS/MySQL-client-4.0.18-1.2.100mdk.i586.rpm
b28337d115d733eb280d7fe5659bcc5a 10.0/RPMS/MySQL-common-4.0.18-1.2.100mdk.i586.rpm
66536b18fc371f756a61496d90340a7b 10.0/RPMS/libmysql12-4.0.18-1.2.100mdk.i586.rpm
befe1dbf68fcbc0b9300af93ec9b9d57 10.0/RPMS/libmysql12-devel-4.0.18-1.2.100mdk.i586.rpm
188e63d83d403f4c4c11ae7487cf45ac 10.0/SRPMS/MySQL-4.0.18-1.2.100mdk.src.rpm

Mandrakelinux 10.0/AMD64:
491712aed8839a408cd2e3a5ca088668 amd64/10.0/RPMS/MySQL-4.0.18-1.2.100mdk.amd64.rpm
d579b376ed0da8d42dc1adb1a472a923 amd64/10.0/RPMS/MySQL-Max-4.0.18-1.2.100mdk.amd64.rpm
b0b056e3a247c2187a09eec2b5c666a3 amd64/10.0/RPMS/MySQL-bench-4.0.18-1.2.100mdk.amd64.rpm
44fc8c891ea9e75ed10918c52e29ddd7 amd64/10.0/RPMS/MySQL-client-4.0.18-1.2.100mdk.amd64.rpm
df20d5582e78629ff86e27499a72b0b7 amd64/10.0/RPMS/MySQL-common-4.0.18-1.2.100mdk.amd64.rpm
79af2d7adb19e2a0df48c8d0765914fe amd64/10.0/RPMS/lib64mysql12-4.0.18-1.2.100mdk.amd64.rpm
a5e44db419bb47f1169deb3af54f9d48 amd64/10.0/RPMS/lib64mysql12-devel-4.0.18-1.2.100mdk.amd64.rpm
188e63d83d403f4c4c11ae7487cf45ac amd64/10.0/SRPMS/MySQL-4.0.18-1.2.100mdk.src.rpm

Mandrakelinux 10.1:
0241fc97ccebf80f02f573404cc7f01b 10.1/RPMS/MySQL-4.0.20-3.1.101mdk.i586.rpm
fb27d0a9d916a63d4c8143c7ae181ef0 10.1/RPMS/MySQL-Max-4.0.20-3.1.101mdk.i586.rpm
758d3b52cf32d0fb1114199eb7e65247 10.1/RPMS/MySQL-bench-4.0.20-3.1.101mdk.i586.rpm
1df5f23ef2ea4f9456323dc7925d0790 10.1/RPMS/MySQL-client-4.0.20-3.1.101mdk.i586.rpm
61d8e14939e9dcc9bf8b9207e7a4bd60 10.1/RPMS/MySQL-common-4.0.20-3.1.101mdk.i586.rpm
ee21d69bf2275f8933ca0c91c5af5b98 10.1/RPMS/libmysql12-4.0.20-3.1.101mdk.i586.rpm
9c64006cb87de169f43ad8f78b1b1c47 10.1/RPMS/libmysql12-devel-4.0.20-3.1.101mdk.i586.rpm
a3b194caf4c67c8fa6f881d5577aabba 10.1/SRPMS/MySQL-4.0.20-3.1.101mdk.src.rpm

Mandrakelinux 10.1/X86_64:
214a6acbb0fb3e8398111a6d30ac4082 x86_64/10.1/RPMS/MySQL-4.0.20-3.1.101mdk.x86_64.rpm
72ad37fa4cd99254d399e725c44b5681 x86_64/10.1/RPMS/MySQL-Max-4.0.20-3.1.101mdk.x86_64.rpm
c98fd317bc3a2387801c440626459f4e x86_64/10.1/RPMS/MySQL-bench-4.0.20-3.1.101mdk.x86_64.rpm
3141d5e2fa8ca10f94c3501e10e0d00f x86_64/10.1/RPMS/MySQL-client-4.0.20-3.1.101mdk.x86_64.rpm
57f74802dbc5a4912dd926ec748d53a4 x86_64/10.1/RPMS/MySQL-common-4.0.20-3.1.101mdk.x86_64.rpm
ab48d1099a5077e763b9d11c373369b4 x86_64/10.1/RPMS/lib64mysql12-4.0.20-3.1.101mdk.x86_64.rpm
2f0846107ddaa0d7c6c389add0dbd6d5 x86_64/10.1/RPMS/lib64mysql12-devel-4.0.20-3.1.101mdk.x86_64.rpm
a3b194caf4c67c8fa6f881d5577aabba x86_64/10.1/SRPMS/MySQL-4.0.20-3.1.101mdk.src.rpm

Corporate Server 2.1:
6a3d3652bcf1b9b213cb12b22abfa297 corporate/2.1/RPMS/MySQL-3.23.56-1.6.C21mdk.i586.rpm
c819f40d6afef344e3fbfd50f13e4adb corporate/2.1/RPMS/MySQL-Max-3.23.56-1.6.C21mdk.i586.rpm
c3bf86fe33f2e1f80ba53817fe23ed60 corporate/2.1/RPMS/MySQL-bench-3.23.56-1.6.C21mdk.i586.rpm
2296ca45f742f6ad4fe0f12827bc7e69 corporate/2.1/RPMS/MySQL-client-3.23.56-1.6.C21mdk.i586.rpm
7cdd06d76012d329ffb1b8c05af8ce22 corporate/2.1/RPMS/libmysql10-3.23.56-1.6.C21mdk.i586.rpm
6b8784affa68c19199753877a7127c93 corporate/2.1/RPMS/libmysql10-devel-3.23.56-1.6.C21mdk.i586.rpm
537ee31b2c8b6c0c006d07bea8aad1a8 corporate/2.1/SRPMS/MySQL-3.23.56-1.6.C21mdk.src.rpm

Corporate Server 2.1/x86_64:
b308f0d13fabf30b0c73b6a62bae42d2 x86_64/corporate/2.1/RPMS/MySQL-3.23.56-1.6.C21mdk.x86_64.rpm
d1681268b5c2d3d5865585d517001aff x86_64/corporate/2.1/RPMS/MySQL-Max-3.23.56-1.6.C21mdk.x86_64.rpm
d508c3f565f294d319e8da215a622eeb x86_64/corporate/2.1/RPMS/MySQL-bench-3.23.56-1.6.C21mdk.x86_64.rpm
20219356f5a1256eb5d4543e30fa3ce4 x86_64/corporate/2.1/RPMS/MySQL-client-3.23.56-1.6.C21mdk.x86_64.rpm
aac8add3fe8beee70f9b3048a7372ab0 x86_64/corporate/2.1/RPMS/libmysql10-3.23.56-1.6.C21mdk.x86_64.rpm
cb7d3ebab5149514909633609b47fab1 x86_64/corporate/2.1/RPMS/libmysql10-devel-3.23.56-1.6.C21mdk.x86_64.rpm
537ee31b2c8b6c0c006d07bea8aad1a8 x86_64/corporate/2.1/SRPMS/MySQL-3.23.56-1.6.C21mdk.src.rpm

Mandrakelinux 9.2:
8a874159baa33853754001a99e1cdd10 9.2/RPMS/MySQL-4.0.15-1.2.92mdk.i586.rpm
ea88058a50c8f170c35b070f8843d1dd 9.2/RPMS/MySQL-Max-4.0.15-1.2.92mdk.i586.rpm
686a188b99e75f2e44c7be5fc49313bb 9.2/RPMS/MySQL-bench-4.0.15-1.2.92mdk.i586.rpm
077b2f4785ec2af1a0886baf0dd5742d 9.2/RPMS/MySQL-client-4.0.15-1.2.92mdk.i586.rpm
e2622344b092c71e68f6be668d2b00a1 9.2/RPMS/MySQL-common-4.0.15-1.2.92mdk.i586.rpm
a1a485e1de88013571f6c2ea0417f1f8 9.2/RPMS/libmysql12-4.0.15-1.2.92mdk.i586.rpm
46b3cfd41057fd6ad674555f1cd2e786 9.2/RPMS/libmysql12-devel-4.0.15-1.2.92mdk.i586.rpm
d040b231845bf2035905fcdeec142650 9.2/SRPMS/MySQL-4.0.15-1.2.92mdk.src.rpm

Mandrakelinux 9.2/AMD64:
e8a1259267471c9f47b812aa80782a7f amd64/9.2/RPMS/MySQL-4.0.15-1.2.92mdk.amd64.rpm
4545590ffd9eb4995807a4c37762d966 amd64/9.2/RPMS/MySQL-Max-4.0.15-1.2.92mdk.amd64.rpm
e85c26267ae0847e982b848bcae82715 amd64/9.2/RPMS/MySQL-bench-4.0.15-1.2.92mdk.amd64.rpm
f1ea2226a633f792d70ecb4508a50bc2 amd64/9.2/RPMS/MySQL-client-4.0.15-1.2.92mdk.amd64.rpm
4aa99ef449ebe42466adbdbf99e2f588 amd64/9.2/RPMS/MySQL-common-4.0.15-1.2.92mdk.amd64.rpm
b92a3b4fa52f27e9e92b9d8691f6bf9e amd64/9.2/RPMS/lib64mysql12-4.0.15-1.2.92mdk.amd64.rpm
410e1737c0cff17eba69081894c91bcd amd64/9.2/RPMS/lib64mysql12-devel-4.0.15-1.2.92mdk.amd64.rpm
d040b231845bf2035905fcdeec142650 amd64/9.2/SRPMS/MySQL-4.0.15-1.2.92mdk.src.rpm


To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandrakesoft for security. You can obtain the GPG public key of the Mandrakelinux Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandrakelinux at:

http://www.mandrakesoft.com/security/advisories

If you want to report vulnerabilities, please contact

security_linux-mandrake.com

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team <security linux-mandrake.com>


Mandrakelinux Security Update Advisory


Package name: mpg123
Advisory ID: MDKSA-2004:120
Date: November 1st, 2004
Affected versions: 10.0, 10.1, Corporate Server 2.1


Problem Description:

Carlos Barros discovered two buffer overflow vulnerabilities in mpg123; the first in the getauthfromURL() function and the second in the http_open() function. These vulnerabilities could be exploited to possibly execute arbitrary code with the privileges of the user running mpg123.

The provided packages are patched to fix these issues, as well additional boundary checks that were lacking have been included (thanks to the Gentoo Linux Sound Team for these additional fixes).


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0891 http://www.barrossecurity.com/advisories/mpg123_getauthfromurl_bof_advisory.txt


Updated Packages:

Mandrakelinux 10.0:
e182221a9da782a235dd6ff3db6d5df0 10.0/RPMS/mpg123-0.59r-22.1.100mdk.i586.rpm
c4d8be742f4e6299c7661d6c66a20d53 10.0/SRPMS/mpg123-0.59r-22.1.100mdk.src.rpm

Mandrakelinux 10.0/AMD64:
79de393feac1cb0b307085f3af8d3fdc amd64/10.0/RPMS/mpg123-0.59r-22.1.100mdk.amd64.rpm
c4d8be742f4e6299c7661d6c66a20d53 amd64/10.0/SRPMS/mpg123-0.59r-22.1.100mdk.src.rpm

Mandrakelinux 10.1:
65f24310894911afebb9172aec3eb7a4 10.1/RPMS/mpg123-0.59r-22.1.101mdk.i586.rpm
ed8c0715a350da0d8b8736f78e52de80 10.1/SRPMS/mpg123-0.59r-22.1.101mdk.src.rpm

Mandrakelinux 10.1/X86_64:
405f3bfd2b7f8379b0fdc4880b1b84ff x86_64/10.1/RPMS/mpg123-0.59r-22.1.101mdk.x86_64.rpm
ed8c0715a350da0d8b8736f78e52de80 x86_64/10.1/SRPMS/mpg123-0.59r-22.1.101mdk.src.rpm

Corporate Server 2.1:
0484f705c2ae6dd6ee6c7183cf5bcc3b corporate/2.1/RPMS/mpg123-0.59r-21.2.C21mdk.i586.rpm
0c38f64a2b5492824947d5aeaddb190a corporate/2.1/SRPMS/mpg123-0.59r-21.2.C21mdk.src.rpm

Corporate Server 2.1/x86_64:
1974ef15ef340f0c38a9dba8ecc9723f x86_64/corporate/2.1/RPMS/mpg123-0.59r-21.2.C21mdk.x86_64.rpm
0c38f64a2b5492824947d5aeaddb190a x86_64/corporate/2.1/SRPMS/mpg123-0.59r-21.2.C21mdk.src.rpm


To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandrakesoft for security. You can obtain the GPG public key of the Mandrakelinux Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandrakelinux at:

http://www.mandrakesoft.com/security/advisories

If you want to report vulnerabilities, please contact

security_linux-mandrake.com

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team <security linux-mandrake.com>


Mandrakelinux Security Update Advisory


Package name: perl-Archive-Zip
Advisory ID: MDKSA-2004:118
Date: November 1st, 2004
Affected versions: 10.1


Problem Description:

Recently, it was noticed that several antivirus programs miss viruses that are contained in ZIP archives with manipulated directory data. The global archive directory of these ZIP file have been manipulated to indicate zero file sizes.

Archive::Zip produces files of zero length when decompressing this type of ZIP file. This causes AV products that use Archive::ZIP to fail to detect viruses in manipulated ZIP archives. One of these products is amavisd-new.

The updated packages are patched to fix this problem.


References:

http://rt.cpan.org/NoAuth/Bug.html?id=8077


Updated Packages:

Mandrakelinux 10.1:
1b0b561bb9766e70bcfd481e25605617 10.1/RPMS/perl-Archive-Zip-1.14-1.0.101mdk.noarch.rpm
c6766a6f3ac0cce36a72e06a1b5f3070 10.1/SRPMS/perl-Archive-Zip-1.14-1.0.101mdk.src.rpm

Mandrakelinux 10.1/X86_64:
527e70bd67497e63ce949ac195d8f28b x86_64/10.1/RPMS/perl-Archive-Zip-1.14-1.0.101mdk.noarch.rpm
c6766a6f3ac0cce36a72e06a1b5f3070 x86_64/10.1/SRPMS/perl-Archive-Zip-1.14-1.0.101mdk.src.rpm


To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandrakesoft for security. You can obtain the GPG public key of the Mandrakelinux Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandrakelinux at:

http://www.mandrakesoft.com/security/advisories

If you want to report vulnerabilities, please contact

security_linux-mandrake.com

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team <security linux-mandrake.com>


Mandrakelinux Security Update Advisory


Package name: gaim
Advisory ID: MDKSA-2004:117
Date: November 1st, 2004
Affected versions: 10.1


Problem Description:

A vulnerability in the MSN protocol handler in the gaim instant messenger application was discovered. When receiving unexpected sequences of MSNSLP messages, it is possible that an attacker could trigger an internal buffer overflow which could lead to a crash or even code execution as the user running gaim.

The updated packages are patched to fix this problem. This problem does not affect Mandrakelinux 10.0 installations.


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0891


Updated Packages:

Mandrakelinux 10.1:
6b2e6e52fc0e1da0bb75b7301850387e 10.1/RPMS/gaim-0.82.1-2.1.101mdk.i586.rpm
6846eac8a14b5ff6a0a88aa5aad13edf 10.1/RPMS/gaim-devel-0.82.1-2.1.101mdk.i586.rpm
00936e0fc7426aa731249074d09157d9 10.1/RPMS/gaim-festival-0.82.1-2.1.101mdk.i586.rpm
9da5d5523a8b36fc269302f846c90326 10.1/RPMS/gaim-gevolution-0.82.1-2.1.101mdk.i586.rpm
66486b28ed9c1ae2a3c51d83098211e6 10.1/RPMS/gaim-perl-0.82.1-2.1.101mdk.i586.rpm
5fbd3315fa9d0b044f46c3293506d7ef 10.1/RPMS/gaim-tcl-0.82.1-2.1.101mdk.i586.rpm
9234881322236a36a3b150ecaa161fbf 10.1/RPMS/libgaim-remote0-0.82.1-2.1.101mdk.i586.rpm
ff323c8ca35ac7f7d06bf1dc559b0971 10.1/RPMS/libgaim-remote0-devel-0.82.1-2.1.101mdk.i586.rpm
f397ccb1e39cf3db656e5375d1d238b5 10.1/SRPMS/gaim-0.82.1-2.1.101mdk.src.rpm

Mandrakelinux 10.1/X86_64:
0df2813a1751c7a768c4fdff3a191443 x86_64/10.1/RPMS/gaim-0.82.1-2.1.101mdk.x86_64.rpm
39e701d2adf67e1c74bd8b131ede3d5e x86_64/10.1/RPMS/gaim-devel-0.82.1-2.1.101mdk.x86_64.rpm
22216a8ac0776d8de42d6f5a7de3b427 x86_64/10.1/RPMS/gaim-festival-0.82.1-2.1.101mdk.x86_64.rpm
020f9285bcca532427cfcfd052d96235 x86_64/10.1/RPMS/gaim-gevolution-0.82.1-2.1.101mdk.x86_64.rpm
4de10661d941c2a9dc7f1a64071f868f x86_64/10.1/RPMS/gaim-perl-0.82.1-2.1.101mdk.x86_64.rpm
92e8ce4e22e77c1235915a0ee68df2ab x86_64/10.1/RPMS/gaim-tcl-0.82.1-2.1.101mdk.x86_64.rpm
5bf30cddc4f32809a346c2cadef3913a x86_64/10.1/RPMS/lib64gaim-remote0-0.82.1-2.1.101mdk.x86_64.rpm
38797f001f6811fca52e32319d14923c x86_64/10.1/RPMS/lib64gaim-remote0-devel-0.82.1-2.1.101mdk.x86_64.rpm
f397ccb1e39cf3db656e5375d1d238b5 x86_64/10.1/SRPMS/gaim-0.82.1-2.1.101mdk.src.rpm


To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandrakesoft for security. You can obtain the GPG public key of the Mandrakelinux Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandrakelinux at:

http://www.mandrakesoft.com/security/advisories

If you want to report vulnerabilities, please contact

security_linux-mandrake.com

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team <security linux-mandrake.com>


Mandrakelinux Security Update Advisory


Package name: mod_ssl/apache2-mod_ssl
Advisory ID: MDKSA-2004:122
Date: November 1st, 2004
Affected versions: 10.0, 10.1, 9.2, Corporate Server 2.1, Multi Network Firewall 8.2


Problem Description:

A vulnerability in mod_ssl was discovered by Hartmut Keil. After a renegotiation, mod_ssl would fail to ensure that the requested cipher suite is actually negotiated. The provided packages have been patched to prevent this problem.


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0885


Updated Packages:

Mandrakelinux 10.0:
429d438717b8bfdd0ac366da8f3e7e89 10.0/RPMS/apache2-2.0.48-6.7.100mdk.i586.rpm
6edd259a81c690a6a1299271a10de8ab 10.0/RPMS/apache2-common-2.0.48-6.7.100mdk.i586.rpm
ddbbe0d19ccdcbcf7a4a4d823676faea 10.0/RPMS/apache2-devel-2.0.48-6.7.100mdk.i586.rpm
9a1425b21544ff9bd81dcc3386c81631 10.0/RPMS/apache2-manual-2.0.48-6.7.100mdk.i586.rpm
27cd57beaf5db175693d01366046691b 10.0/RPMS/apache2-mod_cache-2.0.48-6.7.100mdk.i586.rpm
6141d95d82f2c2f38838b72c3ac7806a 10.0/RPMS/apache2-mod_dav-2.0.48-6.7.100mdk.i586.rpm
48ac206a447c0c25fa9e617639474c77 10.0/RPMS/apache2-mod_deflate-2.0.48-6.7.100mdk.i586.rpm
c6f94930e3b5055ad1073ee949110f57 10.0/RPMS/apache2-mod_disk_cache-2.0.48-6.7.100mdk.i586.rpm
56746abbceb15245aef8573bfa1b7a54 10.0/RPMS/apache2-mod_file_cache-2.0.48-6.7.100mdk.i586.rpm
69bad52d4f96fccb86631a656f50f4eb 10.0/RPMS/apache2-mod_ldap-2.0.48-6.7.100mdk.i586.rpm
e325fadb04ae542e22ae363ce496eb18 10.0/RPMS/apache2-mod_mem_cache-2.0.48-6.7.100mdk.i586.rpm
9d717c63ca90fd26cac4a3cf61cf269f 10.0/RPMS/apache2-mod_proxy-2.0.48-6.7.100mdk.i586.rpm
d9f0228462bd4b7f041dbd94aae68125 10.0/RPMS/apache2-mod_ssl-2.0.48-6.7.100mdk.i586.rpm
7193c375c5dcccc1e51637ec318aea7e 10.0/RPMS/apache2-modules-2.0.48-6.7.100mdk.i586.rpm
38c0cb64d7c75e071c08832c7fd49c3a 10.0/RPMS/apache2-source-2.0.48-6.7.100mdk.i586.rpm
20194ed8af9f9a691b23732058a739b9 10.0/RPMS/libapr0-2.0.48-6.7.100mdk.i586.rpm
e53dbfcd27032f209a1d60a7cd5b5cbf 10.0/RPMS/mod_ssl-2.8.16-1.3.100mdk.i586.rpm
ea8e6ebb5defc2e6465356bccb9d6678 10.0/SRPMS/apache2-2.0.48-6.7.100mdk.src.rpm
8074914686563633c3948fd4143f7b09 10.0/SRPMS/mod_ssl-2.8.16-1.3.100mdk.src.rpm

Mandrakelinux 10.0/AMD64:
146b8d20ad0fec83efbf0a09a3a0dbe0 amd64/10.0/RPMS/apache2-2.0.48-6.7.100mdk.amd64.rpm
936e446e2416dddbb4b189e35aa72279 amd64/10.0/RPMS/apache2-common-2.0.48-6.7.100mdk.amd64.rpm
b62c10d878316695bcd8cb6209a85224 amd64/10.0/RPMS/apache2-devel-2.0.48-6.7.100mdk.amd64.rpm
390b1b48fc06b57951521037835cd804 amd64/10.0/RPMS/apache2-manual-2.0.48-6.7.100mdk.amd64.rpm
7a5affc7e9672730518d1f53982d1db5 amd64/10.0/RPMS/apache2-mod_cache-2.0.48-6.7.100mdk.amd64.rpm
0e9243c8847f717e9f59954f23c571da amd64/10.0/RPMS/apache2-mod_dav-2.0.48-6.7.100mdk.amd64.rpm
cc345abfdea330abda80f2bb85288cc9 amd64/10.0/RPMS/apache2-mod_deflate-2.0.48-6.7.100mdk.amd64.rpm
2a22ea878c5741dd375ad394bc87f1f5 amd64/10.0/RPMS/apache2-mod_disk_cache-2.0.48-6.7.100mdk.amd64.rpm
babacc68efe1bc11a221013fc0910ba0 amd64/10.0/RPMS/apache2-mod_file_cache-2.0.48-6.7.100mdk.amd64.rpm
122f0049f13e32db6a499c1ba937cd31 amd64/10.0/RPMS/apache2-mod_ldap-2.0.48-6.7.100mdk.amd64.rpm
4a92da61ce77dc5a28e6315068687537 amd64/10.0/RPMS/apache2-mod_mem_cache-2.0.48-6.7.100mdk.amd64.rpm
78996c9106336896f83c3f882afa8640 amd64/10.0/RPMS/apache2-mod_proxy-2.0.48-6.7.100mdk.amd64.rpm
4edb7510fa7225422933db88968890cd amd64/10.0/RPMS/apache2-mod_ssl-2.0.48-6.7.100mdk.amd64.rpm
b109c1ac9ca2f0fe66e42944b543ccaa amd64/10.0/RPMS/apache2-modules-2.0.48-6.7.100mdk.amd64.rpm
46169f035e89af16def0ad29b1c7b327 amd64/10.0/RPMS/apache2-source-2.0.48-6.7.100mdk.amd64.rpm
c358fa7df7e0b50818e25f2f8f7866a2 amd64/10.0/RPMS/lib64apr0-2.0.48-6.7.100mdk.amd64.rpm
951ddb8c42310629b23d9eabb188c6b5 amd64/10.0/RPMS/mod_ssl-2.8.16-1.3.100mdk.amd64.rpm
ea8e6ebb5defc2e6465356bccb9d6678 amd64/10.0/SRPMS/apache2-2.0.48-6.7.100mdk.src.rpm
8074914686563633c3948fd4143f7b09 amd64/10.0/SRPMS/mod_ssl-2.8.16-1.3.100mdk.src.rpm

Mandrakelinux 10.1:
e714fa9784281c66b72817bb5deecf6b 10.1/RPMS/apache2-2.0.50-7.1.101mdk.i586.rpm
efcbecb46dabc550023ad708e5b5356d 10.1/RPMS/apache2-common-2.0.50-7.1.101mdk.i586.rpm
dea9db9c1c01e0983faf48f07472e19f 10.1/RPMS/apache2-devel-2.0.50-7.1.101mdk.i586.rpm
d9b7e5a6031fbf5267c2049248fef0c7 10.1/RPMS/apache2-manual-2.0.50-7.1.101mdk.i586.rpm
3f920325b94a6ebebca013340eb8e04a 10.1/RPMS/apache2-mod_cache-2.0.50-7.1.101mdk.i586.rpm
592da78980d07502c3624f796ae6fbe8 10.1/RPMS/apache2-mod_dav-2.0.50-7.1.101mdk.i586.rpm
5e98d536e68aeeec4478883c5cddd2c4 10.1/RPMS/apache2-mod_deflate-2.0.50-7.1.101mdk.i586.rpm
ddf6aedfdd0e69201d96d370a75bcba5 10.1/RPMS/apache2-mod_disk_cache-2.0.50-7.1.101mdk.i586.rpm
6d4607217579d55ba1b6e16c34b21531 10.1/RPMS/apache2-mod_file_cache-2.0.50-7.1.101mdk.i586.rpm
58edbcd2e6a6303596f61b6fceaf631e 10.1/RPMS/apache2-mod_ldap-2.0.50-7.1.101mdk.i586.rpm
84ce3ae0a05d5511195b675a52ee3d99 10.1/RPMS/apache2-mod_mem_cache-2.0.50-7.1.101mdk.i586.rpm
e98c611a98dae2a92591fec63979a363 10.1/RPMS/apache2-mod_proxy-2.0.50-7.1.101mdk.i586.rpm
66c51a72f1933c5146715dcf95c2a3c6 10.1/RPMS/apache2-mod_ssl-2.0.50-4.1.101mdk.i586.rpm
df78cfe3bde7549a7e140baa297d0960 10.1/RPMS/apache2-modules-2.0.50-7.1.101mdk.i586.rpm
06161835b5ef8166608d446e1e5adbb9 10.1/RPMS/apache2-source-2.0.50-7.1.101mdk.i586.rpm
5efa55982a850f076b9b59716d32f0c4 10.1/RPMS/apache2-worker-2.0.50-7.1.101mdk.i586.rpm
5b57e055e2d7b527f1319ca8f9f1f634 10.1/RPMS/mod_ssl-2.8.19-1.1.101mdk.i586.rpm
1e7f77b7dfda5fffcadc105983f8d057 10.1/SRPMS/apache2-2.0.50-7.1.101mdk.src.rpm
f570d037a621f96459b1277a751321f0 10.1/SRPMS/apache2-mod_ssl-2.0.50-4.1.101mdk.src.rpm
7d747fde6e998c9493280925420bab7d 10.1/SRPMS/mod_ssl-2.8.19-1.1.101mdk.src.rpm

Mandrakelinux 10.1/X86_64:
af7afd1cd53cb0f6f21e00dbb05af085 x86_64/10.1/RPMS/apache2-2.0.50-7.1.101mdk.x86_64.rpm
bc53536922c2faa9a05186e2329c0051 x86_64/10.1/RPMS/apache2-common-2.0.50-7.1.101mdk.x86_64.rpm
e7ab3c9911988c2c7c7d7907c61e82c3 x86_64/10.1/RPMS/apache2-devel-2.0.50-7.1.101mdk.x86_64.rpm
1d4a7e7283de77ff88b34c2f63e107de x86_64/10.1/RPMS/apache2-manual-2.0.50-7.1.101mdk.x86_64.rpm
abe578e53cd5b8ef6455049469018300 x86_64/10.1/RPMS/apache2-mod_cache-2.0.50-7.1.101mdk.x86_64.rpm
286510a60cdb51e587bb52a1a9fb1540 x86_64/10.1/RPMS/apache2-mod_dav-2.0.50-7.1.101mdk.x86_64.rpm
abf36d8698ff3380a7df6823655f6084 x86_64/10.1/RPMS/apache2-mod_deflate-2.0.50-7.1.101mdk.x86_64.rpm
87f875b72cb4c0781d4a5dba06d3ac1c x86_64/10.1/RPMS/apache2-mod_disk_cache-2.0.50-7.1.101mdk.x86_64.rpm
16ade85a7672e70db7e64fd22031dad9 x86_64/10.1/RPMS/apache2-mod_file_cache-2.0.50-7.1.101mdk.x86_64.rpm
98fcd424d243b2e67caa9525c1ef2bbb x86_64/10.1/RPMS/apache2-mod_ldap-2.0.50-7.1.101mdk.x86_64.rpm
a8b126818e61e244b264af9af4a0300c x86_64/10.1/RPMS/apache2-mod_mem_cache-2.0.50-7.1.101mdk.x86_64.rpm
e0b056b71173248fe4dda59b8e369179 x86_64/10.1/RPMS/apache2-mod_proxy-2.0.50-7.1.101mdk.x86_64.rpm
deb6381ca4d8b3f661e23189b3147c0b x86_64/10.1/RPMS/apache2-mod_ssl-2.0.50-4.1.101mdk.x86_64.rpm
ee24aeecfa66282cfdddf36868289d66 x86_64/10.1/RPMS/apache2-modules-2.0.50-7.1.101mdk.x86_64.rpm
3787cc810380a875b017c5dd61dfa753 x86_64/10.1/RPMS/apache2-source-2.0.50-7.1.101mdk.x86_64.rpm
85d018473eccf002f3952aa373ad011b x86_64/10.1/RPMS/apache2-worker-2.0.50-7.1.101mdk.x86_64.rpm
ec2086cc14f5d8dfe69d7d3997839dc3 x86_64/10.1/RPMS/mod_ssl-2.8.19-1.1.101mdk.x86_64.rpm
1e7f77b7dfda5fffcadc105983f8d057 x86_64/10.1/SRPMS/apache2-2.0.50-7.1.101mdk.src.rpm
f570d037a621f96459b1277a751321f0 x86_64/10.1/SRPMS/apache2-mod_ssl-2.0.50-4.1.101mdk.src.rpm
7d747fde6e998c9493280925420bab7d x86_64/10.1/SRPMS/mod_ssl-2.8.19-1.1.101mdk.src.rpm

Corporate Server 2.1:
bbb22f7a803e1e8576c01b1625b9fe59 corporate/2.1/RPMS/mod_ssl-2.8.10-5.5.C21mdk.i586.rpm
35924170ec84967c32030c56085ba4c9 corporate/2.1/SRPMS/mod_ssl-2.8.10-5.5.C21mdk.src.rpm

Corporate Server 2.1/x86_64:
0fb53bcb355dcf8c3b0a6ef7f9b77c73 x86_64/corporate/2.1/RPMS/mod_ssl-2.8.10-5.5.C21mdk.x86_64.rpm
35924170ec84967c32030c56085ba4c9 x86_64/corporate/2.1/SRPMS/mod_ssl-2.8.10-5.5.C21mdk.src.rpm

Mandrakelinux 9.2:
b312c6619e75753289727e7f54e99cd6 9.2/RPMS/apache2-2.0.47-6.10.92mdk.i586.rpm
f06a2e2d1eb60941b2ff4d01d85318da 9.2/RPMS/apache2-common-2.0.47-6.10.92mdk.i586.rpm
51ea641f34b2f69942ad7721c03bcd5e 9.2/RPMS/apache2-devel-2.0.47-6.10.92mdk.i586.rpm
d76190eb798cee44c4310ceae6b3bb4c 9.2/RPMS/apache2-manual-2.0.47-6.10.92mdk.i586.rpm
fad309f79c12f0d596ad0fb00dcca2f1 9.2/RPMS/apache2-mod_cache-2.0.47-6.10.92mdk.i586.rpm
4785ab184520460d1a97c3655cd18d92 9.2/RPMS/apache2-mod_dav-2.0.47-6.10.92mdk.i586.rpm
29844a272f63fe05b339efba4fa56fbe 9.2/RPMS/apache2-mod_deflate-2.0.47-6.10.92mdk.i586.rpm
51f8fcede09e49a3d4d674368c900adc 9.2/RPMS/apache2-mod_disk_cache-2.0.47-6.10.92mdk.i586.rpm
ce9fab1d93818c2f14bca5202b215b53 9.2/RPMS/apache2-mod_file_cache-2.0.47-6.10.92mdk.i586.rpm
5c28f8dc9e753f8d11a6870e4ec0877a 9.2/RPMS/apache2-mod_ldap-2.0.47-6.10.92mdk.i586.rpm
87a1c68f6c5294343aeadf53737f7b90 9.2/RPMS/apache2-mod_mem_cache-2.0.47-6.10.92mdk.i586.rpm
9f114f43426e496f63abb49e3697121c 9.2/RPMS/apache2-mod_proxy-2.0.47-6.10.92mdk.i586.rpm
900730bdc0e7c427c8566d3549a25854 9.2/RPMS/apache2-mod_ssl-2.0.47-6.10.92mdk.i586.rpm
de5b05c49ad0e05d0894594014c1196a 9.2/RPMS/apache2-modules-2.0.47-6.10.92mdk.i586.rpm
45cc0029100e385f54474f0aa9e7223c 9.2/RPMS/apache2-source-2.0.47-6.10.92mdk.i586.rpm
4e1957d8592e62098ff4be7e2b1006c2 9.2/RPMS/libapr0-2.0.47-6.10.92mdk.i586.rpm
8fc7c6d3324a88309a6fd3dcc53f5495 9.2/RPMS/mod_ssl-2.8.15-1.3.92mdk.i586.rpm
9d7c85949ee82104c2e9aa3f8c7eeb5a 9.2/SRPMS/apache2-2.0.47-6.10.92mdk.src.rpm
1b1ca90dfaad56a8e9b72996e7326eee 9.2/SRPMS/mod_ssl-2.8.15-1.3.92mdk.src.rpm

Mandrakelinux 9.2/AMD64:
543d639dacd77a9120ce5d18ab8182d6 amd64/9.2/RPMS/apache2-2.0.47-6.10.92mdk.amd64.rpm
d0eafc19c3cfbdb8eead634b5af006e7 amd64/9.2/RPMS/apache2-common-2.0.47-6.10.92mdk.amd64.rpm
ca61c7be7085ea9c27cb67e4406ce0be amd64/9.2/RPMS/apache2-devel-2.0.47-6.10.92mdk.amd64.rpm
b986b2fc9d5ae3e3926c7fcf521866e4 amd64/9.2/RPMS/apache2-manual-2.0.47-6.10.92mdk.amd64.rpm
d423e61363e56cd7557ce0a7bf4ff4f9 amd64/9.2/RPMS/apache2-mod_cache-2.0.47-6.10.92mdk.amd64.rpm
cdfc95e2f7d1f62e8941a660a1890832 amd64/9.2/RPMS/apache2-mod_dav-2.0.47-6.10.92mdk.amd64.rpm
53ca615e3fd661236bc517e4fa34ecfc amd64/9.2/RPMS/apache2-mod_deflate-2.0.47-6.10.92mdk.amd64.rpm
f55acf23c9f4d390f416be8a1b056494 amd64/9.2/RPMS/apache2-mod_disk_cache-2.0.47-6.10.92mdk.amd64.rpm
e5f68ec4b8c51b1b505baad44601fd87 amd64/9.2/RPMS/apache2-mod_file_cache-2.0.47-6.10.92mdk.amd64.rpm
e0ab7918f345fca17d9da8ac3f6b07bd amd64/9.2/RPMS/apache2-mod_ldap-2.0.47-6.10.92mdk.amd64.rpm
999e91d7acc4203c577f6a6314231a9b amd64/9.2/RPMS/apache2-mod_mem_cache-2.0.47-6.10.92mdk.amd64.rpm
8a0b12128fc41bfa487ba4587f075545 amd64/9.2/RPMS/apache2-mod_proxy-2.0.47-6.10.92mdk.amd64.rpm
83724c0485d7fea735b8b7a7a64cb33d amd64/9.2/RPMS/apache2-mod_ssl-2.0.47-6.10.92mdk.amd64.rpm
25fb5ebb5493ef1ba22bd66dc244999d amd64/9.2/RPMS/apache2-modules-2.0.47-6.10.92mdk.amd64.rpm
80baf78003f6a137704c3c3675d9292c amd64/9.2/RPMS/apache2-source-2.0.47-6.10.92mdk.amd64.rpm
6a58f3643d9406be341b797af29e509b amd64/9.2/RPMS/lib64apr0-2.0.47-6.10.92mdk.amd64.rpm
c7fc3129993f2832d57004b80d614925 amd64/9.2/RPMS/mod_ssl-2.8.15-1.3.92mdk.amd64.rpm
9d7c85949ee82104c2e9aa3f8c7eeb5a amd64/9.2/SRPMS/apache2-2.0.47-6.10.92mdk.src.rpm
1b1ca90dfaad56a8e9b72996e7326eee amd64/9.2/SRPMS/mod_ssl-2.8.15-1.3.92mdk.src.rpm

Multi Network Firewall 8.2:
5f789e741db0885e7d73fccd4022b387 mnf8.2/RPMS/mod_ssl-2.8.7-3.5.M82mdk.i586.rpm
5b471a15f2d5b9b70f85c561d75226f8 mnf8.2/SRPMS/mod_ssl-2.8.7-3.5.M82mdk.src.rpm


To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandrakesoft for security. You can obtain the GPG public key of the Mandrakelinux Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandrakelinux at:

http://www.mandrakesoft.com/security/advisories

If you want to report vulnerabilities, please contact

security_linux-mandrake.com

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team <security linux-mandrake.com>