dcsimg
Linux Today: Linux News On Internet Time.





More on LinuxToday


Advisories: April 7, 2005

Apr 08, 2005, 04:45 (0 Talkback[s])

Fedora Core


Fedora Update Notification
FEDORA-2005-309
2005-04-07

Product : Fedora Core 3
Name : gftp
Version : 2.0.18
Release : 0.FC3
Summary : A multi-threaded FTP client for the X Window System.

Description :
gFTP is a multi-threaded FTP client for the X Window System. gFTP supports simultaneous downloads, resumption of interrupted file transfers, file transfer queues to allow downloading of multiple files, support for downloading entire directories/subdirectories, a bookmarks menu to allow quick connection to FTP sites, caching of remote directory listings, local and remote chmod, drag and drop, a connection manager and much more.

Install gftp if you need a graphical FTP client.


  • Fri Feb 18 2005 Warren Togami <wtogami@redhat.com> 2.0.18-0.FC3
    • FC3 (including CAN-2005-0372)
  • Thu Feb 10 2005 Warren Togami <wtogami@redhat.com> 2.0.18-1
    • 2.0.18

This update can be downloaded from:
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/

ed8d34aa5c34d6478cc4bb054d460dbe SRPMS/gftp-2.0.18-0.FC3.src.rpm
83f29722b6d6597f37bab3355c2e0806 x86_64/gftp-2.0.18-0.FC3.x86_64.rpm
68c4b1f72274e854cc45af49f5a26e41 x86_64/debug/gftpdebuginfo -2.0.18-0.FC3.x86_64.rpm
5062b71fdfd999e301aa83c887965c1d i386/gftp-2.0.18-0.FC3.i386.rpm
5f7839e2c42861bce1d222a7adc34b7d i386/debug/gftpdebuginfo -2.0.18-0.FC3.i386.rpm

This update can also be installed with the Update Agent; you can launch the Update Agent with the 'up2date' command.



Fedora Update Notification
FEDORA-2005-310
2005-04-07

Product : Fedora Core 2
Name : gftp
Version : 2.0.18
Release : 0.FC2
Summary : A multi-threaded FTP client for the X Window System.

Description :
gFTP is a multi-threaded FTP client for the X Window System. gFTP supports simultaneous downloads, resumption of interrupted file transfers, file transfer queues to allow downloading of multiple files, support for downloading entire directories/subdirectories, a bookmarks menu to allow quick connection to FTP sites, caching of remote directory listings, local and remote chmod, drag and drop, a connection manager and much more.

Install gftp if you need a graphical FTP client.


  • Fri Feb 18 2005 Warren Togami <wtogami@redhat.com> 2.0.18-0.FC2
    • FC2 (including CAN-2005-0372)
  • Thu Feb 10 2005 Warren Togami <wtogami@redhat.com> 2.0.18-1
    • 2.0.18
  • Tue Jun 15 2004 Elliot Lee <sopwith@redhat.com>
    • rebuilt

This update can be downloaded from:
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/2/

881c3a931eae3bb43d3fbf6c0ebe95bd SRPMS/gftp-2.0.18-0.FC2.src.rpm
c4488c9382efaa1556f0f4111998a20a x86_64/gftp-2.0.18-0.FC2.x86_64.rpm
8765bb914df075dbfd4fd7bd7b935274 x86_64/debug/gftpdebuginfo -2.0.18-0.FC2.x86_64.rpm
c9f0c27d1fa4b6756aba1941cd9c0137 i386/gftp-2.0.18-0.FC2.i386.rpm
60e604a70fc5b0bb80f730c7edf333d5 i386/debug/gftpdebuginfo -2.0.18-0.FC2.i386.rpm

This update can also be installed with the Update Agent; you can launch the Update Agent with the 'up2date' command.


Gentoo Linux


Gentoo Linux Security Advisory GLSA 200504-06

http://security.gentoo.org/


Severity: Normal
Title: sharutils: Insecure temporary file creation
Date: April 06, 2005
Bugs: #87939
ID: 200504-06


Synopsis

The unshar utility is vulnerable to symlink attacks, potentially allowing a local user to overwrite arbitrary files.

Background

sharutils is a collection of tools to deal with shar archives.

Affected packages


     Package             /   Vulnerable   /                 Unaffected

  1  app-arch/sharutils      < 4.2.1-r11                  >= 4.2.1-r11

Description

Joey Hess has discovered that the program unshar, which is a part of sharutils, creates temporary files in a world-writable directory with predictable names.

Impact

A local attacker could create symbolic links in the temporary files directory, pointing to a valid file somewhere on the filesystem. When unshar is executed, this would result in the file being overwritten with the rights of the user running the utility, which could be the root user.

Workaround

There is no known workaround at this time.

Resolution

All sharutils users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=app-arch/sharutils-4.2.1-r11"

References

[ 1 ] Ubuntu Advisory

http://www.ubuntulinux.org/support/documentation/usn/usn-104-1

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-200504-06.xml

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org.

License

Copyright 2005 Gentoo Foundation, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.0

Mandriva Linux/Mandrakelinux

Mandrakelinux Security Update Advisory


Package name: sharutils
Advisory ID: MDKSA-2005:067
Date: April 7th, 2005
Affected versions: 10.0, 10.1, Corporate 3.0, Corporate Server 2.1


Problem Description:

Shaun Colley discovered a buffer overflow in shar that was triggered by output files (using -o) with names longer than 49 characters which could be exploited to run arbitrary attacker-specified code.

Ulf Harnhammar discovered that shar does not check the data length returned by the wc command.

Joey Hess discovered that unshar would create temporary files in an insecure manner which could allow a symbolic link attack to create or overwrite arbitrary files with the privileges of the user using unshar.

The updated packages have been patched to correct these issues.


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1772
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1773
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=302412


Updated Packages:

Mandrakelinux 10.0:
e0c5cfb886f7a0fedfc5bdc1455abccd 10.0/RPMS/sharutils-4.2.1-14.1.100mdk.i586.rpm
21b92cbccfc0d68d6e54d8e5a29cb7a4 10.0/SRPMS/sharutils-4.2.1-14.1.100mdk.src.rpm

Mandrakelinux 10.0/AMD64:
3a5e130272c580dea1fa04759ac6bc13 amd64/10.0/RPMS/sharutils-4.2.1-14.1.100mdk.amd64.rpm
21b92cbccfc0d68d6e54d8e5a29cb7a4 amd64/10.0/SRPMS/sharutils-4.2.1-14.1.100mdk.src.rpm

Mandrakelinux 10.1:
6385031df18e26b9cfb90cd3258ef3d0 10.1/RPMS/sharutils-4.2.1-17.1.101mdk.i586.rpm
f2ccbc3b40ce4e78cf38fb04903ff115 10.1/SRPMS/sharutils-4.2.1-17.1.101mdk.src.rpm

Mandrakelinux 10.1/X86_64:
bd19a7967add2833d4307f4bbe4bb846 x86_64/10.1/RPMS/sharutils-4.2.1-17.1.101mdk.x86_64.rpm
f2ccbc3b40ce4e78cf38fb04903ff115 x86_64/10.1/SRPMS/sharutils-4.2.1-17.1.101mdk.src.rpm

Corporate Server 2.1:
5dfef49fe2541b8d59a0bb19ce0e4118 corporate/2.1/RPMS/sharutils-4.2.1-14.1.C21mdk.i586.rpm
85f8159f48a7eaed12a22b72bb0444b3 corporate/2.1/SRPMS/sharutils-4.2.1-14.1.C21mdk.src.rpm

Corporate Server 2.1/X86_64:
9a797c69a9b09049db9a6844e75c8db5 x86_64/corporate/2.1/RPMS/sharutils-4.2.1-14.1.C21mdk.x86_64.rpm
85f8159f48a7eaed12a22b72bb0444b3 x86_64/corporate/2.1/SRPMS/sharutils-4.2.1-14.1.C21mdk.src.rpm

Corporate 3.0:
77797b4c5413cc83ce90718238d9ec49 corporate/3.0/RPMS/sharutils-4.2.1-14.1.C30mdk.i586.rpm
cf8342d9bfdbcd90ccd36aec74546589 corporate/3.0/SRPMS/sharutils-4.2.1-14.1.C30mdk.src.rpm

Corporate 3.0/X86_64:
b8f7c96b18dc28d5ef919d2841496648 x86_64/corporate/3.0/RPMS/sharutils-4.2.1-14.1.C30mdk.x86_64.rpm
cf8342d9bfdbcd90ccd36aec74546589 x86_64/corporate/3.0/SRPMS/sharutils-4.2.1-14.1.C30mdk.src.rpm


To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandrakesoft for security. You can obtain the GPG public key of the Mandrakelinux Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandrakelinux at:

http://www.mandrakesoft.com/security/advisories

If you want to report vulnerabilities, please contact

security_linux-mandrake.com


Mandrakelinux Security Update Advisory


Package name: gtk+2.0
Advisory ID: MDKSA-2005:068
Date: April 7th, 2005
Affected versions: 10.0, 10.1, Corporate 3.0


Problem Description:

A bug was discovered in the way that gtk+2.0 processes BMP images which could allow for a specially crafted BMP to cause a Denial of Service attack on applications linked against gtk+2.0.

The updated packages have been patched to correct these issues.


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0891


Updated Packages:

Mandrakelinux 10.0:
6ded91220f9da5195a7eb8bd29744ce5 10.0/RPMS/gtk+2.0-2.2.4-10.2.100mdk.i586.rpm
defbd824fdbceafb811c4a26804eea2d 10.0/RPMS/libgdk_pixbuf2.0_0-2.2.4-10.2.100mdk.i586.rpm
fa164ed6e67c60abd8f9624715b06cef 10.0/RPMS/libgdk_pixbuf2.0_0-devel-2.2.4-10.2.100mdk.i586.rpm
0a90ddf71f6e8bd8b70503a4bbe41f00 10.0/RPMS/libgtk+-linuxfb-2.0_0-2.2.4-10.2.100mdk.i586.rpm
5f9257920729f34f1657406ab69dd3fe 10.0/RPMS/libgtk+-linuxfb-2.0_0-devel-2.2.4-10.2.100mdk.i586.rpm
ff6e8a3eb98537c53607275896788a6b 10.0/RPMS/libgtk+-x11-2.0_0-2.2.4-10.2.100mdk.i586.rpm
dcb5de61416c85a2680bfe331e12faf4 10.0/RPMS/libgtk+2.0_0-2.2.4-10.2.100mdk.i586.rpm
b5e1886ca33a99b7ea26ba65a634a171 10.0/RPMS/libgtk+2.0_0-devel-2.2.4-10.2.100mdk.i586.rpm
8a7e5e9f6620200330f7800d65e02468 10.0/SRPMS/gtk+2.0-2.2.4-10.2.100mdk.src.rpm

Mandrakelinux 10.0/AMD64:
3442a95e11299776193b69b6bc86513a amd64/10.0/RPMS/gtk+2.0-2.2.4-10.2.100mdk.amd64.rpm
879dfefb728b1f04c5f5e0c049cb173b amd64/10.0/RPMS/lib64gdk_pixbuf2.0_0-2.2.4-10.2.100mdk.amd64.rpm
c4ac90a0f8d987a825fb1f6732e14c57 amd64/10.0/RPMS/lib64gdk_pixbuf2.0_0-devel-2.2.4-10.2.100mdk.amd64.rpm
554b74e447cda888be6ae8cb7e916761 amd64/10.0/RPMS/lib64gtk+-linuxfb-2.0_0-2.2.4-10.2.100mdk.amd64.rpm
c17c2e94111421bfd631adf517fc5b57 amd64/10.0/RPMS/lib64gtk+-linuxfb-2.0_0-devel-2.2.4-10.2.100mdk.amd64.rpm
fd493ea1d4da40eedf305e2d558d41e6 amd64/10.0/RPMS/lib64gtk+-x11-2.0_0-2.2.4-10.2.100mdk.amd64.rpm
292e229535ee420bc8bbf7488225611a amd64/10.0/RPMS/lib64gtk+2.0_0-2.2.4-10.2.100mdk.amd64.rpm
827a421ac971df39a90f47467195eb75 amd64/10.0/RPMS/lib64gtk+2.0_0-devel-2.2.4-10.2.100mdk.amd64.rpm
8a7e5e9f6620200330f7800d65e02468 amd64/10.0/SRPMS/gtk+2.0-2.2.4-10.2.100mdk.src.rpm

Mandrakelinux 10.1:
63bdf92cde28cd4596862acb8303db89 10.1/RPMS/gtk+2.0-2.4.9-9.1.101mdk.i586.rpm
d0b44ebf0f5a32495164e3b95f836a1e 10.1/RPMS/libgdk_pixbuf2.0_0-2.4.9-9.1.101mdk.i586.rpm
b61a83a21d2af5f893d010687e4ba31c 10.1/RPMS/libgdk_pixbuf2.0_0-devel-2.4.9-9.1.101mdk.i586.rpm
79e3363764cd1e005c92217b1601410d 10.1/RPMS/libgtk+-x11-2.0_0-2.4.9-9.1.101mdk.i586.rpm
db1d643a7c5e8c2ea9caf3a09b08ffd1 10.1/RPMS/libgtk+2.0_0-2.4.9-9.1.101mdk.i586.rpm
825f54c99f3e0790fa563318eb0ad4f4 10.1/RPMS/libgtk+2.0_0-devel-2.4.9-9.1.101mdk.i586.rpm
73738f0963942b9266e0cb3ec2e7812b 10.1/SRPMS/gtk+2.0-2.4.9-9.1.101mdk.src.rpm

Mandrakelinux 10.1/X86_64:
58f3b14ddf3174f282a7fcedd2291cb2 x86_64/10.1/RPMS/gtk+2.0-2.4.9-9.1.101mdk.x86_64.rpm
d0b44ebf0f5a32495164e3b95f836a1e x86_64/10.1/RPMS/libgdk_pixbuf2.0_0-2.4.9-9.1.101mdk.i586.rpm
79e3363764cd1e005c92217b1601410d x86_64/10.1/RPMS/libgtk+-x11-2.0_0-2.4.9-9.1.101mdk.i586.rpm
db1d643a7c5e8c2ea9caf3a09b08ffd1 x86_64/10.1/RPMS/libgtk+2.0_0-2.4.9-9.1.101mdk.i586.rpm
0a8969769eb5197c102f9c4e26de3c9d x86_64/10.1/RPMS/lib64gdk_pixbuf2.0_0-2.4.9-9.1.101mdk.x86_64.rpm
8587febd8da71ae4ac0523f1bf3799ba x86_64/10.1/RPMS/lib64gdk_pixbuf2.0_0-devel-2.4.9-9.1.101mdk.x86_64.rpm
81a6326dd657d99ee7dd7c0677fc8ff2 x86_64/10.1/RPMS/lib64gtk+-x11-2.0_0-2.4.9-9.1.101mdk.x86_64.rpm
777f9c5fc9d83748825e0e9af165c3e3 x86_64/10.1/RPMS/lib64gtk+2.0_0-2.4.9-9.1.101mdk.x86_64.rpm
72273e60a9ff32f874239d90d5cdfd24 x86_64/10.1/RPMS/lib64gtk+2.0_0-devel-2.4.9-9.1.101mdk.x86_64.rpm
73738f0963942b9266e0cb3ec2e7812b x86_64/10.1/SRPMS/gtk+2.0-2.4.9-9.1.101mdk.src.rpm

Corporate 3.0:
87c55c922e3fe5dce66fd619d6d94034 corporate/3.0/RPMS/gtk+2.0-2.2.4-10.3.C30mdk.i586.rpm
5bdfa2ded3da000da4d39c7bdb5a2edb corporate/3.0/RPMS/libgdk_pixbuf2.0_0-2.2.4-10.3.C30mdk.i586.rpm
e6e00410204aff942b57b4b42ce3708a corporate/3.0/RPMS/libgdk_pixbuf2.0_0-devel-2.2.4-10.3.C30mdk.i586.rpm
7b714ac098a96754362d0e6e6b06d22a corporate/3.0/RPMS/libgtk+-linuxfb-2.0_0-2.2.4-10.3.C30mdk.i586.rpm
4f13d0dd61a046297f8ced1e78496549 corporate/3.0/RPMS/libgtk+-linuxfb-2.0_0-devel-2.2.4-10.3.C30mdk.i586.rpm
5009d264352ec2f4710d4e2d198f5178 corporate/3.0/RPMS/libgtk+-x11-2.0_0-2.2.4-10.3.C30mdk.i586.rpm
70cc0d5faecb6ade7db357bd98ae2f2c corporate/3.0/RPMS/libgtk+2.0_0-2.2.4-10.3.C30mdk.i586.rpm
fe6a4d000fb5af708fec694109e56339 corporate/3.0/RPMS/libgtk+2.0_0-devel-2.2.4-10.3.C30mdk.i586.rpm
cb2b245a60da7db473b9d6f95596a8e8 corporate/3.0/SRPMS/gtk+2.0-2.2.4-10.3.C30mdk.src.rpm

Corporate 3.0/X86_64:
62ba5850d9ce991c37b00d4f4c2423fc x86_64/corporate/3.0/RPMS/gtk+2.0-2.2.4-10.3.C30mdk.x86_64.rpm
c3752c95681dba01c2862559099ae28c x86_64/corporate/3.0/RPMS/lib64gdk_pixbuf2.0_0-2.2.4-10.3.C30mdk.x86_64.rpm
c60a80e68525611932a2be6c5a224471 x86_64/corporate/3.0/RPMS/lib64gdk_pixbuf2.0_0-devel-2.2.4-10.3.C30mdk.x86_64.rpm
493ef92d6e50f9399303015c73d74bdd x86_64/corporate/3.0/RPMS/lib64gtk+-linuxfb-2.0_0-2.2.4-10.3.C30mdk.x86_64.rpm
0b60bc13179cb5563580bcfe78754065 x86_64/corporate/3.0/RPMS/lib64gtk+-linuxfb-2.0_0-devel-2.2.4-10.3.C30mdk.x86_64.rpm
93ca4819c1be2754e0b45fafebe12133 x86_64/corporate/3.0/RPMS/lib64gtk+-x11-2.0_0-2.2.4-10.3.C30mdk.x86_64.rpm
313c17b002cde662476654bca69a887b x86_64/corporate/3.0/RPMS/lib64gtk+2.0_0-2.2.4-10.3.C30mdk.x86_64.rpm
730e178acc1c61b370490b7aaf71bb5f x86_64/corporate/3.0/RPMS/lib64gtk+2.0_0-devel-2.2.4-10.3.C30mdk.x86_64.rpm
cb2b245a60da7db473b9d6f95596a8e8 x86_64/corporate/3.0/SRPMS/gtk+2.0-2.2.4-10.3.C30mdk.src.rpm


To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandrakesoft for security. You can obtain the GPG public key of the Mandrakelinux Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandrakelinux at:

http://www.mandrakesoft.com/security/advisories

If you want to report vulnerabilities, please contact

security_linux-mandrake.com

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team <security linux-mandrake.com>



Mandrakelinux Security Update Advisory


Package name: gdk-pixbuf
Advisory ID: MDKSA-2005:069
Date: April 7th, 2005
Affected versions: 10.0, 10.1, Corporate 3.0


Problem Description:

A bug was discovered in the way that gdk-pixbuf processes BMP images which could allow for a specially crafted BMP to cause a Denial of Service attack on applications linked against gdk-pixbuf.

The updated packages have been patched to correct these issues.


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0891


Updated Packages:

Mandrakelinux 10.0:
f430b445e8a76a05376b65d8bcf085b9 10.0/RPMS/gdk-pixbuf-loaders-0.22.0-2.3.100mdk.i586.rpm
0e87d2d409375ccb4d900dd4f360efa1 10.0/RPMS/libgdk-pixbuf-gnomecanvas1-0.22.0-2.3.100mdk.i586.rpm
5332504ce51f46a200869595c1a0e859 10.0/RPMS/libgdk-pixbuf-xlib2-0.22.0-2.3.100mdk.i586.rpm
6d8075217b6d323a5ade36f02d110015 10.0/RPMS/libgdk-pixbuf2-0.22.0-2.3.100mdk.i586.rpm
fc8ea48179e55758f2432d9360f50627 10.0/RPMS/libgdk-pixbuf2-devel-0.22.0-2.3.100mdk.i586.rpm
bc8962a581d9df3bfcd6449c98651e6c 10.0/SRPMS/gdk-pixbuf-0.22.0-2.3.100mdk.src.rpm

Mandrakelinux 10.0/AMD64:
fbd1ddbf1d5a20166a0f5197107c2018 amd64/10.0/RPMS/gdk-pixbuf-loaders-0.22.0-2.3.100mdk.amd64.rpm
19ea3305f0672cfef258b8d9070ebcb2 amd64/10.0/RPMS/lib64gdk-pixbuf-gnomecanvas1-0.22.0-2.3.100mdk.amd64.rpm
cd48bd19cc3dcf7efc044e3f8d6714bf amd64/10.0/RPMS/lib64gdk-pixbuf-xlib2-0.22.0-2.3.100mdk.amd64.rpm
4a39a2ccfe011df57c87902a255e2665 amd64/10.0/RPMS/lib64gdk-pixbuf2-0.22.0-2.3.100mdk.amd64.rpm
7cda46391c609bc960ae64b80e89015b amd64/10.0/RPMS/lib64gdk-pixbuf2-devel-0.22.0-2.3.100mdk.amd64.rpm
bc8962a581d9df3bfcd6449c98651e6c amd64/10.0/SRPMS/gdk-pixbuf-0.22.0-2.3.100mdk.src.rpm

Mandrakelinux 10.1:
0fbccd1cdae7c75775faf437cdf47dd6 10.1/RPMS/gdk-pixbuf-loaders-0.22.0-5.1.101mdk.i586.rpm
dd160afc8f5a9b5e90b3ee9953eb79aa 10.1/RPMS/libgdk-pixbuf-gnomecanvas1-0.22.0-5.1.101mdk.i586.rpm
4144e66108cf882dd3f4f1bf4bce2ff2 10.1/RPMS/libgdk-pixbuf-xlib2-0.22.0-5.1.101mdk.i586.rpm
8bbed60b2e8298474f40d29d90858dc5 10.1/RPMS/libgdk-pixbuf2-0.22.0-5.1.101mdk.i586.rpm
0c3a28830681cb6409b8e43e3acc5bab 10.1/RPMS/libgdk-pixbuf2-devel-0.22.0-5.1.101mdk.i586.rpm
d106ccd550bf9d9e32ee279eed8a5eba 10.1/SRPMS/gdk-pixbuf-0.22.0-5.1.101mdk.src.rpm

Mandrakelinux 10.1/X86_64:
7590453088477646d32207678c74aebb x86_64/10.1/RPMS/gdk-pixbuf-loaders-0.22.0-5.1.101mdk.x86_64.rpm
dd160afc8f5a9b5e90b3ee9953eb79aa x86_64/10.1/RPMS/libgdk-pixbuf-gnomecanvas1-0.22.0-5.1.101mdk.i586.rpm
4144e66108cf882dd3f4f1bf4bce2ff2 x86_64/10.1/RPMS/libgdk-pixbuf-xlib2-0.22.0-5.1.101mdk.i586.rpm
8bbed60b2e8298474f40d29d90858dc5 x86_64/10.1/RPMS/libgdk-pixbuf2-0.22.0-5.1.101mdk.i586.rpm
2249305133157e4df30e4dccd15953c8 x86_64/10.1/RPMS/lib64gdk-pixbuf-gnomecanvas1-0.22.0-5.1.101mdk.x86_64.rpm
db79c2089feb5dec9bce76e3475b08a7 x86_64/10.1/RPMS/lib64gdk-pixbuf-xlib2-0.22.0-5.1.101mdk.x86_64.rpm
f84a8a50bc36072dbb157a1097f0d949 x86_64/10.1/RPMS/lib64gdk-pixbuf2-0.22.0-5.1.101mdk.x86_64.rpm
3259e21f008ae6f7895e0c22196bfb76 x86_64/10.1/RPMS/lib64gdk-pixbuf2-devel-0.22.0-5.1.101mdk.x86_64.rpm
d106ccd550bf9d9e32ee279eed8a5eba x86_64/10.1/SRPMS/gdk-pixbuf-0.22.0-5.1.101mdk.src.rpm

Corporate 3.0:
451bbbd4bd336dee287fba9b29f635e4 corporate/3.0/RPMS/gdk-pixbuf-loaders-0.22.0-2.3.C30mdk.i586.rpm
acb446883025bdf03429fecd7123f867 corporate/3.0/RPMS/libgdk-pixbuf-gnomecanvas1-0.22.0-2.3.C30mdk.i586.rpm
5c9ef2fcd3a3d290898478832583c98f corporate/3.0/RPMS/libgdk-pixbuf-xlib2-0.22.0-2.3.C30mdk.i586.rpm
f111de3c371cbb9b7f9d93cdee94250f corporate/3.0/RPMS/libgdk-pixbuf2-0.22.0-2.3.C30mdk.i586.rpm
1a17bf4e8148d703b543d7cc6548aae4 corporate/3.0/RPMS/libgdk-pixbuf2-devel-0.22.0-2.3.C30mdk.i586.rpm
39a9fe79245f9bc8ea83e24ae1d34041 corporate/3.0/SRPMS/gdk-pixbuf-0.22.0-2.3.C30mdk.src.rpm

Corporate 3.0/X86_64:
e97d3b46e21b4de9d31af7bdd9cf7e73 x86_64/corporate/3.0/RPMS/gdk-pixbuf-loaders-0.22.0-2.3.C30mdk.x86_64.rpm
b0a897d394be8925adacb37d705b6f37 x86_64/corporate/3.0/RPMS/lib64gdk-pixbuf-gnomecanvas1-0.22.0-2.3.C30mdk.x86_64.rpm
103253c83fa7b9c79f121157615c3c08 x86_64/corporate/3.0/RPMS/lib64gdk-pixbuf-xlib2-0.22.0-2.3.C30mdk.x86_64.rpm
6b0d14a317df8bb09866dc287ff06692 x86_64/corporate/3.0/RPMS/lib64gdk-pixbuf2-0.22.0-2.3.C30mdk.x86_64.rpm
90004b32575925d0721668317b40a8c7 x86_64/corporate/3.0/RPMS/lib64gdk-pixbuf2-devel-0.22.0-2.3.C30mdk.x86_64.rpm
39a9fe79245f9bc8ea83e24ae1d34041 x86_64/corporate/3.0/SRPMS/gdk-pixbuf-0.22.0-2.3.C30mdk.src.rpm


To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandrakesoft for security. You can obtain the GPG public key of the Mandrakelinux Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandrakelinux at:

http://www.mandrakesoft.com/security/advisories

If you want to report vulnerabilities, please contact

security_linux-mandrake.com

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team <security linux-mandrake.com>