SHARE
Facebook X Pinterest WhatsApp

Advisories: April 7, 2005

Written By
thumbnail
Web Webster
Web Webster
Apr 8, 2005

Fedora Core


Fedora Update Notification
FEDORA-2005-309
2005-04-07


Product : Fedora Core 3
Name : gftp
Version : 2.0.18
Release : 0.FC3
Summary : A multi-threaded FTP client for the X Window System.

Description :
gFTP is a multi-threaded FTP client for the X Window System. gFTP
supports simultaneous downloads, resumption of interrupted file
transfers, file transfer queues to allow downloading of multiple
files, support for downloading entire directories/subdirectories, a
bookmarks menu to allow quick connection to FTP sites, caching of
remote directory listings, local and remote chmod, drag and drop, a
connection manager and much more.

Install gftp if you need a graphical FTP client.


  • Fri Feb 18 2005 Warren Togami <wtogami@redhat.com>
    2.0.18-0.FC3
    • FC3 (including CAN-2005-0372)
  • Thu Feb 10 2005 Warren Togami <wtogami@redhat.com>
    2.0.18-1
    • 2.0.18

This update can be downloaded from:

http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/

ed8d34aa5c34d6478cc4bb054d460dbe
SRPMS/gftp-2.0.18-0.FC3.src.rpm
83f29722b6d6597f37bab3355c2e0806
x86_64/gftp-2.0.18-0.FC3.x86_64.rpm
68c4b1f72274e854cc45af49f5a26e41 x86_64/debug/gftpdebuginfo
-2.0.18-0.FC3.x86_64.rpm
5062b71fdfd999e301aa83c887965c1d
i386/gftp-2.0.18-0.FC3.i386.rpm
5f7839e2c42861bce1d222a7adc34b7d i386/debug/gftpdebuginfo
-2.0.18-0.FC3.i386.rpm

This update can also be installed with the Update Agent; you can
launch the Update Agent with the ‘up2date’ command.



Fedora Update Notification
FEDORA-2005-310
2005-04-07


Product : Fedora Core 2
Name : gftp
Version : 2.0.18
Release : 0.FC2
Summary : A multi-threaded FTP client for the X Window System.

Description :
gFTP is a multi-threaded FTP client for the X Window System. gFTP
supports simultaneous downloads, resumption of interrupted file
transfers, file transfer queues to allow downloading of multiple
files, support for downloading entire directories/subdirectories, a
bookmarks menu to allow quick connection to FTP sites, caching of
remote directory listings, local and remote chmod, drag and drop, a
connection manager and much more.

Install gftp if you need a graphical FTP client.


  • Fri Feb 18 2005 Warren Togami <wtogami@redhat.com>
    2.0.18-0.FC2
    • FC2 (including CAN-2005-0372)
  • Thu Feb 10 2005 Warren Togami <wtogami@redhat.com>
    2.0.18-1
    • 2.0.18
  • Tue Jun 15 2004 Elliot Lee <sopwith@redhat.com>
    • rebuilt

This update can be downloaded from:

http://download.fedora.redhat.com/pub/fedora/linux/core/updates/2/

881c3a931eae3bb43d3fbf6c0ebe95bd
SRPMS/gftp-2.0.18-0.FC2.src.rpm
c4488c9382efaa1556f0f4111998a20a
x86_64/gftp-2.0.18-0.FC2.x86_64.rpm
8765bb914df075dbfd4fd7bd7b935274 x86_64/debug/gftpdebuginfo
-2.0.18-0.FC2.x86_64.rpm
c9f0c27d1fa4b6756aba1941cd9c0137
i386/gftp-2.0.18-0.FC2.i386.rpm
60e604a70fc5b0bb80f730c7edf333d5 i386/debug/gftpdebuginfo
-2.0.18-0.FC2.i386.rpm

This update can also be installed with the Update Agent; you can
launch the Update Agent with the ‘up2date’ command.


Gentoo Linux


Gentoo Linux Security Advisory GLSA 200504-06


http://security.gentoo.org/


Severity: Normal
Title: sharutils: Insecure temporary file creation
Date: April 06, 2005
Bugs: #87939
ID: 200504-06


Synopsis

The unshar utility is vulnerable to symlink attacks, potentially
allowing a local user to overwrite arbitrary files.

Background

sharutils is a collection of tools to deal with shar
archives.

Affected packages


     Package             /   Vulnerable   /                 Unaffected

  1  app-arch/sharutils      < 4.2.1-r11                  >= 4.2.1-r11

Description

Joey Hess has discovered that the program unshar, which is a
part of sharutils, creates temporary files in a world-writable
directory with predictable names.

Impact

A local attacker could create symbolic links in the temporary
files directory, pointing to a valid file somewhere on the
filesystem. When unshar is executed, this would result in the file
being overwritten with the rights of the user running the utility,
which could be the root user.

Workaround

There is no known workaround at this time.

Resolution

All sharutils users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=app-arch/sharutils-4.2.1-r11"

References

[ 1 ] Ubuntu Advisory

http://www.ubuntulinux.org/support/documentation/usn/usn-104-1

Availability

This GLSA and any updates to it are available for viewing at the
Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-200504-06.xml

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or
alternatively, you may file a bug at http://bugs.gentoo.org.

License

Copyright 2005 Gentoo Foundation, Inc; referenced text belongs
to its owner(s).

The contents of this document are licensed under the Creative
Commons – Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.0

Mandriva Linux/Mandrakelinux

Mandrakelinux Security Update Advisory


Package name: sharutils
Advisory ID: MDKSA-2005:067
Date: April 7th, 2005
Affected versions: 10.0, 10.1, Corporate 3.0, Corporate Server
2.1


Problem Description:

Shaun Colley discovered a buffer overflow in shar that was
triggered by output files (using -o) with names longer than 49
characters which could be exploited to run arbitrary
attacker-specified code.

Ulf Harnhammar discovered that shar does not check the data
length returned by the wc command.

Joey Hess discovered that unshar would create temporary files in
an insecure manner which could allow a symbolic link attack to
create or overwrite arbitrary files with the privileges of the user
using unshar.

The updated packages have been patched to correct these
issues.


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1772

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1773

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=302412


Updated Packages:

Mandrakelinux 10.0:
e0c5cfb886f7a0fedfc5bdc1455abccd
10.0/RPMS/sharutils-4.2.1-14.1.100mdk.i586.rpm
21b92cbccfc0d68d6e54d8e5a29cb7a4
10.0/SRPMS/sharutils-4.2.1-14.1.100mdk.src.rpm

Mandrakelinux 10.0/AMD64:
3a5e130272c580dea1fa04759ac6bc13
amd64/10.0/RPMS/sharutils-4.2.1-14.1.100mdk.amd64.rpm
21b92cbccfc0d68d6e54d8e5a29cb7a4
amd64/10.0/SRPMS/sharutils-4.2.1-14.1.100mdk.src.rpm

Mandrakelinux 10.1:
6385031df18e26b9cfb90cd3258ef3d0
10.1/RPMS/sharutils-4.2.1-17.1.101mdk.i586.rpm
f2ccbc3b40ce4e78cf38fb04903ff115
10.1/SRPMS/sharutils-4.2.1-17.1.101mdk.src.rpm

Mandrakelinux 10.1/X86_64:
bd19a7967add2833d4307f4bbe4bb846
x86_64/10.1/RPMS/sharutils-4.2.1-17.1.101mdk.x86_64.rpm
f2ccbc3b40ce4e78cf38fb04903ff115
x86_64/10.1/SRPMS/sharutils-4.2.1-17.1.101mdk.src.rpm

Corporate Server 2.1:
5dfef49fe2541b8d59a0bb19ce0e4118
corporate/2.1/RPMS/sharutils-4.2.1-14.1.C21mdk.i586.rpm
85f8159f48a7eaed12a22b72bb0444b3
corporate/2.1/SRPMS/sharutils-4.2.1-14.1.C21mdk.src.rpm

Corporate Server 2.1/X86_64:
9a797c69a9b09049db9a6844e75c8db5
x86_64/corporate/2.1/RPMS/sharutils-4.2.1-14.1.C21mdk.x86_64.rpm

85f8159f48a7eaed12a22b72bb0444b3
x86_64/corporate/2.1/SRPMS/sharutils-4.2.1-14.1.C21mdk.src.rpm

Corporate 3.0:
77797b4c5413cc83ce90718238d9ec49
corporate/3.0/RPMS/sharutils-4.2.1-14.1.C30mdk.i586.rpm
cf8342d9bfdbcd90ccd36aec74546589
corporate/3.0/SRPMS/sharutils-4.2.1-14.1.C30mdk.src.rpm

Corporate 3.0/X86_64:
b8f7c96b18dc28d5ef919d2841496648
x86_64/corporate/3.0/RPMS/sharutils-4.2.1-14.1.C30mdk.x86_64.rpm

cf8342d9bfdbcd90ccd36aec74546589
x86_64/corporate/3.0/SRPMS/sharutils-4.2.1-14.1.C30mdk.src.rpm


To upgrade automatically use MandrakeUpdate or urpmi. The
verification of md5 checksums and GPG signatures is performed
automatically for you.

All packages are signed by Mandrakesoft for security. You can
obtain the GPG public key of the Mandrakelinux Security Team by
executing:

gpg –recv-keys –keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandrakelinux at:

http://www.mandrakesoft.com/security/advisories

If you want to report vulnerabilities, please contact

security_linux-mandrake.com


Mandrakelinux Security Update Advisory


Package name: gtk+2.0
Advisory ID: MDKSA-2005:068
Date: April 7th, 2005
Affected versions: 10.0, 10.1, Corporate 3.0


Problem Description:

A bug was discovered in the way that gtk+2.0 processes BMP
images which could allow for a specially crafted BMP to cause a
Denial of Service attack on applications linked against
gtk+2.0.

The updated packages have been patched to correct these
issues.


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0891


Updated Packages:

Mandrakelinux 10.0:
6ded91220f9da5195a7eb8bd29744ce5
10.0/RPMS/gtk+2.0-2.2.4-10.2.100mdk.i586.rpm
defbd824fdbceafb811c4a26804eea2d
10.0/RPMS/libgdk_pixbuf2.0_0-2.2.4-10.2.100mdk.i586.rpm
fa164ed6e67c60abd8f9624715b06cef
10.0/RPMS/libgdk_pixbuf2.0_0-devel-2.2.4-10.2.100mdk.i586.rpm
0a90ddf71f6e8bd8b70503a4bbe41f00
10.0/RPMS/libgtk+-linuxfb-2.0_0-2.2.4-10.2.100mdk.i586.rpm
5f9257920729f34f1657406ab69dd3fe
10.0/RPMS/libgtk+-linuxfb-2.0_0-devel-2.2.4-10.2.100mdk.i586.rpm

ff6e8a3eb98537c53607275896788a6b
10.0/RPMS/libgtk+-x11-2.0_0-2.2.4-10.2.100mdk.i586.rpm
dcb5de61416c85a2680bfe331e12faf4
10.0/RPMS/libgtk+2.0_0-2.2.4-10.2.100mdk.i586.rpm
b5e1886ca33a99b7ea26ba65a634a171
10.0/RPMS/libgtk+2.0_0-devel-2.2.4-10.2.100mdk.i586.rpm
8a7e5e9f6620200330f7800d65e02468
10.0/SRPMS/gtk+2.0-2.2.4-10.2.100mdk.src.rpm

Mandrakelinux 10.0/AMD64:
3442a95e11299776193b69b6bc86513a
amd64/10.0/RPMS/gtk+2.0-2.2.4-10.2.100mdk.amd64.rpm
879dfefb728b1f04c5f5e0c049cb173b
amd64/10.0/RPMS/lib64gdk_pixbuf2.0_0-2.2.4-10.2.100mdk.amd64.rpm

c4ac90a0f8d987a825fb1f6732e14c57
amd64/10.0/RPMS/lib64gdk_pixbuf2.0_0-devel-2.2.4-10.2.100mdk.amd64.rpm

554b74e447cda888be6ae8cb7e916761
amd64/10.0/RPMS/lib64gtk+-linuxfb-2.0_0-2.2.4-10.2.100mdk.amd64.rpm

c17c2e94111421bfd631adf517fc5b57
amd64/10.0/RPMS/lib64gtk+-linuxfb-2.0_0-devel-2.2.4-10.2.100mdk.amd64.rpm

fd493ea1d4da40eedf305e2d558d41e6
amd64/10.0/RPMS/lib64gtk+-x11-2.0_0-2.2.4-10.2.100mdk.amd64.rpm
292e229535ee420bc8bbf7488225611a
amd64/10.0/RPMS/lib64gtk+2.0_0-2.2.4-10.2.100mdk.amd64.rpm
827a421ac971df39a90f47467195eb75
amd64/10.0/RPMS/lib64gtk+2.0_0-devel-2.2.4-10.2.100mdk.amd64.rpm

8a7e5e9f6620200330f7800d65e02468
amd64/10.0/SRPMS/gtk+2.0-2.2.4-10.2.100mdk.src.rpm

Mandrakelinux 10.1:
63bdf92cde28cd4596862acb8303db89
10.1/RPMS/gtk+2.0-2.4.9-9.1.101mdk.i586.rpm
d0b44ebf0f5a32495164e3b95f836a1e
10.1/RPMS/libgdk_pixbuf2.0_0-2.4.9-9.1.101mdk.i586.rpm
b61a83a21d2af5f893d010687e4ba31c
10.1/RPMS/libgdk_pixbuf2.0_0-devel-2.4.9-9.1.101mdk.i586.rpm
79e3363764cd1e005c92217b1601410d
10.1/RPMS/libgtk+-x11-2.0_0-2.4.9-9.1.101mdk.i586.rpm
db1d643a7c5e8c2ea9caf3a09b08ffd1
10.1/RPMS/libgtk+2.0_0-2.4.9-9.1.101mdk.i586.rpm
825f54c99f3e0790fa563318eb0ad4f4
10.1/RPMS/libgtk+2.0_0-devel-2.4.9-9.1.101mdk.i586.rpm
73738f0963942b9266e0cb3ec2e7812b
10.1/SRPMS/gtk+2.0-2.4.9-9.1.101mdk.src.rpm

Mandrakelinux 10.1/X86_64:
58f3b14ddf3174f282a7fcedd2291cb2
x86_64/10.1/RPMS/gtk+2.0-2.4.9-9.1.101mdk.x86_64.rpm
d0b44ebf0f5a32495164e3b95f836a1e
x86_64/10.1/RPMS/libgdk_pixbuf2.0_0-2.4.9-9.1.101mdk.i586.rpm
79e3363764cd1e005c92217b1601410d
x86_64/10.1/RPMS/libgtk+-x11-2.0_0-2.4.9-9.1.101mdk.i586.rpm
db1d643a7c5e8c2ea9caf3a09b08ffd1
x86_64/10.1/RPMS/libgtk+2.0_0-2.4.9-9.1.101mdk.i586.rpm
0a8969769eb5197c102f9c4e26de3c9d
x86_64/10.1/RPMS/lib64gdk_pixbuf2.0_0-2.4.9-9.1.101mdk.x86_64.rpm

8587febd8da71ae4ac0523f1bf3799ba
x86_64/10.1/RPMS/lib64gdk_pixbuf2.0_0-devel-2.4.9-9.1.101mdk.x86_64.rpm

81a6326dd657d99ee7dd7c0677fc8ff2
x86_64/10.1/RPMS/lib64gtk+-x11-2.0_0-2.4.9-9.1.101mdk.x86_64.rpm

777f9c5fc9d83748825e0e9af165c3e3
x86_64/10.1/RPMS/lib64gtk+2.0_0-2.4.9-9.1.101mdk.x86_64.rpm
72273e60a9ff32f874239d90d5cdfd24
x86_64/10.1/RPMS/lib64gtk+2.0_0-devel-2.4.9-9.1.101mdk.x86_64.rpm

73738f0963942b9266e0cb3ec2e7812b
x86_64/10.1/SRPMS/gtk+2.0-2.4.9-9.1.101mdk.src.rpm

Corporate 3.0:
87c55c922e3fe5dce66fd619d6d94034
corporate/3.0/RPMS/gtk+2.0-2.2.4-10.3.C30mdk.i586.rpm
5bdfa2ded3da000da4d39c7bdb5a2edb
corporate/3.0/RPMS/libgdk_pixbuf2.0_0-2.2.4-10.3.C30mdk.i586.rpm

e6e00410204aff942b57b4b42ce3708a
corporate/3.0/RPMS/libgdk_pixbuf2.0_0-devel-2.2.4-10.3.C30mdk.i586.rpm

7b714ac098a96754362d0e6e6b06d22a
corporate/3.0/RPMS/libgtk+-linuxfb-2.0_0-2.2.4-10.3.C30mdk.i586.rpm

4f13d0dd61a046297f8ced1e78496549
corporate/3.0/RPMS/libgtk+-linuxfb-2.0_0-devel-2.2.4-10.3.C30mdk.i586.rpm

5009d264352ec2f4710d4e2d198f5178
corporate/3.0/RPMS/libgtk+-x11-2.0_0-2.2.4-10.3.C30mdk.i586.rpm
70cc0d5faecb6ade7db357bd98ae2f2c
corporate/3.0/RPMS/libgtk+2.0_0-2.2.4-10.3.C30mdk.i586.rpm
fe6a4d000fb5af708fec694109e56339
corporate/3.0/RPMS/libgtk+2.0_0-devel-2.2.4-10.3.C30mdk.i586.rpm

cb2b245a60da7db473b9d6f95596a8e8
corporate/3.0/SRPMS/gtk+2.0-2.2.4-10.3.C30mdk.src.rpm

Corporate 3.0/X86_64:
62ba5850d9ce991c37b00d4f4c2423fc
x86_64/corporate/3.0/RPMS/gtk+2.0-2.2.4-10.3.C30mdk.x86_64.rpm
c3752c95681dba01c2862559099ae28c
x86_64/corporate/3.0/RPMS/lib64gdk_pixbuf2.0_0-2.2.4-10.3.C30mdk.x86_64.rpm

c60a80e68525611932a2be6c5a224471
x86_64/corporate/3.0/RPMS/lib64gdk_pixbuf2.0_0-devel-2.2.4-10.3.C30mdk.x86_64.rpm

493ef92d6e50f9399303015c73d74bdd
x86_64/corporate/3.0/RPMS/lib64gtk+-linuxfb-2.0_0-2.2.4-10.3.C30mdk.x86_64.rpm

0b60bc13179cb5563580bcfe78754065
x86_64/corporate/3.0/RPMS/lib64gtk+-linuxfb-2.0_0-devel-2.2.4-10.3.C30mdk.x86_64.rpm

93ca4819c1be2754e0b45fafebe12133
x86_64/corporate/3.0/RPMS/lib64gtk+-x11-2.0_0-2.2.4-10.3.C30mdk.x86_64.rpm

313c17b002cde662476654bca69a887b
x86_64/corporate/3.0/RPMS/lib64gtk+2.0_0-2.2.4-10.3.C30mdk.x86_64.rpm

730e178acc1c61b370490b7aaf71bb5f
x86_64/corporate/3.0/RPMS/lib64gtk+2.0_0-devel-2.2.4-10.3.C30mdk.x86_64.rpm

cb2b245a60da7db473b9d6f95596a8e8
x86_64/corporate/3.0/SRPMS/gtk+2.0-2.2.4-10.3.C30mdk.src.rpm


To upgrade automatically use MandrakeUpdate or urpmi. The
verification of md5 checksums and GPG signatures is performed
automatically for you.

All packages are signed by Mandrakesoft for security. You can
obtain the GPG public key of the Mandrakelinux Security Team by
executing:

gpg –recv-keys –keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandrakelinux at:

http://www.mandrakesoft.com/security/advisories

If you want to report vulnerabilities, please contact

security_linux-mandrake.com

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team
<security linux-mandrake.com>



Mandrakelinux Security Update Advisory


Package name: gdk-pixbuf
Advisory ID: MDKSA-2005:069
Date: April 7th, 2005
Affected versions: 10.0, 10.1, Corporate 3.0


Problem Description:

A bug was discovered in the way that gdk-pixbuf processes BMP
images which could allow for a specially crafted BMP to cause a
Denial of Service attack on applications linked against
gdk-pixbuf.

The updated packages have been patched to correct these
issues.


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0891


Updated Packages:

Mandrakelinux 10.0:
f430b445e8a76a05376b65d8bcf085b9
10.0/RPMS/gdk-pixbuf-loaders-0.22.0-2.3.100mdk.i586.rpm
0e87d2d409375ccb4d900dd4f360efa1
10.0/RPMS/libgdk-pixbuf-gnomecanvas1-0.22.0-2.3.100mdk.i586.rpm
5332504ce51f46a200869595c1a0e859
10.0/RPMS/libgdk-pixbuf-xlib2-0.22.0-2.3.100mdk.i586.rpm
6d8075217b6d323a5ade36f02d110015
10.0/RPMS/libgdk-pixbuf2-0.22.0-2.3.100mdk.i586.rpm
fc8ea48179e55758f2432d9360f50627
10.0/RPMS/libgdk-pixbuf2-devel-0.22.0-2.3.100mdk.i586.rpm
bc8962a581d9df3bfcd6449c98651e6c
10.0/SRPMS/gdk-pixbuf-0.22.0-2.3.100mdk.src.rpm

Mandrakelinux 10.0/AMD64:
fbd1ddbf1d5a20166a0f5197107c2018
amd64/10.0/RPMS/gdk-pixbuf-loaders-0.22.0-2.3.100mdk.amd64.rpm
19ea3305f0672cfef258b8d9070ebcb2
amd64/10.0/RPMS/lib64gdk-pixbuf-gnomecanvas1-0.22.0-2.3.100mdk.amd64.rpm

cd48bd19cc3dcf7efc044e3f8d6714bf
amd64/10.0/RPMS/lib64gdk-pixbuf-xlib2-0.22.0-2.3.100mdk.amd64.rpm

4a39a2ccfe011df57c87902a255e2665
amd64/10.0/RPMS/lib64gdk-pixbuf2-0.22.0-2.3.100mdk.amd64.rpm
7cda46391c609bc960ae64b80e89015b
amd64/10.0/RPMS/lib64gdk-pixbuf2-devel-0.22.0-2.3.100mdk.amd64.rpm

bc8962a581d9df3bfcd6449c98651e6c
amd64/10.0/SRPMS/gdk-pixbuf-0.22.0-2.3.100mdk.src.rpm

Mandrakelinux 10.1:
0fbccd1cdae7c75775faf437cdf47dd6
10.1/RPMS/gdk-pixbuf-loaders-0.22.0-5.1.101mdk.i586.rpm
dd160afc8f5a9b5e90b3ee9953eb79aa
10.1/RPMS/libgdk-pixbuf-gnomecanvas1-0.22.0-5.1.101mdk.i586.rpm
4144e66108cf882dd3f4f1bf4bce2ff2
10.1/RPMS/libgdk-pixbuf-xlib2-0.22.0-5.1.101mdk.i586.rpm
8bbed60b2e8298474f40d29d90858dc5
10.1/RPMS/libgdk-pixbuf2-0.22.0-5.1.101mdk.i586.rpm
0c3a28830681cb6409b8e43e3acc5bab
10.1/RPMS/libgdk-pixbuf2-devel-0.22.0-5.1.101mdk.i586.rpm
d106ccd550bf9d9e32ee279eed8a5eba
10.1/SRPMS/gdk-pixbuf-0.22.0-5.1.101mdk.src.rpm

Mandrakelinux 10.1/X86_64:
7590453088477646d32207678c74aebb
x86_64/10.1/RPMS/gdk-pixbuf-loaders-0.22.0-5.1.101mdk.x86_64.rpm

dd160afc8f5a9b5e90b3ee9953eb79aa
x86_64/10.1/RPMS/libgdk-pixbuf-gnomecanvas1-0.22.0-5.1.101mdk.i586.rpm

4144e66108cf882dd3f4f1bf4bce2ff2
x86_64/10.1/RPMS/libgdk-pixbuf-xlib2-0.22.0-5.1.101mdk.i586.rpm
8bbed60b2e8298474f40d29d90858dc5
x86_64/10.1/RPMS/libgdk-pixbuf2-0.22.0-5.1.101mdk.i586.rpm
2249305133157e4df30e4dccd15953c8
x86_64/10.1/RPMS/lib64gdk-pixbuf-gnomecanvas1-0.22.0-5.1.101mdk.x86_64.rpm

db79c2089feb5dec9bce76e3475b08a7
x86_64/10.1/RPMS/lib64gdk-pixbuf-xlib2-0.22.0-5.1.101mdk.x86_64.rpm

f84a8a50bc36072dbb157a1097f0d949
x86_64/10.1/RPMS/lib64gdk-pixbuf2-0.22.0-5.1.101mdk.x86_64.rpm
3259e21f008ae6f7895e0c22196bfb76
x86_64/10.1/RPMS/lib64gdk-pixbuf2-devel-0.22.0-5.1.101mdk.x86_64.rpm

d106ccd550bf9d9e32ee279eed8a5eba
x86_64/10.1/SRPMS/gdk-pixbuf-0.22.0-5.1.101mdk.src.rpm

Corporate 3.0:
451bbbd4bd336dee287fba9b29f635e4
corporate/3.0/RPMS/gdk-pixbuf-loaders-0.22.0-2.3.C30mdk.i586.rpm

acb446883025bdf03429fecd7123f867
corporate/3.0/RPMS/libgdk-pixbuf-gnomecanvas1-0.22.0-2.3.C30mdk.i586.rpm

5c9ef2fcd3a3d290898478832583c98f
corporate/3.0/RPMS/libgdk-pixbuf-xlib2-0.22.0-2.3.C30mdk.i586.rpm

f111de3c371cbb9b7f9d93cdee94250f
corporate/3.0/RPMS/libgdk-pixbuf2-0.22.0-2.3.C30mdk.i586.rpm
1a17bf4e8148d703b543d7cc6548aae4
corporate/3.0/RPMS/libgdk-pixbuf2-devel-0.22.0-2.3.C30mdk.i586.rpm

39a9fe79245f9bc8ea83e24ae1d34041
corporate/3.0/SRPMS/gdk-pixbuf-0.22.0-2.3.C30mdk.src.rpm

Corporate 3.0/X86_64:
e97d3b46e21b4de9d31af7bdd9cf7e73
x86_64/corporate/3.0/RPMS/gdk-pixbuf-loaders-0.22.0-2.3.C30mdk.x86_64.rpm

b0a897d394be8925adacb37d705b6f37
x86_64/corporate/3.0/RPMS/lib64gdk-pixbuf-gnomecanvas1-0.22.0-2.3.C30mdk.x86_64.rpm

103253c83fa7b9c79f121157615c3c08
x86_64/corporate/3.0/RPMS/lib64gdk-pixbuf-xlib2-0.22.0-2.3.C30mdk.x86_64.rpm

6b0d14a317df8bb09866dc287ff06692
x86_64/corporate/3.0/RPMS/lib64gdk-pixbuf2-0.22.0-2.3.C30mdk.x86_64.rpm

90004b32575925d0721668317b40a8c7
x86_64/corporate/3.0/RPMS/lib64gdk-pixbuf2-devel-0.22.0-2.3.C30mdk.x86_64.rpm

39a9fe79245f9bc8ea83e24ae1d34041
x86_64/corporate/3.0/SRPMS/gdk-pixbuf-0.22.0-2.3.C30mdk.src.rpm


To upgrade automatically use MandrakeUpdate or urpmi. The
verification of md5 checksums and GPG signatures is performed
automatically for you.

All packages are signed by Mandrakesoft for security. You can
obtain the GPG public key of the Mandrakelinux Security Team by
executing:

gpg –recv-keys –keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandrakelinux at:

http://www.mandrakesoft.com/security/advisories

If you want to report vulnerabilities, please contact

security_linux-mandrake.com

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team
<security linux-mandrake.com>

thumbnail
Web Webster

Web Webster

Web Webster has more than 20 years of writing and editorial experience in the tech sector. He’s written and edited news, demand generation, user-focused, and thought leadership content for business software solutions, consumer tech, and Linux Today, he edits and writes for a portfolio of tech industry news and analysis websites including webopedia.com, and DatabaseJournal.com.

Recommended for you...

A Thorough Approach to Improve the Privacy and Security of Your Linux PC
Damien
Oct 24, 2024
Several Russian Maintainers Removed From Linux Kernel Due To Compliance Concerns
Senthil Kumar
Oct 23, 2024
OpenSSH Splits Again: New Authentication Binary Unveiled
Bobby Borisov
Oct 16, 2024
13 Best Free and Open Source Anti-Malware Tools
webmaster
Oct 14, 2024
Linux Today Logo

LinuxToday is a trusted, contributor-driven news resource supporting all types of Linux users. Our thriving international community engages with us through social media and frequent content contributions aimed at solving problems ranging from personal computing to enterprise-level IT operations. LinuxToday serves as a home for a community that struggles to find comparable information elsewhere on the web.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.