Gentoo Linux
Gentoo Linux Security Advisory [ERRATA UPDATE] GLSA 200612-03:02
Severity: Normal
Title: GnuPG: Multiple vulnerabilities
Date: December 10, 2006
Updated: December 10, 2006
Bugs: #156476, #156947
ID: 200612-03:02
Errata
The Resolution proposed in the original version of this Security
Advisory did not correctly address the issue for users who also
have GnuPG 1.9 installed.
The corrected sections appear below.
Resolution
All GnuPG users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose "=app-crypt/gnupg-1.4*"
Availability
This GLSA and any updates to it are available for viewing at the
Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-200612-03.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or
alternatively, you may file a bug at http://bugs.gentoo.org.
License
Copyright 2006 Gentoo Foundation, Inc; referenced text belongs
to its owner(s).
The contents of this document are licensed under the Creative
Commons – Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
Gentoo Linux Security Advisory GLSA 200612-04
Severity: Normal
Title: ModPlug: Multiple buffer overflows
Date: December 10, 2006
Bugs: #143404
ID: 200612-04
Synopsis
ModPlug contains several boundary errors that could lead to
buffer overflows resulting in the possible execution of arbitrary
code.
Background
ModPlug is a library for playing MOD-like music.
Affected packages
Package / Vulnerable / Unaffected
1 media-libs/libmodplug < 0.8-r1 >= 0.8-r1
Description
Luigi Auriemma has reported various boundary errors in
load_it.cpp and a boundary error in the “CSoundFile::ReadSample()”
function in sndfile.cpp.
Impact
A remote attacker can entice a user to read crafted modules or
ITP files, which may trigger a buffer overflow resulting in the
execution of arbitrary code with the privileges of the user running
the application.
Workaround
There is no known workaround at this time.
Resolution
All ModPlug users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=media-libs/libmodplug-0.8-r1"
References
[ 1 ] CVE-2006-4192
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4192
Availability
This GLSA and any updates to it are available for viewing at the
Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-200612-04.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or
alternatively, you may file a bug at http://bugs.gentoo.org.
License
Copyright 2006 Gentoo Foundation, Inc; referenced text belongs
to its owner(s).
The contents of this document are licensed under the Creative
Commons – Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
Gentoo Linux Security Advisory GLSA 200612-06
Severity: High
Title: Mozilla Thunderbird: Multiple vulnerabilities
Date: December 10, 2006
Bugs: #154448
ID: 200612-06
Synopsis
Multiple vulnerabilities have been identified in Mozilla
Thunderbird.
Background
Mozilla Thunderbird is a popular open-source email client from
the Mozilla Project.
Affected packages
Package / Vulnerable / Unaffected
1 mozilla-thunderbird < 1.5.0.8 >= 1.5.0.8 2 mozilla-thunderbird-bin < 1.5.0.8 >= 1.5.0.8 ------------------------------------------------------------------- 2 affected packages on all of their supported architectures.
Description
It has been identified that Mozilla Thunderbird improperly
handles Script objects while they are being executed, allowing them
to be modified during execution. JavaScript is disabled in Mozilla
Thunderbird by default. Mozilla Thunderbird has also been found to
be vulnerable to various potential buffer overflows. Lastly, the
binary release of Mozilla Thunderbird is vulnerable to a low
exponent RSA signature forgery issue because it is bundled with a
vulnerable version of NSS.
Impact
An attacker could entice a user to view a specially crafted
email that causes a buffer overflow and again executes arbitrary
code or causes a Denial of Service. An attacker could also entice a
user to view an email containing specially crafted JavaScript and
execute arbitrary code with the rights of the user running Mozilla
Thunderbird. It is important to note that JavaScript is off by
default in Mozilla Thunderbird, and enabling it is strongly
discouraged. It is also possible for an attacker to create SSL/TLS
or email certificates that would not be detected as invalid by the
binary release of Mozilla Thunderbird, raising the possibility for
Man-in-the-Middle attacks.
Workaround
There is no known workaround at this time.
Resolution
Users upgrading to the following releases of Mozilla Thunderbird
should note that this version of Mozilla Thunderbird has been found
to not display certain messages in some cases.
</br>
</br> All Mozilla Thunderbird users should upgrade to the
latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-1.5.0.8"
All Mozilla Thunderbird binary release users should upgrade to
the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-bin-1.5.0.8"
References
[ 1 ] CVE-2006-5462
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5462
[ 2 ] CVE-2006-5463
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5463
[ 3 ] CVE-2006-5464
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5464
[ 4 ] CVE-2006-5747
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5747
[ 5 ] CVE-2006-5748
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5748
[ 6 ] Mozilla Thunderbird Email Loss Bug
https://bugzilla.mozilla.org/show_bug.cgi?id=360409
Availability
This GLSA and any updates to it are available for viewing at the
Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-200612-06.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or
alternatively, you may file a bug at http://bugs.gentoo.org.
License
Copyright 2006 Gentoo Foundation, Inc; referenced text belongs
to its owner(s).
The contents of this document are licensed under the Creative
Commons – Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
Gentoo Linux Security Advisory GLSA 200612-08
Severity: High
Title: SeaMonkey: Multiple vulnerabilities
Date: December 10, 2006
Bugs: #154449
ID: 200612-08
Synopsis
Multiple vulnerabilities have been identified in the SeaMonkey
project.
Background
The SeaMonkey project is a community effort to deliver
production-quality releases of code derived from the application
formerly known as ‘Mozilla Application Suite’.
Affected packages
Package / Vulnerable / Unaffected
1 www-client/seamonkey < 1.0.6 >= 1.0.6
Description
The SeaMonkey project is vulnerable to arbitrary JavaScript
bytecode execution and arbitrary code execution.
Impact
An attacker could entice a user to load malicious JavaScript or
a malicious web page with a SeaMonkey application and execute
arbitrary code with the rights of the user running those products.
It is important to note that in the SeaMonkey email client,
JavaScript is disabled by default.
Workaround
There is no known workaround at this time.
Resolution
All SeaMonkey users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=www-client/seamonkey-1.0.6"
References
[ 1 ] CVE-2006-5462
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5462
[ 2 ] CVE-2006-5463
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5463
[ 3 ] CVE-2006-5464
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5464
[ 4 ] CVE-2006-5747
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5747
[ 5 ] CVE-2006-5748
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5748
Availability
This GLSA and any updates to it are available for viewing at the
Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-200612-08.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or
alternatively, you may file a bug at http://bugs.gentoo.org.
License
Copyright 2006 Gentoo Foundation, Inc; referenced text belongs
to its owner(s).
The contents of this document are licensed under the Creative
Commons – Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
Gentoo Linux Security Advisory GLSA 200612-09
Severity: High
Title: MadWifi: Kernel driver buffer overflow
Date: December 10, 2006
Bugs: #157449
ID: 200612-09
Synopsis
MadWifi is vulnerable to a buffer overflow that could
potentially lead to the remote execution of arbitrary code with
root privileges.
Background
MadWifi (Multiband Atheros Driver for Wireless Fidelity)
provides a Linux kernel device driver for Atheros-based Wireless
LAN devices.
Affected packages
Package / Vulnerable / Unaffected
1 net-wireless/madwifi-ng < 0.9.2.1 >= 0.9.2.1
Description
Laurent Butti, Jerome Raznieski and Julien Tinnes reported a
buffer overflow in the encode_ie() and the giwscan_cb() functions
from ieee80211_wireless.c.
Impact
A remote attacker could send specially crafted wireless WPA
packets containing malicious RSN Information Headers (IE) that
could potentially lead to the remote execution of arbitrary code as
the root user.
Workaround
There is no known workaround at this time.
Resolution
All MadWifi users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-wireless/madwifi-ng-0.9.2.1"
References
[ 1 ] CVE-2006-6332
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6332
Availability
This GLSA and any updates to it are available for viewing at the
Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-200612-09.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or
alternatively, you may file a bug at http://bugs.gentoo.org.
License
Copyright 2006 Gentoo Foundation, Inc; referenced text belongs
to its owner(s).
The contents of this document are licensed under the Creative
Commons – Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
Gentoo Linux Security Advisory GLSA 200612-10
Severity: Normal
Title: Tar: Directory traversal vulnerability
Date: December 11, 2006
Bugs: #155901
ID: 200612-10
Synopsis
Tar is vulnerable to directory traversal possibly allowing for
the overwriting of arbitrary files.
Background
The Tar program provides the ability to create and manipulate
tar archives.
Affected packages
Package / Vulnerable / Unaffected
1 app-arch/tar < 1.16-r2 >= 1.16-r2
Description
Tar does not properly extract archive elements using the
GNUTYPE_NAMES record name, allowing files to be created at
arbitrary locations using symlinks. Once a symlink is extracted,
files after the symlink in the archive will be extracted to the
destination of the symlink.
Impact
An attacker could entice a user to extract a specially crafted
tar archive, possibly allowing for the overwriting of arbitrary
files on the system extracting the archive.
Workaround
There is no known workaround at this time.
Resolution
All Tar users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-arch/tar-1.16-r2"
References
[ 1 ] CVE-2006-6097
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6097
Availability
This GLSA and any updates to it are available for viewing at the
Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-200612-10.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or
alternatively, you may file a bug at http://bugs.gentoo.org.
License
Copyright 2006 Gentoo Foundation, Inc; referenced text belongs
to its owner(s).
The contents of this document are licensed under the Creative
Commons – Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
Mandriva Linux
Mandriva Linux Security Advisory MDKSA-2006:226
http://www.mandriva.com/security/
Package : squirrelmail
Date : December 11, 2006
Affected: Corporate 3.0, Corporate 4.0
Problem Description:
Multiple cross-site scripting (XSS) vulnerabilities in
SquirrelMail 1.4.0 through 1.4.9 allow remote attackers to inject
arbitrary web script or HTML via the (1) mailto parameter in (a)
webmail.php, the (2) session and (3) delete_draft parameters in (b)
compose.php, and (4) unspecified vectors involving “a shortcoming
in the magicHTML filter.”
Updated packages are patched to address these issues.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6142
Updated Packages:
Corporate 3.0:
fdd1baf652c58196f2b538b389bec65f
corporate/3.0/i586/squirrelmail-1.4.5-1.5.C30mdk.noarch.rpm
89d39b6fc6a73d84feeb9f3deb458d0a
corporate/3.0/i586/squirrelmail-poutils-1.4.5-1.5.C30mdk.noarch.rpm
d4de921727ae29bba7221a3e93d487bc
corporate/3.0/SRPMS/squirrelmail-1.4.5-1.5.C30mdk.src.rpm
Corporate 3.0/X86_64:
ba27570deb04e7ff3400a280bbe75d52
corporate/3.0/x86_64/squirrelmail-1.4.5-1.5.C30mdk.noarch.rpm
276acc4e766908c326321cd214abd341
corporate/3.0/x86_64/squirrelmail-poutils-1.4.5-1.5.C30mdk.noarch.rpm
d4de921727ae29bba7221a3e93d487bc
corporate/3.0/SRPMS/squirrelmail-1.4.5-1.5.C30mdk.src.rpm
Corporate 4.0:
9503ad05873246568977df58ddc01e96
corporate/4.0/i586/squirrelmail-1.4.8-3.1.20060mlcs4.noarch.rpm
15d7cc5cf7b4f377c989dbfdfde9bc3a
corporate/4.0/i586/squirrelmail-ar-1.4.8-3.1.20060mlcs4.noarch.rpm
cbb2b592b960ee18160b0545bd01b11b
corporate/4.0/i586/squirrelmail-bg-1.4.8-3.1.20060mlcs4.noarch.rpm
823a98906ea456700be9f9301c03d3ca
corporate/4.0/i586/squirrelmail-bn-1.4.8-3.1.20060mlcs4.noarch.rpm
da53ecb3b61aacb38d9091416be2ad56
corporate/4.0/i586/squirrelmail-ca-1.4.8-3.1.20060mlcs4.noarch.rpm
a678e3d9380e1ab15f7232f64a4eb968
corporate/4.0/i586/squirrelmail-cs-1.4.8-3.1.20060mlcs4.noarch.rpm
f8b349923a77d8b844aa8ec86a63271d
corporate/4.0/i586/squirrelmail-cy-1.4.8-3.1.20060mlcs4.noarch.rpm
276bd5cfb76328244e1359e5026b5d6b
corporate/4.0/i586/squirrelmail-cyrus-1.4.8-3.1.20060mlcs4.noarch.rpm
39a5d34d477eb4ebe60e3a70c67f52e5
corporate/4.0/i586/squirrelmail-da-1.4.8-3.1.20060mlcs4.noarch.rpm
993a2c910c67f3c91723c2d4a0813f9c
corporate/4.0/i586/squirrelmail-de-1.4.8-3.1.20060mlcs4.noarch.rpm
06f4e571aba0928134506bd2a9198932
corporate/4.0/i586/squirrelmail-el-1.4.8-3.1.20060mlcs4.noarch.rpm
63ec92841ad90c70dae9d64e72c82662
corporate/4.0/i586/squirrelmail-en-1.4.8-3.1.20060mlcs4.noarch.rpm
d8e5a906d6e759ae19ff100690ec5e63
corporate/4.0/i586/squirrelmail-es-1.4.8-3.1.20060mlcs4.noarch.rpm
385f47aa4d9812a0a7d75a9db33b18b9
corporate/4.0/i586/squirrelmail-et-1.4.8-3.1.20060mlcs4.noarch.rpm
39fe314ed16fda2f4d342dc7f45271a4
corporate/4.0/i586/squirrelmail-eu-1.4.8-3.1.20060mlcs4.noarch.rpm
2959c6d41637880844da2a4b928ab3ea
corporate/4.0/i586/squirrelmail-fa-1.4.8-3.1.20060mlcs4.noarch.rpm
0f26c752ebe55b741da49ffc8e7df910
corporate/4.0/i586/squirrelmail-fi-1.4.8-3.1.20060mlcs4.noarch.rpm
fb53b2054f25f65f75529a4500adb05e
corporate/4.0/i586/squirrelmail-fo-1.4.8-3.1.20060mlcs4.noarch.rpm
52204b63d7536a948aefe250b075ab4b
corporate/4.0/i586/squirrelmail-fr-1.4.8-3.1.20060mlcs4.noarch.rpm
c877a11c38c60fa0664b425190d73e6b
corporate/4.0/i586/squirrelmail-he-1.4.8-3.1.20060mlcs4.noarch.rpm
59aac3b1912c3da62b3b721361db620b
corporate/4.0/i586/squirrelmail-hr-1.4.8-3.1.20060mlcs4.noarch.rpm
91fa54fde44d76216b3195a6e6e7f1a4
corporate/4.0/i586/squirrelmail-hu-1.4.8-3.1.20060mlcs4.noarch.rpm
8ad5805c6e351ae6fa6fbb53b13cb4de
corporate/4.0/i586/squirrelmail-id-1.4.8-3.1.20060mlcs4.noarch.rpm
af76a96cd2f1376eae5c1bf2f3d1f65b
corporate/4.0/i586/squirrelmail-is-1.4.8-3.1.20060mlcs4.noarch.rpm
7b1f3d4cdcf063b1e8b5f308e217e554
corporate/4.0/i586/squirrelmail-it-1.4.8-3.1.20060mlcs4.noarch.rpm
bc1f13031e7155bca253f5835ae0c90c
corporate/4.0/i586/squirrelmail-ja-1.4.8-3.1.20060mlcs4.noarch.rpm
a4f516f21f2036e89484dafe9d3d1a6c
corporate/4.0/i586/squirrelmail-ka-1.4.8-3.1.20060mlcs4.noarch.rpm
0e9b7214f5ce67f1a7b55d0bd196d814
corporate/4.0/i586/squirrelmail-ko-1.4.8-3.1.20060mlcs4.noarch.rpm
35a4bc3bf9161ffc3d10c5e4aed52877
corporate/4.0/i586/squirrelmail-lt-1.4.8-3.1.20060mlcs4.noarch.rpm
75b9963fa101cb2c71831ce4dd4e7f33
corporate/4.0/i586/squirrelmail-ms-1.4.8-3.1.20060mlcs4.noarch.rpm
ef4f24c8f94cb9e6384a35a556de256e
corporate/4.0/i586/squirrelmail-nb-1.4.8-3.1.20060mlcs4.noarch.rpm
4d2b35b6527db41eec54c917dd44ba01
corporate/4.0/i586/squirrelmail-nl-1.4.8-3.1.20060mlcs4.noarch.rpm
5db7bfef8a1ccfd7b2e5d57ca119a7e0
corporate/4.0/i586/squirrelmail-nn-1.4.8-3.1.20060mlcs4.noarch.rpm
afe1da824ed5c25db8046b4ddc2389d8
corporate/4.0/i586/squirrelmail-pl-1.4.8-3.1.20060mlcs4.noarch.rpm
b22b1fbf3a474983d017a164d737bba9
corporate/4.0/i586/squirrelmail-poutils-1.4.8-3.1.20060mlcs4.noarch.rpm
9ca9b100b0649843e2f17ef33c69a3a2
corporate/4.0/i586/squirrelmail-pt-1.4.8-3.1.20060mlcs4.noarch.rpm
780fff6991d9116971c35ec2fa378d90
corporate/4.0/i586/squirrelmail-ro-1.4.8-3.1.20060mlcs4.noarch.rpm
99cad9c5a0c26db2c6698f1a9b6ed804
corporate/4.0/i586/squirrelmail-ru-1.4.8-3.1.20060mlcs4.noarch.rpm
e074101cbddda0086eb8628528218abd
corporate/4.0/i586/squirrelmail-sk-1.4.8-3.1.20060mlcs4.noarch.rpm
9c856a8fa088e9e5e8dc28a7c087b4d2
corporate/4.0/i586/squirrelmail-sl-1.4.8-3.1.20060mlcs4.noarch.rpm
9e8d04ac9b1c7c089055572e486fffa8
corporate/4.0/i586/squirrelmail-sr-1.4.8-3.1.20060mlcs4.noarch.rpm
ee4c5f91c8065ff407aea103bb20e024
corporate/4.0/i586/squirrelmail-sv-1.4.8-3.1.20060mlcs4.noarch.rpm
93267f0d3add91d9fa71e2f1680a89f3
corporate/4.0/i586/squirrelmail-th-1.4.8-3.1.20060mlcs4.noarch.rpm
8614c64008b94ad139fdd3336421c920
corporate/4.0/i586/squirrelmail-tl-1.4.8-3.1.20060mlcs4.noarch.rpm
4a6fbf0245470d9fcf5072ae77ac4eef
corporate/4.0/i586/squirrelmail-tr-1.4.8-3.1.20060mlcs4.noarch.rpm
3f2f133c3d0cacecadefc7648aae6c0d
corporate/4.0/i586/squirrelmail-ug-1.4.8-3.1.20060mlcs4.noarch.rpm
2b836169ca514af3ded1383d027cd170
corporate/4.0/i586/squirrelmail-uk-1.4.8-3.1.20060mlcs4.noarch.rpm
46390f41d8942b9ca14c5cc81898a00f
corporate/4.0/i586/squirrelmail-vi-1.4.8-3.1.20060mlcs4.noarch.rpm
930c18bdca20d0b1a65728b255a71f96
corporate/4.0/i586/squirrelmail-zh_CN-1.4.8-3.1.20060mlcs4.noarch.rpm
5dc8559e99284aff1e482457a0d1ed3d
corporate/4.0/i586/squirrelmail-zh_TW-1.4.8-3.1.20060mlcs4.noarch.rpm
b134bb2e680863641a457b9478b59390
corporate/4.0/SRPMS/squirrelmail-1.4.8-3.1.20060mlcs4.src.rpm
Corporate 4.0/X86_64:
c2b0dd3acf47652ac205c2e0b3be24a9
corporate/4.0/x86_64/squirrelmail-1.4.8-3.1.20060mlcs4.noarch.rpm
0820ee17a848c6acc42444df660f9ac3
corporate/4.0/x86_64/squirrelmail-ar-1.4.8-3.1.20060mlcs4.noarch.rpm
f372ff44ac3ac7ea668b57607897f694
corporate/4.0/x86_64/squirrelmail-bg-1.4.8-3.1.20060mlcs4.noarch.rpm
a5bd987ea5051a5f3e81af1461a832ed
corporate/4.0/x86_64/squirrelmail-bn-1.4.8-3.1.20060mlcs4.noarch.rpm
7be52eb4a430b2468d658edc54ea046f
corporate/4.0/x86_64/squirrelmail-ca-1.4.8-3.1.20060mlcs4.noarch.rpm
c84b32819f87050a562b045b0c48e53e
corporate/4.0/x86_64/squirrelmail-cs-1.4.8-3.1.20060mlcs4.noarch.rpm
83cc2f2456de5579301ad5c0e4c120be
corporate/4.0/x86_64/squirrelmail-cy-1.4.8-3.1.20060mlcs4.noarch.rpm
de4aa16075840a7b7e07f1fe78ba93cb
corporate/4.0/x86_64/squirrelmail-cyrus-1.4.8-3.1.20060mlcs4.noarch.rpm
a43d22f7c65980cfed004909bbb30eab
corporate/4.0/x86_64/squirrelmail-da-1.4.8-3.1.20060mlcs4.noarch.rpm
2358f02f874cce70b2c3981f56cbbf32
corporate/4.0/x86_64/squirrelmail-de-1.4.8-3.1.20060mlcs4.noarch.rpm
eabb1921968805c7cbf22798fcebc7af
corporate/4.0/x86_64/squirrelmail-el-1.4.8-3.1.20060mlcs4.noarch.rpm
a43fb652af55cadf50258136fdeb2d74
corporate/4.0/x86_64/squirrelmail-en-1.4.8-3.1.20060mlcs4.noarch.rpm
4500d031b892b441f433746336c7dcf0
corporate/4.0/x86_64/squirrelmail-es-1.4.8-3.1.20060mlcs4.noarch.rpm
58cb4546b05efac31f3a64e1014095ee
corporate/4.0/x86_64/squirrelmail-et-1.4.8-3.1.20060mlcs4.noarch.rpm
dcf6ae26d69ade7fc454625046129360
corporate/4.0/x86_64/squirrelmail-eu-1.4.8-3.1.20060mlcs4.noarch.rpm
ef5cf4b334635291e9a510bb9ed794eb
corporate/4.0/x86_64/squirrelmail-fa-1.4.8-3.1.20060mlcs4.noarch.rpm
40b9915e723a0f573f1572cffaf03bf4
corporate/4.0/x86_64/squirrelmail-fi-1.4.8-3.1.20060mlcs4.noarch.rpm
0bfa396c60e5cf6a47229f69c9b337a1
corporate/4.0/x86_64/squirrelmail-fo-1.4.8-3.1.20060mlcs4.noarch.rpm
bea0e3c16887a984a6f8fd7084d27db6
corporate/4.0/x86_64/squirrelmail-fr-1.4.8-3.1.20060mlcs4.noarch.rpm
43059bc5bc5c91e5414946b34eda580c
corporate/4.0/x86_64/squirrelmail-he-1.4.8-3.1.20060mlcs4.noarch.rpm
dba3a65e08dd093bd9f6865f403aca06
corporate/4.0/x86_64/squirrelmail-hr-1.4.8-3.1.20060mlcs4.noarch.rpm
a97490f955480bb90321b5a96653f228
corporate/4.0/x86_64/squirrelmail-hu-1.4.8-3.1.20060mlcs4.noarch.rpm
0211d99cc8a5ed9385f3d0a59f8a5f1b
corporate/4.0/x86_64/squirrelmail-id-1.4.8-3.1.20060mlcs4.noarch.rpm
6db9f5d3699dc30d5abf17bbf3367161
corporate/4.0/x86_64/squirrelmail-is-1.4.8-3.1.20060mlcs4.noarch.rpm
53029ee9fc829a6b4c20007fc8e15d99
corporate/4.0/x86_64/squirrelmail-it-1.4.8-3.1.20060mlcs4.noarch.rpm
1e7fbb15fe44df99d88732a11765c460
corporate/4.0/x86_64/squirrelmail-ja-1.4.8-3.1.20060mlcs4.noarch.rpm
f65f1c05de5b647f503e7e1b203171d7
corporate/4.0/x86_64/squirrelmail-ka-1.4.8-3.1.20060mlcs4.noarch.rpm
fe1d25b5ad531f90cf05af7c293a645f
corporate/4.0/x86_64/squirrelmail-ko-1.4.8-3.1.20060mlcs4.noarch.rpm
144bfe711e3effd39cfc6e410ca9af0d
corporate/4.0/x86_64/squirrelmail-lt-1.4.8-3.1.20060mlcs4.noarch.rpm
91d2336ef151704e2e7695d7637a989f
corporate/4.0/x86_64/squirrelmail-ms-1.4.8-3.1.20060mlcs4.noarch.rpm
6c450896ce137fd1220658857e7fa7ee
corporate/4.0/x86_64/squirrelmail-nb-1.4.8-3.1.20060mlcs4.noarch.rpm
f6c1404ec21d6bc6ddba5a720fe7d2ef
corporate/4.0/x86_64/squirrelmail-nl-1.4.8-3.1.20060mlcs4.noarch.rpm
5c289717bc9518ba1133d6e91b5e5a77
corporate/4.0/x86_64/squirrelmail-nn-1.4.8-3.1.20060mlcs4.noarch.rpm
f459bf2f55c0733d63ce96eb365b9d22
corporate/4.0/x86_64/squirrelmail-pl-1.4.8-3.1.20060mlcs4.noarch.rpm
e0a44506bb0f05f0443155b0faf19443
corporate/4.0/x86_64/squirrelmail-poutils-1.4.8-3.1.20060mlcs4.noarch.rpm
6f0b27637a7208b118bb7b9e06b477dd
corporate/4.0/x86_64/squirrelmail-pt-1.4.8-3.1.20060mlcs4.noarch.rpm
9bfcb50cecb0ab7e32bd768b03692a0a
corporate/4.0/x86_64/squirrelmail-ro-1.4.8-3.1.20060mlcs4.noarch.rpm
d8093092134cc585726dd979efb4b651
corporate/4.0/x86_64/squirrelmail-ru-1.4.8-3.1.20060mlcs4.noarch.rpm
1c374b54c33289b2dcb0b237b3f133f5
corporate/4.0/x86_64/squirrelmail-sk-1.4.8-3.1.20060mlcs4.noarch.rpm
bc93e042ec8afc9c72dda75f31099b49
corporate/4.0/x86_64/squirrelmail-sl-1.4.8-3.1.20060mlcs4.noarch.rpm
6e0c7da453b631024cbbeb7e12e7ba5c
corporate/4.0/x86_64/squirrelmail-sr-1.4.8-3.1.20060mlcs4.noarch.rpm
aa294e3ad85a698dd3c34777d4da7903
corporate/4.0/x86_64/squirrelmail-sv-1.4.8-3.1.20060mlcs4.noarch.rpm
e603484d002b57e8a021ac28de0b3179
corporate/4.0/x86_64/squirrelmail-th-1.4.8-3.1.20060mlcs4.noarch.rpm
c5f7e2607f8b5113af875c53628cbc19
corporate/4.0/x86_64/squirrelmail-tl-1.4.8-3.1.20060mlcs4.noarch.rpm
7182b852259c4be5e537418ec5b2305a
corporate/4.0/x86_64/squirrelmail-tr-1.4.8-3.1.20060mlcs4.noarch.rpm
56a78e1547cab2d3b7efcccb35d7b010
corporate/4.0/x86_64/squirrelmail-ug-1.4.8-3.1.20060mlcs4.noarch.rpm
abe4dbdd1dad7b5adb246195f1e0178b
corporate/4.0/x86_64/squirrelmail-uk-1.4.8-3.1.20060mlcs4.noarch.rpm
e871bd1da833d961cd62eba52a383354
corporate/4.0/x86_64/squirrelmail-vi-1.4.8-3.1.20060mlcs4.noarch.rpm
508e5df69a92f5759545e7279f5d729b
corporate/4.0/x86_64/squirrelmail-zh_CN-1.4.8-3.1.20060mlcs4.noarch.rpm
ec8c34458856e9b6aaefcdd5453dcb5e
corporate/4.0/x86_64/squirrelmail-zh_TW-1.4.8-3.1.20060mlcs4.noarch.rpm
b134bb2e680863641a457b9478b59390
corporate/4.0/SRPMS/squirrelmail-1.4.8-3.1.20060mlcs4.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The
verification of md5 checksums and GPG signatures is performed
automatically for you.
All packages are signed by Mandriva for security. You can obtain
the GPG public key of the Mandriva Security Team by executing:
gpg –recv-keys –keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
Mandriva Linux Security Advisory MDKSA-2006:227
http://www.mandriva.com/security/
Package : kdegraphics
Date : December 11, 2006
Affected: 2007.0, Corporate 3.0, Corporate 4.0
Problem Description:
Stack overflow in the KFILE JPEG (kfile_jpeg) plugin in
kdegraphics3, as used by konqueror, digikam, and other KDE image
browsers, allows remote attackers to cause a denial of service
(stack consumption) via a crafted EXIF section in a JPEG file,
which results in an infinite recursion.
The updated packages have been patched to correct this
issue.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6297
Updated Packages:
Mandriva Linux 2007.0:
6e89f3874a96540fa1d4031dcc37a17b
2007.0/i586/kdegraphics-3.5.4-7.1mdv2007.0.i586.rpm
fd7cf5ecd552b43c4b05be3e275fbe9e
2007.0/i586/kdegraphics-common-3.5.4-7.1mdv2007.0.i586.rpm
1fdacd36d0c735b99de188b35262739a
2007.0/i586/kdegraphics-kcolorchooser-3.5.4-7.1mdv2007.0.i586.rpm
3810fcfd704c735fdb599d03ccbcf051
2007.0/i586/kdegraphics-kcoloredit-3.5.4-7.1mdv2007.0.i586.rpm
27d179e50c2a4181685df61b9d4831df
2007.0/i586/kdegraphics-kdvi-3.5.4-7.1mdv2007.0.i586.rpm
6ccd33d46c803152086e86efcb891421
2007.0/i586/kdegraphics-kfax-3.5.4-7.1mdv2007.0.i586.rpm
245d01f1f3202d7c15a076d2e0791abd
2007.0/i586/kdegraphics-kghostview-3.5.4-7.1mdv2007.0.i586.rpm
769d98df9e182b949a05120e94d4fbe1
2007.0/i586/kdegraphics-kiconedit-3.5.4-7.1mdv2007.0.i586.rpm
cd41454a7f01fc9ade690a6382267927
2007.0/i586/kdegraphics-kolourpaint-3.5.4-7.1mdv2007.0.i586.rpm
de89292ad4c14021c5ee348c21fac260
2007.0/i586/kdegraphics-kooka-3.5.4-7.1mdv2007.0.i586.rpm
9c3ff4d37861a31d585483fd6fa7ab26
2007.0/i586/kdegraphics-kpdf-3.5.4-7.1mdv2007.0.i586.rpm
e7fb905b1acf999f25b1000f8cd3d6d6
2007.0/i586/kdegraphics-kpovmodeler-3.5.4-7.1mdv2007.0.i586.rpm
fd4a51c696a549ca050104e279c65ca2
2007.0/i586/kdegraphics-kruler-3.5.4-7.1mdv2007.0.i586.rpm
b3db1362303e456fcc34aee34e422614
2007.0/i586/kdegraphics-ksnapshot-3.5.4-7.1mdv2007.0.i586.rpm
4d9acb96ddd3f13f3ad5dea86601c595
2007.0/i586/kdegraphics-ksvg-3.5.4-7.1mdv2007.0.i586.rpm
aad7047bd2c78070bd98a141144aa19b
2007.0/i586/kdegraphics-kuickshow-3.5.4-7.1mdv2007.0.i586.rpm
a5183761af7d80c95901b08bc2254513
2007.0/i586/kdegraphics-kview-3.5.4-7.1mdv2007.0.i586.rpm
d71c990067396203ebe90b15a890aaa0
2007.0/i586/kdegraphics-mrmlsearch-3.5.4-7.1mdv2007.0.i586.rpm
ac22d45901705b7bea1c55c2dfafaf8d
2007.0/i586/libkdegraphics0-common-3.5.4-7.1mdv2007.0.i586.rpm
60e221b46f5af9d4d11de18e7470a777
2007.0/i586/libkdegraphics0-common-devel-3.5.4-7.1mdv2007.0.i586.rpm
0a42a68e4f7085e7b52b455d02d3e5fc
2007.0/i586/libkdegraphics0-kghostview-3.5.4-7.1mdv2007.0.i586.rpm
c66f95121d95719b8929ea8383373a1a
2007.0/i586/libkdegraphics0-kghostview-devel-3.5.4-7.1mdv2007.0.i586.rpm
af3eb8e08afb4e93713f69be96e3a429
2007.0/i586/libkdegraphics0-kooka-3.5.4-7.1mdv2007.0.i586.rpm
d9142070b0b91c15749e8fd9252c3db0
2007.0/i586/libkdegraphics0-kooka-devel-3.5.4-7.1mdv2007.0.i586.rpm
aebc94e07a8a77c3a99ad3a22bef8246
2007.0/i586/libkdegraphics0-kpovmodeler-3.5.4-7.1mdv2007.0.i586.rpm
7619c56e202bca1e34b28867dc0ad0e8
2007.0/i586/libkdegraphics0-kpovmodeler-devel-3.5.4-7.1mdv2007.0.i586.rpm
b0395010aa1c01d1001c9543d5f17911
2007.0/i586/libkdegraphics0-ksvg-3.5.4-7.1mdv2007.0.i586.rpm
8ce4847dd75c97724a979299947948bf
2007.0/i586/libkdegraphics0-ksvg-devel-3.5.4-7.1mdv2007.0.i586.rpm
bbff80ead5c4dca8723c4c6369303d54
2007.0/i586/libkdegraphics0-kview-3.5.4-7.1mdv2007.0.i586.rpm
6be2fed4e62ac8a1539eea25fb208edc
2007.0/i586/libkdegraphics0-kview-devel-3.5.4-7.1mdv2007.0.i586.rpm
c35cf358df91e4d224a684d63b69c4f3
2007.0/SRPMS/kdegraphics-3.5.4-7.1mdv2007.0.src.rpm
Mandriva Linux 2007.0/X86_64:
e79cfa9037fd4c26a5b79217a3d79497
2007.0/x86_64/kdegraphics-3.5.4-7.1mdv2007.0.x86_64.rpm
87b00c4fd7fbbac63ed82077caacd2cb
2007.0/x86_64/kdegraphics-common-3.5.4-7.1mdv2007.0.x86_64.rpm
6436ecb6465173e4c06f5f1c296ccbe9
2007.0/x86_64/kdegraphics-kcolorchooser-3.5.4-7.1mdv2007.0.x86_64.rpm
a01eb9cc427030f253a40a53e9d84d2c
2007.0/x86_64/kdegraphics-kcoloredit-3.5.4-7.1mdv2007.0.x86_64.rpm
ec5ddf068cdbb6616ea05c714958e1ea
2007.0/x86_64/kdegraphics-kdvi-3.5.4-7.1mdv2007.0.x86_64.rpm
f1b9e09ad9e0cb6a9307dcf9241994b8
2007.0/x86_64/kdegraphics-kfax-3.5.4-7.1mdv2007.0.x86_64.rpm
74ea3d6f6650a01c5cb424b2926b16cb
2007.0/x86_64/kdegraphics-kghostview-3.5.4-7.1mdv2007.0.x86_64.rpm
415180a978a851df625224cdd7c13f77
2007.0/x86_64/kdegraphics-kiconedit-3.5.4-7.1mdv2007.0.x86_64.rpm
88c511450eaaeba69bdf510e277fc4e7
2007.0/x86_64/kdegraphics-kolourpaint-3.5.4-7.1mdv2007.0.x86_64.rpm
230e339f6b524c7c8f93a7a86a3fe30e
2007.0/x86_64/kdegraphics-kooka-3.5.4-7.1mdv2007.0.x86_64.rpm
7e765122e5473f9750a13c2a89f70df1
2007.0/x86_64/kdegraphics-kpdf-3.5.4-7.1mdv2007.0.x86_64.rpm
eb721c17dc6f8dffbf8c3e8ab6dfae0a
2007.0/x86_64/kdegraphics-kpovmodeler-3.5.4-7.1mdv2007.0.x86_64.rpm
236129966f43709d4ae891f4c912d62c
2007.0/x86_64/kdegraphics-kruler-3.5.4-7.1mdv2007.0.x86_64.rpm
f2826041cde62e9a4f64d08d97dfee10
2007.0/x86_64/kdegraphics-ksnapshot-3.5.4-7.1mdv2007.0.x86_64.rpm
4a7ec071aa6fbdf97d5909657580edf1
2007.0/x86_64/kdegraphics-ksvg-3.5.4-7.1mdv2007.0.x86_64.rpm
b578717af98f91c6cf025273a409ac8d
2007.0/x86_64/kdegraphics-kuickshow-3.5.4-7.1mdv2007.0.x86_64.rpm
7b62ddadb8cd518d5e8e60b7b5e14ce2
2007.0/x86_64/kdegraphics-kview-3.5.4-7.1mdv2007.0.x86_64.rpm
0b22ef36963b31051dd29d6659a9c7b9
2007.0/x86_64/kdegraphics-mrmlsearch-3.5.4-7.1mdv2007.0.x86_64.rpm
d2b5df8246590f1af9958094ccf160d7
2007.0/x86_64/lib64kdegraphics0-common-3.5.4-7.1mdv2007.0.x86_64.rpm
f940f76bd3f6d8a2ed4623f1f4320119
2007.0/x86_64/lib64kdegraphics0-common-devel-3.5.4-7.1mdv2007.0.x86_64.rpm
b5ee5fd8c6e32a366874f9751f41d87b
2007.0/x86_64/lib64kdegraphics0-kghostview-3.5.4-7.1mdv2007.0.x86_64.rpm
9271721cc1fb1a62f54e46a4d0ff359c
2007.0/x86_64/lib64kdegraphics0-kghostview-devel-3.5.4-7.1mdv2007.0.x86_64.rpm
679c511a383bcf6f49000b298a1bc284
2007.0/x86_64/lib64kdegraphics0-kooka-3.5.4-7.1mdv2007.0.x86_64.rpm
75ca0c4062caabc331d67ea677c616ee
2007.0/x86_64/lib64kdegraphics0-kooka-devel-3.5.4-7.1mdv2007.0.x86_64.rpm
24e3dafdb8cf72305f3fc6232722d557
2007.0/x86_64/lib64kdegraphics0-kpovmodeler-3.5.4-7.1mdv2007.0.x86_64.rpm
5122b14c05d93aa5ae1b8184a6ec5680
2007.0/x86_64/lib64kdegraphics0-kpovmodeler-devel-3.5.4-7.1mdv2007.0.x86_64.rpm
9af5412789b2686795cb70227101c576
2007.0/x86_64/lib64kdegraphics0-ksvg-3.5.4-7.1mdv2007.0.x86_64.rpm
fa830aeb8ef9cee113fc411a8420b461
2007.0/x86_64/lib64kdegraphics0-ksvg-devel-3.5.4-7.1mdv2007.0.x86_64.rpm
0255428daec795631f0cbe2e7288262d
2007.0/x86_64/lib64kdegraphics0-kview-3.5.4-7.1mdv2007.0.x86_64.rpm
5b35c10c58b1434cd1a8bc0e252580a0
2007.0/x86_64/lib64kdegraphics0-kview-devel-3.5.4-7.1mdv2007.0.x86_64.rpm
c35cf358df91e4d224a684d63b69c4f3
2007.0/SRPMS/kdegraphics-3.5.4-7.1mdv2007.0.src.rpm
Corporate 3.0:
2fc94fe9cb1603d382452210242e7d77
corporate/3.0/i586/kdegraphics-3.2-15.13.C30mdk.i586.rpm
25f3a02decd96f02979b6e9d5dfb5b21
corporate/3.0/i586/kdegraphics-common-3.2-15.13.C30mdk.i586.rpm
ffca8e258ced134c3d5b209bd361d390
corporate/3.0/i586/kdegraphics-kdvi-3.2-15.13.C30mdk.i586.rpm
35e9d39b5bb214090f24137092d997c3
corporate/3.0/i586/kdegraphics-kfax-3.2-15.13.C30mdk.i586.rpm
29b648144b6811a07f4c76837be95f32
corporate/3.0/i586/kdegraphics-kghostview-3.2-15.13.C30mdk.i586.rpm
130e18e47bffccd5abdd44b08d0eb3f4
corporate/3.0/i586/kdegraphics-kiconedit-3.2-15.13.C30mdk.i586.rpm
090e96550a552c714e05d807a9af3b55
corporate/3.0/i586/kdegraphics-kooka-3.2-15.13.C30mdk.i586.rpm
6f49e3dad0a816fbbe53e72bdfaccc94
corporate/3.0/i586/kdegraphics-kpaint-3.2-15.13.C30mdk.i586.rpm
ebf5f34644cb198cb2f2f20d1fb09308
corporate/3.0/i586/kdegraphics-kpdf-3.2-15.13.C30mdk.i586.rpm
88347612742492086ae2a06294a42d0a
corporate/3.0/i586/kdegraphics-kpovmodeler-3.2-15.13.C30mdk.i586.rpm
80de2293b4e7c0a9ae849b175b391198
corporate/3.0/i586/kdegraphics-kruler-3.2-15.13.C30mdk.i586.rpm
3641f635fd16be1c464f89efadca7b09
corporate/3.0/i586/kdegraphics-ksnapshot-3.2-15.13.C30mdk.i586.rpm
634a386d2ac542dcbc2da7fb06726733
corporate/3.0/i586/kdegraphics-ksvg-3.2-15.13.C30mdk.i586.rpm
31179f3561568e582e3fef1ec551cdcb
corporate/3.0/i586/kdegraphics-kuickshow-3.2-15.13.C30mdk.i586.rpm
ebf206a03879f0cf7dacf606f870da16
corporate/3.0/i586/kdegraphics-kview-3.2-15.13.C30mdk.i586.rpm
15fb87595432138f486bd78b2da41a49
corporate/3.0/i586/kdegraphics-mrmlsearch-3.2-15.13.C30mdk.i586.rpm
34e6718386e6e6e57e80fb1096f843f8
corporate/3.0/i586/libkdegraphics0-common-3.2-15.13.C30mdk.i586.rpm
c3a1a3e06996647838452c428bb557f2
corporate/3.0/i586/libkdegraphics0-common-devel-3.2-15.13.C30mdk.i586.rpm
dbc772da3012bf55d2f1939f66ae5af6
corporate/3.0/i586/libkdegraphics0-kooka-3.2-15.13.C30mdk.i586.rpm
829beca412e89f2afef07504cfc32a3d
corporate/3.0/i586/libkdegraphics0-kooka-devel-3.2-15.13.C30mdk.i586.rpm
c616454fded8ae32ed7c30b713763b7d
corporate/3.0/i586/libkdegraphics0-kpovmodeler-3.2-15.13.C30mdk.i586.rpm
4fc6d8b358f75c67e67f454c479a3db7
corporate/3.0/i586/libkdegraphics0-kpovmodeler-devel-3.2-15.13.C30mdk.i586.rpm
418b0e06965439536f57c3aa65461a33
corporate/3.0/i586/libkdegraphics0-ksvg-3.2-15.13.C30mdk.i586.rpm
8254f0ed01d54eec133b863f860d2fb3
corporate/3.0/i586/libkdegraphics0-ksvg-devel-3.2-15.13.C30mdk.i586.rpm
f1f70eb5c715d9b430474dab0047ca84
corporate/3.0/i586/libkdegraphics0-kuickshow-3.2-15.13.C30mdk.i586.rpm
a40e3ba70707158be862d3eeb7ebc1ad
corporate/3.0/i586/libkdegraphics0-kview-3.2-15.13.C30mdk.i586.rpm
34b573701e057adf47be21c8c26a77bf
corporate/3.0/i586/libkdegraphics0-kview-devel-3.2-15.13.C30mdk.i586.rpm
82af2d9ecd3c94bb2bb9bb384e363175
corporate/3.0/i586/libkdegraphics0-mrmlsearch-3.2-15.13.C30mdk.i586.rpm
118616d1fbbc2a288b0c845b530ab5ba
corporate/3.0/SRPMS/kdegraphics-3.2-15.13.C30mdk.src.rpm
Corporate 3.0/X86_64:
e56f8e1452788a6682c63bf12d89c4dc
corporate/3.0/x86_64/kdegraphics-3.2-15.13.C30mdk.x86_64.rpm
ea747244ce018b9f7f0fe9e7acda73a2
corporate/3.0/x86_64/kdegraphics-common-3.2-15.13.C30mdk.x86_64.rpm
43f7612469f0530dca0ea13735d7fb21
corporate/3.0/x86_64/kdegraphics-kdvi-3.2-15.13.C30mdk.x86_64.rpm
ce8dccbcf4db264f3dab9bf12e876506
corporate/3.0/x86_64/kdegraphics-kfax-3.2-15.13.C30mdk.x86_64.rpm
605b6cd01214f45dd9472765acd69f1e
corporate/3.0/x86_64/kdegraphics-kghostview-3.2-15.13.C30mdk.x86_64.rpm
14eec91200f15fceaf0a7f6e62cb2e52
corporate/3.0/x86_64/kdegraphics-kiconedit-3.2-15.13.C30mdk.x86_64.rpm
a481acd62448ca88e0826d3566609f98
corporate/3.0/x86_64/kdegraphics-kooka-3.2-15.13.C30mdk.x86_64.rpm
3ceb16e8055e9777fd38c91f3e11706a
corporate/3.0/x86_64/kdegraphics-kpaint-3.2-15.13.C30mdk.x86_64.rpm
c0c2e035673223cd8602a0838b0598fb
corporate/3.0/x86_64/kdegraphics-kpdf-3.2-15.13.C30mdk.x86_64.rpm
df8c5c7111271082ad50fca8ffdf055d
corporate/3.0/x86_64/kdegraphics-kpovmodeler-3.2-15.13.C30mdk.x86_64.rpm
79e3e14d8dd7fa7e6349e97f1d9d7b5a
corporate/3.0/x86_64/kdegraphics-kruler-3.2-15.13.C30mdk.x86_64.rpm
c09dec0e9b5df4f3d2a2f69cd72c77f2
corporate/3.0/x86_64/kdegraphics-ksnapshot-3.2-15.13.C30mdk.x86_64.rpm
7758c9ebab956ac41e9f3a2d2a6c8a7c
corporate/3.0/x86_64/kdegraphics-ksvg-3.2-15.13.C30mdk.x86_64.rpm
702873b7683ebd5043bba05d38a93656
corporate/3.0/x86_64/kdegraphics-kuickshow-3.2-15.13.C30mdk.x86_64.rpm
ac5a46b1098454f4489496e4166c8b5f
corporate/3.0/x86_64/kdegraphics-kview-3.2-15.13.C30mdk.x86_64.rpm
56150fe2c88109c86bead8cf09ba04ac
corporate/3.0/x86_64/kdegraphics-mrmlsearch-3.2-15.13.C30mdk.x86_64.rpm
8f3a68bb43ef4525eb8c3a6e6117a182
corporate/3.0/x86_64/lib64kdegraphics0-common-3.2-15.13.C30mdk.x86_64.rpm
534eb8871b8983f86d8e63d46df30e10
corporate/3.0/x86_64/lib64kdegraphics0-common-devel-3.2-15.13.C30mdk.x86_64.rpm
cd981a050f0e0c6ae91acced2e52394b
corporate/3.0/x86_64/lib64kdegraphics0-kooka-3.2-15.13.C30mdk.x86_64.rpm
c1d1f2d8bcae49bedf6646798cb29453
corporate/3.0/x86_64/lib64kdegraphics0-kooka-devel-3.2-15.13.C30mdk.x86_64.rpm
4aa97e98fa26ddf8ef93f1fd4d1c22e2
corporate/3.0/x86_64/lib64kdegraphics0-kpovmodeler-3.2-15.13.C30mdk.x86_64.rpm
31702c7761c465b7d78177c865fcef2b
corporate/3.0/x86_64/lib64kdegraphics0-kpovmodeler-devel-3.2-15.13.C30mdk.x86_64.rpm
4b50916440138d3ad18af03515eebdf5
corporate/3.0/x86_64/lib64kdegraphics0-ksvg-3.2-15.13.C30mdk.x86_64.rpm
f3be5478fcba1b48a41645859b65b373
corporate/3.0/x86_64/lib64kdegraphics0-ksvg-devel-3.2-15.13.C30mdk.x86_64.rpm
6a2d1c240d284bc741f72a283c990062
corporate/3.0/x86_64/lib64kdegraphics0-kuickshow-3.2-15.13.C30mdk.x86_64.rpm
7590b48293cf62557ff41d1a53896357
corporate/3.0/x86_64/lib64kdegraphics0-kview-3.2-15.13.C30mdk.x86_64.rpm
d39a534a98bc5751f6bcc0d1af3ae408
corporate/3.0/x86_64/lib64kdegraphics0-kview-devel-3.2-15.13.C30mdk.x86_64.rpm
c5f531f3c2798796b7fe5261c1af3c56
corporate/3.0/x86_64/lib64kdegraphics0-mrmlsearch-3.2-15.13.C30mdk.x86_64.rpm
118616d1fbbc2a288b0c845b530ab5ba
corporate/3.0/SRPMS/kdegraphics-3.2-15.13.C30mdk.src.rpm
Corporate 4.0:
400b776273133c15a27b3cd0bc7d492a
corporate/4.0/i586/libkdegraphics0-kooka-3.5.4-0.2.20060mlcs4.i586.rpm
43c5da552e05179a7065f19f6153dc21
corporate/4.0/i586/libkdegraphics0-kooka-devel-3.5.4-0.2.20060mlcs4.i586.rpm
fdcff6a1e1770cc4eac9e25028bd427e
corporate/4.0/SRPMS/kdegraphics-3.5.4-0.2.20060mlcs4.src.rpm
Corporate 4.0/X86_64:
0d9fe775f62e6cd137875c52a24b5999
corporate/4.0/x86_64/lib64kdegraphics0-kooka-3.5.4-0.2.20060mlcs4.x86_64.rpm
89ac83dc22519c9dc7d2729251dc90c1
corporate/4.0/x86_64/lib64kdegraphics0-kooka-devel-3.5.4-0.2.20060mlcs4.x86_64.rpm
fdcff6a1e1770cc4eac9e25028bd427e
corporate/4.0/SRPMS/kdegraphics-3.5.4-0.2.20060mlcs4.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The
verification of md5 checksums and GPG signatures is performed
automatically for you.
All packages are signed by Mandriva for security. You can obtain
the GPG public key of the Mandriva Security Team by executing:
gpg –recv-keys –keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>