SHARE
Facebook X Pinterest WhatsApp

Advisories: March 22, 2005

Written By
thumbnail
Web Webster
Web Webster
Mar 23, 2005

Debian GNU/Linux


Debian Security Advisory DSA 696-1 security@debian.org
http://www.debian.org/security/
Martin Schulze
March 22nd, 2005 http://www.debian.org/security/faq


Package : perl
Vulnerability : design flaw
Problem-Type : local
Debian-specific: no
CVE ID : CAN-2005-0448
Debian Bug : 286905 286922

Paul Szabo discovered another vulnerability in the
File::Path::rmtree function of perl, the popular scripting
language. When a process is deleting a directory tree, a different
user could exploit a race condition to create setuid binaries in
this directory tree, provided that he already had write permissions
in any subdirectory of that tree.

For the stable distribution (woody) this problem has been fixed
in version 5.6.1-8.9.

For the unstable distribution (sid) this problem has been fixed
in version 5.8.4-8.

We recommend that you upgrade your perl packages.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody


Source archives:


http://security.debian.org/pool/updates/main/p/perl/perl_5.6.1-8.9.dsc

Size/MD5 checksum: 687 bf8f434e157f15546953ae89dfb2f932

http://security.debian.org/pool/updates/main/p/perl/perl_5.6.1-8.9.diff.gz

Size/MD5 checksum: 176889 5f8583904c8f261d31f0935611ca7314

http://security.debian.org/pool/updates/main/p/perl/perl_5.6.1.orig.tar.gz

Size/MD5 checksum: 5983695 ec1ff15464809b562aecfaa2e65edba6

Architecture independent components:


http://security.debian.org/pool/updates/main/p/perl/libcgi-fast-perl_5.6.1-8.9_all.deb

Size/MD5 checksum: 31524 2516eb570a001c6a3376042ff85e3ff9

http://security.debian.org/pool/updates/main/p/perl/perl-doc_5.6.1-8.9_all.deb

Size/MD5 checksum: 3885588 d2ccba71035e7b24bed20b0d50e6cd3c

http://security.debian.org/pool/updates/main/p/perl/perl-modules_5.6.1-8.9_all.deb

Size/MD5 checksum: 1278636 ba2dbf867e05ce0a238a6bb0655ae88f

Alpha architecture:


http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.6.1-8.9_alpha.deb

Size/MD5 checksum: 620238 f6f8096076b94b0ac14a7e76f5cba5e8

http://security.debian.org/pool/updates/main/p/perl/libperl5.6_5.6.1-8.9_alpha.deb

Size/MD5 checksum: 435790 e0d74ac7f28bea04ad599a34e3c860c3

http://security.debian.org/pool/updates/main/p/perl/perl_5.6.1-8.9_alpha.deb

Size/MD5 checksum: 1218044 4d4cbcd9b01f010f0ca55a324a7f5052

http://security.debian.org/pool/updates/main/p/perl/perl-base_5.6.1-8.9_alpha.deb

Size/MD5 checksum: 209396 5227c51b7c3669e6351b60fdfc71ac4a

http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.6.1-8.9_alpha.deb

Size/MD5 checksum: 2826616 46388e257e6870a5625fa0d90e52dbe2

http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.6.1-8.9_alpha.deb

Size/MD5 checksum: 34564 ee65e15d8617f998669827f2b462d91c

ARM architecture:


http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.6.1-8.9_arm.deb

Size/MD5 checksum: 516690 39fbf1d488a709588bf624f0371e6330

http://security.debian.org/pool/updates/main/p/perl/libperl5.6_5.6.1-8.9_arm.deb

Size/MD5 checksum: 362946 2d443d23489a01a8b69c837d1c4c6f9f

http://security.debian.org/pool/updates/main/p/perl/perl_5.6.1-8.9_arm.deb

Size/MD5 checksum: 1164488 813bb81756ee700c9f0fa7b59082fb2e

http://security.debian.org/pool/updates/main/p/perl/perl-base_5.6.1-8.9_arm.deb

Size/MD5 checksum: 546032 3e6acd2b374169ac6b5baeacb64489a5

http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.6.1-8.9_arm.deb

Size/MD5 checksum: 2307832 c7e285156f4d87fd35c1229585ef8782

http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.6.1-8.9_arm.deb

Size/MD5 checksum: 29198 ad16061b652d47e4c424b66b97f1975a

Intel IA-32 architecture:


http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.6.1-8.9_i386.deb

Size/MD5 checksum: 424620 325554fce57546f366bd8eb8eae13d0d

http://security.debian.org/pool/updates/main/p/perl/libperl5.6_5.6.1-8.9_i386.deb

Size/MD5 checksum: 347980 e896258f9bab36868a62f2d4abf38f3b

http://security.debian.org/pool/updates/main/p/perl/perl_5.6.1-8.9_i386.deb

Size/MD5 checksum: 1150462 7eb6c4b69d60aa1aa203c8e121001b08

http://security.debian.org/pool/updates/main/p/perl/perl-base_5.6.1-8.9_i386.deb

Size/MD5 checksum: 497350 46ad051a8314caccc5bb58c0c63f21fb

http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.6.1-8.9_i386.deb

Size/MD5 checksum: 2119332 d32af3c6b914565feef67bbc88d26fac

http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.6.1-8.9_i386.deb

Size/MD5 checksum: 28422 2d35d5c7bf825e4ee402a2ee2d1e9961

Intel IA-64 architecture:


http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.6.1-8.9_ia64.deb

Size/MD5 checksum: 703848 88b2bba779fad35e4c4a0b8d19238e08

http://security.debian.org/pool/updates/main/p/perl/libperl5.6_5.6.1-8.9_ia64.deb

Size/MD5 checksum: 599458 9eed98c89d18626a780acad02c548394

http://security.debian.org/pool/updates/main/p/perl/perl_5.6.1-8.9_ia64.deb

Size/MD5 checksum: 1266698 2e8b9cc7c51ff5f83543cc8f72062db1

http://security.debian.org/pool/updates/main/p/perl/perl-base_5.6.1-8.9_ia64.deb

Size/MD5 checksum: 227016 ae999032a6292a8bc1afeaa779338a65

http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.6.1-8.9_ia64.deb

Size/MD5 checksum: 3312646 cb9590ae70e82d03809b6dd0cdf6adbb

http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.6.1-8.9_ia64.deb

Size/MD5 checksum: 44922 e938aea805dbcc82a6b51c45808ba117

HP Precision architecture:


http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.6.1-8.9_hppa.deb

Size/MD5 checksum: 623294 8a37db2a531ceac76b5ff58b63c7dea0

http://security.debian.org/pool/updates/main/p/perl/libperl5.6_5.6.1-8.9_hppa.deb

Size/MD5 checksum: 473742 4bfb532b44c575d9ac162721e53a3296

http://security.debian.org/pool/updates/main/p/perl/perl_5.6.1-8.9_hppa.deb

Size/MD5 checksum: 1211970 5f02f7b3827b5bcccfae2d55d2abb3e8

http://security.debian.org/pool/updates/main/p/perl/perl-base_5.6.1-8.9_hppa.deb

Size/MD5 checksum: 209228 61b8c26d1fd0cf1efe199f8c2f0114dd

http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.6.1-8.9_hppa.deb

Size/MD5 checksum: 2288236 c9c35fe2b162d6c221996dceff59227e

http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.6.1-8.9_hppa.deb

Size/MD5 checksum: 33804 93aaedff418ba33ec0dca5fd5ae00cf2

Motorola 680×0 architecture:


http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.6.1-8.9_m68k.deb

Size/MD5 checksum: 399768 1c4ff2052a44789b9257d4edc59e33c5

http://security.debian.org/pool/updates/main/p/perl/libperl5.6_5.6.1-8.9_m68k.deb

Size/MD5 checksum: 332248 d419e1b65fb16004a7b62fca3a488445

http://security.debian.org/pool/updates/main/p/perl/perl_5.6.1-8.9_m68k.deb

Size/MD5 checksum: 1149668 f1c1c802bece18494c769d0752e93df2

http://security.debian.org/pool/updates/main/p/perl/perl-base_5.6.1-8.9_m68k.deb

Size/MD5 checksum: 192926 85e49a21425030e7217a2ed3c0803654

http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.6.1-8.9_m68k.deb

Size/MD5 checksum: 2132078 ad607985a798b1367e4ccef997a371ab

http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.6.1-8.9_m68k.deb

Size/MD5 checksum: 27486 9e54239d40fe18c3a6130ed08c873e1a

Big endian MIPS architecture:


http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.6.1-8.9_mips.deb

Size/MD5 checksum: 522846 8ebd0579ab6ee8cf7ed31f37d1990953

http://security.debian.org/pool/updates/main/p/perl/libperl5.6_5.6.1-8.9_mips.deb

Size/MD5 checksum: 364932 72afd3b4f4229da22df458f35bb85893

http://security.debian.org/pool/updates/main/p/perl/perl_5.6.1-8.9_mips.deb

Size/MD5 checksum: 1162038 7cbad6e00cbf6e6796d9fdcdeccaa7ff

http://security.debian.org/pool/updates/main/p/perl/perl-base_5.6.1-8.9_mips.deb

Size/MD5 checksum: 186566 2e2e8245567fd65a3da46effd457d6ad

http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.6.1-8.9_mips.deb

Size/MD5 checksum: 2408714 735db2fb28c5387a345ab214daa3586b

http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.6.1-8.9_mips.deb

Size/MD5 checksum: 28774 3da9dae3a1b7b0973e78dba4640e7fca

Little endian MIPS architecture:


http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.6.1-8.9_mipsel.deb

Size/MD5 checksum: 516598 3ea5fd72796802f9e2217ef857963e8a

http://security.debian.org/pool/updates/main/p/perl/libperl5.6_5.6.1-8.9_mipsel.deb

Size/MD5 checksum: 361566 dcba96e1e5ecf54b37bd09442a632ada

http://security.debian.org/pool/updates/main/p/perl/perl_5.6.1-8.9_mipsel.deb

Size/MD5 checksum: 1160540 803e02a77c086a3b3e91b364abb39447

http://security.debian.org/pool/updates/main/p/perl/perl-base_5.6.1-8.9_mipsel.deb

Size/MD5 checksum: 186056 acb435b8e4337c1b7abdfebc2d611ba9

http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.6.1-8.9_mipsel.deb

Size/MD5 checksum: 2265654 0c1c16167fc65440eba23d17217ada05

http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.6.1-8.9_mipsel.deb

Size/MD5 checksum: 28354 d3e4a6c4608a8728379f4082c693324f

PowerPC architecture:


http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.6.1-8.9_powerpc.deb

Size/MD5 checksum: 567786 9a9eaff7634f0413fc89b2975ef18a54

http://security.debian.org/pool/updates/main/p/perl/libperl5.6_5.6.1-8.9_powerpc.deb

Size/MD5 checksum: 400804 b8c0c65a8711851fd03607da100a169c

http://security.debian.org/pool/updates/main/p/perl/perl_5.6.1-8.9_powerpc.deb

Size/MD5 checksum: 1183760 9209ef9514add684d6192cb29d81271b

http://security.debian.org/pool/updates/main/p/perl/perl-base_5.6.1-8.9_powerpc.deb

Size/MD5 checksum: 202904 d4c99aedd96846be19bf963acd70170a

http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.6.1-8.9_powerpc.deb

Size/MD5 checksum: 2301264 99ab35e586b1cecb05834106b8106daa

http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.6.1-8.9_powerpc.deb

Size/MD5 checksum: 30568 c859419ca068e074b011841d7bf29d70

IBM S/390 architecture:


http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.6.1-8.9_s390.deb

Size/MD5 checksum: 456344 d4bbbca929f81cc6c4a3da63e4c99a9f

http://security.debian.org/pool/updates/main/p/perl/libperl5.6_5.6.1-8.9_s390.deb

Size/MD5 checksum: 405156 de0c5dfb77f6f06eae9cc2f04c632fa8

http://security.debian.org/pool/updates/main/p/perl/perl_5.6.1-8.9_s390.deb

Size/MD5 checksum: 1168236 b51348ff85d77789baf85faecebb1686

http://security.debian.org/pool/updates/main/p/perl/perl-base_5.6.1-8.9_s390.deb

Size/MD5 checksum: 191948 048b3fde8d8ab1b2587e0c876efd2228

http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.6.1-8.9_s390.deb

Size/MD5 checksum: 2210630 00802a6d82f01ad545c8b1e7cb71b310

http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.6.1-8.9_s390.deb

Size/MD5 checksum: 32540 62b9dcc44027696b5f129910fb34f446

Sun Sparc architecture:


http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.6.1-8.9_sparc.deb

Size/MD5 checksum: 529162 0279f9d389232fa97b2de37a2299e8f7

http://security.debian.org/pool/updates/main/p/perl/libperl5.6_5.6.1-8.9_sparc.deb

Size/MD5 checksum: 404524 2c1a815027304e986c97ca96e43520c6

http://security.debian.org/pool/updates/main/p/perl/perl_5.6.1-8.9_sparc.deb

Size/MD5 checksum: 1192166 7a85c23d177eb8bec63e15cf80e479b0

http://security.debian.org/pool/updates/main/p/perl/perl-base_5.6.1-8.9_sparc.deb

Size/MD5 checksum: 211848 94817bb5a07639c6988a21266e8770f0

http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.6.1-8.9_sparc.deb

Size/MD5 checksum: 2285542 0f0b4081df6154ef89f8ca59863c4367

http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.6.1-8.9_sparc.deb

Size/MD5 checksum: 30724 aa5a594ce8210d02ac75d979f1ab0201

These files will probably be moved into the stable distribution
on its next update.


For apt-get: deb http://security.debian.org/
stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security
dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org

Package info: `apt-cache show <pkg>’ and http://packages.debian.org/<pkg>

Mandrakelinux


Mandrakelinux Security Update Advisory


Package name: MySQL
Advisory ID: MDKSA-2005:060
Date: March 21st, 2005
Affected versions: 10.0, 10.1, Corporate 3.0, Corporate Server
2.1


Problem Description:

A number of vulnerabilities were discovered by Stefano Di Paola
in the MySQL server:

If an authenticated user had INSERT privileges on the ‘mysql’
database, the CREATE FUNCTION command allowed that user to use libc
functions to execute arbitrary code with the privileges of the user
running the database server (mysql) (CAN-2005-0709).

If an authenticated user had INSERT privileges on the ‘mysql’
database, it was possible to load a library located in an arbitrary
directory by using INSERT INTO mysql.func instead of CREATE
FUNCTION. This also would allow the user to execute arbitrary code
with the privileges of the user running the database server
(CAN-2005-0710).

Finally, temporary files belonging to tables created with CREATE
TEMPORARY TABLE were handled in an insecure manner, allowing any
local user to overwrite arbitrary files with the privileges of the
database server (CAN-2005-0711).

The updated packages have been patched to correct these
issues.


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0709

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0710

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0711


Updated Packages:

Mandrakelinux 10.0:
a63c4a586c5ce21eefc68121b8bfcbb7
10.0/RPMS/libmysql12-4.0.18-1.4.100mdk.i586.rpm
91deea11427c50779b5435a952efc7e3
10.0/RPMS/libmysql12-devel-4.0.18-1.4.100mdk.i586.rpm
4150e294ce81935ee7e8844537867f89
10.0/RPMS/MySQL-4.0.18-1.4.100mdk.i586.rpm
1d7343e4ef5363066387fb4249ddf22a
10.0/RPMS/MySQL-Max-4.0.18-1.4.100mdk.i586.rpm
1b96455b734d9f896391041c6a1014d9
10.0/RPMS/MySQL-bench-4.0.18-1.4.100mdk.i586.rpm
d4e8ee5ce5608ad9c81905ad4a9b10eb
10.0/RPMS/MySQL-client-4.0.18-1.4.100mdk.i586.rpm
d83c85b5417d2c0e96002aa1d162bf35
10.0/RPMS/MySQL-common-4.0.18-1.4.100mdk.i586.rpm
7f206e82f4858c1f5d26e3f45f317320
10.0/SRPMS/MySQL-4.0.18-1.4.100mdk.src.rpm

Mandrakelinux 10.0/AMD64:
0ab0bb4f82c8dc3d6194bd6d01136948
amd64/10.0/RPMS/lib64mysql12-4.0.18-1.4.100mdk.amd64.rpm
283f25dfa37b406ac76c724f7d45dfe7
amd64/10.0/RPMS/lib64mysql12-devel-4.0.18-1.4.100mdk.amd64.rpm
6e796a5b00ee1b450aefe434ccadf437
amd64/10.0/RPMS/MySQL-4.0.18-1.4.100mdk.amd64.rpm
bcd3e0ffdd1402ff54a63cc7386a36be
amd64/10.0/RPMS/MySQL-Max-4.0.18-1.4.100mdk.amd64.rpm
46b367fcf652e07fccd09d76738a8662
amd64/10.0/RPMS/MySQL-bench-4.0.18-1.4.100mdk.amd64.rpm
76ea0bbb46e2f7af835498759cd991cb
amd64/10.0/RPMS/MySQL-client-4.0.18-1.4.100mdk.amd64.rpm
db3725e14b8dfd0bd99e0f5ebc645303
amd64/10.0/RPMS/MySQL-common-4.0.18-1.4.100mdk.amd64.rpm
7f206e82f4858c1f5d26e3f45f317320
amd64/10.0/SRPMS/MySQL-4.0.18-1.4.100mdk.src.rpm

Mandrakelinux 10.1:
c3c557a06d519f6f8e91ba43a9f3d404
10.1/RPMS/libmysql12-4.0.20-3.3.101mdk.i586.rpm
0ada09ca0942df3ac24b54e77d4f1ab7
10.1/RPMS/libmysql12-devel-4.0.20-3.3.101mdk.i586.rpm
051ba4877ed955d2ba10dfa689d4b380
10.1/RPMS/MySQL-4.0.20-3.3.101mdk.i586.rpm
ec4c10ff52536c9aba73207d4090878a
10.1/RPMS/MySQL-Max-4.0.20-3.3.101mdk.i586.rpm
8a0df2fc5431d0bea357ff35f99aec64
10.1/RPMS/MySQL-bench-4.0.20-3.3.101mdk.i586.rpm
bc0478faf5d4f1c453b3a67143685c82
10.1/RPMS/MySQL-client-4.0.20-3.3.101mdk.i586.rpm
3f87f6fa53b47ab287714df3a7b569cf
10.1/RPMS/MySQL-common-4.0.20-3.3.101mdk.i586.rpm
5eef9940c3b0f16bbe47ef5cf2d87335
10.1/SRPMS/MySQL-4.0.20-3.3.101mdk.src.rpm

Mandrakelinux 10.1/X86_64:
7782ecace6685d4070d50983e4b68a26
x86_64/10.1/RPMS/lib64mysql12-4.0.20-3.3.101mdk.x86_64.rpm
23c36f372c0eafad5304fe8a5a91340c
x86_64/10.1/RPMS/lib64mysql12-devel-4.0.20-3.3.101mdk.x86_64.rpm

d1d378de68e919c70125a26f598bbc9d
x86_64/10.1/RPMS/MySQL-4.0.20-3.3.101mdk.x86_64.rpm
bef40ae1d0b3d7d2fd02e23675890bf3
x86_64/10.1/RPMS/MySQL-Max-4.0.20-3.3.101mdk.x86_64.rpm
33888c8872f94005b83c46ee7a4c0e9e
x86_64/10.1/RPMS/MySQL-bench-4.0.20-3.3.101mdk.x86_64.rpm
c1d72a2398a4fca7d60efe7f717ddb91
x86_64/10.1/RPMS/MySQL-client-4.0.20-3.3.101mdk.x86_64.rpm
3a8bcfea1e9106510c69c93875cedad3
x86_64/10.1/RPMS/MySQL-common-4.0.20-3.3.101mdk.x86_64.rpm
5eef9940c3b0f16bbe47ef5cf2d87335
x86_64/10.1/SRPMS/MySQL-4.0.20-3.3.101mdk.src.rpm

Corporate Server 2.1:
0bc49a4120e6f7218204420787eb2f67
corporate/2.1/RPMS/libmysql10-3.23.56-1.8.C21mdk.i586.rpm
7bb7b42e1872b2e4087f2e9818d3c309
corporate/2.1/RPMS/libmysql10-devel-3.23.56-1.8.C21mdk.i586.rpm
23470127e8aa4d0f17d4d4112dbcedfd
corporate/2.1/RPMS/MySQL-3.23.56-1.8.C21mdk.i586.rpm
19c2791af702f6642073c545c7e0849b
corporate/2.1/RPMS/MySQL-Max-3.23.56-1.8.C21mdk.i586.rpm
8096eb5a826ff1789285a7604ce39d30
corporate/2.1/RPMS/MySQL-bench-3.23.56-1.8.C21mdk.i586.rpm
f1276798252c0f5376c263b0e0e18b89
corporate/2.1/RPMS/MySQL-client-3.23.56-1.8.C21mdk.i586.rpm
6e07c7ea6e92b0b0828814648234c9b3
corporate/2.1/SRPMS/MySQL-3.23.56-1.8.C21mdk.src.rpm

Corporate Server 2.1/X86_64:
179bb081fc42e1605aee0e0cd4302479
x86_64/corporate/2.1/RPMS/libmysql10-3.23.56-1.8.C21mdk.x86_64.rpm

0aff7099f82a97b088a42998c8a2be79
x86_64/corporate/2.1/RPMS/libmysql10-devel-3.23.56-1.8.C21mdk.x86_64.rpm

3c5266fa6cd2bc2ea601b400d7affd27
x86_64/corporate/2.1/RPMS/MySQL-3.23.56-1.8.C21mdk.x86_64.rpm
e50a52624efac2ab7f2ee79a56093a9b
x86_64/corporate/2.1/RPMS/MySQL-Max-3.23.56-1.8.C21mdk.x86_64.rpm

c7d5c09665aa3ba0f93de29b2a825b0f
x86_64/corporate/2.1/RPMS/MySQL-bench-3.23.56-1.8.C21mdk.x86_64.rpm

4c885f301ed4fa22954a24e86f96e11b
x86_64/corporate/2.1/RPMS/MySQL-client-3.23.56-1.8.C21mdk.x86_64.rpm

6e07c7ea6e92b0b0828814648234c9b3
x86_64/corporate/2.1/SRPMS/MySQL-3.23.56-1.8.C21mdk.src.rpm

Corporate 3.0:
c7b137fde3b84b2135cdb1b1c4b3669c
corporate/3.0/RPMS/libmysql12-4.0.18-1.4.C30mdk.i586.rpm
9a1220153597986dcea93655e616985c
corporate/3.0/RPMS/libmysql12-devel-4.0.18-1.4.C30mdk.i586.rpm
c94748b75420afebba61f3889179ed27
corporate/3.0/RPMS/MySQL-4.0.18-1.4.C30mdk.i586.rpm
4230df255b7e26fdc5352fef47a652dd
corporate/3.0/RPMS/MySQL-Max-4.0.18-1.4.C30mdk.i586.rpm
f341a2cdbe037f03f1589dd03c32b122
corporate/3.0/RPMS/MySQL-bench-4.0.18-1.4.C30mdk.i586.rpm
23706070a88e7705d65656fb75a38bac
corporate/3.0/RPMS/MySQL-client-4.0.18-1.4.C30mdk.i586.rpm
8445d01b3058a678b31d4e4f62f0500f
corporate/3.0/RPMS/MySQL-common-4.0.18-1.4.C30mdk.i586.rpm
85f2566dec3dfaea49f5c7220030d13d
corporate/3.0/SRPMS/MySQL-4.0.18-1.4.C30mdk.src.rpm

Corporate 3.0/X86_64:
64283c6daaaf50e766d98b4fa9281a3d
x86_64/corporate/3.0/RPMS/lib64mysql12-4.0.18-1.4.C30mdk.x86_64.rpm

fcf3a8d2142dc35d83ee537a03b2b69d
x86_64/corporate/3.0/RPMS/lib64mysql12-devel-4.0.18-1.4.C30mdk.x86_64.rpm

16984a3255ce4b7934b8b479f2a3d744
x86_64/corporate/3.0/RPMS/MySQL-4.0.18-1.4.C30mdk.x86_64.rpm
f3d128d91d0db42234a0799c17529ef0
x86_64/corporate/3.0/RPMS/MySQL-Max-4.0.18-1.4.C30mdk.x86_64.rpm

34ef63c34906f4bb69d2c5a2048ead58
x86_64/corporate/3.0/RPMS/MySQL-bench-4.0.18-1.4.C30mdk.x86_64.rpm

abeb243d806f4d6026314e0c6323aa27
x86_64/corporate/3.0/RPMS/MySQL-client-4.0.18-1.4.C30mdk.x86_64.rpm

6fe8cd9e5b1d3b784267dcf3b6155438
x86_64/corporate/3.0/RPMS/MySQL-common-4.0.18-1.4.C30mdk.x86_64.rpm

85f2566dec3dfaea49f5c7220030d13d
x86_64/corporate/3.0/SRPMS/MySQL-4.0.18-1.4.C30mdk.src.rpm


To upgrade automatically use MandrakeUpdate or urpmi. The
verification of md5 checksums and GPG signatures is performed
automatically for you.

All packages are signed by Mandrakesoft for security. You can
obtain the GPG public key of the Mandrakelinux Security Team by
executing:

gpg –recv-keys –keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandrakelinux at:

http://www.mandrakesoft.com/security/advisories

If you want to report vulnerabilities, please contact

security_linux-mandrake.com

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team
<security linux-mandrake.com>

thumbnail
Web Webster

Web Webster

Web Webster has more than 20 years of writing and editorial experience in the tech sector. He’s written and edited news, demand generation, user-focused, and thought leadership content for business software solutions, consumer tech, and Linux Today, he edits and writes for a portfolio of tech industry news and analysis websites including webopedia.com, and DatabaseJournal.com.

Recommended for you...

A Thorough Approach to Improve the Privacy and Security of Your Linux PC
Damien
Oct 24, 2024
Several Russian Maintainers Removed From Linux Kernel Due To Compliance Concerns
Senthil Kumar
Oct 23, 2024
OpenSSH Splits Again: New Authentication Binary Unveiled
Bobby Borisov
Oct 16, 2024
13 Best Free and Open Source Anti-Malware Tools
webmaster
Oct 14, 2024
Linux Today Logo

LinuxToday is a trusted, contributor-driven news resource supporting all types of Linux users. Our thriving international community engages with us through social media and frequent content contributions aimed at solving problems ranging from personal computing to enterprise-level IT operations. LinuxToday serves as a home for a community that struggles to find comparable information elsewhere on the web.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.