______________________________________________________________________ Mandrake Linux Update Advisory ______________________________________________________________________ Package name: drakxtools Advisory ID: MDKA-2003:010 Date: May 13th, 2003 Affected versions: 9.0, 9.1, Corporate Server 2.1 ______________________________________________________________________ Problem Description: A number of issues were present in the drakbackup tool. In Mandrake Linux 9.0 and 9.1, the daemon mode of drakbackup did not work correctly. In 9.1, a GTK2-related bug caused a crash when adding other files. Other fixes include disabling the incremental other files checkbox, the lack of incremental backups of other files, and the inability to undo daemon mode once it was enabled. All of these problems have been fixed in this update. ______________________________________________________________________ References: ______________________________________________________________________ Updated Packages: Corporate Server 2.1: 4c0f8a918a7223d49a53c4f0759db723 corporate/2.1/RPMS/drakxtools-1.1.9-53.2mdk.i586.rpm d69826e18c1b605756a632d3cf2ca141 corporate/2.1/RPMS/drakxtools-http-1.1.9-53.2mdk.i586.rpm bce6abbad08fb86cadf328d1d65478a8 corporate/2.1/RPMS/drakxtools-newt-1.1.9-53.2mdk.i586.rpm 3f16d268a494960630c3271abae02f2b corporate/2.1/RPMS/harddrake-1.1.9-53.2mdk.i586.rpm 49b9643655cf0b49cfab1c55dfb8d817 corporate/2.1/RPMS/harddrake-ui-1.1.9-53.2mdk.i586.rpm 86fc5a6d4f0b98862a1b4ab0cd38376d corporate/2.1/SRPMS/drakxtools-1.1.9-53.2mdk.src.rpm Mandrake Linux 9.0: 4c0f8a918a7223d49a53c4f0759db723 9.0/RPMS/drakxtools-1.1.9-53.2mdk.i586.rpm d69826e18c1b605756a632d3cf2ca141 9.0/RPMS/drakxtools-http-1.1.9-53.2mdk.i586.rpm bce6abbad08fb86cadf328d1d65478a8 9.0/RPMS/drakxtools-newt-1.1.9-53.2mdk.i586.rpm 3f16d268a494960630c3271abae02f2b 9.0/RPMS/harddrake-1.1.9-53.2mdk.i586.rpm 49b9643655cf0b49cfab1c55dfb8d817 9.0/RPMS/harddrake-ui-1.1.9-53.2mdk.i586.rpm 86fc5a6d4f0b98862a1b4ab0cd38376d 9.0/SRPMS/drakxtools-1.1.9-53.2mdk.src.rpm Mandrake Linux 9.1: 5bb31c960ef8bb6f95d85a859a081b35 9.1/RPMS/drakxtools-9.1-31.3mdk.i586.rpm 277263ca467b19b0e4ba9e5b9446d999 9.1/RPMS/drakxtools-http-9.1-31.3mdk.i586.rpm c67341f6899140f5c79ce4bcb93e8e08 9.1/RPMS/drakxtools-newt-9.1-31.3mdk.i586.rpm 4ddbe1823e88cfbfe8333c33530ba9cb 9.1/RPMS/harddrake-9.1-31.3mdk.i586.rpm 85f9a29e795a81defb0d2689b13df046 9.1/RPMS/harddrake-ui-9.1-31.3mdk.i586.rpm 399fea65dfa4cfb05baf194d712e129c 9.1/SRPMS/drakxtools-9.1-31.3mdk.src.rpm Mandrake Linux 9.1/PPC: 83f6a2147af23dc7632aee5b4391d324 ppc/9.1/RPMS/drakxtools-9.1-31.3mdk.ppc.rpm ee3addd1be22c244949ea365773e0bdf ppc/9.1/RPMS/drakxtools-http-9.1-31.3mdk.ppc.rpm 23a9064c5f8aafd4e25dcda3ee4529c5 ppc/9.1/RPMS/drakxtools-newt-9.1-31.3mdk.ppc.rpm c1ca94fa7f58b192f70bf1814935302e ppc/9.1/RPMS/harddrake-9.1-31.3mdk.ppc.rpm 546ff5c652bf9147b9f42fa448fb1352 ppc/9.1/RPMS/harddrake-ui-9.1-31.3mdk.ppc.rpm 399fea65dfa4cfb05baf194d712e129c ppc/9.1/SRPMS/drakxtools-9.1-31.3mdk.src.rpm ______________________________________________________________________ Bug IDs fixed (see https://qa.mandrakesoft.com for more information): ______________________________________________________________________ To upgrade automatically, use MandrakeUpdate. The verification of md5 checksums and GPG signatures is performed automatically for you. If you want to upgrade manually, download the updated package from one of our FTP server mirrors and upgrade with "rpm -Fvh *.rpm". A list of FTP mirrors can be obtained from: http://www.mandrakesecure.net/en/ftp.php Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig <filename> All packages are signed by MandrakeSoft for security. You can obtain the GPG public key of the Mandrake Linux Security Team from: https://www.mandrakesecure.net/RPM-GPG-KEYS Please be aware that sometimes it takes the mirrors a few hours to update. You can view other update advisories for Mandrake Linux at: http://www.mandrakesecure.net/en/advisories/ MandrakeSoft has several security-related mailing list services that anyone can subscribe to. Information on these lists can be obtained by visiting: http://www.mandrakesecure.net/en/mlist.php If you want to report vulnerabilities, please contact security_linux-mandrake.com Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team <security linux-mandrake.com>
Mandrake Linux Advisory: drakxtools
By
Get the Free Newsletter!
Subscribe to Developer Insider for top news, trends, & analysis