---

Mandrakelinux Advisories: kdelibs, passwd, libuser, apache


Mandrakelinux Security Update Advisory


Package name: kdelibs
Advisory ID: MDKSA-2004:047
Date: May 18th, 2004
Affected versions: 10.0, 9.2


Problem Description:

A vulnerability in the Opera web browser was identified by
iDEFENSE; the same type of vulnerability exists in KDE. The telnet,
rlogin, ssh, and mailto URI handlers do not check for ‘-‘ at the
beginning of the hostname passed, which makes it possible to pass
an option to the programs started by the handlers. This can allow
remote attackers to create or truncate arbitrary files.

The updated packages contain patches provided by the KDE team to
fix this problem.


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0411

http://www.securityfocus.com/archive/1/363225


Updated Packages:

Mandrakelinux 10.0:
5834d2544ea362a8b1a89df573d37a5e
10.0/RPMS/kdelibs-common-3.2-36.2.100mdk.i586.rpm
c3f3605f848c79040202b741d504be5b
10.0/RPMS/libkdecore4-3.2-36.2.100mdk.i586.rpm
ba2f23077a06234e3ea8abff508c3491
10.0/RPMS/libkdecore4-devel-3.2-36.2.100mdk.i586.rpm
eabd0014c180f29e2df40ad669cb8727
10.0/SRPMS/kdelibs-3.2-36.2.100mdk.src.rpm

Mandrakelinux 10.0/AMD64:
e1da8eb3974deedab1a88cadde9a8485
amd64/10.0/RPMS/kdelibs-common-3.2-36.2.100mdk.amd64.rpm
dbfdb75e9e4d21df70ced100d58f95e9
amd64/10.0/RPMS/lib64kdecore4-3.2-36.2.100mdk.amd64.rpm
1af32502b0dff3cd0dc4d384aa3b9429
amd64/10.0/RPMS/lib64kdecore4-devel-3.2-36.2.100mdk.amd64.rpm
eabd0014c180f29e2df40ad669cb8727
amd64/10.0/SRPMS/kdelibs-3.2-36.2.100mdk.src.rpm

Mandrakelinux 9.2:
1600ba6398e53148f4ae46a36c1014ac
9.2/RPMS/kdelibs-common-3.1.3-35.2.92mdk.i586.rpm
a1725a29836ae4fedc94a259bfea2957
9.2/RPMS/libkdecore4-3.1.3-35.2.92mdk.i586.rpm
88eaf9cd1ea992bfc455425344faa500
9.2/RPMS/libkdecore4-devel-3.1.3-35.2.92mdk.i586.rpm
664aa0ba51c942d0b437bbaf9623e4c0
9.2/SRPMS/kdelibs-3.1.3-35.2.92mdk.src.rpm

Mandrakelinux 9.2/AMD64:
323f3915da6a05de388b9e89b6739055
amd64/9.2/RPMS/kdelibs-common-3.1.3-35.2.92mdk.amd64.rpm
adf904eaa80f7f1b34e7f51cd177a08d
amd64/9.2/RPMS/lib64kdecore4-3.1.3-35.2.92mdk.amd64.rpm
3ae0b390d54151105c33e93af4d686de
amd64/9.2/RPMS/lib64kdecore4-devel-3.1.3-35.2.92mdk.amd64.rpm
664aa0ba51c942d0b437bbaf9623e4c0
amd64/9.2/SRPMS/kdelibs-3.1.3-35.2.92mdk.src.rpm


To upgrade automatically use MandrakeUpdate or urpmi. The
verification of md5 checksums and GPG signatures is performed
automatically for you.

A list of FTP mirrors can be obtained from:

http://www.mandrakesecure.net/en/ftp.php

All packages are signed by Mandrakesoft for security. You can
obtain the GPG public key of the Mandrakelinux Security Team by
executing:

gpg –recv-keys –keyserver www.mandrakesecure.net
0x22458A98

Please be aware that sometimes it takes the mirrors a few hours
to update.

You can view other update advisories for Mandrakelinux at:

http://www.mandrakesecure.net/en/advisories/

Mandrakesoft has several security-related mailing list services
that anyone can subscribe to. Information on these lists can be
obtained by visiting:

http://www.mandrakesecure.net/en/mlist.php

If you want to report vulnerabilities, please contact

security_linux-mandrake.com

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team
<security linux-mandrake.com>


Mandrakelinux Security Update Advisory


Package name: passwd
Advisory ID: MDKSA-2004:045
Date: May 17th, 2004
Affected versions: 10.0, 9.1, 9.2, Corporate Server 2.1, Multi
Network Firewall 8.2


Problem Description:

Steve Grubb found some problems in the passwd program. Passwords
given to passwd via stdin are one character shorter than they are
supposed to be. He also discovered that pam may not have been
sufficiently initialized to ensure safe and proper operation. A few
small memory leaks have been fixed as well.

The updated packages are patched to correct these problems.


Updated Packages:

Mandrakelinux 10.0:
869033ec6feaad1dbcab68f7920f17a2
10.0/RPMS/passwd-0.68-2.2.100mdk.i586.rpm
965e9cd1e2cafcd0678c0a295c8d1da0
10.0/SRPMS/passwd-0.68-2.2.100mdk.src.rpm

Mandrakelinux 10.0/AMD64:
9cc620bae72e31318778f29f49aeaf36
amd64/10.0/RPMS/passwd-0.68-2.2.100mdk.amd64.rpm
965e9cd1e2cafcd0678c0a295c8d1da0
amd64/10.0/SRPMS/passwd-0.68-2.2.100mdk.src.rpm

Corporate Server 2.1:
30be38bdbee75c463e63d58a6d79d0d2
corporate/2.1/RPMS/passwd-0.67-5.2.C21mdk.i586.rpm
e1feb25f44e9994fcaefbac7b9462c36
corporate/2.1/SRPMS/passwd-0.67-5.2.C21mdk.src.rpm

Corporate Server 2.1/x86_64:
f5a299350ce570e4cd5ea62c3e18df45
x86_64/corporate/2.1/RPMS/passwd-0.67-5.2.C21mdk.x86_64.rpm
e1feb25f44e9994fcaefbac7b9462c36
x86_64/corporate/2.1/SRPMS/passwd-0.67-5.2.C21mdk.src.rpm

Mandrakelinux 9.1:
2d0ec037c2a491288fa0e8febe7ddb88
9.1/RPMS/passwd-0.68-2.2.91mdk.i586.rpm
2286c3804aead3235aa95e68d22528be
9.1/SRPMS/passwd-0.68-2.2.91mdk.src.rpm

Mandrakelinux 9.1/PPC:
fdeec3e03e2b6eb9995dfe8b97a6dff1
ppc/9.1/RPMS/passwd-0.68-2.2.91mdk.ppc.rpm
2286c3804aead3235aa95e68d22528be
ppc/9.1/SRPMS/passwd-0.68-2.2.91mdk.src.rpm

Mandrakelinux 9.2:
ab219f0f732de4d65c66ad3d92e34855
9.2/RPMS/passwd-0.68-2.2.92mdk.i586.rpm
feec687b7b497f64c97ff62d23884caa
9.2/SRPMS/passwd-0.68-2.2.92mdk.src.rpm

Mandrakelinux 9.2/AMD64:
860029cdf43c7451f1a8f9360fccbf0d
amd64/9.2/RPMS/passwd-0.68-2.2.92mdk.amd64.rpm
feec687b7b497f64c97ff62d23884caa
amd64/9.2/SRPMS/passwd-0.68-2.2.92mdk.src.rpm

Multi Network Firewall 8.2:
dba7a6584826bbf08929760ac5e7cfd2
mnf8.2/RPMS/passwd-0.64.1-9.2.M82mdk.i586.rpm
8c231cd59ab8ea3c5ad721f6c318d7e1
mnf8.2/SRPMS/passwd-0.64.1-9.2.M82mdk.src.rpm


To upgrade automatically use MandrakeUpdate or urpmi. The
verification of md5 checksums and GPG signatures is performed
automatically for you.

A list of FTP mirrors can be obtained from:

http://www.mandrakesecure.net/en/ftp.php

All packages are signed by Mandrakesoft for security. You can
obtain the GPG public key of the Mandrakelinux Security Team by
executing:

gpg –recv-keys –keyserver www.mandrakesecure.net
0x22458A98

Please be aware that sometimes it takes the mirrors a few hours
to update.

You can view other update advisories for Mandrakelinux at:

http://www.mandrakesecure.net/en/advisories/

Mandrakesoft has several security-related mailing list services
that anyone can subscribe to. Information on these lists can be
obtained by visiting:

http://www.mandrakesecure.net/en/mlist.php

If you want to report vulnerabilities, please contact

security_linux-mandrake.com

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team
<security linux-mandrake.com>


Mandrakelinux Security Update Advisory


Package name: libuser
Advisory ID: MDKSA-2004:044
Date: May 17th, 2004
Affected versions: 10.0, 9.1, 9.2, Corporate Server 2.1


Problem Description:

Steve Grubb discovered a number of problems in the libuser
library that can lead to a crash in applications linked to it, or
possibly write 4GB of garbage to the disk.

The updated packages provide a patched libuser to correct these
problems.


Updated Packages:

Mandrakelinux 10.0:
8b1052f6566345fa9f9ec1f3ac9e1d7f
10.0/RPMS/libuser-0.51.7-9.1.100mdk.i586.rpm
85e478c659a9989d9a766ea4318bac7c
10.0/RPMS/libuser-python-0.51.7-9.1.100mdk.i586.rpm
7ce35b806081b64defe7665d7ae68a1c
10.0/RPMS/libuser1-0.51.7-9.1.100mdk.i586.rpm
ac64c3ce5b4cbfe2f80841af6dfb5e67
10.0/RPMS/libuser1-devel-0.51.7-9.1.100mdk.i586.rpm
d7a7d5c43980af14ff1c4fb21905eca1
10.0/SRPMS/libuser-0.51.7-9.1.100mdk.src.rpm

Mandrakelinux 10.0/AMD64:
9557b2cbdb46786c792babb4fa02d33a
amd64/10.0/RPMS/libuser-0.51.7-9.1.100mdk.amd64.rpm
bd658edd9366db56a4fb2a1af984d332
amd64/10.0/RPMS/libuser-python-0.51.7-9.1.100mdk.amd64.rpm
387f940a770a8e1eb5c189fa6a6d2512
amd64/10.0/RPMS/libuser1-0.51.7-9.1.100mdk.amd64.rpm
41ae8a0f4fb9d322cfb3b181cbabe4a0
amd64/10.0/RPMS/libuser1-devel-0.51.7-9.1.100mdk.amd64.rpm
d7a7d5c43980af14ff1c4fb21905eca1
amd64/10.0/SRPMS/libuser-0.51.7-9.1.100mdk.src.rpm

Corporate Server 2.1:
5e808ded69e5d965537c4e2ea133c98e
corporate/2.1/RPMS/libuser-0.51-4.1.C21mdk.i586.rpm
7e5f1ecabb9e80e0b0b55f0ee541730f
corporate/2.1/RPMS/libuser1-0.51-4.1.C21mdk.i586.rpm
9e3980e106425e52a9ca7d780a9d7f87
corporate/2.1/RPMS/libuser1-devel-0.51-4.1.C21mdk.i586.rpm
275b478ed0e000f3362168db23e55164
corporate/2.1/SRPMS/libuser-0.51-4.1.C21mdk.src.rpm

Corporate Server 2.1/x86_64:
aee3697ed61122c6dca84073f3737cb9
x86_64/corporate/2.1/RPMS/libuser-0.51-4.1.C21mdk.x86_64.rpm
66a9069f2e1bf93d8d4cb9483031ce57
x86_64/corporate/2.1/RPMS/libuser1-0.51-4.1.C21mdk.x86_64.rpm
be873bdd2aa84e410dfc7921e4eebbd3
x86_64/corporate/2.1/RPMS/libuser1-devel-0.51-4.1.C21mdk.x86_64.rpm

275b478ed0e000f3362168db23e55164
x86_64/corporate/2.1/SRPMS/libuser-0.51-4.1.C21mdk.src.rpm

Mandrakelinux 9.1:
079807611894e0256c78c30a3f5c6312
9.1/RPMS/libuser-0.51-6.1.91mdk.i586.rpm
b85b62434cd712c817b0b32942a816db
9.1/RPMS/libuser1-0.51-6.1.91mdk.i586.rpm
e4756b87c61aecdcf6b0333a8bd65d79
9.1/RPMS/libuser1-devel-0.51-6.1.91mdk.i586.rpm
636c10df3bbdb865f86b6edda72b6b89
9.1/SRPMS/libuser-0.51-6.1.91mdk.src.rpm

Mandrakelinux 9.1/PPC:
a406fc70b29d5ef091d35e9b9b1b5297
ppc/9.1/RPMS/libuser-0.51-6.1.91mdk.ppc.rpm
1660ea14a3a4ab99814253f350bc5044
ppc/9.1/RPMS/libuser1-0.51-6.1.91mdk.ppc.rpm
fe58e3131693f632f9a539f34d6b58b6
ppc/9.1/RPMS/libuser1-devel-0.51-6.1.91mdk.ppc.rpm
636c10df3bbdb865f86b6edda72b6b89
ppc/9.1/SRPMS/libuser-0.51-6.1.91mdk.src.rpm

Mandrakelinux 9.2:
05809041080c9b839351a17bf32844e4
9.2/RPMS/libuser-0.51.7-8.1.92mdk.i586.rpm
547ec4105ab690c8ae3871a758c6364e
9.2/RPMS/libuser-python-0.51.7-8.1.92mdk.i586.rpm
97ed7324b001f36e9122609ca067e590
9.2/RPMS/libuser1-0.51.7-8.1.92mdk.i586.rpm
48938167eb941fa4f85a8627294581c0
9.2/RPMS/libuser1-devel-0.51.7-8.1.92mdk.i586.rpm
bbd3f4eaa4f913b568d0b64430ba5de6
9.2/SRPMS/libuser-0.51.7-8.1.92mdk.src.rpm

Mandrakelinux 9.2/AMD64:
dc7bd5a3aee747beb9030922ace0fc54
amd64/9.2/RPMS/libuser-0.51.7-8.1.92mdk.amd64.rpm
0ea25b434d32b0c6f80d8af2bdd8c5be
amd64/9.2/RPMS/libuser-python-0.51.7-8.1.92mdk.amd64.rpm
b7223a4c92ab91fd102c23138422fdbd
amd64/9.2/RPMS/libuser1-0.51.7-8.1.92mdk.amd64.rpm
dab4abf5431b2fa6269d62fb65d60a0f
amd64/9.2/RPMS/libuser1-devel-0.51.7-8.1.92mdk.amd64.rpm
bbd3f4eaa4f913b568d0b64430ba5de6
amd64/9.2/SRPMS/libuser-0.51.7-8.1.92mdk.src.rpm


To upgrade automatically use MandrakeUpdate or urpmi. The
verification of md5 checksums and GPG signatures is performed
automatically for you.

A list of FTP mirrors can be obtained from:

http://www.mandrakesecure.net/en/ftp.php

All packages are signed by Mandrakesoft for security. You can
obtain the GPG public key of the Mandrakelinux Security Team by
executing:

gpg –recv-keys –keyserver www.mandrakesecure.net
0x22458A98

Please be aware that sometimes it takes the mirrors a few hours
to update.

You can view other update advisories for Mandrakelinux at:

http://www.mandrakesecure.net/en/advisories/

Mandrakesoft has several security-related mailing list services
that anyone can subscribe to. Information on these lists can be
obtained by visiting:

http://www.mandrakesecure.net/en/mlist.php

If you want to report vulnerabilities, please contact

security_linux-mandrake.com

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team
<security linux-mandrake.com>


Mandrakelinux Security Update Advisory


Package name: apache
Advisory ID: MDKSA-2004:046
Date: May 17th, 2004
Affected versions: 10.0, 9.1, 9.2, Corporate Server 2.1, Multi
Network Firewall 8.2


Problem Description:

Four security vulnerabilities were fixed with the 1.3.31 release
of Apache. All of these issues have been backported and applied to
the provided packages. Thanks to Ralf Engelschall of OpenPKG for
providing the patches.

Apache 1.3 prior to 1.3.30 did not filter terminal escape
sequences from its error logs. This could make it easier for
attackers to insert those sequences into the terminal emulators of
administrators viewing the error logs that contain vulnerabilities
related to escape sequence handling (CAN-2003-0020).

mod_digest in Apache 1.3 prior to 1.3.31 did not properly verify
the nonce of a client response by using an AuthNonce secret. Apache
now verifies the nonce returned in the client response to check
whether it was issued by itself by means of a “AuthDigestRealmSeed”
secret exposed as an MD5 checksum (CAN-2004-0987).

mod_acces in Apache 1.3 prior to 1.3.30, when running on
big-endian 64-bit platforms, did not properly parse Allow/Deny
rules using IP addresses without a netmask. This could allow a
remote attacker to bypass intended access restrictions
(CAN-2003-0993).

Apache 1.3 prior to 1.3.30, when using multiple listening
sockets on certain platforms, allows a remote attacker to cause a
DoS by blocking new connections via a short-lived connection on a
rarely-accessed listening socket (CAN-2004-0174). While this
particular vulnerability does not affect Linux, we felt it prudent
to include the fix.


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0020

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0987

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0993

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0174


Updated Packages:

Mandrakelinux 10.0:
c10b863b2c71da6e3896135b51e28067
10.0/RPMS/apache-1.3.29-1.1.100mdk.i586.rpm
547ec6569770d99dcc38a2a516def5e1
10.0/RPMS/apache-devel-1.3.29-1.1.100mdk.i586.rpm
e97605cb95bc7ee68c1622e4b7876bbe
10.0/RPMS/apache-modules-1.3.29-1.1.100mdk.i586.rpm
86e0eb12c74c6cf387c90bb871e05d96
10.0/RPMS/apache-source-1.3.29-1.1.100mdk.i586.rpm
8ea42133866f1dc766a66fdb0fbcef2c
10.0/SRPMS/apache-1.3.29-1.1.100mdk.src.rpm

Mandrakelinux 10.0/AMD64:
b3d493f6c856eaba6b6916c05c68b951
amd64/10.0/RPMS/apache-1.3.29-1.1.100mdk.amd64.rpm
7c3e65be2760ff13ae094a86972304d8
amd64/10.0/RPMS/apache-devel-1.3.29-1.1.100mdk.amd64.rpm
6fda2efdbcb30f7e2fa9686fb0f1a584
amd64/10.0/RPMS/apache-modules-1.3.29-1.1.100mdk.amd64.rpm
d358734dc2a2829ecd05ebe368306c9c
amd64/10.0/RPMS/apache-source-1.3.29-1.1.100mdk.amd64.rpm
8ea42133866f1dc766a66fdb0fbcef2c
amd64/10.0/SRPMS/apache-1.3.29-1.1.100mdk.src.rpm

Corporate Server 2.1:
2ba3f60a80db761f9e632807bb68490e
corporate/2.1/RPMS/apache-1.3.26-7.1.C21mdk.i586.rpm
b4d2ebf8611b8a7c96e2e4c573d82d04
corporate/2.1/RPMS/apache-common-1.3.26-7.1.C21mdk.i586.rpm
759c9a160cadf607f5e0b05f2527ef62
corporate/2.1/RPMS/apache-devel-1.3.26-7.1.C21mdk.i586.rpm
5cd5fc3340a801be7d6478c349e11356
corporate/2.1/RPMS/apache-manual-1.3.26-7.1.C21mdk.i586.rpm
af88fd7db2f187abfa0f5bed00d2ea28
corporate/2.1/RPMS/apache-modules-1.3.26-7.1.C21mdk.i586.rpm
17541a17f20b94cd63c1ce208dd92161
corporate/2.1/RPMS/apache-source-1.3.26-7.1.C21mdk.i586.rpm
20022ad2481a7f9b6c589c5d54ff3ef2
corporate/2.1/SRPMS/apache-1.3.26-7.1.C21mdk.src.rpm

Corporate Server 2.1/x86_64:
0b97faa3320694e450b42b7c4c35117b
x86_64/corporate/2.1/RPMS/apache-1.3.26-7.1.C21mdk.x86_64.rpm
2923a077d31e25128ca26f2ff39b2218
x86_64/corporate/2.1/RPMS/apache-common-1.3.26-7.1.C21mdk.x86_64.rpm

bc02caab78d66f916497adef35813f66
x86_64/corporate/2.1/RPMS/apache-devel-1.3.26-7.1.C21mdk.x86_64.rpm

946381e40bfd066e1eea5897dd2f1ccd
x86_64/corporate/2.1/RPMS/apache-manual-1.3.26-7.1.C21mdk.x86_64.rpm

165ae3c407da223e08c10cfd69ae1919
x86_64/corporate/2.1/RPMS/apache-modules-1.3.26-7.1.C21mdk.x86_64.rpm

4904816fd0f79bf8aa2edf32487bdeb1
x86_64/corporate/2.1/RPMS/apache-source-1.3.26-7.1.C21mdk.x86_64.rpm

20022ad2481a7f9b6c589c5d54ff3ef2
x86_64/corporate/2.1/SRPMS/apache-1.3.26-7.1.C21mdk.src.rpm

Mandrakelinux 9.1:
8430439cc946758536b8995214c6b241
9.1/RPMS/apache-1.3.27-8.2.91mdk.i586.rpm
dafe80db84dc3ea0045a3cc88b706025
9.1/RPMS/apache-devel-1.3.27-8.2.91mdk.i586.rpm
8c94ba2f3663be3808f0b730aa816925
9.1/RPMS/apache-modules-1.3.27-8.2.91mdk.i586.rpm
dfd5b600ad329ecbbaa48d86f87ac727
9.1/RPMS/apache-source-1.3.27-8.2.91mdk.i586.rpm
cecbcfb44ca1f13fa3f0afacd8bb21df
9.1/SRPMS/apache-1.3.27-8.2.91mdk.src.rpm

Mandrakelinux 9.1/PPC:
576fd9a94c7b0bdacbf87f03e6e1b193
ppc/9.1/RPMS/apache-1.3.27-8.2.91mdk.ppc.rpm
5cd0231dd70c466e62ef4774de67ea2c
ppc/9.1/RPMS/apache-devel-1.3.27-8.2.91mdk.ppc.rpm
e2bc6d8c1bc8fc35f8591ac2321f1796
ppc/9.1/RPMS/apache-modules-1.3.27-8.2.91mdk.ppc.rpm
0cf21078ea8708932689c3d1857cd21a
ppc/9.1/RPMS/apache-source-1.3.27-8.2.91mdk.ppc.rpm
cecbcfb44ca1f13fa3f0afacd8bb21df
ppc/9.1/SRPMS/apache-1.3.27-8.2.91mdk.src.rpm

Mandrakelinux 9.2:
ad40d4c4d037d2325f517a83b4a6ddbc
9.2/RPMS/apache-1.3.28-3.2.92mdk.i586.rpm
898d8e855ef2dca810a5e85740fbf418
9.2/RPMS/apache-devel-1.3.28-3.2.92mdk.i586.rpm
c67b6a75cf890b8514746e486e498fc9
9.2/RPMS/apache-modules-1.3.28-3.2.92mdk.i586.rpm
66e48a0a86fe3f5b39e195e2b7fad7b3
9.2/RPMS/apache-source-1.3.28-3.2.92mdk.i586.rpm
929aae2cbc5af8267664e45855d7ca86
9.2/SRPMS/apache-1.3.28-3.2.92mdk.src.rpm

Mandrakelinux 9.2/AMD64:
b4d4119cf47406a0a7aab2673588e4af
amd64/9.2/RPMS/apache-1.3.28-3.2.92mdk.amd64.rpm
4bf14eabf3e85ae498b5d4fd2603fe8d
amd64/9.2/RPMS/apache-devel-1.3.28-3.2.92mdk.amd64.rpm
2edc0182131aa5320a36525b4608a342
amd64/9.2/RPMS/apache-modules-1.3.28-3.2.92mdk.amd64.rpm
e6e811b93283881650fd767167b4b85e
amd64/9.2/RPMS/apache-source-1.3.28-3.2.92mdk.amd64.rpm
929aae2cbc5af8267664e45855d7ca86
amd64/9.2/SRPMS/apache-1.3.28-3.2.92mdk.src.rpm

Multi Network Firewall 8.2:
a7749a8b4c3c9812628b26a5936a7ec5
mnf8.2/RPMS/apache-1.3.23-4.4.M82mdk.i586.rpm
3bec21aa4d1a2c02eb46ea73ef1d073b
mnf8.2/RPMS/apache-common-1.3.23-4.4.M82mdk.i586.rpm
55d3551d21662fcd0f9ff71c4ccebeff
mnf8.2/RPMS/apache-modules-1.3.23-4.4.M82mdk.i586.rpm
7acbac463605bbd7e1eb438b3a48003a
mnf8.2/SRPMS/apache-1.3.23-4.4.M82mdk.src.rpm


To upgrade automatically use MandrakeUpdate or urpmi. The
verification of md5 checksums and GPG signatures is performed
automatically for you.

A list of FTP mirrors can be obtained from:

http://www.mandrakesecure.net/en/ftp.php

All packages are signed by Mandrakesoft for security. You can
obtain the GPG public key of the Mandrakelinux Security Team by
executing:

gpg –recv-keys –keyserver www.mandrakesecure.net
0x22458A98

Please be aware that sometimes it takes the mirrors a few hours
to update.

You can view other update advisories for Mandrakelinux at:

http://www.mandrakesecure.net/en/advisories/

Mandrakesoft has several security-related mailing list services
that anyone can subscribe to. Information on these lists can be
obtained by visiting:

http://www.mandrakesecure.net/en/mlist.php

If you want to report vulnerabilities, please contact

security_linux-mandrake.com

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team
<security linux-mandrake.com>

Get the Free Newsletter!

Subscribe to Developer Insider for top news, trends, & analysis