Are these updates going in Cooker?

--- Mandrake Linux Security Team
<[EMAIL PROTECTED]> wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
>
________________________________________________________________________
> 
>                     Mandrake Linux Update Advisory
>
________________________________________________________________________
> 
> Package name:           Various
> Advisory ID:            MDKA-2002:004
> Date:                   April 5th, 2002
> Affected versions:      8.2
>
________________________________________________________________________
> 
> Problem Description:
> 
>  A few packages are being provided as bugfix updates
> to the Mandrake
>  Linux 8.2 release.  Specifically:
> 
>  aspell/kde-i18n: Danish and Slovanian languages
> were mistakenly
>  omitted from the CDs.
> 
>  jmcce: The jmcce package was mistakenly omitted
> from the 8.2 Download
>  Edition.
> 
>  e2fsprogs: The new version fixes some memory leaks
> in the e2fsck
>  journaling code, and in the ismounted code checking
> for a swap device.
> 
>  nss_ldap: The previous package did not give out a
> list of supplementary
>  groups which the user is also a member of.  This
> new package is rebuilt
>  with ids-uid and RFC2307bis support.
> 
>  Xtart: The released Xtart package used an old
> method of initiating X
>  which did not provide a complete environment for
> consolehelper; as a
>  result any applications, like Mandrake Control
> Center, that requires
>  consolehelper to gain root access fails.
> 
>  drakxtools: There were various problems with
> printerdrake and HP
>  Multi-Function devices.  These issues are corrected
> with the new
>  drakxtools package.
>
________________________________________________________________________
> 
> Updated Packages:
> 
>  Mandrake Linux 8.2:
>  fdcfb20ee5bb43906ce21d03360183c7 
> 8.2/RPMS/Xtart-1.1-2.1mdk.i586.rpm
>  0041a2a4a380a043f6f78ab78ff7447b 
> 8.2/RPMS/aspell-da-1.4.21-1mdk.i586.rpm
>  a71bfbd2f905dda53f6acbeaaa857f99 
> 8.2/RPMS/drakxtools-1.1.7-98.1mdk.i586.rpm
>  115ee432de480e0bc2f301e8b14ee626 
> 8.2/RPMS/drakxtools-http-1.1.7-98.1mdk.i586.rpm
>  22dbee0ad124df72f04807ee0708347f 
> 8.2/RPMS/drakxtools-newt-1.1.7-98.1mdk.i586.rpm
>  253780af866608d2d126b99d16989c38 
> 8.2/RPMS/e2fsprogs-1.27-1.1mdk.i586.rpm
>  b1b318e282d670037d3ff175fdf0eb7f 
> 8.2/RPMS/jmcce-1.3-10mdk.i586.rpm
>  ce2afa09dbdef781b8da227742fc6624 
> 8.2/RPMS/kde-i18n-da-2.2.2-2mdk.noarch.rpm
>  14e20cc1ac15b827fb7e7d72fb79af62 
> 8.2/RPMS/kde-i18n-sl-2.2.2-1mdk.noarch.rpm
>  de26d383355f040bc8b1ade4db7a3005 
> 8.2/RPMS/libext2fs2-1.27-1.1mdk.i586.rpm
>  0459320945a795c638ee3f484b89e594 
> 8.2/RPMS/libext2fs2-devel-1.27-1.1mdk.i586.rpm
>  6dc393325ea9b982e24761cbae760db4 
> 8.2/RPMS/nss_ldap-173-2.1mdk.i586.rpm
>  d79cb75acecc91c40e81a61173e857ad 
> 8.2/SRPMS/Xtart-1.1-2.1mdk.src.rpm
>  798414049f4475c38a01fb3303bd5bae 
> 8.2/SRPMS/aspell-da-1.4.21-1mdk.src.rpm
>  50636c8316f929c3da07fcb8a8bf1f89 
> 8.2/SRPMS/drakxtools-1.1.7-98.1mdk.src.rpm
>  7aa20199787545344754372ce5d3a26c 
> 8.2/SRPMS/e2fsprogs-1.27-1.1mdk.src.rpm
>  bb9a2dd24675bd424dfa7b85e5fa70e3 
> 8.2/SRPMS/jmcce-1.3-10mdk.src.rpm
>  ed3e7148019726e5e02f97e5d3fbee25 
> 8.2/SRPMS/kde-i18n-da-2.2.2-2mdk.src.rpm
>  1c87f5c0b40450821b8c6378b3ff7469 
> 8.2/SRPMS/kde-i18n-sl-2.2.2-1mdk.src.rpm
>  8f5ca4f81321e35ce3e7799aa3de44fe 
> 8.2/SRPMS/nss_ldap-173-2.1mdk.src.rpm
>
________________________________________________________________________
> 
> Bug IDs fixed (see https://qa.mandrakesoft.com for
> more information):
> 
>
________________________________________________________________________
> 
> To upgrade automatically, use MandrakeUpdate.  The
> verification of md5
> checksums and GPG signatures is performed
> automatically for you.
> 
> If you want to upgrade manually, download the
> updated package from one 
> of our FTP server mirrors and upgrade with "rpm -Fvh
> *.rpm".  A list of
> FTP mirrors can be obtained from:
> 
>   http://www.mandrakesecure.net/en/ftp.php
> 
> Please verify the update prior to upgrading to
> ensure the integrity of
> the downloaded package.  You can do this with the
> command:
> 
>   rpm --checksig <filename>
> 
> You can obtain the GPG public key of the Mandrake
> Linux Security Team
> from:
> 
>   https://www.mandrakesecure.net/RPM-GPG-KEYS
> 
> Please be aware that sometimes it takes the mirrors
> a few hours to 
> update.
> 
> You can view other update advisories for Mandrake
> Linux at:
> 
>   http://www.mandrakesecure.net/en/advisories/
> 
> MandrakeSoft has several security-related mailing
> list services that
> anyone can subscribe to.  Information on these lists
> can be obtained by
> visiting:
> 
>   http://www.mandrakesecure.net/en/mlist.php
> 
> If you want to report vulnerabilities, please
> contact
> 
>   [EMAIL PROTECTED]
>
________________________________________________________________________
> 
> Type Bits/KeyID     Date       User ID
> pub  1024D/22458A98 2000-07-10 Linux Mandrake
> Security Team
>   <[EMAIL PROTECTED]>
> 
> 
> - -----BEGIN PGP PUBLIC KEY BLOCK-----
> Version: GnuPG v1.0.5 (GNU/Linux)
> Comment: For info see http://www.gnupg.org
> 
>
mQGiBDlp594RBAC2tDozI3ZgQsE7XwxurJCJrX0L5vx7SDByR5GHDdWekGhdiday
>
L4nfUax+SeR9SCoCgTgPW1xB8vtQc8/sinJlMjp9197a2iKM0FOcPlkpa3HcOdt7
>
WKJqQhlMrHvRcsivzcgqjH44GBBJIT6sygUF8k0lU6YnMHj5MPc/NGWt8wCg9vKo
>
P0l5QVAFSsHtqcU9W8cc7wMEAJzQsAlnvPXDBfBLEH6u7ptWFdp0GvbSuG2wRaPl
>
hynHvRiE01ZvwbJZXsPsKm1z7uVoW+NknKLunWKB5axrNXDHxCYJBzY3jTeFjsqx
>
PFZkIEAQphLTkeXXelAjQ5u9tEshPswEtMvJvUgNiAfbzHfPYmq8D6x5xOw1IySg
>
2e/LBACxr2UJYCCB2BZ3p508mAB0RpuLGukq+7UWiOizy+kSskIBg2O7sQkVY/Cs
>
iyGEo4XvXqZFMY39RBdfm2GY+WB/5NFiTOYJRKjfprP6K1YbtsmctsX8dG+foKsD
>
LLFs7OuVfaydLQYp1iiN6D+LJDSMPM8/LCWzZsgr9EKJ8NXiyrQ6TGludXggTWFu
>
ZHJha2UgU2VjdXJpdHkgVGVhbSA8c2VjdXJpdHlAbGludXgtbWFuZHJha2UuY29t
>
PohWBBMRAgAWBQI5aefeBAsKBAMDFQMCAxYCAQIXgAAKCRCaqNDQIkWKmK6LAKCy
>
/NInDsaMSI+WHwrquwC5PZrcnQCeI+v3gUDsNfQfiKBvQSANu1hdulqIRgQQEQIA
>
BgUCOtNVGQAKCRBZ5w3um0pAJJWQAKDUoL5He+mKbfrMaTuyU5lmRyJ0fwCgoFAP
>
WdvQlu/kFjphF740XeOwtOqIRgQQEQIABgUCOu8A6QAKCRBynDnb9lq3CnpjAJ4w
>
Pk0SEE9U4r40IxWpwLU+wrWVugCdFfSPllPpZRCiaC7HwbFcfExRmPa5AQ0EOWnn
>
7xAEAOQlTVY4TiNo5V/iP0J1xnqjqlqZsU7yEBKo/gZz6/+hx75RURe1ebiJ9F77
>
9FQbpJ9Epz1KLSXvq974rnVb813zuGdmgFyk+ryA/rTR2RQ8h+EoNkwmATzRxBXV
>
Jb57fFQjxOu4eNjZAtfII/YXb0uyXXrdr5dlJ/3eXrcO4p0XAAMFBACCxo6Z269s
>
+A4v8C6Ui12aarOQcCDlV8cVG9LkyatU3FNTlnasqwo6EkaP572448weJWwN6SCX
>
Vl+xOYLiK0hL/6Jb/O9Agw75yUVdk+RMM2I4fNEi+y4hmfMh2siBv8yEkEvZjTcl
>
3TpkTfzYky85tu433wmKaLFOv0WjBFSikohGBBgRAgAGBQI5aefvAAoJEJqo0NAi
>
RYqYid0AoJgeWzXrEdIClBOSW5Q6FzqJJyaqAKC0Y9YI3UFlE4zSIGjcFlLJEJGX
> lA==
> =0ahQ
> - -----END PGP PUBLIC KEY BLOCK-----
> 
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.0.6 (GNU/Linux)
> Comment: For info see http://www.gnupg.org
> 
>
iD8DBQE8rhUHmqjQ0CJFipgRApzEAJ4nco78I2lvP+uM3PAmXCI+pWBFsgCgiDSm
> 3UCG+qaZX2eu6v0Ig8RDgjM=
> =H3zR
> -----END PGP SIGNATURE-----
> 

__________________________________________________
Do You Yahoo!?
Yahoo! Tax Center - online filing with TurboTax
http://taxes.yahoo.com/

Reply via email to