MDKSA-2001:008 - diffutils update

2001-01-10 Thread Linux Mandrake Security Team
can get the GPG public key of the Linux-Mandrake Security Team at http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS If you use MandrakeUpdate, the verification of md5 checksum and GPG signature is performed automatically for you. Linux-Mandrake 6.0: 07f772ddd79ba6403441746be476a139 6.0/RPMS

MDKSA-2001:001 - wu-ftpd update

2001-01-10 Thread Linux Mandrake Security Team
. _ Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Linux-Mandrake Security Team at http://www.linux-mandrake.com/en/security/RPM

MDKSA-2001:009 - mgetty update

2001-01-10 Thread Linux Mandrake Security Team
GPG public key of the Linux-Mandrake Security Team at http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS If you use MandrakeUpdate, the verification of md5 checksum and GPG signature is performed automatically for you. Linux-Mandrake 6.0: 72edd3932ba4127993362e4d801fa9fd 6.0/RPMS/mgetty

MDKSA-2001:003 - squid update

2001-01-10 Thread Linux Mandrake Security Team
. Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Linux-Mandrake Security Team at

MDKSA-2001:010 - inn update

2001-01-10 Thread Linux Mandrake Security Team
. Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Linux-Mandrake Security Team at http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS If you use

MDKSA-2001:007 - shadow-utils update

2001-01-10 Thread Linux Mandrake Security Team
oblem. Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Linux-Mandrake Security Team at http://www.linux-mandrake.com/en/security/RP

MDKSA-2001:005 - rdist update

2001-01-10 Thread Linux Mandrake Security Team
Linux-Mandrake Security Team at http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS If you use MandrakeUpdate, the verification of md5 checksum and GPG signature is performed automatically for you. Linux-Mandrake 6.0: cecfe6c8c7295e56d30affe9fad3d6a6 6.0/RPMS/rdist-6.1.5-17.2mdk.i586.rpm

MDKSA-2001:004 - getty_ps update

2001-01-10 Thread Linux Mandrake Security Team
of the Linux-Mandrake Security Team at http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS If you use MandrakeUpdate, the verification of md5 checksum and GPG signature is performed automatically for you. Linux-Mandrake 6.0: de0b568399b926361335cb22e354eee0 6.0/RPMS/getty_ps-2.0.7j

MDKSA-2001:006 - gpm update

2001-01-10 Thread Linux Mandrake Security Team
e to subscribe to or unsubscribe from either list: http://www.linux-mandrake.com/en/flists.php3#security Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team <[EMAIL PROTECTED]&g

MDKSA-2001:002 - arpwatch update

2001-01-10 Thread Linux Mandrake Security Team
can get the GPG public key of the Linux-Mandrake Security Team at http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS If you use MandrakeUpdate, the verification of md5 checksum and GPG signature is performed automatically for you. Linux-Mandrake 6.0: 01dae52de3b7d9b118fd80e96a6cd705 6.0/RPMS

MDKSA-2001:008-1 - diffutils update

2001-01-12 Thread Linux Mandrake Security Team
. Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Linux-Mandrake Security Team at http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS If you

MDKSA-2001:011 - linuxconf update

2001-01-12 Thread Linux Mandrake Security Team
get the GPG public key of the Linux-Mandrake Security Team at http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS If you use MandrakeUpdate, the verification of md5 checksum and GPG signature is performed automatically for you. Linux-Mandrake 6.0: 7e6b1aba001ec31d89ace76ba9a9de8c 6.0/RPMS

MDKSA-2001:001-1 - wu-ftpd update

2001-01-12 Thread Linux Mandrake Security Team
the Linux-Mandrake Security Team at http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS If you use MandrakeUpdate, the verification of md5 checksum and GPG signature is performed automatically for you. Linux-Mandrake 6.0: a6adb7822d8fea6adb82a2a2e37850fd 6.0/RPMS/wu-ftpd-2.6.1-8.5mdk.i586.rpm

MDKSA-2001:001-2 - wu-ftpd update

2001-01-16 Thread Linux Mandrake Security Team
verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Linux-Mandrake Security Team at http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS If you use

MDKSA-2001:012 - glibc update

2001-01-18 Thread Linux Mandrake Security Team
______ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team <[EMAIL PROTECTED]> - -BEGIN PGP PUBLIC KEY BLOCK- Version: GnuPG v1.0.1 (GNU/Linux) Comment: For info see http://w

MDKSA-2001:013 - php update

2001-01-19 Thread Linux Mandrake Security Team
this with the command: rpm --checksig package.rpm You can get the GPG public key of the Linux-Mandrake Security Team at http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS If you use MandrakeUpdate, the verification of md5 checksum and GPG signature is performed au

[Security Announce] MDKSA-2001:014 - MySQL and php update

2001-01-23 Thread Linux Mandrake Security Team
public key of the Linux-Mandrake Security Team at http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS If you use MandrakeUpdate, the verification of md5 checksum and GPG signature is performed automatically for you. Linux-Mandrake 7.2: 06ccef6a0a68e631847b10d1d30a79f9 7.2/RPMS/MySQL-3.23.31

MDKSA-2001:014-1 MySQL update

2001-01-28 Thread Linux Mandrake Security Team
package.rpm You can get the GPG public key of the Linux-Mandrake Security Team at http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS If you use MandrakeUpdate, the verification of md5 checksum and GPG signature is performed automatically for you. Linux-Mandrake 7.1

MDKSA-2001:016 - webmin update

2001-01-29 Thread Linux Mandrake Security Team
. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Linux-Mandrake Security Team at http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS If you use MandrakeUpdate, the verification of md5 checksum and GPG signature is performed automatically

MDKSA-2001:015 - exmh update

2001-01-29 Thread Linux Mandrake Security Team
this with the command: rpm --checksig package.rpm You can get the GPG public key of the Linux-Mandrake Security Team at http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS If you use MandrakeUpdate, the verification of md5 checksum and GPG signature is performed automatically for you. Linux

MDKSA-2001:017 - bind update

2001-01-30 Thread Linux Mandrake Security Team
Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Linux-Mandrake Security Team at http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS If you use

MDKSA-2001:018 - kdesu update

2001-01-31 Thread Linux Mandrake Security Team
bs package. Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Linux-Mandrake Security Team at http://www.linux-mandrake.com/en/securi

MDKSA-2001:019 - xemacs update

2001-02-01 Thread Linux Mandrake Security Team
"12345678"). Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Linux-Mandrake Security Team at http://www.linux-mandrake.com/en/security/RPM

MDKSA-2001:020 - cups update

2001-02-02 Thread Linux Mandrake Security Team
integrity of the downloaded package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Linux-Mandrake Security Team at http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS If you use MandrakeUpdate, the verification of md5 checksum and GPG

MDKSA-2001:020-1 - cups update

2001-02-05 Thread Linux Mandrake Security Team
. Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Linux-Mandrake Security Team

MDKSA-2001:021 - proftpd update

2001-02-09 Thread Linux Mandrake Security Team
package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Linux-Mandrake Security Team at http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS If you use MandrakeUpdate, the verification of md5 checksum and GPG signature is performed

MDKSA-2001:022 - vixie-cron update

2001-02-21 Thread Linux Mandrake Security Team
the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Linux-Mandrake Security Team at http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS If you use MandrakeU

MDKSA-2001:023 - cups update

2001-02-22 Thread Linux Mandrake Security Team
cribe from either list: http://www.linux-mandrake.com/en/flists.php3#security ____ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team <[EMAIL PROTECTED]> - -BEGIN

MDKSA-2001:025 - Zope update

2001-02-27 Thread Linux Mandrake Security Team
update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Linux-Mandrake Security Team at http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS If you use MandrakeUpdate, the

MDKSA-2001:024 - sudo update

2001-02-27 Thread Linux Mandrake Security Team
package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Linux-Mandrake Security Team at http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS If you use MandrakeUpdate, the verification of md5 checksum and GPG signature is performed

MDKSA-2001:026 - joe update

2001-03-06 Thread Linux Mandrake Security Team
s with the command: rpm --checksig package.rpm You can get the GPG public key of the Linux-Mandrake Security Team at http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS If you use MandrakeUpdate, the verification of md5 checksum and GPG signature is performed automatically for you. Linux-Ma

MDKSA-2001:027 - eperl update

2001-03-07 Thread Linux Mandrake Security Team
ey of the Linux-Mandrake Security Team at http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS If you use MandrakeUpdate, the verification of md5 checksum and GPG signature is performed automatically for you. Linux-Mandrake 7.1: 29d22c99cf995c7dd90f34467e0ae202 7.1/RPMS/eperl-2.2.14-7.2mdk.i58

MDKSA-2001:028 - slrn update

2001-03-10 Thread Linux Mandrake Security Team
. Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Linux-Mandrake Security Team at http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS If

MDKSA-2001:024-1 - sudo update

2001-03-14 Thread Linux Mandrake Security Team
downloaded package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Linux-Mandrake Security Team at http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS If you use MandrakeUpdate, the verification of md5 checksum and GPG signature is performed

MDKSA-2001:029 - Mesa update

2001-03-14 Thread Linux Mandrake Security Team
verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Linux-Mandrake Security Team at http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS If you use MandrakeUpdate

MDKSA-2001:030 - sgml-tools update

2001-03-16 Thread Linux Mandrake Security Team
the Linux-Mandrake Security Team at http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS If you use MandrakeUpdate, the verification of md5 checksum and GPG signature is performed automatically for you. Linux-Mandrake 6.0: 0dffdf59bf60b15f695a8f8cf1e0633e 6.0/RPMS/sgml-tools-1.0.9-3.1mdk.i586

MDKSA-2001:031 - mutt update

2001-03-20 Thread Linux Mandrake Security Team
integrity of the downloaded package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Linux-Mandrake Security Team at http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS If you use MandrakeUpdate, the verification of md5 checksum and GPG

MDKSA-2001:030-1 - sgml-tools update

2001-03-21 Thread Linux Mandrake Security Team
ribe from either list: http://www.linux-mandrake.com/en/flists.php3#security Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team <[EMAIL PROTECTED]> - -BEGIN P

MDKSA-2001:032 - licq update

2001-03-21 Thread Linux Mandrake Security Team
upgrading. Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Linux-Mandrake Security Team at http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS

MDKSA-2001:033 - openssh update

2001-03-23 Thread Linux Mandrake Security Team
. Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Linux-Mandrake Security Team at http://www.linux-mandrake.com/en

MDKSA-2001:034 - timed update

2001-03-23 Thread Linux Mandrake Security Team
to upgrading to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Linux-Mandrake Security Team at http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS If you use MandrakeUpdate, the verification

MDKSA-2001:033-1 - openssh update

2001-03-25 Thread Linux Mandrake Security Team
the downloaded package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Linux-Mandrake Security Team at http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS If you use MandrakeUpdate, the verification of md5 checksum and GPG signature is

MDKSA-2001:032-1 - licq update

2001-03-26 Thread Linux Mandrake Security Team
e these new packages. Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Linux-Mandr

MDKSA-2001:035 - vim update

2001-03-27 Thread Linux Mandrake Security Team
the downloaded package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Linux-Mandrake Security Team at http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS If you use MandrakeUpdate, the verification of md5 checksum and GPG signature is

MDKSA-2001:036 - ntp/xntp3 update

2001-04-06 Thread Linux Mandrake Security Team
ing to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Linux-Mandrake Security Team at http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS If you use MandrakeUpdate, the verification of md5 checks

MDKSA-2001:037 - kernel update

2001-04-18 Thread Linux Mandrake Security Team
. Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Linux-Mandrake Security Team at

MDKSA-2001:040 - samba update

2001-04-22 Thread Linux Mandrake Security Team
G public key of the Linux-Mandrake Security Team at http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS If you use MandrakeUpdate, the verification of md5 checksum and GPG signature is performed automatically for you. Linux-Mandrake 7.1: 893aa5b63b25263f4118094129b2c44f 7.1/RPMS/sa

MDKSA-2001:041 - hylafax update

2001-04-24 Thread Linux Mandrake Security Team
; in the body of the message. Optionally, you can use the web interface to subscribe to or unsubscribe from either list: http://www.linux-mandrake.com/en/flists.php3#security ____ Type Bits/KeyID Date User ID pub

MDKSA-2001:042 - nedit update

2001-04-26 Thread Linux Mandrake Security Team
the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Linux-Mandrake Security Team at http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS If you use MandrakeUpdate, the

MDKSA-2001:044 - gftp update

2001-04-28 Thread Linux Mandrake Security Team
. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Linux-Mandrake Security Team at http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS If you use MandrakeUpdate, the verification of md5 checksum and GPG signature is performed automatically

MDKSA-2001:043 - rpmdrake update

2001-04-28 Thread Linux Mandrake Security Team
. Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Linux-Mandrake Security Team at http

MDKSA-2001:047 - pine update

2001-05-08 Thread Linux Mandrake Security Team
verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Linux-Mandrake Security Team at http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS If you use

MDKSA-2001:048 - cups update

2001-05-14 Thread Linux Mandrake Security Team
of the downloaded package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Linux-Mandrake Security Team at http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS If you use MandrakeUpdate, the verification of md5 checksum and GPG signature is

MDKSA-2001:049 - Zope update

2001-05-14 Thread Linux Mandrake Security Team
the command: rpm --checksig package.rpm You can get the GPG public key of the Linux-Mandrake Security Team at http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS If you use MandrakeUpdate, the verification of md5 checksum and GPG signature is performed automatically for you. Linux-Mandrake

MDKSA-2001:050 - vixie-cron update

2001-05-14 Thread Linux Mandrake Security Team
Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Linux-Mandrake Security Team at http://www.linux-mandrake.com/en

MDKSA-2001:047-1 - pine update

2001-05-16 Thread Linux Mandrake Security Team
command: rpm --checksig package.rpm You can get the GPG public key of the Linux-Mandrake Security Team at http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS If you use MandrakeUpdate, the verification of md5 checksum and GPG signature is performed automatically for you. Linux-Mandrake 7.1

[mdk-security] DELIVERY FAILURE: User frocha (frocha@investshop.com.br) not listed inpublic Name & Address Book

2001-05-21 Thread Linux Mandrake Security Team
g package.rpm You can get the GPG public key of the Linux-Mandrake Security Team at http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS If you use MandrakeUpdate, the verification of md5 checksum and GPG signature is performed automatically for you. Linux-Mandrake 7.1: 5758d0764be77871603ca

[mdk-security] DELIVERY FAILURE: User frocha (frocha@investshop.com.br) not listed inpublic Name & Address Book

2001-05-21 Thread Linux Mandrake Security Team
ferences: Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Linux-Mandrake Security Team at http://www.linux-mandrak

MDKSA-2001:046-1 - kdelibs update

2001-05-25 Thread Linux Mandrake Security Team
-Mandrake Security Team at http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS If you use MandrakeUpdate, the verification of md5 checksum and GPG signature is performed automatically for you. Linux-Mandrake 8.0: 7300d6fa62a35dedcfae1e98f3a24176 8.0/RPMS/arts-2.1.2-2mdk.i586.rpm

MDKSA-2001:052 - ncurses update

2001-05-25 Thread Linux Mandrake Security Team
ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Linux-Mandrake Security Team at http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS If you use MandrakeUpdate, the verification of md5 checksum

MDKSA-2001:053 - gnupg update

2001-05-31 Thread Linux Mandrake Security Team
Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Linux-Mandrake Security Team at http

MDKSA-2001:054 - imap update

2001-06-11 Thread Linux Mandrake Security Team
____ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team <[EMAIL PROTECTED]> - -BEGIN PGP PUBLIC KEY BLOCK- Version: GnuPG v1.0.5 (GNU/Linux) Comment: For info see http://www.gnupg.org mQGiBDlp594RBA

MDKSA-2001:055 - xinetd update

2001-06-11 Thread Linux Mandrake Security Team
me]" in the body of the message. Optionally, you can use the web interface to subscribe to or unsubscribe from either list: http://www.linux-mandrake.com/en/flists.php3#security Type Bits/KeyID Date User ID

MDKSA-2001:056 - tcpdump update

2001-06-13 Thread Linux Mandrake Security Team
he message. Optionally, you can use the web interface to subscribe to or unsubscribe from either list: http://www.linux-mandrake.com/en/flists.php3#security Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-0

MDKSA-2001:046-2 - kdelibs update

2001-06-18 Thread Linux Mandrake Security Team
_ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team <[EMAIL PROTECTED]> - -BEGIN PGP PUBLIC KEY BLOCK- Version: GnuPG v1.0.5 (GNU/Linux) Comment: For info see http://www.gnupg.org mQGiBDlp594RBAC2tDo

MDKSA-2001:060 - rxvt

2001-06-20 Thread Linux Mandrake Security Team
__ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team <[EMAIL PROTECTED]> - -BEGIN PGP PUBLIC KEY BLOCK- Version: GnuPG v1.0.5 (GNU/Linux) Comment: For info see http://www.gnupg.org mQGiBDlp594RBAC2tDozI3ZgQs

MDKSA-2001:057 - proftpd

2001-06-20 Thread Linux Mandrake Security Team
or unsubscribe from either list: http://www.linux-mandrake.com/en/flists.php3#security Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team <[EMAIL PROTECTED]> - -BEGIN P

MDKSA-2001:058 - ispell update

2001-06-20 Thread Linux Mandrake Security Team
message. Optionally, you can use the web interface to subscribe to or unsubscribe from either list: http://www.linux-mandrake.com/en/flists.php3#security Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Linux

MDKSA-2001:059 - webmin update

2001-06-20 Thread Linux Mandrake Security Team
uot;info [listname]" in the body of the message. Optionally, you can use the web interface to subscribe to or unsubscribe from either list: http://www.linux-mandrake.com/en/flists.php3#security Type Bits/KeyID Dat

MDKSA-2001:062 - samba update

2001-07-01 Thread Linux Mandrake Security Team
y ________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team <[EMAIL PROTECTED]> - -BEGIN PGP PUBLIC KEY BLOCK- Version: GnuPG v1.0.5 (GNU/Linux) Comment: For info

[mdk-security] MDKSA-2001:046-3 - kdelibs update

2001-06-28 Thread Linux Mandrake Security Team
PROTECTED] with "info [listname]" in the body of the message. Optionally, you can use the web interface to subscribe to or unsubscribe from either list: http://www.linux-mandrake.com/en/flists.php3#security Type Bits/KeyI

MDKSA-2001:055-1 - xinetd update

2001-07-05 Thread Linux Mandrake Security Team
Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team <[EMAIL PROTECTED]> - -BEGIN PGP PUBLIC KEY BLOCK- Version: GnuPG v1.0.5 (GNU/Linux) Comment: For info see http://www.gnupg.o

MDKSA-2001:063 - fetchmail update

2001-07-05 Thread Linux Mandrake Security Team
cribe from either list: http://www.linux-mandrake.com/en/flists.php3#security ____ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team <[EMAIL PROTECTED]> - -BEGIN PGP PUBLIC KEY B

MDKSA-2001:064 - tripwire update

2001-07-18 Thread Linux Mandrake Security Team
either list: http://www.linux-mandrake.com/en/flists.php3#security Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team <[EMAIL PROTECTED]> - -BEGIN PGP PUBLIC KEY BLOCK-

MDKSA-2001:065 - openssl update

2001-07-18 Thread Linux Mandrake Security Team
bscribe to or unsubscribe from either list: http://www.linux-mandrake.com/en/flists.php3#security ____ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team <[EMAIL PROTECTED]>

MDKSA-2001:067 - elm update

2001-07-25 Thread Linux Mandrake Security Team
the body of the message. Optionally, you can use the web interface to subscribe to or unsubscribe from either list: http://www.linux-mandrake.com/en/flists.php3#security Type Bits/KeyID Date User ID pub 1024

MDKSA-2001:066 - squid update

2001-07-25 Thread Linux Mandrake Security Team
o or unsubscribe from either list: http://www.linux-mandrake.com/en/flists.php3#security Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team <[EMAIL PROTECTED]> - --