Updated e2fsprogs packages fix incorrect requirements

_______________________________________________________________________

Mandriva Linux Advisory MDVA-2008:007
http://www.mandriva.com/security/
_______________________________________________________________________

Package : e2fsprogs
Date : January 10, 2008
Affected: 2008.0
_______________________________________________________________________

Problem Description:

An incorrect Requires was added to the e2fsprogs package that prevented
it from being installed properly on a system with both 32bit and
64bit update media configured. This update corrects the Requires,
allowing the package to be installed properly.
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2008.0:
df5f4dc58fe681f7153f46546f085eec 2008.0/i586/e2fsprogs-1.40.2-5.2mdv2008.0.i586.rpm
3fe2ca6f05742b786036c794e23248bd 2008.0/i586/libext2fs-devel-1.40.2-5.2mdv2008.0.i586.rpm
aaa554e97ed3721df9e3161ce566aba0 2008.0/i586/libext2fs2-1.40.2-5.2mdv2008.0.i586.rpm
9256e196e86185b26e343e66f995ab78 2008.0/SRPMS/e2fsprogs-1.40.2-5.2mdv2008.0.src.rpm

Mandriva Linux 2008.0/X86_64:
8379cbf2488c42f5922f4d9e2849611d 2008.0/x86_64/e2fsprogs-1.40.2-5.2mdv2008.0.x86_64.rpm
6b972471691bdda85e9bfb5152ee97fb 2008.0/x86_64/lib64ext2fs-devel-1.40.2-5.2mdv2008.0.x86_64.rpm
3989d1a1aa4b61df0141d9459f6120ae 2008.0/x86_64/lib64ext2fs2-1.40.2-5.2mdv2008.0.x86_64.rpm
9256e196e86185b26e343e66f995ab78 2008.0/SRPMS/e2fsprogs-1.40.2-5.2mdv2008.0.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team

Go to http://www.mandrivastore.com
Join the Club : http://www.mandrivaclub.com
_______________________________________________________


Scritto da ziobudda, il 11-01-2008
LinkConsiglia.

Updated madwifi-source, wpa_supplicant packages fix vulnerabilities

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2008:007
http://www.mandriva.com/security/
_______________________________________________________________________

Package : madwifi-source
Date : January 10, 2008
Affected: 2007.0, 2007.1, 2008.0
_______________________________________________________________________

Problem Description:

MadWifi prior to 0.9.3.3 allowed remote attackers to cause a denial
of service (panic) via a beacon frame with a large length value in
the extended supported rates (xrates) element, which would trigger
an assertion error.

Updated packages have been updated to 0.9.3.3 to correct this
issue. Wpa_supplicant is built using madwifi-source and has been
rebuilt using 0.9.3.3 source.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5448
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2007.0:
994e5a529757654404fe20c659f01a81 2007.0/i586/madwifi-source-0.9.3.3-1.1mdv2007.0.noarch.rpm
96337298e1b19ebf0680b704bb37aabc 2007.0/i586/wpa_gui-0.5.5-2.3mdv2007.0.i586.rpm
b71e1f08dcecac80668c1e6486ef85e8 2007.0/i586/wpa_supplicant-0.5.5-2.3mdv2007.0.i586.rpm
e228e88670cae478d7f025013e21d487 2007.0/SRPMS/madwifi-source-0.9.3.3-1.1mdv2007.0.src.rpm
ca8ad7710dc3f8f3a659de1c480b7f4a 2007.0/SRPMS/wpa_supplicant-0.5.5-2.3mdv2007.0.src.rpm

Mandriva Linux 2007.0/X86_64:
9474e50b228b594ed8a8ee31d85c2a13 2007.0/x86_64/madwifi-source-0.9.3.3-1.1mdv2007.0.noarch.rpm
d0fab326d4ebcccb814e7afc78c62023 2007.0/x86_64/wpa_gui-0.5.5-2.3mdv2007.0.x86_64.rpm
2b8ea9b48f395ff7f407774444989dfc 2007.0/x86_64/wpa_supplicant-0.5.5-2.3mdv2007.0.x86_64.rpm
e228e88670cae478d7f025013e21d487 2007.0/SRPMS/madwifi-source-0.9.3.3-1.1mdv2007.0.src.rpm
ca8ad7710dc3f8f3a659de1c480b7f4a 2007.0/SRPMS/wpa_supplicant-0.5.5-2.3mdv2007.0.src.rpm

Mandriva Linux 2007.1:
f7e6a1f9fcf31eace993c3732fff56e2 2007.1/i586/madwifi-source-0.9.3.3-1.1mdv2007.1.noarch.rpm
8be4e877f8f1302312fc8e87204099c0 2007.1/i586/wpa_gui-0.5.7-1.3mdv2007.1.i586.rpm
11e5d5478132946e0ba0af05b4a95d93 2007.1/i586/wpa_supplicant-0.5.7-1.3mdv2007.1.i586.rpm
dfdd7c77a9613d4617581202835dae8b 2007.1/SRPMS/madwifi-source-0.9.3.3-1.1mdv2007.1.src.rpm
6d3ac2467ad746a431cb7ba29d223490 2007.1/SRPMS/wpa_supplicant-0.5.7-1.3mdv2007.1.src.rpm

Mandriva Linux 2007.1/X86_64:
1d02ba56908361b47b734744037aacf9 2007.1/x86_64/madwifi-source-0.9.3.3-1.1mdv2007.1.noarch.rpm
51a6280d852c1a0cdd7068e79138e4ac 2007.1/x86_64/wpa_gui-0.5.7-1.3mdv2007.1.x86_64.rpm
56666aee7b298754788cfdbd983b9fdb 2007.1/x86_64/wpa_supplicant-0.5.7-1.3mdv2007.1.x86_64.rpm
dfdd7c77a9613d4617581202835dae8b 2007.1/SRPMS/madwifi-source-0.9.3.3-1.1mdv2007.1.src.rpm
6d3ac2467ad746a431cb7ba29d223490 2007.1/SRPMS/wpa_supplicant-0.5.7-1.3mdv2007.1.src.rpm

Mandriva Linux 2008.0:
e854f61c347877fd0ee65bc2c0218337 2008.0/i586/madwifi-source-0.9.3.3-1.1mdv2008.0.noarch.rpm
e04b222093d69d2049c7439dd2e806b1 2008.0/i586/wpa_gui-0.6.0-1.2mdv2008.0.i586.rpm
e43ac8caaada63eeaacf980eebe14ceb 2008.0/i586/wpa_supplicant-0.6.0-1.2mdv2008.0.i586.rpm
a2aa4eb6917a165427de69725064e8b7 2008.0/SRPMS/madwifi-source-0.9.3.3-1.1mdv2008.0.src.rpm
fd704402aad00c89cc23d22a78e892c4 2008.0/SRPMS/wpa_supplicant-0.6.0-1.2mdv2008.0.src.rpm

Mandriva Linux 2008.0/X86_64:
90194015eb52160071fd74743ef6c198 2008.0/x86_64/madwifi-source-0.9.3.3-1.1mdv2008.0.noarch.rpm
f041b8320f9f363b58d3c548312151b0 2008.0/x86_64/wpa_gui-0.6.0-1.2mdv2008.0.x86_64.rpm
3f76dbf8e0758bd949713f224142038c 2008.0/x86_64/wpa_supplicant-0.6.0-1.2mdv2008.0.x86_64.rpm
a2aa4eb6917a165427de69725064e8b7 2008.0/SRPMS/madwifi-source-0.9.3.3-1.1mdv2008.0.src.rpm
fd704402aad00c89cc23d22a78e892c4 2008.0/SRPMS/wpa_supplicant-0.6.0-1.2mdv2008.0.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team


_______________________________________________________


Updated squid package fixes remote denial of service

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2008:002
http://www.mandriva.com/security/
_______________________________________________________________________

Package : squid
Date : January 4, 2008
Affected: 2007.0, 2007.1, 2008.0, Corporate 3.0, Corporate 4.0,
Multi Network Firewall 2.0
_______________________________________________________________________

Problem Description:

The cache update reply processing functionality in Squid 2.x before
2.6.STABLE17, and Squid 3.0, allows remote attackers to cause a denial
of service (crash) via unknown vectors related to HTTP headers.

The updated package fixes this issue.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6239
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2007.0:
96faafb7a9e07b278a0aafa84bf926ae 2007.0/i586/squid-2.6.STABLE1-4.4mdv2007.0.i586.rpm
03fad047effae58ca2489e80aa1bfa5b 2007.0/i586/squid-cachemgr-2.6.STABLE1-4.4mdv2007.0.i586.rpm
37dfa22f24df058851acc5c3c1b5879d 2007.0/SRPMS/squid-2.6.STABLE1-4.4mdv2007.0.src.rpm

Mandriva Linux 2007.0/X86_64:
c2ed1ce138a117d92a9d1258e19853a4 2007.0/x86_64/squid-2.6.STABLE1-4.4mdv2007.0.x86_64.rpm
8b1db434ee0e509aa71d7b1c81f62665 2007.0/x86_64/squid-cachemgr-2.6.STABLE1-4.4mdv2007.0.x86_64.rpm
37dfa22f24df058851acc5c3c1b5879d 2007.0/SRPMS/squid-2.6.STABLE1-4.4mdv2007.0.src.rpm

Mandriva Linux 2007.1:
4e5314934a52d574cfab66fab288fec1 2007.1/i586/squid-2.6.STABLE7-2.1mdv2007.1.i586.rpm
ea5fff3e07bb15bca7a2c3b3fd1dce43 2007.1/i586/squid-cachemgr-2.6.STABLE7-2.1mdv2007.1.i586.rpm
8ae95395bd9b0bd3888561ce359048db 2007.1/SRPMS/squid-2.6.STABLE7-2.1mdv2007.1.src.rpm

Mandriva Linux 2007.1/X86_64:
c4b1a7b86c812f272601c76c757a456e 2007.1/x86_64/squid-2.6.STABLE7-2.1mdv2007.1.x86_64.rpm
48bd862e07da9f1aacbf8f4e30ebc734 2007.1/x86_64/squid-cachemgr-2.6.STABLE7-2.1mdv2007.1.x86_64.rpm
8ae95395bd9b0bd3888561ce359048db 2007.1/SRPMS/squid-2.6.STABLE7-2.1mdv2007.1.src.rpm

Mandriva Linux 2008.0:
471283e5ec222b4558804201ed528580 2008.0/i586/squid-2.6.STABLE16-1.2mdv2008.0.i586.rpm
aae1cede196ab3ee8ce872a4f9339197 2008.0/i586/squid-cachemgr-2.6.STABLE16-1.2mdv2008.0.i586.rpm
3b7ac01f28af138e6a4a911ea13c3014 2008.0/SRPMS/squid-2.6.STABLE16-1.2mdv2008.0.src.rpm

Mandriva Linux 2008.0/X86_64:
ee831d24d0027f9e30d329ba19481572 2008.0/x86_64/squid-2.6.STABLE16-1.2mdv2008.0.x86_64.rpm
4d788055f21fd55b228881b66d4e351e 2008.0/x86_64/squid-cachemgr-2.6.STABLE16-1.2mdv2008.0.x86_64.rpm
3b7ac01f28af138e6a4a911ea13c3014 2008.0/SRPMS/squid-2.6.STABLE16-1.2mdv2008.0.src.rpm

Corporate 3.0:
b80be38521a9c761ddeb3fac585a5bef corporate/3.0/i586/squid-2.5.STABLE9-1.8.C30mdk.i586.rpm
068c0327621ff22367dd979aa9f7ecee corporate/3.0/SRPMS/squid-2.5.STABLE9-1.8.C30mdk.src.rpm

Corporate 3.0/X86_64:
2c0eaf65b0c65bb56793bce55d2ac0fc corporate/3.0/x86_64/squid-2.5.STABLE9-1.8.C30mdk.x86_64.rpm
068c0327621ff22367dd979aa9f7ecee corporate/3.0/SRPMS/squid-2.5.STABLE9-1.8.C30mdk.src.rpm

Corporate 4.0:
69d5364d1187f459934c86e311bf6d96 corporate/4.0/i586/squid-2.6.STABLE1-4.4.20060mlcs4.i586.rpm
9cab80bad8eac5d17af87f8411185529 corporate/4.0/i586/squid-cachemgr-2.6.STABLE1-4.4.20060mlcs4.i586.rpm
33c75a040e930c85e7668b160216558a corporate/4.0/SRPMS/squid-2.6.STABLE1-4.4.20060mlcs4.src.rpm

Corporate 4.0/X86_64:
37a81cbfac6f8937fd74e4b672e04019 corporate/4.0/x86_64/squid-2.6.STABLE1-4.4.20060mlcs4.x86_64.rpm
df0f15a253003d6b2c234e4a5ccfbff1 corporate/4.0/x86_64/squid-cachemgr-2.6.STABLE1-4.4.20060mlcs4.x86_64.rpm
33c75a040e930c85e7668b160216558a corporate/4.0/SRPMS/squid-2.6.STABLE1-4.4.20060mlcs4.src.rpm

Multi Network Firewall 2.0:
0d291e6348ec79f86213230619ce7cfd mnf/2.0/i586/squid-2.5.STABLE9-1.8.M20mdk.i586.rpm
2192fc9b2b9e1e000e144abf8e054860 mnf/2.0/SRPMS/squid-2.5.STABLE9-1.8.M20mdk.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team


Scritto da ziobudda, il 08-01-2008
LinkConsiglia.

Updated drakx-net package fixes missing requirement for drakvpn

_______________________________________________________________________

Mandriva Linux Advisory MDVA-2008:002
http://www.mandriva.com/security/
_______________________________________________________________________

Package : drakx-net
Date : January 3, 2008
Affected: 2008.0
_______________________________________________________________________

Problem Description:

The VPN connection wizard failed to setup OpenVPN connections with
username and password, because of a missing requirement in the package.

This update package adds the perl-Net-Telnet dependency to solve
the issue.
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2008.0:
f4f9583818368a40bcce4884fe8b5058 2008.0/i586/drakx-net-0.24-1.1mdv2008.0.noarch.rpm
cc705b2c024a6533baa7f79a675653ab 2008.0/i586/drakx-net-text-0.24-1.1mdv2008.0.noarch.rpm
617411963542c8929b448e54cbeecabc 2008.0/i586/libdrakx-net-0.24-1.1mdv2008.0.noarch.rpm
fc10aa95658f13cce1faf47cb4cdd525 2008.0/SRPMS/drakx-net-0.24-1.1mdv2008.0.src.rpm

Mandriva Linux 2008.0/X86_64:
be27e076b379175efc2aff009f28c211 2008.0/x86_64/drakx-net-0.24-1.1mdv2008.0.noarch.rpm
21f0616ea395a4b9c5b5491076090948 2008.0/x86_64/drakx-net-text-0.24-1.1mdv2008.0.noarch.rpm
942417cfb13a570147cdd21c175a59ee 2008.0/x86_64/libdrakx-net-0.24-1.1mdv2008.0.noarch.rpm
fc10aa95658f13cce1faf47cb4cdd525 2008.0/SRPMS/drakx-net-0.24-1.1mdv2008.0.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com


Updated wireshark packages fix multiple vulnerabilities

Package : wireshark
Date : January 2, 2008
Affected: 2007.0, 2007.1, 2008.0, Corporate 4.0
_______________________________________________________________________

Problem Description:

A number of vulnerabilities in the Wireshark program were found that
could cause crashes, excessive looping, or arbitrary code execution.

This update rovides Wireshark 0.99.7 which is not vulnerable to
these issues.

An updated version of libsmi is also being provided, not because
of security issues, but because this version of wireshark uses it
instead of net-snmp for SNMP support.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6111
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6112
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6113
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6114
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6115
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6116
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6117
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6118
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6119
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6120
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6121
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6438
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6439
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6441
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6450
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6451
http://www.wireshark.org/security/wnpa-sec-2007-03.html
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2007.0:
3b8e9077915d6d2b26334de8d2f845fe 2007.0/i586/libsmi-mibs-ext-0.4.5-2.2mdv2007.0.i586.rpm
dbe6a64db1d2fccb573a3e3f67f973f8 2007.0/i586/libsmi-mibs-std-0.4.5-2.2mdv2007.0.i586.rpm
87d655b543be31d5ae0f58a8dbf97027 2007.0/i586/libsmi2-0.4.5-2.2mdv2007.0.i586.rpm
4ff75e902911eb3ff3fdf307220ca62d 2007.0/i586/libsmi2-devel-0.4.5-2.2mdv2007.0.i586.rpm
49765d2627d5d361fea25034a7cffdb3 2007.0/i586/libwireshark0-0.99.7-0.1mdv2007.0.i586.rpm
0a01841128e59b2f7d176294017c6763 2007.0/i586/smi-tools-0.4.5-2.2mdv2007.0.i586.rpm
8aa19bb4d1e9117ca49513cc59029796 2007.0/i586/tshark-0.99.7-0.1mdv2007.0.i586.rpm
3bc0b4bab65defa5bf6e35759031fcb7 2007.0/i586/wireshark-0.99.7-0.1mdv2007.0.i586.rpm
c0c54d8444367c6183c62cece8cac049 2007.0/i586/wireshark-tools-0.99.7-0.1mdv2007.0.i586.rpm
7968c27be369f6b1f420fa24a4a515a1 2007.0/SRPMS/libsmi-0.4.5-2.2mdv2007.0.src.rpm
93d4485e496435ada84767d57f7c1225 2007.0/SRPMS/wireshark-0.99.7-0.1mdv2007.0.src.rpm

Mandriva Linux 2007.0/X86_64:
5f6ce5ab3aec1f5127103b072bd119f8 2007.0/x86_64/lib64smi2-0.4.5-2.2mdv2007.0.x86_64.rpm
be3c430ecada008c60cf35e286825708 2007.0/x86_64/lib64smi2-devel-0.4.5-2.2mdv2007.0.x86_64.rpm
c6fe3c1044e2dd49e6ba317ccb894584 2007.0/x86_64/lib64wireshark0-0.99.7-0.1mdv2007.0.x86_64.rpm
9d8536864c09ad40dd4224fa3b0d574d 2007.0/x86_64/libsmi-mibs-ext-0.4.5-2.2mdv2007.0.x86_64.rpm
6f038a40025193ca8051b0460fb7caa5 2007.0/x86_64/libsmi-mibs-std-0.4.5-2.2mdv2007.0.x86_64.rpm
68369d61905e99fe3ccaf53f5e57bc8e 2007.0/x86_64/smi-tools-0.4.5-2.2mdv2007.0.x86_64.rpm
c26ac8fc5775cd607c661690329ab1e1 2007.0/x86_64/tshark-0.99.7-0.1mdv2007.0.x86_64.rpm
d459878bb96b1876b5bd6bb474e4a7ce 2007.0/x86_64/wireshark-0.99.7-0.1mdv2007.0.x86_64.rpm
0f8cb96e05b83022fb31444bc01e08c3 2007.0/x86_64/wireshark-tools-0.99.7-0.1mdv2007.0.x86_64.rpm
7968c27be369f6b1f420fa24a4a515a1 2007.0/SRPMS/libsmi-0.4.5-2.2mdv2007.0.src.rpm
93d4485e496435ada84767d57f7c1225 2007.0/SRPMS/wireshark-0.99.7-0.1mdv2007.0.src.rpm

Mandriva Linux 2007.1:
d4f8fcfde7e4a5f547282829163a6838 2007.1/i586/libsmi-mibs-ext-0.4.5-2.2mdv2007.1.i586.rpm
be6c823a10d7dd7ea3b23da1606e30a7 2007.1/i586/libsmi-mibs-std-0.4.5-2.2mdv2007.1.i586.rpm
ae2f88e691ebb0b376a136fa2f7a5949 2007.1/i586/libsmi2-0.4.5-2.2mdv2007.1.i586.rpm
245b8d9a9b8f85437f8c4aebb81479c6 2007.1/i586/libsmi2-devel-0.4.5-2.2mdv2007.1.i586.rpm
8fe776c3019f672043e5346fd4462995 2007.1/i586/libwireshark0-0.99.7-0.1mdv2007.1.i586.rpm
42fb7f4c0baaed536c933adc1e4cb07c 2007.1/i586/smi-tools-0.4.5-2.2mdv2007.1.i586.rpm
1fefa448daf9412b9475a1fcb908ddc4 2007.1/i586/tshark-0.99.7-0.1mdv2007.1.i586.rpm
6df4f1564d1d20087b87ad12c2afc7d8 2007.1/i586/wireshark-0.99.7-0.1mdv2007.1.i586.rpm
18263c6e83de541e5c241ee90e6c07d7 2007.1/i586/wireshark-tools-0.99.7-0.1mdv2007.1.i586.rpm
db3984a957602d0d4d92b3afb3a99d4e 2007.1/SRPMS/libsmi-0.4.5-2.2mdv2007.1.src.rpm
ff37f6fc51d9f1fceb55e7cc993e7de5 2007.1/SRPMS/wireshark-0.99.7-0.1mdv2007.1.src.rpm

Mandriva Linux 2007.1/X86_64:
33c0feb8826a285b520ec5779e94b193 2007.1/x86_64/lib64smi2-0.4.5-2.2mdv2007.1.x86_64.rpm
27af7f9e7aa57ae63b4afc44c7cf5509 2007.1/x86_64/lib64smi2-devel-0.4.5-2.2mdv2007.1.x86_64.rpm
49b666ff593a860f1930f66d1ce4defe 2007.1/x86_64/lib64wireshark0-0.99.7-0.1mdv2007.1.x86_64.rpm
aee09168343a531052b148ee2b8cb612 2007.1/x86_64/libsmi-mibs-ext-0.4.5-2.2mdv2007.1.x86_64.rpm
de9f9609eb2b1fa492179af10a4ae48b 2007.1/x86_64/libsmi-mibs-std-0.4.5-2.2mdv2007.1.x86_64.rpm
d8e3b591abae976a1a0171824a36c906 2007.1/x86_64/smi-tools-0.4.5-2.2mdv2007.1.x86_64.rpm
a26a60457e667e0bf28911bd17f9031f 2007.1/x86_64/tshark-0.99.7-0.1mdv2007.1.x86_64.rpm
55a41bf37f237a77b6d700521222865a 2007.1/x86_64/wireshark-0.99.7-0.1mdv2007.1.x86_64.rpm
1253938c2b8b83846fbcba775d1abfb6 2007.1/x86_64/wireshark-tools-0.99.7-0.1mdv2007.1.x86_64.rpm
db3984a957602d0d4d92b3afb3a99d4e 2007.1/SRPMS/libsmi-0.4.5-2.2mdv2007.1.src.rpm
ff37f6fc51d9f1fceb55e7cc993e7de5 2007.1/SRPMS/wireshark-0.99.7-0.1mdv2007.1.src.rpm

Mandriva Linux 2008.0:
8ddec7918618ad0c05681c9e868d5749 2008.0/i586/libsmi-devel-0.4.5-2.1mdv2008.0.i586.rpm
515291f1ea87bc98886232c88d8e77ac 2008.0/i586/libsmi-mibs-ext-0.4.5-2.1mdv2008.0.i586.rpm
428ca0dd4c11b4a52e9b8b55c1226889 2008.0/i586/libsmi-mibs-std-0.4.5-2.1mdv2008.0.i586.rpm
78d313e34cd392ad925c497d77703bd1 2008.0/i586/libsmi2-0.4.5-2.1mdv2008.0.i586.rpm
e9d9a6560a9f35a325c45142c20d73a7 2008.0/i586/libwireshark-devel-0.99.7-0.1mdv2008.0.i586.rpm
8cd27aef2b1d9a74125aa09a0fd67c62 2008.0/i586/libwireshark0-0.99.7-0.1mdv2008.0.i586.rpm
03ec7ad86e36e72f5726ef3e61d0c966 2008.0/i586/smi-tools-0.4.5-2.1mdv2008.0.i586.rpm
ddb7b8990649bc5dfb924ab138b5f166 2008.0/i586/tshark-0.99.7-0.1mdv2008.0.i586.rpm
acd81887f0c6d376c5c27c25bd9ce573 2008.0/i586/wireshark-0.99.7-0.1mdv2008.0.i586.rpm
42d89dc7de0b0d95de0b145348fbe434 2008.0/i586/wireshark-tools-0.99.7-0.1mdv2008.0.i586.rpm
1f6549a3de8de269542ed3136059de7d 2008.0/SRPMS/libsmi-0.4.5-2.1mdv2008.0.src.rpm
7d2618f7919055f24c6a5a0a642c012c 2008.0/SRPMS/wireshark-0.99.7-0.1mdv2008.0.src.rpm

Mandriva Linux 2008.0/X86_64:
422f39bcba64fdc3034d8ae4107d0c83 2008.0/x86_64/lib64smi-devel-0.4.5-2.1mdv2008.0.x86_64.rpm
82cee9a6f246a30e3981639ad559ac99 2008.0/x86_64/lib64smi2-0.4.5-2.1mdv2008.0.x86_64.rpm
e2750893002c9f30573bf9f13e208a24 2008.0/x86_64/lib64wireshark-devel-0.99.7-0.1mdv2008.0.x86_64.rpm
053969419e2af559526b382f891d5b5e 2008.0/x86_64/lib64wireshark0-0.99.7-0.1mdv2008.0.x86_64.rpm
9e52ac6e6da6ee73a9e5ee9713b93eac 2008.0/x86_64/libsmi-mibs-ext-0.4.5-2.1mdv2008.0.x86_64.rpm
56dda40a8b674d50338c09895d5b0edb 2008.0/x86_64/libsmi-mibs-std-0.4.5-2.1mdv2008.0.x86_64.rpm
d12810fb24e625beff6000b0eb11319f 2008.0/x86_64/smi-tools-0.4.5-2.1mdv2008.0.x86_64.rpm
2a4d7a7174e29b939f7328b6c42b0cbe 2008.0/x86_64/tshark-0.99.7-0.1mdv2008.0.x86_64.rpm
d9f0965ee9bd47c2a7e29d2adb7632ce 2008.0/x86_64/wireshark-0.99.7-0.1mdv2008.0.x86_64.rpm
7045d748d1bff2cc6372efcc1fa8eee9 2008.0/x86_64/wireshark-tools-0.99.7-0.1mdv2008.0.x86_64.rpm
1f6549a3de8de269542ed3136059de7d 2008.0/SRPMS/libsmi-0.4.5-2.1mdv2008.0.src.rpm
7d2618f7919055f24c6a5a0a642c012c 2008.0/SRPMS/wireshark-0.99.7-0.1mdv2008.0.src.rpm

Corporate 4.0:
3105c7480d1466787bab5c202a24c881 corporate/4.0/i586/libsmi-mibs-ext-0.4.5-2.2.20060mlcs4.i586.rpm
6b1f79d9dcfede50a77833d7e27b2207 corporate/4.0/i586/libsmi-mibs-std-0.4.5-2.2.20060mlcs4.i586.rpm
3a022e89d08142476e1dd697da40aefd corporate/4.0/i586/libsmi2-0.4.5-2.2.20060mlcs4.i586.rpm
ce253c3fd84efb95e9f80d91d2047ba3 corporate/4.0/i586/libsmi2-devel-0.4.5-2.2.20060mlcs4.i586.rpm
cb1558626b02c7ac7a60f2470e22406f corporate/4.0/i586/libwireshark0-0.99.7-0.1.20060mlcs4.i586.rpm
ba73ddd29044d4d93cec49dcd737efae corporate/4.0/i586/smi-tools-0.4.5-2.2.20060mlcs4.i586.rpm
16fde2392ce2adf31a992010cbec390f corporate/4.0/i586/tshark-0.99.7-0.1.20060mlcs4.i586.rpm
f9eca8f2b302d3dbb8d7379d4038e910 corporate/4.0/i586/wireshark-0.99.7-0.1.20060mlcs4.i586.rpm
71fe25c9a1bd3b9bdb0339c51aa9463c corporate/4.0/i586/wireshark-tools-0.99.7-0.1.20060mlcs4.i586.rpm
a050e420402960d4ff2608487326bc31 corporate/4.0/SRPMS/libsmi-0.4.5-2.2.20060mlcs4.src.rpm
5cce91e2cb4c0e330b7280131870640f corporate/4.0/SRPMS/wireshark-0.99.7-0.1.20060mlcs4.src.rpm

Corporate 4.0/X86_64:
22ae3adf154cd430b91c1883344df21d corporate/4.0/x86_64/lib64smi2-0.4.5-2.2.20060mlcs4.x86_64.rpm
fa4f2e5e8a8f4b055ba34ea3d6c33224 corporate/4.0/x86_64/lib64smi2-devel-0.4.5-2.2.20060mlcs4.x86_64.rpm
1601e097303a14f2b9c36d13b6d8e785 corporate/4.0/x86_64/lib64wireshark0-0.99.7-0.1.20060mlcs4.x86_64.rpm
c682b4bb19a9161ffe0d4520a091815e corporate/4.0/x86_64/libsmi-mibs-ext-0.4.5-2.2.20060mlcs4.x86_64.rpm
7605b1a4a0c911e4de3c5658e87bd2fd corporate/4.0/x86_64/libsmi-mibs-std-0.4.5-2.2.20060mlcs4.x86_64.rpm
1ffe2793d1ec3747e503caa0ae38faed corporate/4.0/x86_64/smi-tools-0.4.5-2.2.20060mlcs4.x86_64.rpm
6e405520c32127950447cf43c3399bf7 corporate/4.0/x86_64/tshark-0.99.7-0.1.20060mlcs4.x86_64.rpm
3d5691445aabafc9b1871c0f46df4cb0 corporate/4.0/x86_64/wireshark-0.99.7-0.1.20060mlcs4.x86_64.rpm
9509f638dbab7c4e5a89f356db1d49fc corporate/4.0/x86_64/wireshark-tools-0.99.7-0.1.20060mlcs4.x86_64.rpm
a050e420402960d4ff2608487326bc31 corporate/4.0/SRPMS/libsmi-0.4.5-2.2.20060mlcs4.src.rpm
5cce91e2cb4c0e330b7280131870640f corporate/4.0/SRPMS/wireshark-0.99.7-0.1.20060mlcs4.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com


_______________________________________________________


Scritto da ziobudda, il 03-01-2008
LinkConsiglia.

Updated urpmi package fixes --auto-update and --limit-rate options

Package : urpmi
Date : January 2, 2008
Affected: 2008.0
_______________________________________________________________________

Problem Description:

urpmi --auto-update was strangely broken in some uncertain cases
(see bug #36134).

urpmi --limit-rate had a regression introduced in version 4.9.12.

The updated package fixes these issues.
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2008.0:
2378589c16acdcfbf0d5dcc1d760ca86 2008.0/i586/gurpmi-4.10.14.2-1.1mdv2008.0.noarch.rpm
b978aa28f74b518e2c2a7302760df395 2008.0/i586/urpmi-4.10.14.2-1.1mdv2008.0.noarch.rpm
74c92f154d63e267dbb8e6e3a2aa6f30 2008.0/i586/urpmi-ldap-4.10.14.2-1.1mdv2008.0.noarch.rpm
1f2a348bccb792d09f78c1a74be8d693 2008.0/i586/urpmi-parallel-ka-run-4.10.14.2-1.1mdv2008.0.noarch.rpm
ded25ab47cf54f731bb53c5816cad265 2008.0/i586/urpmi-parallel-ssh-4.10.14.2-1.1mdv2008.0.noarch.rpm
467ab48ea9f71995ec92d4398e1365c6 2008.0/i586/urpmi-recover-4.10.14.2-1.1mdv2008.0.noarch.rpm
3635102746f8dd993456d1d4476cb50c 2008.0/SRPMS/urpmi-4.10.14.2-1.1mdv2008.0.src.rpm

Mandriva Linux 2008.0/X86_64:
08f080bcb06eb23aca38d304d5775c81 2008.0/x86_64/gurpmi-4.10.14.2-1.1mdv2008.0.noarch.rpm
876a186fc653675cc54264362c26a530 2008.0/x86_64/urpmi-4.10.14.2-1.1mdv2008.0.noarch.rpm
9f6dd3cf3f93846d0b98e6b3da6545ea 2008.0/x86_64/urpmi-ldap-4.10.14.2-1.1mdv2008.0.noarch.rpm
e32ed2cd1f139107be2f0bfa01d93995 2008.0/x86_64/urpmi-parallel-ka-run-4.10.14.2-1.1mdv2008.0.noarch.rpm
843d6f72c9f477492d7de4d858b7dbe9 2008.0/x86_64/urpmi-parallel-ssh-4.10.14.2-1.1mdv2008.0.noarch.rpm
be7a027d3a6076e4f1a8af731a8b16f5 2008.0/x86_64/urpmi-recover-4.10.14.2-1.1mdv2008.0.noarch.rpm
3635102746f8dd993456d1d4476cb50c 2008.0/SRPMS/urpmi-4.10.14.2-1.1mdv2008.0.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com


Scritto da ziobudda, il 03-01-2008
LinkConsiglia.

Updated nss_ldap packages correct bad SIGPIPE handling

_______________________________________________________________________

Mandriva Linux Advisory MDKA-2007:137
http://www.mandriva.com/security/
_______________________________________________________________________

Package : nss_ldap
Date : December 31, 2007
Affected: 2007.1
_______________________________________________________________________

Problem Description:

This update corrects an issue in nss_ldap when handling SIGPIPE,
which could manifest itself in many different ways in systems running
with nss_ldap installed and configured, such as a simple application
silent error to a complete abort.
_______________________________________________________________________

References:

http://qa.mandriva.com/show_bug.cgi?id=28962
http://qa.mandriva.com/show_bug.cgi?id=32597
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2007.1:
a104f0e1ba57fbe6bb5133849d6ce999 2007.1/i586/nss_ldap-257-1.1mdv2007.1.i586.rpm
b1a2c346fdc994ee8da2db42ad9f0649 2007.1/SRPMS/nss_ldap-257-1.1mdv2007.1.src.rpm

Mandriva Linux 2007.1/X86_64:
414ec94ea062fa5473fbde8379fb4e8d 2007.1/x86_64/nss_ldap-257-1.1mdv2007.1.x86_64.rpm
b1a2c346fdc994ee8da2db42ad9f0649 2007.1/SRPMS/nss_ldap-257-1.1mdv2007.1.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________


Updated kdetoys fix kweather applet availability issue

________________________________________________________________________
 
 Mandriva Linux Advisory                                   MDKA-2007:135
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : kdetoys
 Date    : December 31, 2007
 Affected: 2008.0
 _______________________________________________________________________
 
 Problem Description:
 
 The kweather applet would be available in the applets viewer of the
 KDE kicker, despite the kweather application not being installed.
 This update corrects the issue.
 _______________________________________________________________________

 References:
 
 http://qa.mandriva.com/show_bug.cgi?id=35327
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 2008.0:
 c88bc948e7b749d9511e49addcf90530  2008.0/i586/kdetoys-3.5.7-2.2mdv2008.0.i586.rpm
 149f98b5177c4feaa67fcf6e14cd4d46  2008.0/i586/kdetoys-kweather-3.5.7-2.2mdv2008.0.i586.rpm
 4203cf3803562b3c5e370b5f7bdbfec4  2008.0/i586/libkdetoys1-devel-3.5.7-2.2mdv2008.0.i586.rpm
 e8d7c9e3a7843d5ca4e2ac52658bb83f  2008.0/i586/libkdetoys1-kweather-3.5.7-2.2mdv2008.0.i586.rpm
 f27246f82f5cd6afe6f6e86b27c8928d  2008.0/SRPMS/kdetoys-3.5.7-2.2mdv2008.0.src.rpm

 Mandriva Linux 2008.0/X86_64:
 a5352b5ba075a622a3405b9cd354fb95  2008.0/x86_64/kdetoys-3.5.7-2.2mdv2008.0.x86_64.rpm
 0acd3727745fb42be65af0f7c2f85939  2008.0/x86_64/kdetoys-kweather-3.5.7-2.2mdv2008.0.x86_64.rpm
 542814b9c635bf7062ef766981243f02  2008.0/x86_64/lib64kdetoys1-devel-3.5.7-2.2mdv2008.0.x86_64.rpm
 7969b4f4bb1c6603207bc33a7c1155fc  2008.0/x86_64/lib64kdetoys1-kweather-3.5.7-2.2mdv2008.0.x86_64.rpm
 f27246f82f5cd6afe6f6e86b27c8928d  2008.0/SRPMS/kdetoys-3.5.7-2.2mdv2008.0.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com


Scritto da ziobudda, il 01-01-2008
LinkConsiglia.







Collabora

ZioBudda.net sta crescendo sempre di più, ma mi serve una mano per portare avanti i progetti e per rendere il sito sempre più bello e pieno di informazioni.






Si ringrazia:

Unbit.it Cybernetic.it website counter