Welcome to Gaia! ::

The Official Linux Users of Gaia

Back to Guilds

A Guild for Linux, BSD, Mac, Solaris, and other Unix like operating systems. 

Tags: Computer Help, Linux, BSD (Berkeley Software Distrobution), Mac (Macintosh), Unix 

Reply Linux Security, keeping you on top of the bugs!
Mandriva 06/11/09 x3

Quick Reply

Enter both words below, separated by a space:

Can't read the text? Click here

Submit

vendion Gear
Captain

PostPosted: Thu Jun 11, 2009 7:17 am


Mandriva system library (perl-MDK-Common) was not handling configuration files that had '#' character inside parameters correctly. This update fixes the issue.

_______________________________________________________________________

Mandriva Linux Advisory MDVA-2009:096
http://www.mandriva.com/security/
_______________________________________________________________________

Package : perl-MDK-Common
Date : June 10, 2009
Affected: 2008.1, 2009.0, 2009.1
_______________________________________________________________________

Problem Description:

Mandriva system library (perl-MDK-Common) was not handling
configuration files that had '#' character inside parameters
correctly. This update fixes the issue.
_______________________________________________________________________

References:

https://qa.mandriva.com/50670
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2008.1:
41ab2ae25935fe2933acc31b3539dd2d 2008.1/i586/perl-MDK-Common-1.2.12-2.1mdv2008.1.noarch.rpm
97c1f00dd65261bb5813f504e54c0b50 2008.1/SRPMS/perl-MDK-Common-1.2.12-2.1mdv2008.1.src.rpm

Mandriva Linux 2008.1/X86_64:
a1a446aa42b19fb54a8f4265b182dff4 2008.1/x86_64/perl-MDK-Common-1.2.12-2.1mdv2008.1.noarch.rpm
97c1f00dd65261bb5813f504e54c0b50 2008.1/SRPMS/perl-MDK-Common-1.2.12-2.1mdv2008.1.src.rpm

Mandriva Linux 2009.0:
ed31786c8963677d129cfb3a041ff9f9 2009.0/i586/perl-MDK-Common-1.2.14-2.1mdv2009.0.noarch.rpm
634f32f0a3c0bec5c5e298e0a9693943 2009.0/SRPMS/perl-MDK-Common-1.2.14-2.1mdv2009.0.src.rpm

Mandriva Linux 2009.0/X86_64:
89a58bce47cdc1b0e25a41f47253b6ae 2009.0/x86_64/perl-MDK-Common-1.2.14-2.1mdv2009.0.noarch.rpm
634f32f0a3c0bec5c5e298e0a9693943 2009.0/SRPMS/perl-MDK-Common-1.2.14-2.1mdv2009.0.src.rpm

Mandriva Linux 2009.1:
d6761296508d185ee0ddbf5f6d6d2c4a 2009.1/i586/perl-MDK-Common-1.2.18-2.1mdv2009.1.noarch.rpm
bc0e8a17ddb7986dee2a1c9069c6dafa 2009.1/SRPMS/perl-MDK-Common-1.2.18-2.1mdv2009.1.src.rpm

Mandriva Linux 2009.1/X86_64:
88f84df0c4c68c69ba815a9badf71664 2009.1/x86_64/perl-MDK-Common-1.2.18-2.1mdv2009.1.noarch.rpm
bc0e8a17ddb7986dee2a1c9069c6dafa 2009.1/SRPMS/perl-MDK-Common-1.2.18-2.1mdv2009.1.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
PostPosted: Thu Jun 11, 2009 7:18 am


This bugfix update to drakx-net fixes a number of issues: - wireless passwords with '#' character were not properly handled (bug #50670) - wireless connection settings were not preserved for different connections (bug #46010)

_______________________________________________________________________

Mandriva Linux Advisory MDVA-2009:098
http://www.mandriva.com/security/
_______________________________________________________________________

Package : drakx-net
Date : June 10, 2009
Affected: 2009.0
_______________________________________________________________________

Problem Description:

This bugfix update to drakx-net fixes a number of issues:
- wireless passwords with '#' character were not properly handled
(bug #50670)
- wireless connection settings were not preserved for different
connections (bug #46010)
_______________________________________________________________________

References:

https://qa.mandriva.com/50670
https://qa.mandriva.com/46010
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2009.0:
acbbde4fae3c011f07a3153a2666a9c6 2009.0/i586/drakx-net-0.54.6-1.3mdv2009.0.noarch.rpm
714511b41dd6c8980e057223818f66b0 2009.0/i586/drakx-net-text-0.54.6-1.3mdv2009.0.noarch.rpm
680683e9b86df3b00617bcc8ca967290 2009.0/i586/libdrakx-net-0.54.6-1.3mdv2009.0.noarch.rpm
065c8672e481e04a1550226879c55bfa 2009.0/SRPMS/drakx-net-0.54.6-1.3mdv2009.0.src.rpm

Mandriva Linux 2009.0/X86_64:
3214e5efda6ab4bc1808adcfc6a143e7 2009.0/x86_64/drakx-net-0.54.6-1.3mdv2009.0.noarch.rpm
796ee5e6d3faa12f3853388e926420bf 2009.0/x86_64/drakx-net-text-0.54.6-1.3mdv2009.0.noarch.rpm
7325d88714a93df88042bf5df770fd03 2009.0/x86_64/libdrakx-net-0.54.6-1.3mdv2009.0.noarch.rpm
065c8672e481e04a1550226879c55bfa 2009.0/SRPMS/drakx-net-0.54.6-1.3mdv2009.0.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team

vendion Gear
Captain


vendion Gear
Captain

PostPosted: Thu Jun 11, 2009 7:19 am


This bugfix release makes it possible to pass additional options to the ntpdate utility and for the releases lacking it the ntpd server by utilizing the /etc/sysconfig/ntpd file while starting the ntp service.

_______________________________________________________________________

Mandriva Linux Advisory MDVA-2009:099
http://www.mandriva.com/security/
_______________________________________________________________________

Package : ntp
Date : June 10, 2009
Affected: 2008.1, 2009.0, 2009.1, Corporate 4.0
_______________________________________________________________________

Problem Description:

This bugfix release makes it possible to pass additional options to
the ntpdate utility and for the releases lacking it the ntpd server by
utilizing the /etc/sysconfig/ntpd file while starting the ntp service.
_______________________________________________________________________

References:

https://qa.mandriva.com/51393
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2008.1:
acb476d765ed420b2e18da6de1a0651b 2008.1/i586/ntp-4.2.4-15.4mdv2008.1.i586.rpm
08919c4955daa1efd0339bff992746e5 2008.1/i586/ntp-client-4.2.4-15.4mdv2008.1.i586.rpm
62a7d0a2fab98da0087b435f70047993 2008.1/i586/ntp-doc-4.2.4-15.4mdv2008.1.i586.rpm
78759307a0594b03b2d8d3ee9031db72 2008.1/SRPMS/ntp-4.2.4-15.4mdv2008.1.src.rpm

Mandriva Linux 2008.1/X86_64:
2a3ad574d308c486200ec899681a1a5f 2008.1/x86_64/ntp-4.2.4-15.4mdv2008.1.x86_64.rpm
cd3f0f24a277f4e3ff8bfc55559140f9 2008.1/x86_64/ntp-client-4.2.4-15.4mdv2008.1.x86_64.rpm
b7401dbb2659688b265f2cbb3a3cb211 2008.1/x86_64/ntp-doc-4.2.4-15.4mdv2008.1.x86_64.rpm
78759307a0594b03b2d8d3ee9031db72 2008.1/SRPMS/ntp-4.2.4-15.4mdv2008.1.src.rpm

Mandriva Linux 2009.0:
d44b09bff83abd7678f05a67f524a201 2009.0/i586/ntp-4.2.4-18.4mdv2009.0.i586.rpm
2995aad8ad2a4c6c3d4cf2239e63c91a 2009.0/i586/ntp-client-4.2.4-18.4mdv2009.0.i586.rpm
1395e189699cbfe9c340efa9b1445fdf 2009.0/i586/ntp-doc-4.2.4-18.4mdv2009.0.i586.rpm
c7a6efc181c2d0da6c1e94301682bb5b 2009.0/SRPMS/ntp-4.2.4-18.4mdv2009.0.src.rpm

Mandriva Linux 2009.0/X86_64:
785c5db1fcbb3d2f1990547dfaaf1b0d 2009.0/x86_64/ntp-4.2.4-18.4mdv2009.0.x86_64.rpm
e877e68aef57b4d44d5cde7242c9f2f0 2009.0/x86_64/ntp-client-4.2.4-18.4mdv2009.0.x86_64.rpm
e9b5113214ea9a145d73d93235645a8e 2009.0/x86_64/ntp-doc-4.2.4-18.4mdv2009.0.x86_64.rpm
c7a6efc181c2d0da6c1e94301682bb5b 2009.0/SRPMS/ntp-4.2.4-18.4mdv2009.0.src.rpm

Mandriva Linux 2009.1:
9a11316abcfdeffb12451da25330b450 2009.1/i586/ntp-4.2.4-22.2mdv2009.1.i586.rpm
a8e80df41c833ebc3baea99d16490dde 2009.1/i586/ntp-client-4.2.4-22.2mdv2009.1.i586.rpm
7e43113d9149045e912a77959e204945 2009.1/i586/ntp-doc-4.2.4-22.2mdv2009.1.i586.rpm
43732f00e7a3c9a311195d92d72a1338 2009.1/SRPMS/ntp-4.2.4-22.2mdv2009.1.src.rpm

Mandriva Linux 2009.1/X86_64:
7ab3dba4af6849db81cb61fd49ce3834 2009.1/x86_64/ntp-4.2.4-22.2mdv2009.1.x86_64.rpm
f2747fcfbb58d17ba0d33735b7526fa2 2009.1/x86_64/ntp-client-4.2.4-22.2mdv2009.1.x86_64.rpm
3bb60deccf8f8c36aea2c7dab1dbf241 2009.1/x86_64/ntp-doc-4.2.4-22.2mdv2009.1.x86_64.rpm
43732f00e7a3c9a311195d92d72a1338 2009.1/SRPMS/ntp-4.2.4-22.2mdv2009.1.src.rpm

Corporate 4.0:
8a3dc65e3a8118cca56d78db732c0c45 corporate/4.0/i586/ntp-4.2.0-21.6.20060mlcs4.i586.rpm
4d477a5fa8bd656abe3849706a2e2f50 corporate/4.0/i586/ntp-client-4.2.0-21.6.20060mlcs4.i586.rpm
63a2e9803be191b6bc55320c18b1f94e corporate/4.0/SRPMS/ntp-4.2.0-21.6.20060mlcs4.src.rpm

Corporate 4.0/X86_64:
4a7b55ea436784762e1f578b7ef7bd2a corporate/4.0/x86_64/ntp-4.2.0-21.6.20060mlcs4.x86_64.rpm
613d76f621e638e382a863de66c2f04c corporate/4.0/x86_64/ntp-client-4.2.0-21.6.20060mlcs4.x86_64.rpm
63a2e9803be191b6bc55320c18b1f94e corporate/4.0/SRPMS/ntp-4.2.0-21.6.20060mlcs4.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
Reply
Linux Security, keeping you on top of the bugs!

 
Manage Your Items
Other Stuff
Get GCash
Offers
Get Items
More Items
Where Everyone Hangs Out
Other Community Areas
Virtual Spaces
Fun Stuff
Gaia's Games
Mini-Games
Play with GCash
Play with Platinum