Updated g-wrap packages are available for Mandrakelinux 10.1/x86_64
_______________________________________________________________________
Mandrakelinux Update Advisory
_______________________________________________________________________
Package name: g-wrap
Advisory ID: MDKA-2005:001
Date: January 10th, 2005
Affected versions: 10.1
______________________________________________________________________
Problem Description:
A compilation error in g-wrap prevented gnucash from running on Mandrakelinux 10.1/x86_64. The updated packages correct the problem.
______________________________________________________________________
Updated Packages:
Mandrakelinux 10.1/X86_64:
602291318a2b9231c5e5e24ee80908df x86_64/10.1/RPMS/g-wrap-1.3.4-10.2.101mdk.x86_64.rpm
67575deb636e3411b7c6fecb2f0af404 x86_64/10.1/RPMS/lib64g-wrap1-1.3.4-10.2.101mdk.x86_64.rpm
c58a376149012a80808a9b4264d23bff x86_64/10.1/RPMS/lib64g-wrap1-devel-1.3.4-10.2.101mdk.x86_64.rpm
b9688a1fdf261946afee90c44d57c4b0 x86_64/10.1/SRPMS/g-wrap-1.3.4-10.2.101mdk.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandrakesoft for security. You can obtain the GPG public key of the Mandrakelinux Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandrakelinux at:
http://www.mandrakesoft.com/security/advisories
If you want to report vulnerabilities, please contact
security_linux-mandrake.com
_______________________________________________________________________
Mandrakelinux Update Advisory
_______________________________________________________________________
Package name: g-wrap
Advisory ID: MDKA-2005:001
Date: January 10th, 2005
Affected versions: 10.1
______________________________________________________________________
Problem Description:
A compilation error in g-wrap prevented gnucash from running on Mandrakelinux 10.1/x86_64. The updated packages correct the problem.
______________________________________________________________________
Updated Packages:
Mandrakelinux 10.1/X86_64:
602291318a2b9231c5e5e24ee80908df x86_64/10.1/RPMS/g-wrap-1.3.4-10.2.101mdk.x86_64.rpm
67575deb636e3411b7c6fecb2f0af404 x86_64/10.1/RPMS/lib64g-wrap1-1.3.4-10.2.101mdk.x86_64.rpm
c58a376149012a80808a9b4264d23bff x86_64/10.1/RPMS/lib64g-wrap1-devel-1.3.4-10.2.101mdk.x86_64.rpm
b9688a1fdf261946afee90c44d57c4b0 x86_64/10.1/SRPMS/g-wrap-1.3.4-10.2.101mdk.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandrakesoft for security. You can obtain the GPG public key of the Mandrakelinux Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandrakelinux at:
http://www.mandrakesoft.com/security/advisories
If you want to report vulnerabilities, please contact
security_linux-mandrake.com