Mandriva 1273 Published by

An updated mdkonline package has been released for Mandrakelinux
_______________________________________________________________________

Mandrakelinux Update Advisory
_______________________________________________________________________

Package name: mdkonline
Advisory ID: MDKA-2005:006
Date: January 27th, 2005

Affected versions: 10.0, 10.1, Corporate Server 3.0
______________________________________________________________________

Problem Description:

A permissions flaw was found on /etc/sysconfig/mdkonline which prevented users from reading the file. This has been fixed in the updated packages. Better x86_64 support has also been added, as well as other minor fixes.



______________________________________________________________________

Updated Packages:

Mandrakelinux 10.0:
bcf47a2353b0d02c452752a778ac1055 10.0/RPMS/mdkonline-1.1-27.1.100mdk.noarch.rpm
c6856f4dcfe2bd39a0204c8c48f5a5c0 10.0/SRPMS/mdkonline-1.1-27.1.100mdk.src.rpm

Mandrakelinux 10.0/AMD64:
bcf47a2353b0d02c452752a778ac1055 amd64/10.0/RPMS/mdkonline-1.1-27.1.100mdk.noarch.rpm
c6856f4dcfe2bd39a0204c8c48f5a5c0 amd64/10.0/SRPMS/mdkonline-1.1-27.1.100mdk.src.rpm

Mandrakelinux 10.1:
b7002d97f2b9c03bc19b0380d1555aee 10.1/RPMS/mdkonline-1.1-27.1.101mdk.noarch.rpm
1393b80cc0fd3be75298f49efb917913 10.1/SRPMS/mdkonline-1.1-27.1.101mdk.src.rpm

Mandrakelinux 10.1/X86_64:
b7002d97f2b9c03bc19b0380d1555aee x86_64/10.1/RPMS/mdkonline-1.1-27.1.101mdk.noarch.rpm
1393b80cc0fd3be75298f49efb917913 x86_64/10.1/SRPMS/mdkonline-1.1-27.1.101mdk.src.rpm

Corporate Server 3.0:
b6a9fa2d26fa60d5c19907c9fc9e9315 corporate/3.0/RPMS/mdkonline-1.1-27.1.C30mdk.noarch.rpm
8a4dfbed3ae8e4d3ca4788e254c31f28 corporate/3.0/SRPMS/mdkonline-1.1-27.1.C30mdk.src.rpm

Corporate Server 3.0/x86_64:
b6a9fa2d26fa60d5c19907c9fc9e9315 x86_64/corporate/3.0/RPMS/mdkonline-1.1-27.1.C30mdk.noarch.rpm
8a4dfbed3ae8e4d3ca4788e254c31f28 x86_64/corporate/3.0/SRPMS/mdkonline-1.1-27.1.C30mdk.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandrakesoft for security. You can obtain the GPG public key of the Mandrakelinux Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandrakelinux at:

http://www.mandrakesoft.com/security/advisories

If you want to report vulnerabilities, please contact

security_linux-mandrake.com