An updated mdkonline package has been released for Mandrakelinux
_______________________________________________________________________
Mandrakelinux Update Advisory
_______________________________________________________________________
Package name: mdkonline
Advisory ID: MDKA-2005:006
Date: January 27th, 2005
Affected versions: 10.0, 10.1, Corporate Server 3.0
______________________________________________________________________
Problem Description:
A permissions flaw was found on /etc/sysconfig/mdkonline which prevented users from reading the file. This has been fixed in the updated packages. Better x86_64 support has also been added, as well as other minor fixes.
______________________________________________________________________
Updated Packages:
Mandrakelinux 10.0:
bcf47a2353b0d02c452752a778ac1055 10.0/RPMS/mdkonline-1.1-27.1.100mdk.noarch.rpm
c6856f4dcfe2bd39a0204c8c48f5a5c0 10.0/SRPMS/mdkonline-1.1-27.1.100mdk.src.rpm
Mandrakelinux 10.0/AMD64:
bcf47a2353b0d02c452752a778ac1055 amd64/10.0/RPMS/mdkonline-1.1-27.1.100mdk.noarch.rpm
c6856f4dcfe2bd39a0204c8c48f5a5c0 amd64/10.0/SRPMS/mdkonline-1.1-27.1.100mdk.src.rpm
Mandrakelinux 10.1:
b7002d97f2b9c03bc19b0380d1555aee 10.1/RPMS/mdkonline-1.1-27.1.101mdk.noarch.rpm
1393b80cc0fd3be75298f49efb917913 10.1/SRPMS/mdkonline-1.1-27.1.101mdk.src.rpm
Mandrakelinux 10.1/X86_64:
b7002d97f2b9c03bc19b0380d1555aee x86_64/10.1/RPMS/mdkonline-1.1-27.1.101mdk.noarch.rpm
1393b80cc0fd3be75298f49efb917913 x86_64/10.1/SRPMS/mdkonline-1.1-27.1.101mdk.src.rpm
Corporate Server 3.0:
b6a9fa2d26fa60d5c19907c9fc9e9315 corporate/3.0/RPMS/mdkonline-1.1-27.1.C30mdk.noarch.rpm
8a4dfbed3ae8e4d3ca4788e254c31f28 corporate/3.0/SRPMS/mdkonline-1.1-27.1.C30mdk.src.rpm
Corporate Server 3.0/x86_64:
b6a9fa2d26fa60d5c19907c9fc9e9315 x86_64/corporate/3.0/RPMS/mdkonline-1.1-27.1.C30mdk.noarch.rpm
8a4dfbed3ae8e4d3ca4788e254c31f28 x86_64/corporate/3.0/SRPMS/mdkonline-1.1-27.1.C30mdk.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandrakesoft for security. You can obtain the GPG public key of the Mandrakelinux Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandrakelinux at:
http://www.mandrakesoft.com/security/advisories
If you want to report vulnerabilities, please contact
security_linux-mandrake.com
_______________________________________________________________________
Mandrakelinux Update Advisory
_______________________________________________________________________
Package name: mdkonline
Advisory ID: MDKA-2005:006
Date: January 27th, 2005
Affected versions: 10.0, 10.1, Corporate Server 3.0
______________________________________________________________________
Problem Description:
A permissions flaw was found on /etc/sysconfig/mdkonline which prevented users from reading the file. This has been fixed in the updated packages. Better x86_64 support has also been added, as well as other minor fixes.
______________________________________________________________________
Updated Packages:
Mandrakelinux 10.0:
bcf47a2353b0d02c452752a778ac1055 10.0/RPMS/mdkonline-1.1-27.1.100mdk.noarch.rpm
c6856f4dcfe2bd39a0204c8c48f5a5c0 10.0/SRPMS/mdkonline-1.1-27.1.100mdk.src.rpm
Mandrakelinux 10.0/AMD64:
bcf47a2353b0d02c452752a778ac1055 amd64/10.0/RPMS/mdkonline-1.1-27.1.100mdk.noarch.rpm
c6856f4dcfe2bd39a0204c8c48f5a5c0 amd64/10.0/SRPMS/mdkonline-1.1-27.1.100mdk.src.rpm
Mandrakelinux 10.1:
b7002d97f2b9c03bc19b0380d1555aee 10.1/RPMS/mdkonline-1.1-27.1.101mdk.noarch.rpm
1393b80cc0fd3be75298f49efb917913 10.1/SRPMS/mdkonline-1.1-27.1.101mdk.src.rpm
Mandrakelinux 10.1/X86_64:
b7002d97f2b9c03bc19b0380d1555aee x86_64/10.1/RPMS/mdkonline-1.1-27.1.101mdk.noarch.rpm
1393b80cc0fd3be75298f49efb917913 x86_64/10.1/SRPMS/mdkonline-1.1-27.1.101mdk.src.rpm
Corporate Server 3.0:
b6a9fa2d26fa60d5c19907c9fc9e9315 corporate/3.0/RPMS/mdkonline-1.1-27.1.C30mdk.noarch.rpm
8a4dfbed3ae8e4d3ca4788e254c31f28 corporate/3.0/SRPMS/mdkonline-1.1-27.1.C30mdk.src.rpm
Corporate Server 3.0/x86_64:
b6a9fa2d26fa60d5c19907c9fc9e9315 x86_64/corporate/3.0/RPMS/mdkonline-1.1-27.1.C30mdk.noarch.rpm
8a4dfbed3ae8e4d3ca4788e254c31f28 x86_64/corporate/3.0/SRPMS/mdkonline-1.1-27.1.C30mdk.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandrakesoft for security. You can obtain the GPG public key of the Mandrakelinux Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandrakelinux at:
http://www.mandrakesoft.com/security/advisories
If you want to report vulnerabilities, please contact
security_linux-mandrake.com