Updated drakxtools packages are available for Mandriva Linux
_______________________________________________________________________
Mandriva Linux Update Advisory
_______________________________________________________________________
Package name: drakxtools
Advisory ID: MDKA-2005:025
Date: May 16th, 2005
Affected versions: 10.2
______________________________________________________________________
Problem Description:
Three hardware-related bugs were discovered in the drakxtools package:
A test to determine if there was at least one PCMCIA controller was flawed and resulted in disabling PCMCIA support on each boot.
While probing for extra PCI serial controllers, all serial drivers were mistakenly loaded rather than just the serial drivers related to the PCI cards installed in the computer.
Finally, harddrake now detects SATA and RAID controllers (both SATA and SCSI) in their own category. This makes it so that hwdb will not fill the IDE category with SATA controllers.
The updated packages correct these issues.
______________________________________________________________________
Updated Packages:
Mandrakelinux 10.2:
ce079093707c0e0095ed9a3cb56b1ca4 10.2/RPMS/drakx-finish-install-10.2-24.2.102mdk.i586.rpm
732ac9067106abc43fa3f65be1865fd9 10.2/RPMS/drakxtools-10.2-24.2.102mdk.i586.rpm
8b0f972721968813eb7b2746f8695474 10.2/RPMS/drakxtools-backend-10.2-24.2.102mdk.i586.rpm
a25a6129f0c4ffd200e34d27ed47a5d2 10.2/RPMS/drakxtools-http-10.2-24.2.102mdk.i586.rpm
c3b08fa931edf74b247acd3407436ce8 10.2/RPMS/drakxtools-newt-10.2-24.2.102mdk.i586.rpm
0ab96b28281cfec785f99461970ba075 10.2/RPMS/harddrake-10.2-24.2.102mdk.i586.rpm
c632fb99d76832eeca72a5886015fca8 10.2/RPMS/harddrake-ui-10.2-24.2.102mdk.i586.rpm
86de857463e65fbd23a06998633a011d 10.2/SRPMS/drakxtools-10.2-24.2.102mdk.src.rpm
Mandrakelinux 10.2/X86_64:
2a35c061cc6561583e4788c418942ffb x86_64/10.2/RPMS/drakx-finish-install-10.2-24.2.102mdk.x86_64.rpm
a9ffa91c7a3fdcf87f5d12b975a2a682 x86_64/10.2/RPMS/drakxtools-10.2-24.2.102mdk.x86_64.rpm
b57f2e74caf3c5192a569e96beedfdc8 x86_64/10.2/RPMS/drakxtools-backend-10.2-24.2.102mdk.x86_64.rpm
0d4b3eaf1433d728cbdd73411ade1931 x86_64/10.2/RPMS/drakxtools-http-10.2-24.2.102mdk.x86_64.rpm
a41774b325fcef5854767fc399eaa738 x86_64/10.2/RPMS/drakxtools-newt-10.2-24.2.102mdk.x86_64.rpm
6f0f3aeb1093b65a807a80a2e3159d66 x86_64/10.2/RPMS/harddrake-10.2-24.2.102mdk.x86_64.rpm
bb0c73db365b3670741a9519293c37e8 x86_64/10.2/RPMS/harddrake-ui-10.2-24.2.102mdk.x86_64.rpm
86de857463e65fbd23a06998633a011d x86_64/10.2/SRPMS/drakxtools-10.2-24.2.102mdk.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Mandriva Linux Update Advisory
_______________________________________________________________________
Package name: drakxtools
Advisory ID: MDKA-2005:025
Date: May 16th, 2005
Affected versions: 10.2
______________________________________________________________________
Problem Description:
Three hardware-related bugs were discovered in the drakxtools package:
A test to determine if there was at least one PCMCIA controller was flawed and resulted in disabling PCMCIA support on each boot.
While probing for extra PCI serial controllers, all serial drivers were mistakenly loaded rather than just the serial drivers related to the PCI cards installed in the computer.
Finally, harddrake now detects SATA and RAID controllers (both SATA and SCSI) in their own category. This makes it so that hwdb will not fill the IDE category with SATA controllers.
The updated packages correct these issues.
______________________________________________________________________
Updated Packages:
Mandrakelinux 10.2:
ce079093707c0e0095ed9a3cb56b1ca4 10.2/RPMS/drakx-finish-install-10.2-24.2.102mdk.i586.rpm
732ac9067106abc43fa3f65be1865fd9 10.2/RPMS/drakxtools-10.2-24.2.102mdk.i586.rpm
8b0f972721968813eb7b2746f8695474 10.2/RPMS/drakxtools-backend-10.2-24.2.102mdk.i586.rpm
a25a6129f0c4ffd200e34d27ed47a5d2 10.2/RPMS/drakxtools-http-10.2-24.2.102mdk.i586.rpm
c3b08fa931edf74b247acd3407436ce8 10.2/RPMS/drakxtools-newt-10.2-24.2.102mdk.i586.rpm
0ab96b28281cfec785f99461970ba075 10.2/RPMS/harddrake-10.2-24.2.102mdk.i586.rpm
c632fb99d76832eeca72a5886015fca8 10.2/RPMS/harddrake-ui-10.2-24.2.102mdk.i586.rpm
86de857463e65fbd23a06998633a011d 10.2/SRPMS/drakxtools-10.2-24.2.102mdk.src.rpm
Mandrakelinux 10.2/X86_64:
2a35c061cc6561583e4788c418942ffb x86_64/10.2/RPMS/drakx-finish-install-10.2-24.2.102mdk.x86_64.rpm
a9ffa91c7a3fdcf87f5d12b975a2a682 x86_64/10.2/RPMS/drakxtools-10.2-24.2.102mdk.x86_64.rpm
b57f2e74caf3c5192a569e96beedfdc8 x86_64/10.2/RPMS/drakxtools-backend-10.2-24.2.102mdk.x86_64.rpm
0d4b3eaf1433d728cbdd73411ade1931 x86_64/10.2/RPMS/drakxtools-http-10.2-24.2.102mdk.x86_64.rpm
a41774b325fcef5854767fc399eaa738 x86_64/10.2/RPMS/drakxtools-newt-10.2-24.2.102mdk.x86_64.rpm
6f0f3aeb1093b65a807a80a2e3159d66 x86_64/10.2/RPMS/harddrake-10.2-24.2.102mdk.x86_64.rpm
bb0c73db365b3670741a9519293c37e8 x86_64/10.2/RPMS/harddrake-ui-10.2-24.2.102mdk.x86_64.rpm
86de857463e65fbd23a06998633a011d x86_64/10.2/SRPMS/drakxtools-10.2-24.2.102mdk.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com