news 28 Posted January 12, 2010 This is a multi-part message in MIME format... ------------=_1263259648-24326-3344 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Advisory MDVA-2010:018 http://www.mandriva.com/security/ _______________________________________________________________________ Package : fetchmail Date : January 11, 2010 Affected: 2010.0 _______________________________________________________________________ Problem Description: A regression was discovered in fetchmail 6.3.12 The multiline SMTP error fix in release 6.3.12 caused fetchmail to lose message codes 400..599 and treat all of these as temporary error. This would cause messages to be left on the server even if softbounce was turned off. Reported by Thomas Jarosch. This update provides fetchmail 6.3.13, which addresses this problem. _______________________________________________________________________ References: https://qa.mandriva.com/55584 _______________________________________________________________________ Updated Packages: Mandriva Linux 2010.0: dd10d6cc8b0cc80aa04e5b5eb3fc31ee 2010.0/i586/fetchmail-6.3.13-1.1mdv2010.0.i586.rpm 41e62bd08ba00819e60daeb321c5b87b 2010.0/i586/fetchmailconf-6.3.13-1.1mdv2010.0.i586.rpm 2fca427d4ae87802872e6f7466617f8b 2010.0/i586/fetchmail-daemon-6.3.13-1.1mdv2010.0.i586.rpm 63cf3655a29c71d36f2993aceb53dbfc 2010.0/SRPMS/fetchmail-6.3.13-1.1mdv2010.0.src.rpm Mandriva Linux 2010.0/X86_64: 8fe7bc9636fae329392e074adf736272 2010.0/x86_64/fetchmail-6.3.13-1.1mdv2010.0.x86_64.rpm 00f5f08a4f7cc8d5c122af87e63459da 2010.0/x86_64/fetchmailconf-6.3.13-1.1mdv2010.0.x86_64.rpm 7bcf3e708d3202a4eaf75dc2386ce96d 2010.0/x86_64/fetchmail-daemon-6.3.13-1.1mdv2010.0.x86_64.rpm 63cf3655a29c71d36f2993aceb53dbfc 2010.0/SRPMS/fetchmail-6.3.13-1.1mdv2010.0.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFLS6VFmqjQ0CJFipgRApKbAJ9b3KprZvZ9L3kQTPYy+VOcM59OpACg44DH 0bsUR5DYuJWb0iwVM6nQJLg= =IKiD -----END PGP SIGNATURE----- ------------=_1263259648-24326-3344 Content-Type: text/plain; name="message-footer.txt" Content-Disposition: inline; filename="message-footer.txt" Content-Transfer-Encoding: 8bit To unsubscribe, send a email to sympa ( -at -) mandrivalinux.org with this subject : unsubscribe security-announce _______________________________________________________ Want to buy your Pack or Services from Mandriva? Go to http://www.mandrivastore.com Join the Club : http://www.mandrivaclub.com _______________________________________________________ ------------=_1263259648-24326-3344-- Share this post Link to post