news 28 Posted January 27, 2010 This is a multi-part message in MIME format... ------------=_1264618288-24326-3826 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Advisory MDVA-2010:045 http://www.mandriva.com/security/ _______________________________________________________________________ Package : urpmi Date : January 27, 2010 Affected: 2008.0, 2009.0, 2009.1, Enterprise Server 5.0 _______________________________________________________________________ Problem Description: There was a small typo in the french translation. The update packages addresses this issue. _______________________________________________________________________ References: https://qa.mandriva.com/51377 _______________________________________________________________________ Updated Packages: Mandriva Linux 2008.0: 3efd41222ffd5c6d4c64fe6d41e5c568 2008.0/i586/gurpmi-4.10.14.2-1.2mdv2008.0.noarch.rpm e1b81e1728ebf62e8f9ec4a526a864a3 2008.0/i586/urpmi-4.10.14.2-1.2mdv2008.0.noarch.rpm 41c0196625bceea0c9a0d1ddbec64909 2008.0/i586/urpmi-ldap-4.10.14.2-1.2mdv2008.0.noarch.rpm 545d1952a0cd132d7bf37ea6f22273c4 2008.0/i586/urpmi-parallel-ka-run-4.10.14.2-1.2mdv2008.0.noarch.rpm ebe6b027d178f0c8a6c2d52c133443ca 2008.0/i586/urpmi-parallel-ssh-4.10.14.2-1.2mdv2008.0.noarch.rpm bc95bf86bc46064be8f0361bcafed041 2008.0/i586/urpmi-recover-4.10.14.2-1.2mdv2008.0.noarch.rpm b96fc71199f33923195a42286e8cbc71 2008.0/SRPMS/urpmi-4.10.14.2-1.2mdv2008.0.src.rpm Mandriva Linux 2008.0/X86_64: 4faae92fc321e81e6388ddb146813761 2008.0/x86_64/gurpmi-4.10.14.2-1.2mdv2008.0.noarch.rpm 8eee49a3430c1f0d87473708b729b532 2008.0/x86_64/urpmi-4.10.14.2-1.2mdv2008.0.noarch.rpm 8006ffd4670dea0a1c2fcb7d9eeecf83 2008.0/x86_64/urpmi-ldap-4.10.14.2-1.2mdv2008.0.noarch.rpm fcb2d28f382ca97b38aeee793db8697d 2008.0/x86_64/urpmi-parallel-ka-run-4.10.14.2-1.2mdv2008.0.noarch.rpm 9e822d6c50cfcd7d8d273324ba62bbc1 2008.0/x86_64/urpmi-parallel-ssh-4.10.14.2-1.2mdv2008.0.noarch.rpm 070ea16f5b33ec4b89ab3382f04efc95 2008.0/x86_64/urpmi-recover-4.10.14.2-1.2mdv2008.0.noarch.rpm b96fc71199f33923195a42286e8cbc71 2008.0/SRPMS/urpmi-4.10.14.2-1.2mdv2008.0.src.rpm Mandriva Linux 2009.0: def95bcb10ecf58900b4e573c4f45937 2009.0/i586/gurpmi-6.14.15-1.3mdv2009.0.noarch.rpm 64966eaf61b891200442953b7f56eb34 2009.0/i586/urpmi-6.14.15-1.3mdv2009.0.noarch.rpm 7656243477c951cf2d76163f38cb918d 2009.0/i586/urpmi-ldap-6.14.15-1.3mdv2009.0.noarch.rpm 917b573c2163bc870c052aefb363b7ef 2009.0/i586/urpmi-parallel-ka-run-6.14.15-1.3mdv2009.0.noarch.rpm d883496e2e460d26fb9289a2d29249d2 2009.0/i586/urpmi-parallel-ssh-6.14.15-1.3mdv2009.0.noarch.rpm 651e92f11d81d37ae01307465dc1bc97 2009.0/i586/urpmi-recover-6.14.15-1.3mdv2009.0.noarch.rpm 3c9b1a16d84440d3715851b56ce2ff71 2009.0/SRPMS/urpmi-6.14.15-1.3mdv2009.0.src.rpm Mandriva Linux 2009.0/X86_64: d87c11a94768e886a8433c30d21afab5 2009.0/x86_64/gurpmi-6.14.15-1.3mdv2009.0.noarch.rpm 69bf8cc96967c50813748d66832ab7f4 2009.0/x86_64/urpmi-6.14.15-1.3mdv2009.0.noarch.rpm 235159eaeb0378b0586a5c06af93729e 2009.0/x86_64/urpmi-ldap-6.14.15-1.3mdv2009.0.noarch.rpm 082026254bf59a1d8178b76882373d55 2009.0/x86_64/urpmi-parallel-ka-run-6.14.15-1.3mdv2009.0.noarch.rpm 1144aef5df0939297c28609409eccfdc 2009.0/x86_64/urpmi-parallel-ssh-6.14.15-1.3mdv2009.0.noarch.rpm a345eff75fa9454a794bc18bbaeb5f23 2009.0/x86_64/urpmi-recover-6.14.15-1.3mdv2009.0.noarch.rpm 3c9b1a16d84440d3715851b56ce2ff71 2009.0/SRPMS/urpmi-6.14.15-1.3mdv2009.0.src.rpm Mandriva Linux 2009.1: c50a72ea0bc9391511e5c68f2f63999f 2009.1/i586/gurpmi-6.25.6-1.2mdv2009.1.noarch.rpm 7b936f44bac0433ae5fd8f161a37b132 2009.1/i586/urpmi-6.25.6-1.2mdv2009.1.noarch.rpm 895e10d2e0bc8059e3488ae1c8c0dddf 2009.1/i586/urpmi-ldap-6.25.6-1.2mdv2009.1.noarch.rpm 8bea19040a95c7ad30fb08405579c90c 2009.1/i586/urpmi-parallel-ka-run-6.25.6-1.2mdv2009.1.noarch.rpm dbaad4a3216614d3c9adb506b1cdcaf2 2009.1/i586/urpmi-parallel-ssh-6.25.6-1.2mdv2009.1.noarch.rpm 4c932228cbb08008eb9aab6639aa4305 2009.1/SRPMS/urpmi-6.25.6-1.2mdv2009.1.src.rpm Mandriva Linux 2009.1/X86_64: 7cc6b20811bf49d2d0bfe63dd52e5d29 2009.1/x86_64/gurpmi-6.25.6-1.2mdv2009.1.noarch.rpm fbec033e713c373ae0aaa57d177aba14 2009.1/x86_64/urpmi-6.25.6-1.2mdv2009.1.noarch.rpm fda962023f0804646d7c08b8afa52a6c 2009.1/x86_64/urpmi-ldap-6.25.6-1.2mdv2009.1.noarch.rpm f11c7d7eafe1356bf31edb1016ea6501 2009.1/x86_64/urpmi-parallel-ka-run-6.25.6-1.2mdv2009.1.noarch.rpm f089e8f490879480f5dc0968d3ab1414 2009.1/x86_64/urpmi-parallel-ssh-6.25.6-1.2mdv2009.1.noarch.rpm 4c932228cbb08008eb9aab6639aa4305 2009.1/SRPMS/urpmi-6.25.6-1.2mdv2009.1.src.rpm Mandriva Enterprise Server 5: f0e1969fc3627c52b68c74af1c203091 mes5/i586/gurpmi-6.14.15-1.3mdvmes5.noarch.rpm a0c5bef70c75b8cd1507a77ab9c9f2f3 mes5/i586/urpmi-6.14.15-1.3mdvmes5.noarch.rpm 6555401d5bacc55a30a19a0d7c1fcf0e mes5/i586/urpmi-ldap-6.14.15-1.3mdvmes5.noarch.rpm 439a6933676f9bde5a59dba561661f40 mes5/i586/urpmi-parallel-ka-run-6.14.15-1.3mdvmes5.noarch.rpm d84ffa88cdc74b1d5ca95cefdd2b0a54 mes5/i586/urpmi-parallel-ssh-6.14.15-1.3mdvmes5.noarch.rpm 8db5e65777e972b3a66212df98f4bb52 mes5/i586/urpmi-recover-6.14.15-1.3mdvmes5.noarch.rpm c9126d95ddc784c6d78ae26a9317ba49 mes5/SRPMS/urpmi-6.14.15-1.3mdvmes5.src.rpm Mandriva Enterprise Server 5/X86_64: 5a3b0cdc2f3ffb04cd42de1f8c668d5e mes5/x86_64/gurpmi-6.14.15-1.3mdvmes5.noarch.rpm 88704f9693b44f5c4a12eff12952cff1 mes5/x86_64/urpmi-6.14.15-1.3mdvmes5.noarch.rpm a4a570a21be3d3deaed6ff2fe93b3687 mes5/x86_64/urpmi-ldap-6.14.15-1.3mdvmes5.noarch.rpm 6165d4a80c2dfddff5bb50d254eb6e15 mes5/x86_64/urpmi-parallel-ka-run-6.14.15-1.3mdvmes5.noarch.rpm 78a0ac942ba021d0672d385b0cad0255 mes5/x86_64/urpmi-parallel-ssh-6.14.15-1.3mdvmes5.noarch.rpm cef5736d2550c3143fac5928e86173fd mes5/x86_64/urpmi-recover-6.14.15-1.3mdvmes5.noarch.rpm c9126d95ddc784c6d78ae26a9317ba49 mes5/SRPMS/urpmi-6.14.15-1.3mdvmes5.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFLYFwkmqjQ0CJFipgRAtZHAKCxkIYfBR5n4oKagF+xGMr29ncR1ACfQ2JZ E4pFzHt4CNE29TFABJO4CUQ= =+Z+O -----END PGP SIGNATURE----- ------------=_1264618288-24326-3826 Content-Type: text/plain; name="message-footer.txt" Content-Disposition: inline; filename="message-footer.txt" Content-Transfer-Encoding: 8bit To unsubscribe, send a email to sympa ( -at -) mandrivalinux.org with this subject : unsubscribe security-announce _______________________________________________________ Want to buy your Pack or Services from Mandriva? Go to http://www.mandrivastore.com Join the Club : http://www.mandrivaclub.com _______________________________________________________ ------------=_1264618288-24326-3826-- Share this post Link to post