news 28 Posted February 25, 2010 This is a multi-part message in MIME format... ------------=_1267136684-24326-5193 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Advisory MDVA-2010:082 http://www.mandriva.com/security/ _______________________________________________________________________ Package : drakxtools Date : February 25, 2010 Affected: 2009.0, Enterprise Server 5.0 _______________________________________________________________________ Problem Description: When LDAP authentication is configured using the drakauth application, it could result in several bogus error messages related to '/var/lib/misc/group.db: file not found'. This update fixes this issue. _______________________________________________________________________ References: https://qa.mandriva.com/57800 https://qa.mandriva.com/43062 _______________________________________________________________________ Updated Packages: Mandriva Linux 2009.0: 14a383856795a05b12cbcbc37c5b85da 2009.0/i586/drakx-finish-install-11.71.12-1.1mdv2009.0.i586.rpm 0cc486ae9c8f8e5390d3f981c4bc9107 2009.0/i586/drakxtools-11.71.12-1.1mdv2009.0.i586.rpm dfff72c3da11a877a2d5ddef23426594 2009.0/i586/drakxtools-backend-11.71.12-1.1mdv2009.0.i586.rpm c65674f65c86c180516b5be653aba43e 2009.0/i586/drakxtools-curses-11.71.12-1.1mdv2009.0.i586.rpm d67c502c517dc55f8a6c5a1b246a12ee 2009.0/i586/drakxtools-http-11.71.12-1.1mdv2009.0.i586.rpm 3e70b0393fcfae2cf63fa9ea5c405cde 2009.0/i586/harddrake-11.71.12-1.1mdv2009.0.i586.rpm f873ca69824d4561896476059a6a8993 2009.0/i586/harddrake-ui-11.71.12-1.1mdv2009.0.i586.rpm 3a2d7e04cda63a81157fb679ed2eda96 2009.0/SRPMS/drakxtools-11.71.12-1.1mdv2009.0.src.rpm Mandriva Linux 2009.0/X86_64: cee9501cc42e813dd2e3e9874495061c 2009.0/x86_64/drakx-finish-install-11.71.12-1.1mdv2009.0.x86_64.rpm b11cc8bb5998f5ab9f7cb01e671fcace 2009.0/x86_64/drakxtools-11.71.12-1.1mdv2009.0.x86_64.rpm 9e1ffd77a753b87a96dc6bb605f835c3 2009.0/x86_64/drakxtools-backend-11.71.12-1.1mdv2009.0.x86_64.rpm 118d4ce0a8ed736b2d6e9b3098e5f02d 2009.0/x86_64/drakxtools-curses-11.71.12-1.1mdv2009.0.x86_64.rpm 5d19b48995a5db23609b3e4521a69c14 2009.0/x86_64/drakxtools-http-11.71.12-1.1mdv2009.0.x86_64.rpm f50d6201f6c2069f8bc768588276905d 2009.0/x86_64/harddrake-11.71.12-1.1mdv2009.0.x86_64.rpm 1986a169695cdc808d60cca8729428b0 2009.0/x86_64/harddrake-ui-11.71.12-1.1mdv2009.0.x86_64.rpm 3a2d7e04cda63a81157fb679ed2eda96 2009.0/SRPMS/drakxtools-11.71.12-1.1mdv2009.0.src.rpm Mandriva Enterprise Server 5: 13dc9a01332bc99bc2c7bdd6b9e0ea99 mes5/i586/drakx-finish-install-11.71.12-1.1mdvmes5.i586.rpm 11e47fc7ac367026ba080afde3209f4b mes5/i586/drakxtools-11.71.12-1.1mdvmes5.i586.rpm 172c4e2f9c72435390f271d8b7468a6e mes5/i586/drakxtools-backend-11.71.12-1.1mdvmes5.i586.rpm c9db34218b548142893d1d6dd2e8cd8b mes5/i586/drakxtools-curses-11.71.12-1.1mdvmes5.i586.rpm c34e9faf4c73c456d7f788a72bd4bf51 mes5/i586/drakxtools-http-11.71.12-1.1mdvmes5.i586.rpm 7f59759153ad9ade6470c939a711965f mes5/i586/harddrake-11.71.12-1.1mdvmes5.i586.rpm 07d3b634e41931d18904ee720196b1bb mes5/i586/harddrake-ui-11.71.12-1.1mdvmes5.i586.rpm a4ce110ee8c0ff071dfd15465fb9a40f mes5/SRPMS/drakxtools-11.71.12-1.1mdvmes5.src.rpm Mandriva Enterprise Server 5/X86_64: abc11b34476b7fada9265a425781fe3f mes5/x86_64/drakx-finish-install-11.71.12-1.1mdvmes5.x86_64.rpm 2f5e8a6fb62b2c5934aa7910adeab958 mes5/x86_64/drakxtools-11.71.12-1.1mdvmes5.x86_64.rpm 64e8a4483fd0cdff9147204980d1946f mes5/x86_64/drakxtools-backend-11.71.12-1.1mdvmes5.x86_64.rpm eb7a79dcd14aad2e0aaa70097ffb4ee3 mes5/x86_64/drakxtools-curses-11.71.12-1.1mdvmes5.x86_64.rpm 0116c712697a3d1401765617cb753c14 mes5/x86_64/drakxtools-http-11.71.12-1.1mdvmes5.x86_64.rpm 4b4408655c506a6d96b3765d741e7fd1 mes5/x86_64/harddrake-11.71.12-1.1mdvmes5.x86_64.rpm 7879c4a9e9a551d5891290eee1236251 mes5/x86_64/harddrake-ui-11.71.12-1.1mdvmes5.x86_64.rpm a4ce110ee8c0ff071dfd15465fb9a40f mes5/SRPMS/drakxtools-11.71.12-1.1mdvmes5.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFLhsuxmqjQ0CJFipgRAiR0AJ9MbnO/0NLd0Yw5b57ILBzbWyDQBQCdH9mG nwpLDCf8ey/hU0NEb3+EY0k= =bOH3 -----END PGP SIGNATURE----- ------------=_1267136684-24326-5193 Content-Type: text/plain; name="message-footer.txt" Content-Disposition: inline; filename="message-footer.txt" Content-Transfer-Encoding: 8bit To unsubscribe, send a email to sympa ( -at -) mandrivalinux.org with this subject : unsubscribe security-announce _______________________________________________________ Want to buy your Pack or Services from Mandriva? Go to http://www.mandrivastore.com Join the Club : http://www.mandrivaclub.com _______________________________________________________ ------------=_1267136684-24326-5193-- Share this post Link to post