[Full-Disclosure] MDKSA-2004:137-1 - Updated libxpm4 packages correct issues with previous update

From: Mandrake Linux Security Team (security_at_linux-mandrake.com)
Date: 11/30/04

  • Next message: morning_wood: "Re: [Full-Disclosure] overburning edit of molded cdroms feasible?"
    To: full-disclosure@lists.netsys.com
    Date: 30 Nov 2004 04:02:25 -0000
    
    

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1

     _______________________________________________________________________

                     Mandrakelinux Security Update Advisory
     _______________________________________________________________________

     Package name: libxpm4
     Advisory ID: MDKSA-2004:137-1
     Date: November 29th, 2004
     Original Advisory Date: January 22nd, 2004
     Affected versions: 10.0, 10.1, 9.2, Corporate Server 2.1
     ______________________________________________________________________

     Problem Description:

     The previous libxpm4 update had a linking error that resulted in a missing
     s_popen symbol error running applications dependant on the library. In
     addition, the file path checking in the security updates prevented some
     applications, like gimp-2.0 from being able to save xpm format images.
     
     Updated packages are patched to correct all these issues.
     ______________________________________________________________________

     Updated Packages:
      
     Mandrakelinux 10.0:
     35c897c12a36e38cceb1774f890e91e9 10.0/RPMS/libxpm4-3.4k-27.3.100mdk.i586.rpm
     ff399d6be76862ac2b61ca5bab76941a 10.0/RPMS/libxpm4-devel-3.4k-27.3.100mdk.i586.rpm
     d673354abbc067dbc454481e11c0e110 10.0/SRPMS/xpm-3.4k-27.3.100mdk.src.rpm

     Mandrakelinux 10.0/AMD64:
     0df2d07d04793600e2ede34733c18700 amd64/10.0/RPMS/lib64xpm4-3.4k-27.3.100mdk.amd64.rpm
     c699a6fa6400dd3dfd803b129392b398 amd64/10.0/RPMS/lib64xpm4-devel-3.4k-27.3.100mdk.amd64.rpm
     d673354abbc067dbc454481e11c0e110 amd64/10.0/SRPMS/xpm-3.4k-27.3.100mdk.src.rpm

     Mandrakelinux 10.1:
     e00bdfcecbf0d09dc6758a2dbce6dc9b 10.1/RPMS/libxpm4-3.4k-28.2.101mdk.i586.rpm
     6eb66944f25e92ca7d3d7f76cfa6b577 10.1/RPMS/libxpm4-devel-3.4k-28.2.101mdk.i586.rpm
     562eaedc47c52d4952d27b023bcd49f2 10.1/SRPMS/xpm-3.4k-28.2.101mdk.src.rpm

     Mandrakelinux 10.1/X86_64:
     3b17a7a58c7345520e63fad235a47a3f x86_64/10.1/RPMS/lib64xpm4-3.4k-28.2.101mdk.x86_64.rpm
     18a71ab6716293e66668bf627c24e2a8 x86_64/10.1/RPMS/lib64xpm4-devel-3.4k-28.2.101mdk.x86_64.rpm
     562eaedc47c52d4952d27b023bcd49f2 x86_64/10.1/SRPMS/xpm-3.4k-28.2.101mdk.src.rpm

     Corporate Server 2.1:
     a2910d380ebe04ca8ee624e218b7a9b7 corporate/2.1/RPMS/libxpm4-3.4k-21.3.C21mdk.i586.rpm
     28d0c7868d8b3231751a3f1d97e47725 corporate/2.1/RPMS/libxpm4-devel-3.4k-21.3.C21mdk.i586.rpm
     873a7591285599bdb062d1c26eca3f72 corporate/2.1/SRPMS/xpm-3.4k-21.3.C21mdk.src.rpm

     Corporate Server 2.1/x86_64:
     adc64096557a3934aad0d149918efdae x86_64/corporate/2.1/RPMS/libxpm4-3.4k-21.3.C21mdk.x86_64.rpm
     1a2ab77f1754f1a60781d1e2a8306c47 x86_64/corporate/2.1/RPMS/libxpm4-devel-3.4k-21.3.C21mdk.x86_64.rpm
     873a7591285599bdb062d1c26eca3f72 x86_64/corporate/2.1/SRPMS/xpm-3.4k-21.3.C21mdk.src.rpm

     Mandrakelinux 9.2:
     a7c7c5441b22e690f9be0258db581052 9.2/RPMS/libxpm4-3.4k-27.3.92mdk.i586.rpm
     e950cdc935e75873a4f81a1cc5d6a812 9.2/RPMS/libxpm4-devel-3.4k-27.3.92mdk.i586.rpm
     7d53ee8024d4d586ec50ba0281987fd4 9.2/SRPMS/xpm-3.4k-27.3.92mdk.src.rpm

     Mandrakelinux 9.2/AMD64:
     47b3147cf8ca6fc1fae0d267569b6a15 amd64/9.2/RPMS/lib64xpm4-3.4k-27.3.92mdk.amd64.rpm
     09e3d45094730c2da539437922abb2b6 amd64/9.2/RPMS/lib64xpm4-devel-3.4k-27.3.92mdk.amd64.rpm
     7d53ee8024d4d586ec50ba0281987fd4 amd64/9.2/SRPMS/xpm-3.4k-27.3.92mdk.src.rpm
     _______________________________________________________________________

     To upgrade automatically use MandrakeUpdate or urpmi. The verification
     of md5 checksums and GPG signatures is performed automatically for you.

     All packages are signed by Mandrakesoft for security. You can obtain
     the GPG public key of the Mandrakelinux Security Team by executing:

      gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

     You can view other update advisories for Mandrakelinux at:

      http://www.mandrakesoft.com/security/advisories

     If you want to report vulnerabilities, please contact

      security_linux-mandrake.com

     Type Bits/KeyID Date User ID
     pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team
      <security linux-mandrake.com>
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.0.7 (GNU/Linux)

    iD8DBQFBq/DRmqjQ0CJFipgRAq78AJ48v/E3iNjk/8L78YPkyioCdaIOjgCgsbq8
    LtO02uqj6C3RXckXagkllZg=
    =ObCZ
    -----END PGP SIGNATURE-----

    _______________________________________________
    Full-Disclosure - We believe in it.
    Charter: http://lists.netsys.com/full-disclosure-charter.html


  • Next message: morning_wood: "Re: [Full-Disclosure] overburning edit of molded cdroms feasible?"

    Relevant Pages