MDKA-2004:045: Updated drakxtools
Posted on: 11/18/2004 08:26 AM

Updated drakxtools are available for Mandrakelinux 10.1

_______________________________________________________________________

Mandrakelinux Update Advisory
_______________________________________________________________________

Package name: drakxtools
Advisory ID: MDKA-2004:045
Date: November 17th, 2004

Affected versions: 10.1
______________________________________________________________________

Problem Description:

A number of fixes are available in the updated drakxtools package:

- in drakconnect, ifcfg files are only readble by root when a WEP key is set
- add support for Philips Semiconductors DSL card in drakconnect
- update/add ADSL ISP entries in drakconnect
- create cfg dir if needed in drakTermServ
- ignore vmnet for broadcast address in drakTermServ
- use xorg.conf file in drakTermServ
- touch dhcp.conf.etherboot.kernel in drakTermServ
- fix configuration fcitx IM in localedrake

Fixes for ldetect-lst include:

- do not wrongly detect some sound cards
- disambiguate media devices (eg: TV cards vs SAT cards)
- add a few PCMCIA, SATA and centrino entries
- add a few missing description
- add Sagem Fast 800 E3

______________________________________________________________________

Updated Packages:

Mandrakelinux 10.1:
c512280c86e1900d4114ad2ec9385db8 10.1/RPMS/drakxtools-10.1-27.1.101mdk.i586.rpm
f1bf49d51d6a116596f3e5db45c80965 10.1/RPMS/drakxtools-backend-10.1-27.1.101mdk.i586.rpm
4cbeb061992323d28a3ec1d41df85d27 10.1/RPMS/drakxtools-http-10.1-27.1.101mdk.i586.rpm
a2b887cd54bc438be8affc31b611269d 10.1/RPMS/drakxtools-newt-10.1-27.1.101mdk.i586.rpm
9c40234bbee4da3a92cd5d191cfe7736 10.1/RPMS/harddrake-10.1-27.1.101mdk.i586.rpm
1421063ba436d0767661f6e1234214b0 10.1/RPMS/harddrake-ui-10.1-27.1.101mdk.i586.rpm
f8954f6eb535347cf2d80347e2410d95 10.1/RPMS/ldetect-0.5.3-1mdk.i586.rpm
218b46126642e8215ee336099c79b03e 10.1/RPMS/ldetect-devel-0.5.3-1mdk.i586.rpm
f76549c8e0448ebc5305dff00cf3c311 10.1/RPMS/ldetect-lst-0.1.23-1.1.101mdk.i586.rpm
17bcf7e399fdcf8e23fe4c415e708f1d 10.1/RPMS/ldetect-lst-devel-0.1.23-1.1.101mdk.i586.rpm
d17df4199a58f3046f880620cff58617 10.1/SRPMS/drakxtools-10.1-27.1.101mdk.src.rpm
87ef9658f3268f8e19c5db1e639de7d5 10.1/SRPMS/ldetect-0.5.3-1mdk.src.rpm
1431bcda6f5cc92a4a5b360b7f3a51d4 10.1/SRPMS/ldetect-lst-0.1.23-1.1.101mdk.src.rpm

Mandrakelinux 10.1/X86_64:
28f7c05ea918d94f67797587b6459cbb x86_64/10.1/RPMS/drakxtools-10.1-27.1.101mdk.x86_64.rpm
b01207ddf4db86297a1808c245b54466 x86_64/10.1/RPMS/drakxtools-backend-10.1-27.1.101mdk.x86_64.rpm
d458086071de4d9c218cf74e5b342064 x86_64/10.1/RPMS/drakxtools-http-10.1-27.1.101mdk.x86_64.rpm
fb2a093c6fb12419aab5a054a6020775 x86_64/10.1/RPMS/drakxtools-newt-10.1-27.1.101mdk.x86_64.rpm
89b87af9bd8ad9541bd9a5912b61ca23 x86_64/10.1/RPMS/harddrake-10.1-27.1.101mdk.x86_64.rpm
2f7f22fd10fdb0fc45d7daddb3cdc387 x86_64/10.1/RPMS/harddrake-ui-10.1-27.1.101mdk.x86_64.rpm
1b9a1553f61e5fc045a166204cc6cafd x86_64/10.1/RPMS/ldetect-0.5.3-1mdk.x86_64.rpm
325730c24d6a2e0ed3d8af94c4af128d x86_64/10.1/RPMS/ldetect-devel-0.5.3-1mdk.x86_64.rpm
dd284f57f14321841f7354cc323a3dcf x86_64/10.1/RPMS/ldetect-lst-0.1.23-1.1.101mdk.x86_64.rpm
b6627ac2350cef52924f902a23c10e1d x86_64/10.1/RPMS/ldetect-lst-devel-0.1.23-1.1.101mdk.x86_64.rpm
d17df4199a58f3046f880620cff58617 x86_64/10.1/SRPMS/drakxtools-10.1-27.1.101mdk.src.rpm
87ef9658f3268f8e19c5db1e639de7d5 x86_64/10.1/SRPMS/ldetect-0.5.3-1mdk.src.rpm
1431bcda6f5cc92a4a5b360b7f3a51d4 x86_64/10.1/SRPMS/ldetect-lst-0.1.23-1.1.101mdk.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandrakesoft for security. You can obtain the GPG public key of the Mandrakelinux Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandrakelinux at:

http://www.mandrakesoft.com/security/advisories

If you want to report vulnerabilities, please contact

security_linux-mandrake.com


Printed from Linux Compatible (http://www.linuxcompatible.org/news/story/mdka_2004045_updated_drakxtools.html)