Mandriva 1271 Published by

Updated drakxtools are available for Mandrakelinux 10.1
_______________________________________________________________________

Mandrakelinux Update Advisory
_______________________________________________________________________

Package name: drakxtools
Advisory ID: MDKA-2004:052
Date: December 6th, 2004

Affected versions: 10.1
______________________________________________________________________

Problem Description:

Beginning immediately, all bug reports for stable releases will be handled via Bugzilla at http://qa.mandrakesoft.com/. The drakbug tool has been updated to point users of stable releases to Bugzilla.



______________________________________________________________________

Updated Packages:

Mandrakelinux 10.1:
ed95d3a014cc0168ac94b9561d9c62f9 10.1/RPMS/drakxtools-10.1-27.2.101mdk.i586.rpm
4bf915130a99f340ea2bdd157e353a08 10.1/RPMS/drakxtools-backend-10.1-27.2.101mdk.i586.rpm
4e8c1f31fb13ff4830433908b0c3c749 10.1/RPMS/drakxtools-http-10.1-27.2.101mdk.i586.rpm
49ef94d721ca3c74492b85206c9fe569 10.1/RPMS/drakxtools-newt-10.1-27.2.101mdk.i586.rpm
35b943e8579d89fd3135712f965ef5c0 10.1/RPMS/harddrake-10.1-27.2.101mdk.i586.rpm
b76bbcc087feeb3ad1b4faac66e5337c 10.1/RPMS/harddrake-ui-10.1-27.2.101mdk.i586.rpm
1cb9f748d42a06ccbb64e2736da6ff16 10.1/SRPMS/drakxtools-10.1-27.2.101mdk.src.rpm

Mandrakelinux 10.1/X86_64:
2122f974e027c2a1975e998fff321a96 x86_64/10.1/RPMS/drakxtools-10.1-27.2.101mdk.x86_64.rpm
5084250aae4f6ac63ac644d4bb43be65 x86_64/10.1/RPMS/drakxtools-backend-10.1-27.2.101mdk.x86_64.rpm
3eda21c5ba29fc24a2f320ed9b87cad5 x86_64/10.1/RPMS/drakxtools-http-10.1-27.2.101mdk.x86_64.rpm
05b074dd9c33cc9226df49e631547f19 x86_64/10.1/RPMS/drakxtools-newt-10.1-27.2.101mdk.x86_64.rpm
84a5a340c34f55767e87c042e6586a9c x86_64/10.1/RPMS/harddrake-10.1-27.2.101mdk.x86_64.rpm
6a64fd1bf3cb410c254293e59b76f7ae x86_64/10.1/RPMS/harddrake-ui-10.1-27.2.101mdk.x86_64.rpm
1cb9f748d42a06ccbb64e2736da6ff16 x86_64/10.1/SRPMS/drakxtools-10.1-27.2.101mdk.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandrakesoft for security. You can obtain the GPG public key of the Mandrakelinux Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandrakelinux at:

http://www.mandrakesoft.com/security/advisories

If you want to report vulnerabilities, please contact

security_linux-mandrake.com