Mandriva 1271 Published by

Updated urpmi packages are available for Mandrakelinux 10.1
_______________________________________________________________________

Mandrakelinux Update Advisory
_______________________________________________________________________

Package name: urpmi
Advisory ID: MDKA-2004:059
Date: December 16th, 2004

Affected versions: 10.1
______________________________________________________________________

Problem Description:

A bug in the parallel ssh extension in urpmi would prevent parallel installations using ssh; urpmi would crash. The updated packges fix the problem.



______________________________________________________________________

Updated Packages:

Mandrakelinux 10.1:
2e96162b8d5b0ab9a2e173b9ea7b5e3c 10.1/RPMS/gurpmi-4.5-29.1.101mdk.noarch.rpm
74faac228fb76a182ead8df7eaf3534f 10.1/RPMS/perl-URPM-1.03-2mdk.i586.rpm
f9d5f30016da51c6afd8bbd1a7b19246 10.1/RPMS/urpmi-4.5-29.1.101mdk.noarch.rpm
51dab4ea2f2c63f7a0e23e3075446714 10.1/RPMS/urpmi-parallel-ka-run-4.5-29.1.101mdk.noarch.rpm
039939b302d1fda4fd4f556714eb89b2 10.1/RPMS/urpmi-parallel-ssh-4.5-29.1.101mdk.noarch.rpm
f402efd84acf9e63c8dde9ca9898adc3 10.1/SRPMS/perl-URPM-1.03-2mdk.src.rpm
63a82c156b856c8ca614dc0b49fcf165 10.1/SRPMS/urpmi-4.5-29.1.101mdk.src.rpm

Mandrakelinux 10.1/X86_64:
c0b2c8d9e8d8a276909cb1f466331ca7 x86_64/10.1/RPMS/gurpmi-4.5-29.1.101mdk.noarch.rpm
e3acf586e62200f244fd599445b75cea x86_64/10.1/RPMS/urpmi-4.5-29.1.101mdk.noarch.rpm
eba2bb59fa15113a88c8e5ee1b1e06cb x86_64/10.1/RPMS/urpmi-parallel-ka-run-4.5-29.1.101mdk.noarch.rpm
ece29dce733ec1eaceccdd993b022a1b x86_64/10.1/RPMS/urpmi-parallel-ssh-4.5-29.1.101mdk.noarch.rpm
63a82c156b856c8ca614dc0b49fcf165 x86_64/10.1/SRPMS/urpmi-4.5-29.1.101mdk.src.rpm
_______________________________________________________________________

Bug IDs fixed (see http://qa.mandrakesoft.com for more information):

12249 - urpmi parallel ssh extension doesn't work
_______________________________________________________________________

To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandrakesoft for security. You can obtain the GPG public key of the Mandrakelinux Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandrakelinux at:

http://www.mandrakesoft.com/security/advisories

If you want to report vulnerabilities, please contact

security_linux-mandrake.com