Mandriva 1271 Published by

An updated nut package has been released for Mandrakelinux
_______________________________________________________________________

Mandrakelinux Update Advisory
_______________________________________________________________________

Package name: nut
Advisory ID: MDKA-2005:007
Date: January 27th, 2005

Affected versions: 10.0, 10.1, Corporate Server 3.0
______________________________________________________________________

Problem Description:

A bug in the upsd initscript used by nut exists where it starts the upsd/powerdown script earlier in the halt/shutdown process to ensure it still has access to USB. However, this was done too earlier, while the root partition was still mounted in read/write mode. Due to this delay, it was possible that the UPS would run out of power before a clean halt. The updated packages are fixed to remove the delay that could cause the problem.

It is important to note that users make sure their UPS has at least a 15 second delay before shutting down; most UPS units have this feature by default, but not all. Users can also manage the shutdown delay in the nut configuration file if their nut-driver supports it.



______________________________________________________________________

Updated Packages:

Mandrakelinux 10.0:
3fb12976bca541096177677cf5c5a5df 10.0/RPMS/nut-1.4.2-2.1.100mdk.i586.rpm
3a12ecb4e9fc8d19767221aef154728f 10.0/RPMS/nut-cgi-1.4.2-2.1.100mdk.i586.rpm
205273340acbf5c8f77f924e438102b6 10.0/RPMS/nut-devel-1.4.2-2.1.100mdk.i586.rpm
56206fa81f41c55506acae12339a0616 10.0/RPMS/nut-server-1.4.2-2.1.100mdk.i586.rpm
eeca869c29ac678899dee3c8c11f3536 10.0/SRPMS/nut-1.4.2-2.1.100mdk.src.rpm

Mandrakelinux 10.0/AMD64:
5bc6427733bfdbaae6bb03cd801f2643 amd64/10.0/RPMS/nut-1.4.2-2.1.100mdk.amd64.rpm
c1c442139588012a9d60adcb8b03239c amd64/10.0/RPMS/nut-cgi-1.4.2-2.1.100mdk.amd64.rpm
add2afa10ddc33372ed2eb9cdc157e45 amd64/10.0/RPMS/nut-devel-1.4.2-2.1.100mdk.amd64.rpm
4a7f27b5680d8c8234174ae610160829 amd64/10.0/RPMS/nut-server-1.4.2-2.1.100mdk.amd64.rpm
eeca869c29ac678899dee3c8c11f3536 amd64/10.0/SRPMS/nut-1.4.2-2.1.100mdk.src.rpm

Mandrakelinux 10.1:
28e2497023373434de009f5b168ce483 10.1/RPMS/nut-2.0.0-4.1.101mdk.i586.rpm
f733586929b43899ebeff3fd5ec4798f 10.1/RPMS/nut-cgi-2.0.0-4.1.101mdk.i586.rpm
9498cf1cf29ef052c6afe904b2ca4f8b 10.1/RPMS/nut-devel-2.0.0-4.1.101mdk.i586.rpm
45eb02a04b3b7a29a8cb21234617d6ec 10.1/RPMS/nut-server-2.0.0-4.1.101mdk.i586.rpm
c857cd8abb33ff5312f7ad76016c76ef 10.1/SRPMS/nut-2.0.0-4.1.101mdk.src.rpm

Mandrakelinux 10.1/X86_64:
108f789aa96a2ce2924e07da915b603e x86_64/10.1/RPMS/nut-2.0.0-4.1.101mdk.x86_64.rpm
ac450e7b0d92a457139709106f2be017 x86_64/10.1/RPMS/nut-cgi-2.0.0-4.1.101mdk.x86_64.rpm
951b55730c72c4d47e09a8061cb5529f x86_64/10.1/RPMS/nut-devel-2.0.0-4.1.101mdk.x86_64.rpm
9c554431ccd0a257f68b6ca0253f9a9e x86_64/10.1/RPMS/nut-server-2.0.0-4.1.101mdk.x86_64.rpm
c857cd8abb33ff5312f7ad76016c76ef x86_64/10.1/SRPMS/nut-2.0.0-4.1.101mdk.src.rpm

Corporate Server 3.0:
b6a0b3045bcfbedfb961bf3a804eb33d corporate/3.0/RPMS/nut-1.4.2-2.1.C30mdk.i586.rpm
7bd5324d33cf312a26b2f2004fe053e2 corporate/3.0/RPMS/nut-cgi-1.4.2-2.1.C30mdk.i586.rpm
ebc1447781f0766904bb1c6cd3752127 corporate/3.0/RPMS/nut-devel-1.4.2-2.1.C30mdk.i586.rpm
5155dd5578ebe388125d639dfe6026c0 corporate/3.0/RPMS/nut-server-1.4.2-2.1.C30mdk.i586.rpm
f1a675e85eebe4cc62431d6435277a9d corporate/3.0/SRPMS/nut-1.4.2-2.1.C30mdk.src.rpm

Corporate Server 3.0/x86_64:
fc731757f19de1712a24722eb6f258fd x86_64/corporate/3.0/RPMS/nut-1.4.2-2.1.C30mdk.x86_64.rpm
c330dcd8a8be65a737b5fde0d537a493 x86_64/corporate/3.0/RPMS/nut-cgi-1.4.2-2.1.C30mdk.x86_64.rpm
ff6af3578fec9c6216162cb22beb9a42 x86_64/corporate/3.0/RPMS/nut-devel-1.4.2-2.1.C30mdk.x86_64.rpm
eedee3179c245eea34030866a0e52adc x86_64/corporate/3.0/RPMS/nut-server-1.4.2-2.1.C30mdk.x86_64.rpm
f1a675e85eebe4cc62431d6435277a9d x86_64/corporate/3.0/SRPMS/nut-1.4.2-2.1.C30mdk.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandrakesoft for security. You can obtain the GPG public key of the Mandrakelinux Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandrakelinux at:

http://www.mandrakesoft.com/security/advisories

If you want to report vulnerabilities, please contact

security_linux-mandrake.com