Mandriva 1271 Published by

Updated imap packages are available for Mandrakelinux
_______________________________________________________________________

Mandrakelinux Update Advisory
_______________________________________________________________________

Package name: imap
Advisory ID: MDKA-2005:012
Date: March 4th, 2005

Affected versions: 10.0, 10.1, Corporate 3.0,
Corporate Server 2.1
______________________________________________________________________

Problem Description:

The imap package was missing a requires for xinetd, which is required for using the daemon.

Updated packages include this requirement.



______________________________________________________________________

Updated Packages:

Mandrakelinux 10.0:
8e55c63b892bc717729b39019b040981 10.0/RPMS/imap-2002d-8.2.100mdk.i586.rpm
d90430e3fe2a96892976d28ac29ace22 10.0/RPMS/imap-devel-2002d-8.2.100mdk.i586.rpm
b050dc230ffe183d3b3091eeef33520d 10.0/RPMS/imap-utils-2002d-8.2.100mdk.i586.rpm
0a4d46cabb2ea305c86c23d79ba5e1bf 10.0/SRPMS/imap-2002d-8.2.100mdk.src.rpm

Mandrakelinux 10.0/AMD64:
7f79171b12ab5b0898bddf138dcea150 amd64/10.0/RPMS/imap-2002d-8.2.100mdk.amd64.rpm
8945651e297288d8258ad5abd4dbbe0e amd64/10.0/RPMS/imap-devel-2002d-8.2.100mdk.amd64.rpm
b6d7334ee348e8c7d432954aa0bddaa0 amd64/10.0/RPMS/imap-utils-2002d-8.2.100mdk.amd64.rpm
0a4d46cabb2ea305c86c23d79ba5e1bf amd64/10.0/SRPMS/imap-2002d-8.2.100mdk.src.rpm

Mandrakelinux 10.1:
a7d4ac885f79f8e8ea1a3b05a46bc5ff 10.1/RPMS/imap-2004-2.3.101mdk.i586.rpm
833a000a203ad6cefc0d3a874dc4127c 10.1/RPMS/imap-devel-2004-2.3.101mdk.i586.rpm
d0d7e174f22c1b1850a3749728ea2f2c 10.1/RPMS/imap-utils-2004-2.3.101mdk.i586.rpm
025ea46c3bbb305d0b720f77554cc0d9 10.1/RPMS/libc-client-php0-2004-2.3.101mdk.i586.rpm
0086c4c722daee583e9a1f0bf3d5eff9 10.1/RPMS/libc-client-php0-devel-2004-2.3.101mdk.i586.rpm
034720c456c37694169739c14107ee05 10.1/SRPMS/imap-2004-2.3.101mdk.src.rpm

Mandrakelinux 10.1/X86_64:
7daffa4a1b45485fb2f758ce9c509abc x86_64/10.1/RPMS/imap-2004-2.3.101mdk.x86_64.rpm
c75f1961a308ddf8f8ab3752065f7110 x86_64/10.1/RPMS/imap-devel-2004-2.3.101mdk.x86_64.rpm
42cf0b72d050d71e1ff27060daac79af x86_64/10.1/RPMS/imap-utils-2004-2.3.101mdk.x86_64.rpm
57e360988d114cafdd2c8dacab20103f x86_64/10.1/RPMS/lib64c-client-php0-2004-2.3.101mdk.x86_64.rpm
16760db5e4b03771a23cddd9d6b0eaac x86_64/10.1/RPMS/lib64c-client-php0-devel-2004-2.3.101mdk.x86_64.rpm
034720c456c37694169739c14107ee05 x86_64/10.1/SRPMS/imap-2004-2.3.101mdk.src.rpm

Corporate Server 2.1:
2091e4e0a0e3c46846ed91d519ff29f6 corporate/2.1/RPMS/imap-2001a-9.1.C21mdk.i586.rpm
5840fbc2be98ddf388231e5ff825a683 corporate/2.1/RPMS/imap-devel-2001a-9.1.C21mdk.i586.rpm
fae2cb89ea21bc47089f01aec98b4ca0 corporate/2.1/SRPMS/imap-2001a-9.1.C21mdk.src.rpm

Corporate Server 2.1/X86_64:
e31ffbcfe9a259b4eaea6c13224bf6f3 x86_64/corporate/2.1/RPMS/imap-2001a-9.1.C21mdk.x86_64.rpm
c9d6439c39380e91dd090f5131bcb1d1 x86_64/corporate/2.1/RPMS/imap-devel-2001a-9.1.C21mdk.x86_64.rpm
fae2cb89ea21bc47089f01aec98b4ca0 x86_64/corporate/2.1/SRPMS/imap-2001a-9.1.C21mdk.src.rpm

Corporate 3.0:
63f3ffc9fa0757f21cb49f1017829629 corporate/3.0/RPMS/imap-2002d-8.2.C30mdk.i586.rpm
e8055b07b4c55f646befae9257e26cde corporate/3.0/RPMS/imap-devel-2002d-8.2.C30mdk.i586.rpm
8d0f15aead910986517c3a64a7103bdc corporate/3.0/RPMS/imap-utils-2002d-8.2.C30mdk.i586.rpm
eb8ea02e63974bc343bfaa81f1f3feea corporate/3.0/SRPMS/imap-2002d-8.2.C30mdk.src.rpm

Corporate 3.0/X86_64:
da9652e377b1fd9c674dbf8a464a1e90 x86_64/corporate/3.0/RPMS/imap-2002d-8.2.C30mdk.x86_64.rpm
2e42805266c3c64dae7677c594ac2f40 x86_64/corporate/3.0/RPMS/imap-devel-2002d-8.2.C30mdk.x86_64.rpm
fe153c65cdbc15922c790f915758e913 x86_64/corporate/3.0/RPMS/imap-utils-2002d-8.2.C30mdk.x86_64.rpm
eb8ea02e63974bc343bfaa81f1f3feea x86_64/corporate/3.0/SRPMS/imap-2002d-8.2.C30mdk.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandrakesoft for security. You can obtain the GPG public key of the Mandrakelinux Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandrakelinux at:

http://www.mandrakesoft.com/security/advisories

If you want to report vulnerabilities, please contact

security_linux-mandrake.com