Mandriva 1271 Published by

Updated drakxtools packages are available for Mandriva Linux

_______________________________________________________________________

Mandriva Linux Update Advisory
_______________________________________________________________________

Package name: drakxtools
Advisory ID: MDKA-2005:034
Date: July 11th, 2005

Affected versions: 10.0, Corporate 3.0
______________________________________________________________________

Problem Description:

Three bugs have been corrected in the drakxtools package:

drakfirewall: The port range syntax has been corrected for samba. (#16604)
drakfont: Uninstalling fonts has been fixed. (#9324)
drakbackup: The application has been patched to correctly deal with
directory names that contain spaces, as well as add more
restrictive permissions on the backup tarballs. (#12861)

The updated packages correct these issues.



______________________________________________________________________

Updated Packages:

Mandrakelinux 10.0:
37796110219d4630e385cacba14a2ad1 10.0/RPMS/drakxtools-10-34.10.100mdk.i586.rpm
fb13ab05591d778913e7a4d7a2f419aa 10.0/RPMS/drakxtools-http-10-34.10.100mdk.i586.rpm
50e784568c523740b70871734b144d3c 10.0/RPMS/drakxtools-newt-10-34.10.100mdk.i586.rpm
ce9a04da8b9e11ed24b5b627e94fdc16 10.0/RPMS/harddrake-10-34.10.100mdk.i586.rpm
64a24f233e629d219b6b9d9c21172de2 10.0/RPMS/harddrake-ui-10-34.10.100mdk.i586.rpm
119dd13a66bbb45f12e1d3788b5b9d05 10.0/RPMS/perl-MDK-Common-1.1.11-3.1.100mdk.i586.rpm
3b726d8567901d3dceb20cb741ede3fe 10.0/RPMS/perl-MDK-Common-devel-1.1.11-3.1.100mdk.i586.rpm
2b861a1cf154f37da26e5a78f850adf1 10.0/SRPMS/drakxtools-10-34.10.100mdk.src.rpm
abc72b322aed89e9b36b9b997409881a 10.0/SRPMS/perl-MDK-Common-1.1.11-3.1.100mdk.src.rpm

Mandrakelinux 10.0/AMD64:
84df12268bc25944d1ad82e9cf369748 amd64/10.0/RPMS/drakxtools-10-34.10.100mdk.amd64.rpm
f575190629630a2d735a9f6c32807cc5 amd64/10.0/RPMS/drakxtools-http-10-34.10.100mdk.amd64.rpm
86f22b8dc1cf99c1f9e01e9115d2b5ff amd64/10.0/RPMS/drakxtools-newt-10-34.10.100mdk.amd64.rpm
2d1367ded4c4886a6e597c1c88c62170 amd64/10.0/RPMS/harddrake-10-34.10.100mdk.amd64.rpm
848a50ae5a5b93f1467c0f65bb80137d amd64/10.0/RPMS/harddrake-ui-10-34.10.100mdk.amd64.rpm
6751b5a70f8ddf5757a96e86cbcaecf4 amd64/10.0/RPMS/perl-MDK-Common-1.1.11-3.1.100mdk.amd64.rpm
cf5529fb9607559a05f6af8d2ebd68bf amd64/10.0/RPMS/perl-MDK-Common-devel-1.1.11-3.1.100mdk.amd64.rpm
2b861a1cf154f37da26e5a78f850adf1 amd64/10.0/SRPMS/drakxtools-10-34.10.100mdk.src.rpm
abc72b322aed89e9b36b9b997409881a amd64/10.0/SRPMS/perl-MDK-Common-1.1.11-3.1.100mdk.src.rpm

Corporate 3.0:
3297e8f57f9a6afd719752aa44a642fa corporate/3.0/RPMS/drakxtools-10-34.10.C30mdk.i586.rpm
48b6824149e89baf2ddd0a88970f2f31 corporate/3.0/RPMS/drakxtools-http-10-34.10.C30mdk.i586.rpm
89cf4cdd6822afe954877f8c0f53b691 corporate/3.0/RPMS/drakxtools-newt-10-34.10.C30mdk.i586.rpm
0a737b8f9a27c6b24a6fb4cb8c79cc09 corporate/3.0/RPMS/harddrake-10-34.10.C30mdk.i586.rpm
7fa83bdc2ae61cb2da9af1697b92d4fc corporate/3.0/RPMS/harddrake-ui-10-34.10.C30mdk.i586.rpm
cc51eb977d90e6cc5a3fa5d0d4baec1b corporate/3.0/SRPMS/drakxtools-10-34.10.C30mdk.src.rpm

Corporate 3.0/X86_64:
4877f7b21fe16416f5f63be6d5201187 x86_64/corporate/3.0/RPMS/drakxtools-10-34.10.C30mdk.x86_64.rpm
ab331b0e423b1bb8afc7b9d061f3a62e x86_64/corporate/3.0/RPMS/drakxtools-http-10-34.10.C30mdk.x86_64.rpm
0f7d14189006e22bb2a7c7b8404cd194 x86_64/corporate/3.0/RPMS/drakxtools-newt-10-34.10.C30mdk.x86_64.rpm
1e650892860301b34bf719ff8ebd31cf x86_64/corporate/3.0/RPMS/harddrake-10-34.10.C30mdk.x86_64.rpm
f1c8fce2ef05495e3fc55342abc1355e x86_64/corporate/3.0/RPMS/harddrake-ui-10-34.10.C30mdk.x86_64.rpm
cc51eb977d90e6cc5a3fa5d0d4baec1b x86_64/corporate/3.0/SRPMS/drakxtools-10-34.10.C30mdk.src.rpm
_______________________________________________________________________

Bug IDs fixed (see http://qa.mandriva.com for more information):

9324 - drakfont does not uninstall fonts
12861 - drakbackup does not handle directory names with spaces
16604 - drakfirewall creates incorrect port syntax for samba
_______________________________________________________________________

To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com