MDKA-2004:050 - Updated kdelibs packages
Posted on: 11/26/2004 04:19 AM

Updated kdelibs packages has been released for Mandrakelinux 10.1

Mandrakelinux Update Advisory

Package name: kdelibs
Advisory ID: MDKA-2004:050
Date: November 25th, 2004

Affected versions: 10.1

Problem Description:

A number of bugs in kdelibs are fixed with this update:

- kde bug #53005: fix khtml auto width table
- kde bug #63351: fix khtml rtl "Inverted logic for text-indent in RTL"
- kde bug #75771: link to url without trailing slash is not marked as a visited link
- kde bug #79269: fix khtml "ignore height element for input elements that are not image"
- kde bug #87466: fix listbox in khtml
- kde bug #91327: fixing the default margins for H{1-6} as they are in mozilla, IE, and Safari
- kde bug #91439: fix kdatepicker reset toggle button
- kde bug #91444: fix kdatepicker "show the uer what he's supposed to do"
- kde bug #92066: fix khtml crash
- kde bug #93193: clicking in textarea causes text to scroll
- fix khtml iframe support "allow iframe SRC="" .." (src is null)


Updated Packages:

Mandrakelinux 10.1:
65477484ecc479650253b268c3642469 10.1/RPMS/kdelibs-common-3.2.3-97.1.101mdk.i586.rpm
ca1efbaac227816dc229589df186ad63 10.1/RPMS/libkdecore4-3.2.3-97.1.101mdk.i586.rpm
47351df38208cc20ab6e4312519322d5 10.1/RPMS/libkdecore4-devel-3.2.3-97.1.101mdk.i586.rpm
02ceb3b35d9d9e85620cce3a14e2753c 10.1/SRPMS/kdelibs-3.2.3-97.1.101mdk.src.rpm

Mandrakelinux 10.1/X86_64:
de0c0c9aa760fa604fc2230e0155b868 x86_64/10.1/RPMS/kdelibs-common-3.2.3-97.1.101mdk.x86_64.rpm
c6a0012dabce1e20c48f4c246d481522 x86_64/10.1/RPMS/lib64kdecore4-3.2.3-97.1.101mdk.x86_64.rpm
c4fdfdbd8db6504ea69047e4529d5346 x86_64/10.1/RPMS/lib64kdecore4-devel-3.2.3-97.1.101mdk.x86_64.rpm
02ceb3b35d9d9e85620cce3a14e2753c x86_64/10.1/SRPMS/kdelibs-3.2.3-97.1.101mdk.src.rpm

To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandrakesoft for security. You can obtain the GPG public key of the Mandrakelinux Security Team by executing:

gpg --recv-keys --keyserver 0x22458A98

You can view other update advisories for Mandrakelinux at:

If you want to report vulnerabilities, please contact

Printed from Linux Compatible (