[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1Q8Cl6-0001rN-70@titan.mandriva.com>
Date: Fri, 08 Apr 2011 16:34:00 +0200
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDVSA-2011:072 ] gwenhywfar
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2011:072
http://www.mandriva.com/security/
_______________________________________________________________________
Package : gwenhywfar
Date : April 8, 2011
Affected: 2009.0, 2010.0, 2010.1
_______________________________________________________________________
Problem Description:
It was discovered that gwenhywfar was using an old private copy
of the ca-bundle.crt file containing the root CA certs, this
has now been resolved so that it uses the system wide and up to
date /etc/pki/tls/certs/ca-bundle.crt file last updated with the
MDVSA-2011:068 advisory.
Packages for 2009.0 are provided as of the Extended Maintenance
Program. Please visit this link to learn more:
http://store.mandriva.com/product_info.php?cPath=149&products_id=490
The updated packages provides a solution to this issue.
_______________________________________________________________________
References:
http://www.mandriva.com/security/advisories?name=MDVSA-2011:068
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2009.0:
811d96859d12953907351809701c55f7 2009.0/i586/gwenhywfar-3.4.1-1.1mdv2009.0.i586.rpm
62d04021fe4cf62abdced566bd27cefa 2009.0/i586/libgwenhywfar47-3.4.1-1.1mdv2009.0.i586.rpm
088b5308b6ebccd7a73ba7a671c4a370 2009.0/i586/libgwenhywfar-devel-3.4.1-1.1mdv2009.0.i586.rpm
7c9a8e43b915eeaee0d3fdb82bb1fad3 2009.0/SRPMS/gwenhywfar-3.4.1-1.1mdv2009.0.src.rpm
Mandriva Linux 2009.0/X86_64:
bd71be080aad318dc803d9f696f23a74 2009.0/x86_64/gwenhywfar-3.4.1-1.1mdv2009.0.x86_64.rpm
f757e5f34e6eca8536f4b1ba448c4b90 2009.0/x86_64/lib64gwenhywfar47-3.4.1-1.1mdv2009.0.x86_64.rpm
4637037b3be2162c3aa5f2331a143305 2009.0/x86_64/lib64gwenhywfar-devel-3.4.1-1.1mdv2009.0.x86_64.rpm
7c9a8e43b915eeaee0d3fdb82bb1fad3 2009.0/SRPMS/gwenhywfar-3.4.1-1.1mdv2009.0.src.rpm
Mandriva Linux 2010.0:
abf1c4ea89688553bb2df5246043fdb9 2010.0/i586/gwenhywfar-3.11.1-2.1mdv2010.0.i586.rpm
12f8020929354bbfb50e8500cd1a9d86 2010.0/i586/libgwenhywfar47-3.11.1-2.1mdv2010.0.i586.rpm
6e3818e635f7d011fb3e856cd4aded75 2010.0/i586/libgwenhywfar-devel-3.11.1-2.1mdv2010.0.i586.rpm
4a2931689566732637709b54cdf4f15a 2010.0/SRPMS/gwenhywfar-3.11.1-2.1mdv2010.0.src.rpm
Mandriva Linux 2010.0/X86_64:
32e826fcdbe5c3715276ea105e0ce2a4 2010.0/x86_64/gwenhywfar-3.11.1-2.1mdv2010.0.x86_64.rpm
714c01ca9e2974d44630cfef060193c9 2010.0/x86_64/lib64gwenhywfar47-3.11.1-2.1mdv2010.0.x86_64.rpm
3de90121de80bb3b730296a27997d2fb 2010.0/x86_64/lib64gwenhywfar-devel-3.11.1-2.1mdv2010.0.x86_64.rpm
4a2931689566732637709b54cdf4f15a 2010.0/SRPMS/gwenhywfar-3.11.1-2.1mdv2010.0.src.rpm
Mandriva Linux 2010.1:
3c6e8ba590aea440d92c57e7267c64a0 2010.1/i586/gwenhywfar-3.11.7-3.1mdv2010.2.i586.rpm
4d785ef8281a3715bd0b470e7f5c4c30 2010.1/i586/libgwengui-qt4_0-3.11.7-3.1mdv2010.2.i586.rpm
0827599f64cda026ed0a64c8d3a57727 2010.1/i586/libgwenhywfar47-3.11.7-3.1mdv2010.2.i586.rpm
5deb750ec7ebd459b479e2dcddfa3603 2010.1/i586/libgwenhywfar-devel-3.11.7-3.1mdv2010.2.i586.rpm
beef69ebe1b9fc656b6ceae2e57baf26 2010.1/SRPMS/gwenhywfar-3.11.7-3.1mdv2010.2.src.rpm
Mandriva Linux 2010.1/X86_64:
503174ac9838d143b49def264366c0a0 2010.1/x86_64/gwenhywfar-3.11.7-3.1mdv2010.2.x86_64.rpm
c5b5481a59bfbd44f15aa84b6cc36168 2010.1/x86_64/lib64gwengui-qt4_0-3.11.7-3.1mdv2010.2.x86_64.rpm
97b9b4a9fa662f588f7e3dcf80616d7b 2010.1/x86_64/lib64gwenhywfar47-3.11.7-3.1mdv2010.2.x86_64.rpm
1181a43602b7c19183176cc331da9730 2010.1/x86_64/lib64gwenhywfar-devel-3.11.7-3.1mdv2010.2.x86_64.rpm
beef69ebe1b9fc656b6ceae2e57baf26 2010.1/SRPMS/gwenhywfar-3.11.7-3.1mdv2010.2.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFNnu3SmqjQ0CJFipgRAlHfAKCyU+Cxq18vYLoRLxgeT1/VFD/mVQCdFxb0
7iYnExioYbnYptje90gDrnU=
=O2Fq
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists