lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
From: security at linux-mandrake.com (Mandrake Linux Security Team)
Subject: MDKA-2004:027 - Updated mandrake-doc packages are available

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

                 Mandrakelinux Security Update Advisory
 _______________________________________________________________________

 Package name:           mandrake-doc
 Advisory ID:            MDKA-2004:027
 Date:                   May 26th, 2004

 Affected versions:	 10.0
 ______________________________________________________________________

 Problem Description:

 Updated Mandrakelinux documentation is available with the latest
 updates for the 10.0 release as well as new translations.
 ______________________________________________________________________

 Updated Packages:
  
 Mandrakelinux 10.0:
 a5b9e142acc040cf1b6ef05f2f4dbc2e  10.0/RPMS/mandrake-doc-common-10.0-5.1.100mdk.noarch.rpm
 3dff1c99d644afa251f93fff2e910806  10.0/RPMS/mandrake-doc-de-10.0-5.1.100mdk.noarch.rpm
 48735c1aa68acff5aed52304b931629a  10.0/RPMS/mandrake-doc-drakxtools-de-10.0-5.1.100mdk.noarch.rpm
 bea09ca2e8ccc19d159d8a9d240d5605  10.0/RPMS/mandrake-doc-drakxtools-en-10.0-5.1.100mdk.noarch.rpm
 cf0365501d34e6254bb1eb0785eb8fc3  10.0/RPMS/mandrake-doc-drakxtools-es-10.0-5.1.100mdk.noarch.rpm
 ef2aa961b5143629eef322c60f121482  10.0/RPMS/mandrake-doc-drakxtools-fr-10.0-5.1.100mdk.noarch.rpm
 3d017b8bff6cf16bb64fb434e32cd9f4  10.0/RPMS/mandrake-doc-drakxtools-it-10.0-5.1.100mdk.noarch.rpm
 0cc76af81f316867e5e3bf127c5979ed  10.0/RPMS/mandrake-doc-drakxtools-zh_cn-10.0-5.1.100mdk.noarch.rpm
 1b86e43c0f3995cf1f7b758b240fa067  10.0/RPMS/mandrake-doc-en-10.0-5.1.100mdk.noarch.rpm
 15a1d573f97d06881a1b5712a95fcc7e  10.0/RPMS/mandrake-doc-es-10.0-5.1.100mdk.noarch.rpm
 30a80ea86649e7da5556b3e35dda0638  10.0/RPMS/mandrake-doc-fr-10.0-5.1.100mdk.noarch.rpm
 0663b045d478f4b72fff103e431e4405  10.0/RPMS/mandrake-doc-it-10.0-5.1.100mdk.noarch.rpm
 81be5b369a12ff21b9ef28c338c4a673  10.0/RPMS/mandrake-doc-zh_cn-10.0-5.1.100mdk.noarch.rpm
 1a63131f4bd5ddf1fe74fa70b4f85e90  10.0/SRPMS/mandrake-doc-10.0-5.1.100mdk.src.rpm

 Mandrakelinux 10.0/AMD64:
 a5b9e142acc040cf1b6ef05f2f4dbc2e  amd64/10.0/RPMS/mandrake-doc-common-10.0-5.1.100mdk.noarch.rpm
 3dff1c99d644afa251f93fff2e910806  amd64/10.0/RPMS/mandrake-doc-de-10.0-5.1.100mdk.noarch.rpm
 48735c1aa68acff5aed52304b931629a  amd64/10.0/RPMS/mandrake-doc-drakxtools-de-10.0-5.1.100mdk.noarch.rpm
 bea09ca2e8ccc19d159d8a9d240d5605  amd64/10.0/RPMS/mandrake-doc-drakxtools-en-10.0-5.1.100mdk.noarch.rpm
 cf0365501d34e6254bb1eb0785eb8fc3  amd64/10.0/RPMS/mandrake-doc-drakxtools-es-10.0-5.1.100mdk.noarch.rpm
 ef2aa961b5143629eef322c60f121482  amd64/10.0/RPMS/mandrake-doc-drakxtools-fr-10.0-5.1.100mdk.noarch.rpm
 3d017b8bff6cf16bb64fb434e32cd9f4  amd64/10.0/RPMS/mandrake-doc-drakxtools-it-10.0-5.1.100mdk.noarch.rpm
 0cc76af81f316867e5e3bf127c5979ed  amd64/10.0/RPMS/mandrake-doc-drakxtools-zh_cn-10.0-5.1.100mdk.noarch.rpm
 1b86e43c0f3995cf1f7b758b240fa067  amd64/10.0/RPMS/mandrake-doc-en-10.0-5.1.100mdk.noarch.rpm
 15a1d573f97d06881a1b5712a95fcc7e  amd64/10.0/RPMS/mandrake-doc-es-10.0-5.1.100mdk.noarch.rpm
 30a80ea86649e7da5556b3e35dda0638  amd64/10.0/RPMS/mandrake-doc-fr-10.0-5.1.100mdk.noarch.rpm
 0663b045d478f4b72fff103e431e4405  amd64/10.0/RPMS/mandrake-doc-it-10.0-5.1.100mdk.noarch.rpm
 81be5b369a12ff21b9ef28c338c4a673  amd64/10.0/RPMS/mandrake-doc-zh_cn-10.0-5.1.100mdk.noarch.rpm
 1a63131f4bd5ddf1fe74fa70b4f85e90  amd64/10.0/SRPMS/mandrake-doc-10.0-5.1.100mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrakeUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandrakesoft for security.  You can obtain
 the GPG public key of the Mandrakelinux Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandrakelinux at:

  http://www.mandrakesoft.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_linux-mandrake.com

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Linux Mandrake Security Team
  <security linux-mandrake.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQFAtTUhmqjQ0CJFipgRAitnAJ4yBAeWMG5g1pFzPjT6nPa79u4QQwCfbBR+
SWjzRGqXaCi0GZbllVNUhuA=
=FC3S
-----END PGP SIGNATURE-----


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ