[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Full-disclosure] [ MDVSA-2011:072 ] gwenhywfar



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2011:072
 http://www.mandriva.com/security/
 _______________________________________________________________________

 Package : gwenhywfar
 Date    : April 8, 2011
 Affected: 2009.0, 2010.0, 2010.1
 _______________________________________________________________________

 Problem Description:

 It was discovered that gwenhywfar was using an old private copy
 of the ca-bundle.crt file containing the root CA certs, this
 has now been resolved so that it uses the system wide and up to
 date /etc/pki/tls/certs/ca-bundle.crt file last updated with the
 MDVSA-2011:068 advisory.
 
 Packages for 2009.0 are provided as of the Extended Maintenance
 Program. Please visit this link to learn more:
 http://store.mandriva.com/product_info.php?cPath=149&products_id=490
 
 The updated packages provides a solution to this issue.
 _______________________________________________________________________

 References:

 http://www.mandriva.com/security/advisories?name=MDVSA-2011:068
 _______________________________________________________________________

 Updated Packages:

 Mandriva Linux 2009.0:
 811d96859d12953907351809701c55f7  
2009.0/i586/gwenhywfar-3.4.1-1.1mdv2009.0.i586.rpm
 62d04021fe4cf62abdced566bd27cefa  
2009.0/i586/libgwenhywfar47-3.4.1-1.1mdv2009.0.i586.rpm
 088b5308b6ebccd7a73ba7a671c4a370  
2009.0/i586/libgwenhywfar-devel-3.4.1-1.1mdv2009.0.i586.rpm 
 7c9a8e43b915eeaee0d3fdb82bb1fad3  
2009.0/SRPMS/gwenhywfar-3.4.1-1.1mdv2009.0.src.rpm

 Mandriva Linux 2009.0/X86_64:
 bd71be080aad318dc803d9f696f23a74  
2009.0/x86_64/gwenhywfar-3.4.1-1.1mdv2009.0.x86_64.rpm
 f757e5f34e6eca8536f4b1ba448c4b90  
2009.0/x86_64/lib64gwenhywfar47-3.4.1-1.1mdv2009.0.x86_64.rpm
 4637037b3be2162c3aa5f2331a143305  
2009.0/x86_64/lib64gwenhywfar-devel-3.4.1-1.1mdv2009.0.x86_64.rpm 
 7c9a8e43b915eeaee0d3fdb82bb1fad3  
2009.0/SRPMS/gwenhywfar-3.4.1-1.1mdv2009.0.src.rpm

 Mandriva Linux 2010.0:
 abf1c4ea89688553bb2df5246043fdb9  
2010.0/i586/gwenhywfar-3.11.1-2.1mdv2010.0.i586.rpm
 12f8020929354bbfb50e8500cd1a9d86  
2010.0/i586/libgwenhywfar47-3.11.1-2.1mdv2010.0.i586.rpm
 6e3818e635f7d011fb3e856cd4aded75  
2010.0/i586/libgwenhywfar-devel-3.11.1-2.1mdv2010.0.i586.rpm 
 4a2931689566732637709b54cdf4f15a  
2010.0/SRPMS/gwenhywfar-3.11.1-2.1mdv2010.0.src.rpm

 Mandriva Linux 2010.0/X86_64:
 32e826fcdbe5c3715276ea105e0ce2a4  
2010.0/x86_64/gwenhywfar-3.11.1-2.1mdv2010.0.x86_64.rpm
 714c01ca9e2974d44630cfef060193c9  
2010.0/x86_64/lib64gwenhywfar47-3.11.1-2.1mdv2010.0.x86_64.rpm
 3de90121de80bb3b730296a27997d2fb  
2010.0/x86_64/lib64gwenhywfar-devel-3.11.1-2.1mdv2010.0.x86_64.rpm 
 4a2931689566732637709b54cdf4f15a  
2010.0/SRPMS/gwenhywfar-3.11.1-2.1mdv2010.0.src.rpm

 Mandriva Linux 2010.1:
 3c6e8ba590aea440d92c57e7267c64a0  
2010.1/i586/gwenhywfar-3.11.7-3.1mdv2010.2.i586.rpm
 4d785ef8281a3715bd0b470e7f5c4c30  
2010.1/i586/libgwengui-qt4_0-3.11.7-3.1mdv2010.2.i586.rpm
 0827599f64cda026ed0a64c8d3a57727  
2010.1/i586/libgwenhywfar47-3.11.7-3.1mdv2010.2.i586.rpm
 5deb750ec7ebd459b479e2dcddfa3603  
2010.1/i586/libgwenhywfar-devel-3.11.7-3.1mdv2010.2.i586.rpm 
 beef69ebe1b9fc656b6ceae2e57baf26  
2010.1/SRPMS/gwenhywfar-3.11.7-3.1mdv2010.2.src.rpm

 Mandriva Linux 2010.1/X86_64:
 503174ac9838d143b49def264366c0a0  
2010.1/x86_64/gwenhywfar-3.11.7-3.1mdv2010.2.x86_64.rpm
 c5b5481a59bfbd44f15aa84b6cc36168  
2010.1/x86_64/lib64gwengui-qt4_0-3.11.7-3.1mdv2010.2.x86_64.rpm
 97b9b4a9fa662f588f7e3dcf80616d7b  
2010.1/x86_64/lib64gwenhywfar47-3.11.7-3.1mdv2010.2.x86_64.rpm
 1181a43602b7c19183176cc331da9730  
2010.1/x86_64/lib64gwenhywfar-devel-3.11.7-3.1mdv2010.2.x86_64.rpm 
 beef69ebe1b9fc656b6ceae2e57baf26  
2010.1/SRPMS/gwenhywfar-3.11.7-3.1mdv2010.2.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFNnu3SmqjQ0CJFipgRAlHfAKCyU+Cxq18vYLoRLxgeT1/VFD/mVQCdFxb0
7iYnExioYbnYptje90gDrnU=
=O2Fq
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/