Jump to content

NEW UPDATES MDK 9.1 !!


Bruno

Recommended Posts

Mandrake Linux Security Update AdvisoryPackage name: kdelibsAdvisory ID: MDKSA-2003:079Date: July 31st, 2003Affected versions: 9.0, 9.1, Corporate Server 2.1Problem Description:A vulnerability in Konqueror was discovered where it could inadvertently send authentication credentials to websites other than the intended site in clear text via the HTTP-referer header when authentication credentials are passed as part of a URL in the form http://user:password@host/.The provided packages have a patch that corrects this issue. Full Article

Link to comment
Share on other sites

  • Replies 90
  • Created
  • Last Reply

Top Posters In This Topic

  • Bruno

    27

  • quint

    24

  • nlinecomputers

    20

  • havnblast

    6

Security updates: ( on ALL mirrors now ) Name: mpg123 Version: 0.59r-17.1mdk Name: xpdf Version: 2.01-2.2mdk Total: 11MBB) Bruno
Thank you, Bruno, first order of business after the vacation....updates. :angry: My, have there been so many interesting posts/threads - guess there will be no sleep tonight! :rolleyes:
Link to comment
Share on other sites

Security updates: ( on ALL mirrors now ) Name: mpg123 Version: 0.59r-17.1mdk Name: xpdf Version: 2.01-2.2mdk Total: 11MBB) Bruno
Thank you, Bruno, first order of business after the vacation....updates. :angry: My, have there been so many interesting posts/threads - guess there will be no sleep tonight! :rolleyes:
Welcome back Quint..Hope you had a great..good to have you back where you belong...
Link to comment
Share on other sites

Again a few security updates: Name: kdelibs Version: 3.1-58.2mdk Name: kdelibs-common Version: 3.1-58.2mdk Name: kdelibs-devel Version: 3.1-58.2mdk Total: 31 MB :lol: Bruno

Link to comment
Share on other sites

  • 2 weeks later...
nlinecomputers

New Mandrake updates!

-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1________________________________________________________________________                Mandrake Linux Security Update Advisory ________________________________________________________________________Package name:           eroasterAdvisory ID:            MDKSA-2003:083Date:                   August 19th, 2003Affected versions:	9.0, 9.1, Corporate Server 2.1________________________________________________________________________Problem Description: A vulnerability was discovered in eroaster where it does not take any  security precautions when creating a temporary file for the lockfile.  This vulnerability could be exploited to overwrite arbitrary files with  the privileges of the user running eroaster. ________________________________________________________________________References:    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0656________________________________________________________________________Updated Packages:   Corporate Server 2.1: 381dd0ff7119ea907f3e7c91125ed3d4  corporate/2.1/RPMS/eroaster-2.1.0-6.1mdk.noarch.rpm 859fd6b2fe922be90f2594e4b7e0a8f5  corporate/2.1/SRPMS/eroaster-2.1.0-6.1mdk.src.rpm Mandrake Linux 9.0: 381dd0ff7119ea907f3e7c91125ed3d4  9.0/RPMS/eroaster-2.1.0-6.1mdk.noarch.rpm 859fd6b2fe922be90f2594e4b7e0a8f5  9.0/SRPMS/eroaster-2.1.0-6.1mdk.src.rpm Mandrake Linux 9.1: 24914649a0aefd1733b474e44509baf0  9.1/RPMS/eroaster-2.1.0-6.1mdk.noarch.rpm 859fd6b2fe922be90f2594e4b7e0a8f5  9.1/SRPMS/eroaster-2.1.0-6.1mdk.src.rpm________________________________________________________________________Bug IDs fixed (see https://qa.mandrakesoft.com for more information): ________________________________________________________________________To upgrade automatically, use MandrakeUpdate or urpmi.  The verification of md5 checksums and GPG signatures is performed automatically for you.A list of FTP mirrors can be obtained from:  http://www.mandrakesecure.net/en/ftp.phpAll packages are signed by MandrakeSoft for security.  You can obtain the GPG public key of the Mandrake Linux Security Team by executing:  gpg --recv-keys --keyserver www.mandrakesecure.net 0x22458A98Please be aware that sometimes it takes the mirrors a few hours to update.You can view other update advisories for Mandrake Linux at:  http://www.mandrakesecure.net/en/advisories/MandrakeSoft has several security-related mailing list services that anyone can subscribe to.  Information on these lists can be obtained byvisiting:  http://www.mandrakesecure.net/en/mlist.phpIf you want to report vulnerabilities, please contact  security_linux-mandrake.comType Bits/KeyID     Date       User IDpub  1024D/22458A98 2000-07-10 Linux Mandrake Security Team  <security linux-mandrake.com>-----BEGIN PGP SIGNATURE-----Version: GnuPG v1.0.7 (GNU/Linux)iD8DBQE/Qp5hmqjQ0CJFipgRAsOsAKDI6mhC6g0tVSYFqGwp0MVfKkl5OwCgwMLIDQnQBzfDA/RCEjBA5+qcHuI==giof-----END PGP SIGNATURE-----

Link to comment
Share on other sites

nlinecomputers

Another new Mandrake update.Should be on most FTP servers.

-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1________________________________________________________________________                Mandrake Linux Security Update Advisory ________________________________________________________________________Package name:        unzipAdvisory ID:            MDKSA-2003:073-1Date:                August 19th, 2003Original Advisory Date: July 7th, 2003Affected versions: 8.2, 9.0, 9.1, Corporate Server 2.1, Multi Network Firewall 8.2 ________________________________________________________________________Problem Description: A vulnerability was discovered in unzip 5.50 and earlier that allows  attackers to overwrite arbitrary files during archive extraction by  placing non-printable characters between two "." characters.  These  invalid characters are filtered which results in a ".." sequence. The patch applied to these packages prevents unzip from writing to parent directories unless the "-:" command line option is used.   Update: Ben Laurie found that the original patch used to fix this issue missed  a case where the path component included a quoted slash.  An updated  patch was used to build these packages. ________________________________________________________________________References:    http://cve.mitre.org/cgi-bin/cvename.cgi?n...e=CAN-2003-0282  http://marc.theaimsgroup.com/?l=bugtraq&m=...105259038503175________________________________________________________________________Updated Packages:  Corporate Server 2.1: eb83a1f819f0407da2a6abe8f9470e6d  corporate/2.1/RPMS/unzip-5.50-4.2mdk.i586.rpm ece7c5edb30cb80c00e902a61126e68d  corporate/2.1/SRPMS/unzip-5.50-4.2mdk.src.rpm Corporate Server 2.1/x86_64: 53ecb5284909bec78ef0b570dfbabf89  x86_64/corporate/2.1/RPMS/unzip-5.50-4.2mdk.x86_64.rpm ece7c5edb30cb80c00e902a61126e68d  x86_64/corporate/2.1/SRPMS/unzip-5.50-4.2mdk.src.rpm Mandrake Linux 8.2: da00ebf987ca4200ce2ed926bf4adaeb  8.2/RPMS/unzip-5.50-4.2mdk.i586.rpm ece7c5edb30cb80c00e902a61126e68d  8.2/SRPMS/unzip-5.50-4.2mdk.src.rpm Mandrake Linux 8.2/PPC: 07252553006b6d428289f4fdfadf46fd  ppc/8.2/RPMS/unzip-5.50-4.2mdk.ppc.rpm ece7c5edb30cb80c00e902a61126e68d  ppc/8.2/SRPMS/unzip-5.50-4.2mdk.src.rpm Mandrake Linux 9.0: eb83a1f819f0407da2a6abe8f9470e6d  9.0/RPMS/unzip-5.50-4.2mdk.i586.rpm ece7c5edb30cb80c00e902a61126e68d  9.0/SRPMS/unzip-5.50-4.2mdk.src.rpm Mandrake Linux 9.1: 32f6a6726eb9cfe5d76aec74a71228d1  9.1/RPMS/unzip-5.50-4.2mdk.i586.rpm ece7c5edb30cb80c00e902a61126e68d  9.1/SRPMS/unzip-5.50-4.2mdk.src.rpm Mandrake Linux 9.1/PPC: c4cc4eb7e92026ce5264daa57a42ce98  ppc/9.1/RPMS/unzip-5.50-4.2mdk.ppc.rpm ece7c5edb30cb80c00e902a61126e68d  ppc/9.1/SRPMS/unzip-5.50-4.2mdk.src.rpm Multi Network Firewall 8.2: da00ebf987ca4200ce2ed926bf4adaeb  mnf8.2/RPMS/unzip-5.50-4.2mdk.i586.rpm ece7c5edb30cb80c00e902a61126e68d  mnf8.2/SRPMS/unzip-5.50-4.2mdk.src.rpm________________________________________________________________________Bug IDs fixed (see https://qa.mandrakesoft.com for more information): ________________________________________________________________________To upgrade automatically, use MandrakeUpdate or urpmi.  The verification of md5 checksums and GPG signatures is performed automatically for you.A list of FTP mirrors can be obtained from:  http://www.mandrakesecure.net/en/ftp.phpAll packages are signed by MandrakeSoft for security.  You can obtain the GPG public key of the Mandrake Linux Security Team by executing:  gpg --recv-keys --keyserver www.mandrakesecure.net 0x22458A98Please be aware that sometimes it takes the mirrors a few hours to update.You can view other update advisories for Mandrake Linux at:  http://www.mandrakesecure.net/en/advisories/MandrakeSoft has several security-related mailing list services that anyone can subscribe to.  Information on these lists can be obtained byvisiting:  http://www.mandrakesecure.net/en/mlist.phpIf you want to report vulnerabilities, please contact  security_linux-mandrake.comType Bits/KeyID  Date    User IDpub  1024D/22458A98 2000-07-10 Linux Mandrake Security Team  <security linux-mandrake.com>-----BEGIN PGP SIGNATURE-----Version: GnuPG v1.0.7 (GNU/Linux)iD8DBQE/Qp3VmqjQ0CJFipgRAjKdAJ9UOGzitUPXii6vQV+2ZivlAOAE8wCg1VEhgh8LLfztS4SwVNXFFMxzMNE==JW9+-----END PGP SIGNATURE-----
Link to comment
Share on other sites

nlinecomputers

Updates to gdm packages.

-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1________________________________________________________________________                Mandrake Linux Security Update Advisory ________________________________________________________________________Package name:        gdmAdvisory ID:            MDKSA-2003:085Date:                August 21st, 2003Affected versions: 9.0, 9.1, Corporate Server 2.1________________________________________________________________________Problem Description: Several vulnerabilities were discovered in versions of gdm prior to  2.4.1.6.  The first vulnerability is that any user can read any text  file on the system due to code originally written to be run as the user  logging in was in fact being run as the root user.  This code is what  allows the examination of the ~/.xsession-errors file.  If a user makes  a symlink from this file to any other file on the system during the  session and ensures that the session lasts less than ten seconds, the  user can read the file provided it was readable as a text file. Another two vulnerabilities were found in the XDMCP code that could be  exploited to crash the main gdm daemon which would inhibit starting  any new sessions (although the current session would be unaffected).  The first problem here is due to the indirect query structure being  used right after being freed due to a missing 'continue' statement in a  loop; this happens if a choice of server expired and the client tried  to connect. The second XDMCP problem is that when authorization data is being  checked as a string, the length is not checked first.  If the data is  less than 18 bytes long, the daemon may wander off the end of the  string a few bytes in the strncmp which could cause a SEGV. These updated packages bring gdm to version 2.4.1.6 which is not  vulnerable to any of these problems.  Also note that XDMCP support is  disabled by default in gdm. ________________________________________________________________________References:    http://cve.mitre.org/cgi-bin/cvename.cgi?n...e=CAN-2003-0547  http://cve.mitre.org/cgi-bin/cvename.cgi?n...e=CAN-2003-0548  http://cve.mitre.org/cgi-bin/cvename.cgi?n...e=CAN-2003-0549________________________________________________________________________Updated Packages:  Corporate Server 2.1: 47a2d84bfff0e842657e789e085b434d  corporate/2.1/RPMS/gdm-2.4.1.6-0.2mdk.i586.rpm 8536d89374219e42ad6ca6c441ffb0d1  corporate/2.1/RPMS/gdm-Xnest-2.4.1.6-0.2mdk.i586.rpm 35ab7f8231548f1daa4571bfb5e77054  corporate/2.1/SRPMS/gdm-2.4.1.6-0.2mdk.src.rpm Corporate Server 2.1/x86_64: 252fc231c85e88411ca50a05f0404688  x86_64/corporate/2.1/RPMS/gdm-2.4.1.6-0.2mdk.x86_64.rpm 3f8b47c14e0d7fc4c2d76171e3ee0b5a  x86_64/corporate/2.1/RPMS/gdm-Xnest-2.4.1.6-0.2mdk.x86_64.rpm 35ab7f8231548f1daa4571bfb5e77054  x86_64/corporate/2.1/SRPMS/gdm-2.4.1.6-0.2mdk.src.rpm Mandrake Linux 9.0: 47a2d84bfff0e842657e789e085b434d  9.0/RPMS/gdm-2.4.1.6-0.2mdk.i586.rpm 8536d89374219e42ad6ca6c441ffb0d1  9.0/RPMS/gdm-Xnest-2.4.1.6-0.2mdk.i586.rpm 35ab7f8231548f1daa4571bfb5e77054  9.0/SRPMS/gdm-2.4.1.6-0.2mdk.src.rpm Mandrake Linux 9.1: 9d8a97cc5f475f16eeb73caa9d7d8e6b  9.1/RPMS/gdm-2.4.1.6-0.3mdk.i586.rpm 4f866c5b5b4903d1b0751bcb6dc28d0f  9.1/RPMS/gdm-Xnest-2.4.1.6-0.3mdk.i586.rpm 91f0ff2421135e32f604d6cb82081439  9.1/SRPMS/gdm-2.4.1.6-0.3mdk.src.rpm Mandrake Linux 9.1/PPC: 0cb8fbd74766c4d0036cab36d57b6081  ppc/9.1/RPMS/gdm-2.4.1.6-0.3mdk.ppc.rpm fb0df358c4d6c9a7cf3982c4d3258004  ppc/9.1/RPMS/gdm-Xnest-2.4.1.6-0.3mdk.ppc.rpm 91f0ff2421135e32f604d6cb82081439  ppc/9.1/SRPMS/gdm-2.4.1.6-0.3mdk.src.rpm________________________________________________________________________Bug IDs fixed (see https://qa.mandrakesoft.com for more information): ________________________________________________________________________To upgrade automatically, use MandrakeUpdate or urpmi.  The verification of md5 checksums and GPG signatures is performed automatically for you.A list of FTP mirrors can be obtained from:  http://www.mandrakesecure.net/en/ftp.phpAll packages are signed by MandrakeSoft for security.  You can obtain the GPG public key of the Mandrake Linux Security Team by executing:  gpg --recv-keys --keyserver www.mandrakesecure.net 0x22458A98Please be aware that sometimes it takes the mirrors a few hours to update.You can view other update advisories for Mandrake Linux at:  http://www.mandrakesecure.net/en/advisories/MandrakeSoft has several security-related mailing list services that anyone can subscribe to.  Information on these lists can be obtained byvisiting:  http://www.mandrakesecure.net/en/mlist.phpIf you want to report vulnerabilities, please contact  security_linux-mandrake.comType Bits/KeyID  Date    User IDpub  1024D/22458A98 2000-07-10 Linux Mandrake Security Team  <security linux-mandrake.com>-----BEGIN PGP SIGNATURE-----Version: GnuPG v1.0.7 (GNU/Linux)iD8DBQE/RV9ymqjQ0CJFipgRAuI9AJ9ALXjOCO0zsDVeWMY/L9kaQeP6PgCfVm9+vHw6ApiFh0+4XY4+LhywMGY==mVs6-----END PGP SIGNATURE-----
Link to comment
Share on other sites

Mandrake Linux Security Update AdvisoryPackage name: sendmailAdvisory ID: MDKSA-2003:086Date: August 26th, 2003Affected versions: 8.2, 9.0, Corporate Server 2.1Problem Description:A vulnerability was discovered in all 8.12.x versions of sendmail up to and including 8.12.8. Due to wrong initialization of RESOURCE_RECORD_T structures, if sendmail receives a bad DNS reply it will call free() on random addresses which usually causes sendmail to crash.View Article and Fix

Link to comment
Share on other sites

" Mandrake Linux Security Update AdvisoryPackage name: gkrellmAdvisory ID: MDKSA-2003:087Date: August 28th, 2003Affected versions: 9.1Problem Description:A buffer overflow was discovered in gkrellmd, the server component of the gkrellm monitor package, in versions of gkrellm 2.1.x prior to 2.1.14. This buffer overflow occurs while reading data from connected gkrellm clients and can lead to possible arbitrary code execution as the user running the gkrellmd server. "View Article and Fix

Link to comment
Share on other sites

MandrakeSoft Security Advisory MDKSA-2003:088 : pam_ldap Package name  pam_ldap Date  September 2nd, 2003 Advisory ID  MDKSA-2003:088 Affected versions  9.1 Synopsis  Updated pam_ldap packages fix vulnerability with pam filtering   Problem Description A bug was fixed in pam_ldap 162 with the pam_filter mechanism which is commonly used for host-based access restriction in environments using LDAP for authentication. Mandrake Linux 9.1 provided pam_ldap 161 which had this problem and as a result, systems relying on pam_filter for host-based access restriction would allow any user, regardless of the host attribute associated with their account, to log into the system. All users who use LDAP-based authentication are encouraged to upgrade immediately.
:P Bruno
Link to comment
Share on other sites

Thanks, Bruno...this is the only problem in having nine distros...log-out, re-boot into another distro, update, repeat..."but I do love it so" (to quote Patton).

Link to comment
Share on other sites

  • 2 weeks later...
nlinecomputers

Buffer Management Vulnerability in OpenSSH. Patch your systems an exploit is IN THE WILD now!!!

________________________________________________________________________                Mandrake Linux Security Update Advisory________________________________________________________________________Package name:           opensshAdvisory ID:            MDKSA-2003:090Date:                   September 16th, 2003Affected versions:	8.2, 9.0, 9.1, Corporate Server 2.1, 	 Multi Network Firewall 8.2________________________________________________________________________Problem Description: A buffer management error was discovered in all versions of openssh prior to version 3.7.  According to the OpenSSH team's advisory: "It is uncertain whether this error is potentially exploitable, however, we prefer to see bugs fixed proactively."  There have also been reports of an exploit in the wild.  MandrakeSoft encourages all users to upgrade to these patched openssh packages immediately and to disable sshd until you are able to upgrade if at all possible.________________________________________________________________________References:    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0693  http://www.kb.cert.org/vuls/id/333628  http://www.openssh.com/txt/buffer.adv________________________________________________________________________Updated Packages:   Corporate Server 2.1: 5800ea0b5c436851c04e153a2d8b7706  corporate/2.1/RPMS/openssh-3.6.1p2-1.1.90mdk.i586.rpm ca2a0c392a3b2400139b4bfbdd61121a  corporate/2.1/RPMS/openssh-askpass-3.6.1p2-1.1.90mdk.i586.rpm 51b4d8bcc2e3c92850dd29a41da1ecbc  corporate/2.1/RPMS/openssh-askpass-gnome-3.6.1p2-1.1.90mdk.i586.rpm dd421c26a2c1b5092cc1947394f87cfa  corporate/2.1/RPMS/openssh-clients-3.6.1p2-1.1.90mdk.i586.rpm 933a01509877c76a2c16b4c129bd7bbe  corporate/2.1/RPMS/openssh-server-3.6.1p2-1.1.90mdk.i586.rpm 54299aeb96b49e1d8ef6a4dcc826eba1  corporate/2.1/SRPMS/openssh-3.6.1p2-1.1.90mdk.src.rpm Corporate Server 2.1/x86_64: 5da7de9e35a314a9acc21ee0024c8a55  x86_64/corporate/2.1/RPMS/openssh-3.6.1p2-1.1.90mdk.x86_64.rpm fb60f30f5241741ef2276d8616553a84  x86_64/corporate/2.1/RPMS/openssh-askpass-3.6.1p2-1.1.90mdk.x86_64.rpm c41f38e43f87231c639f6a0fcbb2d065  x86_64/corporate/2.1/RPMS/openssh-askpass-gnome-3.6.1p2-1.1.90mdk.x86_64.rpm c826364829aba4704f1b5435b4ab3319  x86_64/corporate/2.1/RPMS/openssh-clients-3.6.1p2-1.1.90mdk.x86_64.rpm 7b4f9e6970d4bc7ef7ac55e7824247c6  x86_64/corporate/2.1/RPMS/openssh-server-3.6.1p2-1.1.90mdk.x86_64.rpm 54299aeb96b49e1d8ef6a4dcc826eba1  x86_64/corporate/2.1/SRPMS/openssh-3.6.1p2-1.1.90mdk.src.rpm Mandrake Linux 8.2: eb32286108c21f58ac51d782151539b0  8.2/RPMS/openssh-3.6.1p2-1.1.82mdk.i586.rpm 0267fc6f4c0d893e435b7445fb9f6a23  8.2/RPMS/openssh-askpass-3.6.1p2-1.1.82mdk.i586.rpm 69a090f67dd853d4e60f6905eeeadf20  8.2/RPMS/openssh-askpass-gnome-3.6.1p2-1.1.82mdk.i586.rpm 96e50b6c68e657cc01911414e6836f73  8.2/RPMS/openssh-clients-3.6.1p2-1.1.82mdk.i586.rpm f52c7678f32ca9cde888068620fb375d  8.2/RPMS/openssh-server-3.6.1p2-1.1.82mdk.i586.rpm f96f920c60fe9961f107605e60dc0697  8.2/SRPMS/openssh-3.6.1p2-1.1.82mdk.src.rpm Mandrake Linux 8.2/PPC: 14904d382bc45ae8346202bdc75ccee7  ppc/8.2/RPMS/openssh-3.6.1p2-1.1.82mdk.ppc.rpm 8012ca8e133f76d0a7034945603f4e90  ppc/8.2/RPMS/openssh-askpass-3.6.1p2-1.1.82mdk.ppc.rpm aa3658d57bacf80a2bc6750a832f7ff8  ppc/8.2/RPMS/openssh-askpass-gnome-3.6.1p2-1.1.82mdk.ppc.rpm 683f8b21c9887f9160efa0cf7211caf0  ppc/8.2/RPMS/openssh-clients-3.6.1p2-1.1.82mdk.ppc.rpm a919fcf54371e12ece94b84883cdf058  ppc/8.2/RPMS/openssh-server-3.6.1p2-1.1.82mdk.ppc.rpm f96f920c60fe9961f107605e60dc0697  ppc/8.2/SRPMS/openssh-3.6.1p2-1.1.82mdk.src.rpm Mandrake Linux 9.0: 5800ea0b5c436851c04e153a2d8b7706  9.0/RPMS/openssh-3.6.1p2-1.1.90mdk.i586.rpm ca2a0c392a3b2400139b4bfbdd61121a  9.0/RPMS/openssh-askpass-3.6.1p2-1.1.90mdk.i586.rpm 51b4d8bcc2e3c92850dd29a41da1ecbc  9.0/RPMS/openssh-askpass-gnome-3.6.1p2-1.1.90mdk.i586.rpm dd421c26a2c1b5092cc1947394f87cfa  9.0/RPMS/openssh-clients-3.6.1p2-1.1.90mdk.i586.rpm 933a01509877c76a2c16b4c129bd7bbe  9.0/RPMS/openssh-server-3.6.1p2-1.1.90mdk.i586.rpm 54299aeb96b49e1d8ef6a4dcc826eba1  9.0/SRPMS/openssh-3.6.1p2-1.1.90mdk.src.rpm Mandrake Linux 9.1: b428536c41761ef1295a5c424fe7090f  9.1/RPMS/openssh-3.6.1p2-1.1.91mdk.i586.rpm 6b0f784e9a9eb0a5f81682cfed347533  9.1/RPMS/openssh-askpass-3.6.1p2-1.1.91mdk.i586.rpm 1de0d5a790a8b049d936a66f9cbef637  9.1/RPMS/openssh-askpass-gnome-3.6.1p2-1.1.91mdk.i586.rpm 8be79fe54ec8fa4e6e262747b9a266f6  9.1/RPMS/openssh-clients-3.6.1p2-1.1.91mdk.i586.rpm 43c07ba3f3f4ba38f5d215dc1e62b19d  9.1/RPMS/openssh-server-3.6.1p2-1.1.91mdk.i586.rpm 6c50e55e209175d774c39512e31da4ff  9.1/SRPMS/openssh-3.6.1p2-1.1.91mdk.src.rpm Mandrake Linux 9.1/PPC: cea0afcd1c654e52eaeafde47e0b9cdd  ppc/9.1/RPMS/openssh-3.6.1p2-1.1.91mdk.ppc.rpm 937cafe7c1d2bc005bde44157a3ce32a  ppc/9.1/RPMS/openssh-askpass-3.6.1p2-1.1.91mdk.ppc.rpm b96a79881c74002e80088e73b0b5420a  ppc/9.1/RPMS/openssh-askpass-gnome-3.6.1p2-1.1.91mdk.ppc.rpm c11f8f2648eda9d127f7cbf4e20dd768  ppc/9.1/RPMS/openssh-clients-3.6.1p2-1.1.91mdk.ppc.rpm 65761615af545350699e27771761acd0  ppc/9.1/RPMS/openssh-server-3.6.1p2-1.1.91mdk.ppc.rpm 6c50e55e209175d774c39512e31da4ff  ppc/9.1/SRPMS/openssh-3.6.1p2-1.1.91mdk.src.rpm Multi Network Firewall 8.2: eb32286108c21f58ac51d782151539b0  mnf8.2/RPMS/openssh-3.6.1p2-1.1.82mdk.i586.rpm 96e50b6c68e657cc01911414e6836f73  mnf8.2/RPMS/openssh-clients-3.6.1p2-1.1.82mdk.i586.rpm f52c7678f32ca9cde888068620fb375d  mnf8.2/RPMS/openssh-server-3.6.1p2-1.1.82mdk.i586.rpm f96f920c60fe9961f107605e60dc0697  mnf8.2/SRPMS/openssh-3.6.1p2-1.1.82mdk.src.rpm________________________________________________________________________Bug IDs fixed (see https://qa.mandrakesoft.com for more information):________________________________________________________________________To upgrade automatically, use MandrakeUpdate or urpmi.  The verificationof md5 checksums and GPG signatures is performed automatically for you.A list of FTP mirrors can be obtained from:  http://www.mandrakesecure.net/en/ftp.phpAll packages are signed by MandrakeSoft for security.  You can obtainthe GPG public key of the Mandrake Linux Security Team by executing:  gpg --recv-keys --keyserver www.mandrakesecure.net 0x22458A98Please be aware that sometimes it takes the mirrors a few hours toupdate.You can view other update advisories for Mandrake Linux at:  http://www.mandrakesecure.net/en/advisories/MandrakeSoft has several security-related mailing list services thatanyone can subscribe to.  Information on these lists can be obtained byvisiting:  http://www.mandrakesecure.net/en/mlist.phpIf you want to report vulnerabilities, please contact  security_linux-mandrake.comType Bits/KeyID     Date       User IDpub  1024D/22458A98 2000-07-10 Linux Mandrake Security Team  <security linux-mandrake.com>

Link to comment
Share on other sites

nlinecomputers
________________________________________________________________________                Mandrake Linux Security Update Advisory________________________________________________________________________Package name:        kdebaseAdvisory ID:            MDKSA-2003:091Date:                September 16th, 2003Affected versions: 9.0, 9.1, Corporate Server 2.1________________________________________________________________________Problem Description: A vulnerability was discovered in all versions of KDE 2.2.0 up to and including 3.1.3.  KDM does not check for successful completion of the pam_setcred() call and in the case of error conditions in the installed PAM modules, KDM may grant local root access to any user with valid login credentials.  It has been reported to the KDE team that a certain configuration of the MIT pam_krb5 module can result in a failing pam_setcred() call which leaves the session alive and would provide root access to any regular user.  It is also possible that this vulnerability can likewise be exploited with other PAM modules in a similar manner. Another vulnerability was discovered in kdm where the cookie session generating algorithm was considered too weak to supply a full 128 bits of entropy.  This allowed unauthorized users to brute-force the session cookie. mdkkdm, a specialized version of kdm, is likewise vulnerable to these problems and has been patched as well.________________________________________________________________________References:    http://cve.mitre.org/cgi-bin/cvename.cgi?n...e=CAN-2003-0690  http://cve.mitre.org/cgi-bin/cvename.cgi?n...e=CAN-2003-0692  http://www.kde.org/info/security/advisory-...-20030916-1.txt  http://cert.uni-stuttgart.de/archive/suse/...2/msg00101.html________________________________________________________________________Updated Packages:  Corporate Server 2.1: b16612d8f4e68781cecaf9d32e12c50c  corporate/2.1/RPMS/kdebase-3.0.5a-1.4mdk.i586.rpm a80f6c8029c536d59f92fcf7bcf1abd5  corporate/2.1/RPMS/kdebase-devel-3.0.5a-1.4mdk.i586.rpm ae02c014e1994c25a1ee23a7eee8095c  corporate/2.1/RPMS/kdebase-nsplugins-3.0.5a-1.4mdk.i586.rpm f9ebdbc69440ca1d11fcd5653f8173d6  corporate/2.1/SRPMS/kdebase-3.0.5a-1.4mdk.src.rpm Corporate Server 2.1/x86_64: cf6fbbfee865b54584632655fa019ee3  x86_64/corporate/2.1/RPMS/kdebase-3.0.5-2.2mdk.x86_64.rpm 08867a45c5be3c48bbd4c93ced0b6ebb  x86_64/corporate/2.1/RPMS/kdebase-devel-3.0.5-2.2mdk.x86_64.rpm cf53476849eb402be28d6a52ac86a218  x86_64/corporate/2.1/RPMS/kdebase-nsplugins-3.0.5-2.2mdk.x86_64.rpm a1ee293f258c76a720310183f0c4dda4  x86_64/corporate/2.1/SRPMS/kdebase-3.0.5-2.2mdk.src.rpm Mandrake Linux 9.0: b16612d8f4e68781cecaf9d32e12c50c  9.0/RPMS/kdebase-3.0.5a-1.4mdk.i586.rpm a80f6c8029c536d59f92fcf7bcf1abd5  9.0/RPMS/kdebase-devel-3.0.5a-1.4mdk.i586.rpm ae02c014e1994c25a1ee23a7eee8095c  9.0/RPMS/kdebase-nsplugins-3.0.5a-1.4mdk.i586.rpm f9ebdbc69440ca1d11fcd5653f8173d6  9.0/SRPMS/kdebase-3.0.5a-1.4mdk.src.rpm Mandrake Linux 9.1: 06423402c174ef11a64bd0ed44c4a624  9.1/RPMS/kdebase-3.1-83.5mdk.i586.rpm bfa3c991495ec60d87858cd1563353ab  9.1/RPMS/kdebase-devel-3.1-83.5mdk.i586.rpm cfef59c2e6d2c0faf7469ab2d036e091  9.1/RPMS/kdebase-kdm-3.1-83.5mdk.i586.rpm ab122d6e7931a96d239e0aa6db401ffa  9.1/RPMS/kdebase-nsplugins-3.1-83.5mdk.i586.rpm dbcedf83b6ed92afb8d30bdf54ec38d5  9.1/RPMS/mdkkdm-9.1-24.2mdk.i586.rpm dc8f0c5f34088514900266eeaeff63bb  9.1/SRPMS/kdebase-3.1-83.5mdk.src.rpm d5c82813906df0100a099e10a030672b  9.1/SRPMS/mdkkdm-9.1-24.2mdk.src.rpm Mandrake Linux 9.1/PPC: a34824fd162a8ce79258c4db2f2c2d56  ppc/9.1/RPMS/kdebase-3.1-83.5mdk.ppc.rpm 2f3bb4c00a78faa0792dd0353b6e09f2  ppc/9.1/RPMS/kdebase-devel-3.1-83.5mdk.ppc.rpm 818e187fcc9328683fd8e33044c43a78  ppc/9.1/RPMS/kdebase-kdm-3.1-83.5mdk.ppc.rpm 63a508bdfc7040697fd200c9f580204b  ppc/9.1/RPMS/kdebase-nsplugins-3.1-83.5mdk.ppc.rpm 499cd7d3f1e4cc7b1276c0f9eed1c0cf  ppc/9.1/RPMS/mdkkdm-9.1-24.2mdk.ppc.rpm dc8f0c5f34088514900266eeaeff63bb  ppc/9.1/SRPMS/kdebase-3.1-83.5mdk.src.rpm d5c82813906df0100a099e10a030672b  ppc/9.1/SRPMS/mdkkdm-9.1-24.2mdk.src.rpm________________________________________________________________________Bug IDs fixed (see https://qa.mandrakesoft.com for more information):________________________________________________________________________To upgrade automatically, use MandrakeUpdate or urpmi.  The verificationof md5 checksums and GPG signatures is performed automatically for you.A list of FTP mirrors can be obtained from:  http://www.mandrakesecure.net/en/ftp.phpAll packages are signed by MandrakeSoft for security.  You can obtainthe GPG public key of the Mandrake Linux Security Team by executing:  gpg --recv-keys --keyserver www.mandrakesecure.net 0x22458A98Please be aware that sometimes it takes the mirrors a few hours toupdate.You can view other update advisories for Mandrake Linux at:  http://www.mandrakesecure.net/en/advisories/MandrakeSoft has several security-related mailing list services thatanyone can subscribe to.  Information on these lists can be obtained byvisiting:  http://www.mandrakesecure.net/en/mlist.phpIf you want to report vulnerabilities, please contact  security_linux-mandrake.comType Bits/KeyID  Date    User IDpub  1024D/22458A98 2000-07-10 Linux Mandrake Security Team  <security linux-mandrake.com>
Link to comment
Share on other sites

nlinecomputers

Ok ONE MORE TIME. :) The developers of OpenSSH have found more holes that need patching and have released another new version. If you downloaded the patch yesterday you should go get the newer patch issued today.

________________________________________________________________________                Mandrake Linux Security Update Advisory________________________________________________________________________Package name:        opensshAdvisory ID:            MDKSA-2003:090-1Date:                September 17th, 2003Original Advisory Date: September 16th, 2003Affected versions: 8.2, 9.0, 9.1, Corporate Server 2.1, Multi Network Firewall 8.2________________________________________________________________________Problem Description: A buffer management error was discovered in all versions of openssh prior to version 3.7.  According to the OpenSSH team's advisory: "It is uncertain whether this error is potentially exploitable, however, we prefer to see bugs fixed proactively."  There have also been reports of an exploit in the wild. MandrakeSoft encourages all users to upgrade to these patched openssh packages immediately and to disable sshd until you are able to upgrade if at all possible.  Update: The OpenSSH developers discovered more, similar, problems and revised the patch to correct these issues.  These new packages have the latest patch fix applied.________________________________________________________________________References:    http://cve.mitre.org/cgi-bin/cvename.cgi?n...e=CAN-2003-0693  http://cve.mitre.org/cgi-bin/cvename.cgi?n...e=CAN-2003-0695  http://www.kb.cert.org/vuls/id/333628  http://www.openssh.com/txt/buffer.adv________________________________________________________________________Updated Packages:  Corporate Server 2.1: e4dd6a2be580feeceddb7bf702646992  corporate/2.1/RPMS/openssh-3.6.1p2-1.2.90mdk.i586.rpm b643425ed773606865f31797db73b6d5  corporate/2.1/RPMS/openssh-askpass-3.6.1p2-1.2.90mdk.i586.rpm bf403b678dd74c14c489bf5a32939e80  corporate/2.1/RPMS/openssh-askpass-gnome-3.6.1p2-1.2.90mdk.i586.rpm c4ec1f56320d69a37455d4f74da30d2d  corporate/2.1/RPMS/openssh-clients-3.6.1p2-1.2.90mdk.i586.rpm 0252fc0a7273c7c2ebbe4ae92fe492c6  corporate/2.1/RPMS/openssh-server-3.6.1p2-1.2.90mdk.i586.rpm 8909a7349c3e18993784900e1c501dc8  corporate/2.1/SRPMS/openssh-3.6.1p2-1.2.90mdk.src.rpm Corporate Server 2.1/x86_64: 7a297d5ad1cf8f266a7045e5ed6407b4  x86_64/corporate/2.1/RPMS/openssh-3.6.1p2-1.2.90mdk.x86_64.rpm 0e1047d7ac87e4cb2fc83f51156f89e8  x86_64/corporate/2.1/RPMS/openssh-askpass-3.6.1p2-1.2.90mdk.x86_64.rpm 09592be1376bff2acb58577eb22927e5  x86_64/corporate/2.1/RPMS/openssh-askpass-gnome-3.6.1p2-1.2.90mdk.x86_64.rpm cb39634d5cb6811a53e833a566dca625  x86_64/corporate/2.1/RPMS/openssh-clients-3.6.1p2-1.2.90mdk.x86_64.rpm 2e49b64404318ee3c10f7088781f36da  x86_64/corporate/2.1/RPMS/openssh-server-3.6.1p2-1.2.90mdk.x86_64.rpm 8909a7349c3e18993784900e1c501dc8  x86_64/corporate/2.1/SRPMS/openssh-3.6.1p2-1.2.90mdk.src.rpm Mandrake Linux 8.2: 862ccaea668653af1dd98d4f4cba388e  8.2/RPMS/openssh-3.6.1p2-1.2.82mdk.i586.rpm abb351c902abd9bcfc7eefd0d8e56b43  8.2/RPMS/openssh-askpass-3.6.1p2-1.2.82mdk.i586.rpm 614a6bd4680be732689f5bd1e791a351  8.2/RPMS/openssh-askpass-gnome-3.6.1p2-1.2.82mdk.i586.rpm baa534caf5c7121741a7089e11cd169e  8.2/RPMS/openssh-clients-3.6.1p2-1.2.82mdk.i586.rpm 6f0b03ff0dd99857159177d3e797e916  8.2/RPMS/openssh-server-3.6.1p2-1.2.82mdk.i586.rpm d6fd51341f521dc7fc2086915dcaec20  8.2/SRPMS/openssh-3.6.1p2-1.2.82mdk.src.rpm Mandrake Linux 8.2/PPC: c453de5cac92707c112c9245663fd25c  ppc/8.2/RPMS/openssh-3.6.1p2-1.2.82mdk.ppc.rpm 48211a23e464b38ebd4e7deed7347f48  ppc/8.2/RPMS/openssh-askpass-3.6.1p2-1.2.82mdk.ppc.rpm 77d27118abff6a1d6c0f57c167fefb52  ppc/8.2/RPMS/openssh-askpass-gnome-3.6.1p2-1.2.82mdk.ppc.rpm b58b03854614f14c861f42121d165a2b  ppc/8.2/RPMS/openssh-clients-3.6.1p2-1.2.82mdk.ppc.rpm 9c477dda47eab7cad24839d0ea43e6a4  ppc/8.2/RPMS/openssh-server-3.6.1p2-1.2.82mdk.ppc.rpm d6fd51341f521dc7fc2086915dcaec20  ppc/8.2/SRPMS/openssh-3.6.1p2-1.2.82mdk.src.rpm Mandrake Linux 9.0: e4dd6a2be580feeceddb7bf702646992  9.0/RPMS/openssh-3.6.1p2-1.2.90mdk.i586.rpm b643425ed773606865f31797db73b6d5  9.0/RPMS/openssh-askpass-3.6.1p2-1.2.90mdk.i586.rpm bf403b678dd74c14c489bf5a32939e80  9.0/RPMS/openssh-askpass-gnome-3.6.1p2-1.2.90mdk.i586.rpm c4ec1f56320d69a37455d4f74da30d2d  9.0/RPMS/openssh-clients-3.6.1p2-1.2.90mdk.i586.rpm 0252fc0a7273c7c2ebbe4ae92fe492c6  9.0/RPMS/openssh-server-3.6.1p2-1.2.90mdk.i586.rpm 8909a7349c3e18993784900e1c501dc8  9.0/SRPMS/openssh-3.6.1p2-1.2.90mdk.src.rpm Mandrake Linux 9.1: 2f657dd739f51adad400b75e627db53a  9.1/RPMS/openssh-3.6.1p2-1.2.91mdk.i586.rpm 2284741fdae6b3809b85f1f193dc9c7b  9.1/RPMS/openssh-askpass-3.6.1p2-1.2.91mdk.i586.rpm 3462362cb6364701bfe536541f24d349  9.1/RPMS/openssh-askpass-gnome-3.6.1p2-1.2.91mdk.i586.rpm 5a8b2d3763dfc4dd77c7705401b4155e  9.1/RPMS/openssh-clients-3.6.1p2-1.2.91mdk.i586.rpm 508f52a1bc06e57b5176c31dc7d1674b  9.1/RPMS/openssh-server-3.6.1p2-1.2.91mdk.i586.rpm 4d9c124f212d3ad840bc19f6579784fc  9.1/SRPMS/openssh-3.6.1p2-1.2.91mdk.src.rpm Mandrake Linux 9.1/PPC: bf558d8fba0c8f779f73e8a3f75956d8  ppc/9.1/RPMS/openssh-3.6.1p2-1.2.91mdk.ppc.rpm ca0ff77a847d5485cf03e4abb1fc7a88  ppc/9.1/RPMS/openssh-askpass-3.6.1p2-1.2.91mdk.ppc.rpm 4c45f30751958b8347713b818a55caf1  ppc/9.1/RPMS/openssh-askpass-gnome-3.6.1p2-1.2.91mdk.ppc.rpm e7912e06b6bf2579badac32f583d8511  ppc/9.1/RPMS/openssh-clients-3.6.1p2-1.2.91mdk.ppc.rpm 809424b2dd19bd2f654fdf4743fc5a8b  ppc/9.1/RPMS/openssh-server-3.6.1p2-1.2.91mdk.ppc.rpm 4d9c124f212d3ad840bc19f6579784fc  ppc/9.1/SRPMS/openssh-3.6.1p2-1.2.91mdk.src.rpm Multi Network Firewall 8.2: 862ccaea668653af1dd98d4f4cba388e  mnf8.2/RPMS/openssh-3.6.1p2-1.2.82mdk.i586.rpm baa534caf5c7121741a7089e11cd169e  mnf8.2/RPMS/openssh-clients-3.6.1p2-1.2.82mdk.i586.rpm 6f0b03ff0dd99857159177d3e797e916  mnf8.2/RPMS/openssh-server-3.6.1p2-1.2.82mdk.i586.rpm d6fd51341f521dc7fc2086915dcaec20  mnf8.2/SRPMS/openssh-3.6.1p2-1.2.82mdk.src.rpm________________________________________________________________________Bug IDs fixed (see https://qa.mandrakesoft.com for more information):________________________________________________________________________To upgrade automatically, use MandrakeUpdate or urpmi.  The verificationof md5 checksums and GPG signatures is performed automatically for you.A list of FTP mirrors can be obtained from:  http://www.mandrakesecure.net/en/ftp.phpAll packages are signed by MandrakeSoft for security.  You can obtainthe GPG public key of the Mandrake Linux Security Team by executing:  gpg --recv-keys --keyserver www.mandrakesecure.net 0x22458A98Please be aware that sometimes it takes the mirrors a few hours toupdate.You can view other update advisories for Mandrake Linux at:  http://www.mandrakesecure.net/en/advisories/MandrakeSoft has several security-related mailing list services thatanyone can subscribe to.  Information on these lists can be obtained byvisiting:  http://www.mandrakesecure.net/en/mlist.phpIf you want to report vulnerabilities, please contact  security_linux-mandrake.comType Bits/KeyID  Date    User IDpub  1024D/22458A98 2000-07-10 Linux Mandrake Security Team  <security linux-mandrake.com>
Link to comment
Share on other sites

Well, it looks like there is a bit more too . . . . . ( the list contains previous posted opessh too ) Name: kdebase Version: 3.1-83.5mdk Size: 34749 KB Name: kdebase-devel Version: 3.1-83.5mdk Size: 193 KB Name: kdebase-nsplugins Version: 3.1-83.5mdk Size: 235 KB Name: mdkkdm Version: 9.1-24.2mdk Size: 391 KB Name: openssh Version: 3.6.1p2-1.2.91mdk Size: 445 KB Name: openssh-clients Version: 3.6.1p2-1.2.91mdk Size: 416 KB Name: X11R6-contrib Version: 4.3-8.2mdk Size: 867 KB Name: XFree86-100dpi-fonts Version: 4.3-8.2mdk Size: 8217 KB Name: XFree86 Version: 4.3-8.2mdk Size: 28791 KB Name: XFree86-75dpi-fonts Version: 4.3-8.2mdk Size: 7140 KB Name: XFree86-devel Version: 4.3-8.2mdk Size: 5527 KB Name: XFree86-libs Version: 4.3-8.2mdk Size: 5202 KB Name: XFree86-server Version: 4.3-8.2mdk Size: 23932 KB Name: XFree86-xfs Version: 4.3-8.2mdk Size: 539 KB Total 113 MB !! :) Bruno

Link to comment
Share on other sites

Absolutely. :) Got a great deal on an 80GB WD hdd, couldn't pass it up; then decided to test as many flavors of Linux as I could, in order to decide which I liked best, in a variety of ways. Still want to try Slackware 9.0, but it's beyond me to set up at this point, and also will be ordering SUSE 8.2 or 8.3, since it appears to be a favorite. Right at this point, Mandrake is my choice, but RedHat and ELX and Knoppix (installed) are very nice, indeed. Guess most important is that I am learning a little, and sure as heck having fun. :) Hello QuintI too have installed over 30 different flavors of Linux in the past year. I have been doing a review for a couple of computer clubs as well as for my own satisfaction of trying out something New. I just picked up a new Maxtor 80GB ATA 133 8 Mb cache. It is a Ultra Series With the $30 rebate it will have cost me $70. Just got it today as My 40 Gig's are getting full. Installed Slack 9.0 last Night and I have to say it is not bad. Also got Mepis and tried it out too and downloaded the latest Ark Linux Iso's and Installed it. Since getting back to Arizona and my High speed connection I am having a ball and lots of fun downloading and trying the latest Distros. Reinstalled SuSE 8.1 and got MDK 9.2 rc-2 up and running too. Waiting for Libranets latest as I ordered the latest commercial version which according to an e-mail from them should be here in the next 10 days. Must be coming from overseas or maybe Canada.Mel B)
Link to comment
Share on other sites

That's great, Mel! Never thought it would be so much enjoyment...but it gets better all the time! :lol:I am unable to install "Ark Linux", due to:

< spurious 8259A interrupt: IRQ7 >
The exact same thing that prevented me from installing "Debian 3.0rc1".
Link to comment
Share on other sites

Mandrake Linux Advisory: openssh Mandrake Linux Security Update AdvisoryPackage name: opensshAdvisory ID: MDKSA-2003:090-1Date: September 17th, 2003Original Advisory Date: September 16th, 2003Affected versions: 8.2, 9.0, 9.1, Corporate Server 2.1, Multi Network Firewall 8.2Problem Description:A buffer management error was discovered in all versions of openssh prior to version 3.7. According to the OpenSSH team's advisory: "It is uncertain whether this error is potentially exploitable, however, we prefer to see bugs fixed proactively." There have also been reports of an exploit in the wild.MandrakeSoft encourages all users to upgrade to these patched openssh packages immediately and to disable sshd until you are able to upgrade if at all possible.Update:The OpenSSH developers discovered more, similar, problems and revised the patch to correct these issues. These new packages have the latest patch fix applied. Source and Fix

Link to comment
Share on other sites

nlinecomputers

New update for sendmail. Most of the FTP servers are now upto date.

-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1________________________________________________________________________                Mandrake Linux Security Update Advisory________________________________________________________________________Package name:        sendmailAdvisory ID:            MDKSA-2003:092Date:                September 17th, 2003Affected versions: 8.2, 9.0, 9.1, Corporate Server 2.1________________________________________________________________________Problem Description: A buffer overflow vulnerability was discovered in the address parsing code in all versions of sendmail prior to 8.12.10 by Michal Zalewski, with a patch to fix the problem provided by Todd C. Miller.  This vulnerability seems to be remotely exploitable on Linux systems running on the x86 platform; the sendmail team is unsure of other platforms (CAN-2003-0694). Another potential buffer overflow was fixed in ruleset parsing which is not exploitable in the default sendmail configuration.  A problem may occur if non-standard rulesets recipient (2), final (4), or mailer- specific envelope recipients rulesets are use.  This problem was discovered by Timo Sirainen (CAN-2003-0681). MandrakeSoft encourages all users who use sendmail to upgrade to the provided packages which are patched to fix both problems.________________________________________________________________________References:    http://cve.mitre.org/cgi-bin/cvename.cgi?n...e=CAN-2003-0681  http://cve.mitre.org/cgi-bin/cvename.cgi?n...e=CAN-2003-0694  http://www.sendmail.org/8.12.10.html  http://lists.netsys.com/pipermail/full-dis...ber/010287.html________________________________________________________________________Updated Packages:  Corporate Server 2.1: 7870e3e3f35647266197194e933f5ed7  corporate/2.1/RPMS/sendmail-8.12.6-3.5mdk.i586.rpm 3df2666ba0c7eef233a0060d799d86c4  corporate/2.1/RPMS/sendmail-cf-8.12.6-3.5mdk.i586.rpm e09d65fa52f14038643602d9c41ea72b  corporate/2.1/RPMS/sendmail-devel-8.12.6-3.5mdk.i586.rpm 6c580bbbc7212e13b2a27de1e727254d  corporate/2.1/RPMS/sendmail-doc-8.12.6-3.5mdk.i586.rpm e9aa39db8dad6941af1e3a6e8c857cb5  corporate/2.1/SRPMS/sendmail-8.12.6-3.5mdk.src.rpm Mandrake Linux 8.2: 87a2d830b724bc67640ea4e267a60517  8.2/RPMS/sendmail-8.12.1-4.5mdk.i586.rpm b21c82a3f1b554aecd5227ab7269aea4  8.2/RPMS/sendmail-cf-8.12.1-4.5mdk.i586.rpm aed850225f1902657b02010a703d744c  8.2/RPMS/sendmail-devel-8.12.1-4.5mdk.i586.rpm aca8d9015390056de17b16db3fecc3e4  8.2/RPMS/sendmail-doc-8.12.1-4.5mdk.i586.rpm b0a8f5bbc575c2fc8b0dcaf2af00cbba  8.2/SRPMS/sendmail-8.12.1-4.5mdk.src.rpm Mandrake Linux 8.2/PPC: 993a8769ba667651e4319c27c9e82b7e  ppc/8.2/RPMS/sendmail-8.12.1-4.5mdk.ppc.rpm 6c9e501287a7eccec51b10dce7c6e6fb  ppc/8.2/RPMS/sendmail-cf-8.12.1-4.5mdk.ppc.rpm e8d204f807ee1ea4a364fb4afdc24439  ppc/8.2/RPMS/sendmail-devel-8.12.1-4.5mdk.ppc.rpm cb695b306b372a540e363006adfc5f54  ppc/8.2/RPMS/sendmail-doc-8.12.1-4.5mdk.ppc.rpm b0a8f5bbc575c2fc8b0dcaf2af00cbba  ppc/8.2/SRPMS/sendmail-8.12.1-4.5mdk.src.rpm Mandrake Linux 9.0: 7870e3e3f35647266197194e933f5ed7  9.0/RPMS/sendmail-8.12.6-3.5mdk.i586.rpm 3df2666ba0c7eef233a0060d799d86c4  9.0/RPMS/sendmail-cf-8.12.6-3.5mdk.i586.rpm e09d65fa52f14038643602d9c41ea72b  9.0/RPMS/sendmail-devel-8.12.6-3.5mdk.i586.rpm 6c580bbbc7212e13b2a27de1e727254d  9.0/RPMS/sendmail-doc-8.12.6-3.5mdk.i586.rpm e9aa39db8dad6941af1e3a6e8c857cb5  9.0/SRPMS/sendmail-8.12.6-3.5mdk.src.rpm Mandrake Linux 9.1: abf1ad68f3835ce7f2593f935af97c95  9.1/RPMS/sendmail-8.12.9-1.2mdk.i586.rpm 26427faee7bc48e521e370a7957865a7  9.1/RPMS/sendmail-cf-8.12.9-1.2mdk.i586.rpm a531c3ec3b6807428968254854d863b2  9.1/RPMS/sendmail-devel-8.12.9-1.2mdk.i586.rpm 3e70938f6cb88c69f3a004c96b3ec347  9.1/RPMS/sendmail-doc-8.12.9-1.2mdk.i586.rpm 1d575885387c5130d993d15cdfec56e5  9.1/SRPMS/sendmail-8.12.9-1.2mdk.src.rpm Mandrake Linux 9.1/PPC: ff80af8ecc2af755689271c495cffed2  ppc/9.1/RPMS/sendmail-8.12.9-1.2mdk.ppc.rpm d29850a5cd7322d7d908a2c7299133ea  ppc/9.1/RPMS/sendmail-cf-8.12.9-1.2mdk.ppc.rpm 503d3aae07c0b8f707fd0f6187990dbd  ppc/9.1/RPMS/sendmail-devel-8.12.9-1.2mdk.ppc.rpm 10c1cb226d1e991eed8f974d1b62dc33  ppc/9.1/RPMS/sendmail-doc-8.12.9-1.2mdk.ppc.rpm 1d575885387c5130d993d15cdfec56e5  ppc/9.1/SRPMS/sendmail-8.12.9-1.2mdk.src.rpm________________________________________________________________________Bug IDs fixed (see https://qa.mandrakesoft.com for more information):________________________________________________________________________To upgrade automatically, use MandrakeUpdate or urpmi.  The verificationof md5 checksums and GPG signatures is performed automatically for you.A list of FTP mirrors can be obtained from:  http://www.mandrakesecure.net/en/ftp.phpAll packages are signed by MandrakeSoft for security.  You can obtainthe GPG public key of the Mandrake Linux Security Team by executing:  gpg --recv-keys --keyserver www.mandrakesecure.net 0x22458A98Please be aware that sometimes it takes the mirrors a few hours toupdate.You can view other update advisories for Mandrake Linux at:  http://www.mandrakesecure.net/en/advisories/MandrakeSoft has several security-related mailing list services thatanyone can subscribe to.  Information on these lists can be obtained byvisiting:  http://www.mandrakesecure.net/en/mlist.phpIf you want to report vulnerabilities, please contact  security_linux-mandrake.comType Bits/KeyID  Date    User IDpub  1024D/22458A98 2000-07-10 Linux Mandrake Security Team  <security linux-mandrake.com>-----BEGIN PGP SIGNATURE-----Version: GnuPG v1.0.7 (GNU/Linux)iD8DBQE/aSWpmqjQ0CJFipgRAprYAJoDoD//KswcpWMNsRGS1pngxcbVHQCgpRhjLNIH0ocjUdSWrnhyQhjWE30==cHFW-----END PGP SIGNATURE------- Incoming mail is certified Virus Free.Checked by AVG Anti-Virus (http://www.grisoft.com).Version: 7.0.176 / Virus Database: 260.1.0 - Release Date: 9/11/2003
Link to comment
Share on other sites

  • 2 weeks later...
nlinecomputers

Updates for Apache 2. Not yet on all mirrors.

-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1________________________________________________________________________                Mandrake Linux Security Update Advisory ________________________________________________________________________Package name:           apache2Advisory ID:            MDKSA-2003:096Date:                   September 26th, 2003Affected versions:	9.1________________________________________________________________________Problem Description: A problem was discovered in Apache2 where CGI scripts that output more  than 4k of output to STDERR will hang the script's execution which can  cause a Denial of Service on the httpd process because it is waiting  for more input from the CGI that is not forthcoming due to the locked write() call in mod_cgi.  On systems that use scripts that output more than 4k to STDERR, this  could cause httpd processes to hang and once the maximum connection  limit is reached, Apache will no longer respond to requests.   The updated packages provided use the latest mod_cgi.c from the Apache  2.1 CVS version.  Users may have to restart apache by hand after the upgrade by issuing  a "service httpd restart". ________________________________________________________________________References:    http://nagoya.apache.org/bugzilla/show_bug.cgi?id=22030________________________________________________________________________Updated Packages:   Mandrake Linux 9.1: bcd0c73afb901bced97ee201aeb24f1a  9.1/RPMS/apache2-2.0.47-1.3.91mdk.i586.rpm 38379cd70d8e452f6b582b9e4ff59be4  9.1/RPMS/apache2-common-2.0.47-1.3.91mdk.i586.rpm b44270899ca67a657c870a57baba3e2e  9.1/RPMS/apache2-devel-2.0.47-1.3.91mdk.i586.rpm 21e9c7f6d4649a1f2c60e2213e3d9d87  9.1/RPMS/apache2-manual-2.0.47-1.3.91mdk.i586.rpm cbcb9f567273fe80ad754ba5338825a6  9.1/RPMS/apache2-mod_dav-2.0.47-1.3.91mdk.i586.rpm 1940d731a5bde39f3a8c1609b5623330  9.1/RPMS/apache2-mod_ldap-2.0.47-1.3.91mdk.i586.rpm 5508b5bef150a88e80535d9230113735  9.1/RPMS/apache2-mod_ssl-2.0.47-1.3.91mdk.i586.rpm 56267cf09af350b8a383abc2b9ebedbc  9.1/RPMS/apache2-modules-2.0.47-1.3.91mdk.i586.rpm f7ff9796a95d63dc5691ea434fb0efa3  9.1/RPMS/apache2-source-2.0.47-1.3.91mdk.i586.rpm 859c7126af782efa3dcebbda669d7f5d  9.1/RPMS/libapr0-2.0.47-1.3.91mdk.i586.rpm 60261a3a810ceee306cd6bdd1baf3af1  9.1/SRPMS/apache2-2.0.47-1.3.91mdk.src.rpm Mandrake Linux 9.1/PPC: 81fa02d2441b1ad2a59073fae3618923  ppc/9.1/RPMS/apache2-2.0.47-1.3.91mdk.ppc.rpm d903f0a0e9d6d2aa90bc14bb2452dc1b  ppc/9.1/RPMS/apache2-common-2.0.47-1.3.91mdk.ppc.rpm 0ecc1e79b817d1efe346211dda9090de  ppc/9.1/RPMS/apache2-devel-2.0.47-1.3.91mdk.ppc.rpm 398c1db00d0fb47fb57d0a217d1a63f4  ppc/9.1/RPMS/apache2-manual-2.0.47-1.3.91mdk.ppc.rpm 7adfa25d0d80e968c95306a70e60cfdb  ppc/9.1/RPMS/apache2-mod_dav-2.0.47-1.3.91mdk.ppc.rpm e524f04403d6634d970261bae094b545  ppc/9.1/RPMS/apache2-mod_ldap-2.0.47-1.3.91mdk.ppc.rpm c76c5664ff6594c2857e32b3ea62e280  ppc/9.1/RPMS/apache2-mod_ssl-2.0.47-1.3.91mdk.ppc.rpm dce9ebbf7059a0194285467615d52b94  ppc/9.1/RPMS/apache2-modules-2.0.47-1.3.91mdk.ppc.rpm 9a7d2c7b8b3eeb8a566fa713a629d20f  ppc/9.1/RPMS/apache2-source-2.0.47-1.3.91mdk.ppc.rpm 9e98058a1154352d3e8bbe5f74536c1e  ppc/9.1/RPMS/libapr0-2.0.47-1.3.91mdk.ppc.rpm 60261a3a810ceee306cd6bdd1baf3af1  ppc/9.1/SRPMS/apache2-2.0.47-1.3.91mdk.src.rpm________________________________________________________________________Bug IDs fixed (see https://qa.mandrakesoft.com for more information): ________________________________________________________________________To upgrade automatically, use MandrakeUpdate or urpmi.  The verification of md5 checksums and GPG signatures is performed automatically for you.A list of FTP mirrors can be obtained from:  http://www.mandrakesecure.net/en/ftp.phpAll packages are signed by MandrakeSoft for security.  You can obtain the GPG public key of the Mandrake Linux Security Team by executing:  gpg --recv-keys --keyserver www.mandrakesecure.net 0x22458A98Please be aware that sometimes it takes the mirrors a few hours to update.You can view other update advisories for Mandrake Linux at:  http://www.mandrakesecure.net/en/advisories/MandrakeSoft has several security-related mailing list services that anyone can subscribe to.  Information on these lists can be obtained byvisiting:  http://www.mandrakesecure.net/en/mlist.phpIf you want to report vulnerabilities, please contact  security_linux-mandrake.comType Bits/KeyID     Date       User IDpub  1024D/22458A98 2000-07-10 Linux Mandrake Security Team  <security linux-mandrake.com>-----BEGIN PGP SIGNATURE-----Version: GnuPG v1.0.7 (GNU/Linux)iD8DBQE/dMWvmqjQ0CJFipgRAg7mAKCKnd0X7NWGXzqIQ3iJCVJgmKZJJACgrSqRSFlz34CEPL/8FG3WzrHTOaI==TH/h-----END PGP SIGNATURE-----

Link to comment
Share on other sites

nlinecomputers

-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1________________________________________________________________________ Mandrake Linux Security Update Advisory________________________________________________________________________Package name: proftpdAdvisory ID: MDKSA-2003:095Date: September 26th, 2003Affected versions: 9.1, 9.2________________________________________________________________________Problem Description: A vulnerability was discovered by X-Force Research at ISS in ProFTPD's handling of ASCII translation. An attacker, by downloading a carefully crafted file, can remotely exploit this bug to create a root shell. The ProFTPD team encourages all users to upgrade to version 1.2.7 or higher. The problematic code first appeared in ProFTPD 1.2.7rc1, and the provided packages are all patched by the ProFTPD team to protect against this vulnerability.________________________________________________________________________References: http://cve.mitre.org/cgi-bin/cvename.cgi?n...e=CAN-2003-0831 http://xforce.iss.net/xforce/alerts/id/154________________________________________________________________________Updated Packages: Mandrake Linux 9.1: b00bae0743aec3e1decccaf73a356b84 9.1/RPMS/proftpd-1.2.8-1.1.91mdk.i586.rpm 6a85248750d88db30b658ee51fdebcf1 9.1/RPMS/proftpd-anonymous-1.2.8-1.1.91mdk.i586.rpm c04242b94a7451164e42e96bbf648e5d 9.1/SRPMS/proftpd-1.2.8-1.1.91mdk.src.rpm Mandrake Linux 9.1/PPC: a053b5f2fa6e57ee884465385937041f ppc/9.1/RPMS/proftpd-1.2.8-1.1.91mdk.ppc.rpm 55d22b28017dfaab6f2da238d5d8311c ppc/9.1/RPMS/proftpd-anonymous-1.2.8-1.1.91mdk.ppc.rpm c04242b94a7451164e42e96bbf648e5d ppc/9.1/SRPMS/proftpd-1.2.8-1.1.91mdk.src.rpm Mandrake Linux 9.2: 1d9b21bcb2a18fa43158c0c0aa25d13d 9.2/RPMS/proftpd-1.2.8-5.1.92mdk.i586.rpm 80c5b73c6e33444e2dd91659c2b897bd 9.2/RPMS/proftpd-anonymous-1.2.8-5.1.92mdk.i586.rpm ea89351b37a5572fac3f45b27a80b0f3 9.2/SRPMS/proftpd-1.2.8-5.1.92mdk.src.rpm________________________________________________________________________Bug IDs fixed (see https://qa.mandrakesoft.com for more information):________________________________________________________________________To upgrade automatically, use MandrakeUpdate or urpmi. The verificationof md5 checksums and GPG signatures is performed automatically for you.A list of FTP mirrors can be obtained from: http://www.mandrakesecure.net/en/ftp.phpAll packages are signed by MandrakeSoft for security. You can obtainthe GPG public key of the Mandrake Linux Security Team by executing: gpg --recv-keys --keyserver www.mandrakesecure.net 0x22458A98Please be aware that sometimes it takes the mirrors a few hours toupdate.You can view other update advisories for Mandrake Linux at: http://www.mandrakesecure.net/en/advisories/MandrakeSoft has several security-related mailing list services thatanyone can subscribe to. Information on these lists can be obtained byvisiting: http://www.mandrakesecure.net/en/mlist.phpIf you want to report vulnerabilities, please contact security_linux-mandrake.comType Bits/KeyID Date User IDpub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team <security linux-mandrake.com>-----BEGIN PGP SIGNATURE-----Version: GnuPG v1.0.7 (GNU/Linux)iD8DBQE/dMKZmqjQ0CJFipgRAr9VAJ9VtLskLbYmZ6e2fPKwz0BFjkGsWACg1VPwPumsSXrNduTY+1HaaqplD8g==5eUR-----END PGP SIGNATURE------- Incoming mail is certified Virus Free.Checked by AVG Anti-Virus (http://www.grisoft.com).Version: 7.0.176 / Virus Database: 260.1.3 - Release Date: 9/23/2003

Link to comment
Share on other sites

  • 2 weeks later...

Updates on all the mirrors now:Name: libdha0.1Version: 0.90-0.rc4.5.91mdkSize: 226 KBName: libopenssl0Version: 0.9.6i-1.2.91mdkSize: 954 KBName: libopenssl0.9.7Version: 0.9.7a-1.2.91mdkSize: 1191 KBName: libopenssl0.9.7-develVersion: 0.9.7a-1.2.91mdkSize: 2881 KBName: libpostproc0Version: 0.90-0.rc4.5.91mdkSize: 67 KBName: mplayerVersion: 0.90-0.rc4.5.91mdkSize: 6000 KBName: mplayer-guiVersion: 0.90-0.rc4.5.91mdkSize: 8 KBName: opensslVersion: 0.9.7a-1.2.91mdkSize: 836 KBTotal: 11 MBB) Bruno

Link to comment
Share on other sites

  • 2 weeks later...

Why not keep your Mandrake 9.1 up to date as long as you don´t have the 9.2 yet ? :devil: Name: gdm Version: 2.4.1.6-0.4.91mdk Size: 5206 KB Name: gnome-applets Version: 2.2.3-1.1.91mdk Size: 6463 KB Total 11 MBB) Bruno

Link to comment
Share on other sites

  • 1 month later...

-----Original Message-----From: Mandrake Linux Security Team [mailto:security@linux-mandrake.com]Sent: Monday, December 01, 2003 3:27 PMTo: announce@mandrakesecure.netSubject: MDKSA-2003:110 - Updated kernel packages fix vulnerability-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1 _______________________________________________________________________ Mandrake Linux Security Update Advisory _______________________________________________________________________ Package name: kernel Advisory ID: MDKSA-2003:110 Date: December 1st, 2003 Affected versions: 9.0, 9.1, Corporate Server 2.1, Multi Network Firewall 8.2 ______________________________________________________________________ Problem Description: A vulnerability was discovered in the Linux kernel versions 2.4.22 and previous. A flaw in bounds checking in the do_brk() function can allow a local attacker to gain root privileges. This vulnerability is known to be exploitable; an exploit is in the wild at this time. The Mandrake Linux 9.2 kernels are not vulnerable to this problem as the fix for it is already present in those kernels. MandrakeSoft encourages all users to upgrade their systems immediately. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?n...e=CAN-2003-0961 ______________________________________________________________________ Updated Packages: Corporate Server 2.1: e512799c1f49de7b8bd488040d846a4e corporate/2.1/RPMS/kernel-2.4.19.36mdk-1-1mdk.i586.rpm 7f6346a73ee412ad52c14d53ef1496e1 corporate/2.1/RPMS/kernel-enterprise-2.4.19.36mdk-1-1mdk.i586.rpm 410ec8ef4a8a201d09a4f7b1af45e7e0 corporate/2.1/RPMS/kernel-secure-2.4.19.36mdk-1-1mdk.i586.rpm 9b90933e07a60dd19f8ff6353cab6ca9 corporate/2.1/RPMS/kernel-smp-2.4.19.36mdk-1-1mdk.i586.rpm 8f70e81f007ba65a1347d4439a4986bb corporate/2.1/RPMS/kernel-source-2.4.19-36mdk.i586.rpm e27ae3c8322b09e495a449fb1e8cf888 corporate/2.1/SRPMS/kernel-2.4.19.36mdk-1-1mdk.src.rpm Corporate Server 2.1/x86_64: bd427eb5a5b278ac1a9d1e4834a3a6d4 x86_64/corporate/2.1/RPMS/kernel-2.4.19.33mdk-1-1mdk.x86_64.rpm 84ac3f2124e4fc8e06e0cceeb729e22d x86_64/corporate/2.1/RPMS/kernel-secure-2.4.19.33mdk-1-1mdk.x86_64.rpm 4393ae3ce5da77908780cf24798eff5c x86_64/corporate/2.1/RPMS/kernel-smp-2.4.19.33mdk-1-1mdk.x86_64.rpm 7d15239870981460adbe3e2c104c2227 x86_64/corporate/2.1/RPMS/kernel-source-2.4.19-33mdk.x86_64.rpm e27ae3c8322b09e495a449fb1e8cf888 x86_64/corporate/2.1/SRPMS/kernel-2.4.19.36mdk-1-1mdk.src.rpm Mandrake Linux 9.0: e512799c1f49de7b8bd488040d846a4e 9.0/RPMS/kernel-2.4.19.36mdk-1-1mdk.i586.rpm 7f6346a73ee412ad52c14d53ef1496e1 9.0/RPMS/kernel-enterprise-2.4.19.36mdk-1-1mdk.i586.rpm 410ec8ef4a8a201d09a4f7b1af45e7e0 9.0/RPMS/kernel-secure-2.4.19.36mdk-1-1mdk.i586.rpm 9b90933e07a60dd19f8ff6353cab6ca9 9.0/RPMS/kernel-smp-2.4.19.36mdk-1-1mdk.i586.rpm 8f70e81f007ba65a1347d4439a4986bb 9.0/RPMS/kernel-source-2.4.19-36mdk.i586.rpm e27ae3c8322b09e495a449fb1e8cf888 9.0/SRPMS/kernel-2.4.19.36mdk-1-1mdk.src.rpm Mandrake Linux 9.1: 964208c87454db75e46f6b2bfd683259 9.1/RPMS/kernel-2.4.21.0.26mdk-1-1mdk.i586.rpm e51755f9ae85de4c9a53bc7adfd66dff 9.1/RPMS/kernel-enterprise-2.4.21.0.26mdk-1-1mdk.i586.rpm 2d4486f9fc42f04b9bdd1b26e3b7cb9b 9.1/RPMS/kernel-secure-2.4.21.0.26mdk-1-1mdk.i586.rpm 9495cb84ae13cc39c56ff9b23f8a0906 9.1/RPMS/kernel-smp-2.4.21.0.26mdk-1-1mdk.i586.rpm f287612df3fda483f7616fb104fd4271 9.1/RPMS/kernel-source-2.4.21-0.26mdk.i586.rpm 6a907b3727b830957d63e1cbdbe03040 9.1/SRPMS/kernel-2.4.21.0.26mdk-1-1mdk.src.rpm Mandrake Linux 9.1/PPC: abd53f2a5a6b68c61f731ff64ca40696 ppc/9.1/RPMS/kernel-2.4.21.0.26mdk-1-1mdk.ppc.rpm 8e0058a02e938b4ae09a421f228a1dc2 ppc/9.1/RPMS/kernel-enterprise-2.4.21.0.26mdk-1-1mdk.ppc.rpm ff686d8c8aab64c47f78454bbba6b295 ppc/9.1/RPMS/kernel-smp-2.4.21.0.26mdk-1-1mdk.ppc.rpm b36bb2b6f9ae1fbc7223bf65767b16d4 ppc/9.1/RPMS/kernel-source-2.4.21-0.26mdk.ppc.rpm 6a907b3727b830957d63e1cbdbe03040 ppc/9.1/SRPMS/kernel-2.4.21.0.26mdk-1-1mdk.src.rpm Multi Network Firewall 8.2: 045d50d5960e255a51bfd02041c1e67e mnf8.2/RPMS/kernel-secure-2.4.19.36mdk-1-1mdk.i586.rpm e27ae3c8322b09e495a449fb1e8cf888 mnf8.2/SRPMS/kernel-2.4.19.36mdk-1-1mdk.src.rpm _______________________________________________________________________ To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. A list of FTP mirrors can be obtained from: http://www.mandrakesecure.net/en/ftp.php All packages are signed by MandrakeSoft for security. You can obtain the GPG public key of the Mandrake Linux Security Team by executing: gpg --recv-keys --keyserver www.mandrakesecure.net 0x22458A98 Please be aware that sometimes it takes the mirrors a few hours to update. You can view other update advisories for Mandrake Linux at: http://www.mandrakesecure.net/en/advisories/ MandrakeSoft has several security-related mailing list services that anyone can subscribe to. Information on these lists can be obtained by visiting: http://www.mandrakesecure.net/en/mlist.php If you want to report vulnerabilities, please contact security_linux-mandrake.com Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team <security linux-mandrake.com>-----BEGIN PGP SIGNATURE-----Version: GnuPG v1.0.7 (GNU/Linux)iD8DBQE/y7IUmqjQ0CJFipgRAtgDAKCtS+5rIUraF5/+QnTkWzwNyzQaiwCgmyb75agMH06HL/dk9oghmXFaMMo==xrpb-----END PGP SIGNATURE-----

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.


×
×
  • Create New...