-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2011:072 http://www.mandriva.com/security/ _______________________________________________________________________ Package : gwenhywfar Date : April 8, 2011 Affected: 2009.0, 2010.0, 2010.1 _______________________________________________________________________ Problem Description: It was discovered that gwenhywfar was using an old private copy of the ca-bundle.crt file containing the root CA certs, this has now been resolved so that it uses the system wide and up to date /etc/pki/tls/certs/ca-bundle.crt file last updated with the MDVSA-2011:068 advisory. Packages for 2009.0 are provided as of the Extended Maintenance Program. Please visit this link to learn more: http://store.mandriva.com/product_info.php?cPath=149&products_id=490 The updated packages provides a solution to this issue. _______________________________________________________________________ References: http://www.mandriva.com/security/advisories?name=MDVSA-2011:068 _______________________________________________________________________ Updated Packages: Mandriva Linux 2009.0: 811d96859d12953907351809701c55f7 2009.0/i586/gwenhywfar-3.4.1-1.1mdv2009.0.i586.rpm 62d04021fe4cf62abdced566bd27cefa 2009.0/i586/libgwenhywfar47-3.4.1-1.1mdv2009.0.i586.rpm 088b5308b6ebccd7a73ba7a671c4a370 2009.0/i586/libgwenhywfar-devel-3.4.1-1.1mdv2009.0.i586.rpm 7c9a8e43b915eeaee0d3fdb82bb1fad3 2009.0/SRPMS/gwenhywfar-3.4.1-1.1mdv2009.0.src.rpm Mandriva Linux 2009.0/X86_64: bd71be080aad318dc803d9f696f23a74 2009.0/x86_64/gwenhywfar-3.4.1-1.1mdv2009.0.x86_64.rpm f757e5f34e6eca8536f4b1ba448c4b90 2009.0/x86_64/lib64gwenhywfar47-3.4.1-1.1mdv2009.0.x86_64.rpm 4637037b3be2162c3aa5f2331a143305 2009.0/x86_64/lib64gwenhywfar-devel-3.4.1-1.1mdv2009.0.x86_64.rpm 7c9a8e43b915eeaee0d3fdb82bb1fad3 2009.0/SRPMS/gwenhywfar-3.4.1-1.1mdv2009.0.src.rpm Mandriva Linux 2010.0: abf1c4ea89688553bb2df5246043fdb9 2010.0/i586/gwenhywfar-3.11.1-2.1mdv2010.0.i586.rpm 12f8020929354bbfb50e8500cd1a9d86 2010.0/i586/libgwenhywfar47-3.11.1-2.1mdv2010.0.i586.rpm 6e3818e635f7d011fb3e856cd4aded75 2010.0/i586/libgwenhywfar-devel-3.11.1-2.1mdv2010.0.i586.rpm 4a2931689566732637709b54cdf4f15a 2010.0/SRPMS/gwenhywfar-3.11.1-2.1mdv2010.0.src.rpm Mandriva Linux 2010.0/X86_64: 32e826fcdbe5c3715276ea105e0ce2a4 2010.0/x86_64/gwenhywfar-3.11.1-2.1mdv2010.0.x86_64.rpm 714c01ca9e2974d44630cfef060193c9 2010.0/x86_64/lib64gwenhywfar47-3.11.1-2.1mdv2010.0.x86_64.rpm 3de90121de80bb3b730296a27997d2fb 2010.0/x86_64/lib64gwenhywfar-devel-3.11.1-2.1mdv2010.0.x86_64.rpm 4a2931689566732637709b54cdf4f15a 2010.0/SRPMS/gwenhywfar-3.11.1-2.1mdv2010.0.src.rpm Mandriva Linux 2010.1: 3c6e8ba590aea440d92c57e7267c64a0 2010.1/i586/gwenhywfar-3.11.7-3.1mdv2010.2.i586.rpm 4d785ef8281a3715bd0b470e7f5c4c30 2010.1/i586/libgwengui-qt4_0-3.11.7-3.1mdv2010.2.i586.rpm 0827599f64cda026ed0a64c8d3a57727 2010.1/i586/libgwenhywfar47-3.11.7-3.1mdv2010.2.i586.rpm 5deb750ec7ebd459b479e2dcddfa3603 2010.1/i586/libgwenhywfar-devel-3.11.7-3.1mdv2010.2.i586.rpm beef69ebe1b9fc656b6ceae2e57baf26 2010.1/SRPMS/gwenhywfar-3.11.7-3.1mdv2010.2.src.rpm Mandriva Linux 2010.1/X86_64: 503174ac9838d143b49def264366c0a0 2010.1/x86_64/gwenhywfar-3.11.7-3.1mdv2010.2.x86_64.rpm c5b5481a59bfbd44f15aa84b6cc36168 2010.1/x86_64/lib64gwengui-qt4_0-3.11.7-3.1mdv2010.2.x86_64.rpm 97b9b4a9fa662f588f7e3dcf80616d7b 2010.1/x86_64/lib64gwenhywfar47-3.11.7-3.1mdv2010.2.x86_64.rpm 1181a43602b7c19183176cc331da9730 2010.1/x86_64/lib64gwenhywfar-devel-3.11.7-3.1mdv2010.2.x86_64.rpm beef69ebe1b9fc656b6ceae2e57baf26 2010.1/SRPMS/gwenhywfar-3.11.7-3.1mdv2010.2.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFNnu3SmqjQ0CJFipgRAlHfAKCyU+Cxq18vYLoRLxgeT1/VFD/mVQCdFxb0 7iYnExioYbnYptje90gDrnU= =O2Fq -----END PGP SIGNATURE-----