Mandrake alert: apache update (revised)

Posted by dave on Jun 22, 2002 12:10 PM EDT
Mailing list
Mail this story
Print this story

[ Please note that this advisory supersedes the previous MDKSA-2002:039 and MDKSA-2002:039-1 advisories. ] MandrakeSoft is urging all users of Mandrake Linux to update their Apache installations immediately. What was previously thought to have been a DoS-only condition has now been proven to be more than that; exploitable conditions have been discovered on both 32bit and 64bit platforms.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

Mandrake Linux Security Update Advisory ________________________________________________________________________

Package name: apache Advisory ID: MDKSA-2002:039-2 Date: June 22md, 2002 Original Advisory Date: June 20th, 2002 Affected versions: 7.1, 7.2, 8.0, 8.1, 8.2, Corporate Server 1.0.1, Single Network Firewall 7.2 ________________________________________________________________________

Problem Description:

[ Please note that this advisory supersedes the previous MDKSA-2002:039 and MDKSA-2002:039-1 advisories. ]

MandrakeSoft is urging all users of Mandrake Linux to update their Apache installations immediately. What was previously thought to have been a DoS-only condition has now been proven to be more than that; exploitable conditions have been discovered on both 32bit and 64bit platforms. Successful exploitation of this vulnerability may lead to the execution of arbitary code on the server running a vulnerable Apache with the permissions of the web server child process (on Mandrake Linux this is the user "apache"). This can be used to exploit other vulnerabilities that are unrelated to Apache on the local system, and potentially allow the intruder root access.

Thanks to Gobbles for proving that this exploitable condition exists. Because there are known exploits in the wild for some platforms, this update should be considered essential and should be performed immediately.

All versions of Apache prior to 1.3.26 and 2.0.37 are vulnerable to this problem. MandrakeSoft has provided patched versions of Apache to correct this vulnerability.

Also please note that these packages are no different than those provided in MDKSA-2002:039-1 so if you have already updated, there are no new packages to upgrade. ________________________________________________________________________

References:

http://httpd.apache.org/info/security_bulletin_20020620.txt http://online.securityfocus.com/news/493 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0392 ________________________________________________________________________

Updated Packages:

Linux-Mandrake 7.1: e88a36b186ed910b350ded94ecf017eb 7.1/RPMS/apache-1.3.22-10.1mdk.i586.rpm 084e29eb5ea8f07924bd3c3aaa62e166 7.1/RPMS/apache-common-1.3.22-10.1mdk.i586.rpm 99ee271be857848a76ee4e5ddba164db 7.1/RPMS/apache-devel-1.3.22-10.1mdk.i586.rpm 7419f968d50062a46fdb5c932a4e6a66 7.1/RPMS/apache-manual-1.3.22-10.1mdk.i586.rpm a814f93494464cb1dc17ba363d128ade 7.1/RPMS/apache-mod_perl-1.3.22_1.26-2.1mdk.i586.rpm 8ad5af9470bf2efc5a9500c0ca0dc1f0 7.1/RPMS/apache-modules-1.3.22-10.1mdk.i586.rpm fb6de8872a5f8e378df18f7867167202 7.1/RPMS/apache-source-1.3.22-10.1mdk.i586.rpm 6657b308799219bb0adcfd7339c3bacc 7.1/RPMS/mod_perl-common-1.3.22_1.26-2.1mdk.i586.rpm f1ec2ba965c0217b346b9c43e2d9ec3f 7.1/RPMS/mod_perl-devel-1.3.22_1.26-2.1mdk.i586.rpm f743e6702701f49ec7c7226663e94256 7.1/RPMS/HTML-Embperl-1.3.22_1.3.4-2.1mdk.i586.rpm 1ec9d40da21ba65855962c4b05b51f2f 7.1/SRPMS/apache-1.3.22-10.1mdk.src.rpm 4a21f924efa9b33df29b63838a0bd283 7.1/SRPMS/apache-mod_perl-1.3.22_1.26-2.1mdk.src.rpm

Linux-Mandrake 7.2: cbcd89d798177d172cc380a870f93601 7.2/RPMS/apache-1.3.22-10.1mdk.i586.rpm 812a6720c2f5f87ba2e658898b4db982 7.2/RPMS/apache-common-1.3.22-10.1mdk.i586.rpm 47824b2d81b9fd3f2e89fa2a859fc7b0 7.2/RPMS/apache-devel-1.3.22-10.1mdk.i586.rpm 8646380d8ee739b07dedbe49037239e3 7.2/RPMS/apache-manual-1.3.22-10.1mdk.i586.rpm c2cfc97d6808f7641453927fa6ab2138 7.2/RPMS/apache-mod_perl-1.3.22_1.26-2.1mdk.i586.rpm f95cc26eda9c416cf5e2b871516329f9 7.2/RPMS/apache-modules-1.3.22-10.1mdk.i586.rpm 1722fd161613caaadaecf7c210c28964 7.2/RPMS/apache-source-1.3.22-10.1mdk.i586.rpm 885e426cee102583480d33af73d95410 7.2/RPMS/mod_perl-common-1.3.22_1.26-2.1mdk.i586.rpm 4ffdbd4779e52664f4cd10c9dc378333 7.2/RPMS/mod_perl-devel-1.3.22_1.26-2.1mdk.i586.rpm 0472c912f4eca60a286928914f7f1977 7.2/RPMS/HTML-Embperl-1.3.22_1.3.4-2.1mdk.i586.rpm 1ec9d40da21ba65855962c4b05b51f2f 7.2/SRPMS/apache-1.3.22-10.1mdk.src.rpm 4a21f924efa9b33df29b63838a0bd283 7.2/SRPMS/apache-mod_perl-1.3.22_1.26-2.1mdk.src.rpm

Mandrake Linux 8.0: a841d196743ff8be5140155bf26b6c06 8.0/RPMS/apache-1.3.22-10.1mdk.i586.rpm 913417de276e1b3b7ca4987c844f690a 8.0/RPMS/apache-common-1.3.22-10.1mdk.i586.rpm 25fb2306bc4927196ba052dfc704b103 8.0/RPMS/apache-devel-1.3.22-10.1mdk.i586.rpm 18723219d012d68cf674e06787f667dd 8.0/RPMS/apache-manual-1.3.22-10.1mdk.i586.rpm ad618ff45792c4f6d1e48220e802313d 8.0/RPMS/apache-mod_perl-1.3.22_1.26-2.1mdk.i586.rpm 8bc6da7fcf97d54512a567dc6cb8ccb1 8.0/RPMS/apache-modules-1.3.22-10.1mdk.i586.rpm ae02827f90a4982f53554290deb66e67 8.0/RPMS/apache-source-1.3.22-10.1mdk.i586.rpm 6923fa950409e09bf5f4fc956060c098 8.0/RPMS/mod_perl-common-1.3.22_1.26-2.1mdk.i586.rpm 0f9a055653afe3fc42c9241a9016d6e0 8.0/RPMS/mod_perl-devel-1.3.22_1.26-2.1mdk.i586.rpm bace2f60df56c7382e39422d32c30b0e 8.0/RPMS/HTML-Embperl-1.3.22_1.3.4-2.1mdk.i586.rpm 1ec9d40da21ba65855962c4b05b51f2f 8.0/SRPMS/apache-1.3.22-10.1mdk.src.rpm 4a21f924efa9b33df29b63838a0bd283 8.0/SRPMS/apache-mod_perl-1.3.22_1.26-2.1mdk.src.rpm

Mandrake Linux 8.0/ppc: 26133a7c9c93f567cb84810f656e952f ppc/8.0/RPMS/apache-1.3.22-10.1mdk.ppc.rpm 716c398ecc4afe5529f9a00c6fd177ef ppc/8.0/RPMS/apache-common-1.3.22-10.1mdk.ppc.rpm 7c47e06cc5f746027f3097a9878a3303 ppc/8.0/RPMS/apache-devel-1.3.22-10.1mdk.ppc.rpm 7b18a419746effb8ffb71a82277d0332 ppc/8.0/RPMS/apache-manual-1.3.22-10.1mdk.ppc.rpm aadc1eaa4f1d351f278e918cc984f550 ppc/8.0/RPMS/apache-mod_perl-1.3.22_1.26-2.1mdk.ppc.rpm 101422ece6691cf6c34ac775eabdbc7b ppc/8.0/RPMS/apache-modules-1.3.22-10.1mdk.ppc.rpm 1592a59441a459b672aeebc0ed76eb02 ppc/8.0/RPMS/apache-source-1.3.22-10.1mdk.ppc.rpm 498c22b912ed1fddc35115fae2af672c ppc/8.0/RPMS/mod_perl-common-1.3.22_1.26-2.1mdk.ppc.rpm 41f5918cc085da962429eae01c7264cd ppc/8.0/RPMS/mod_perl-devel-1.3.22_1.26-2.1mdk.ppc.rpm ef20447e4a837606656b993edfe38c7a ppc/8.0/RPMS/HTML-Embperl-1.3.22_1.3.4-2.1mdk.ppc.rpm 1ec9d40da21ba65855962c4b05b51f2f ppc/8.0/SRPMS/apache-1.3.22-10.1mdk.src.rpm 4a21f924efa9b33df29b63838a0bd283 ppc/8.0/SRPMS/apache-mod_perl-1.3.22_1.26-2.1mdk.src.rpm

Mandrake Linux 8.1: f01f2c68d9124e6e650fc06ff6db4a46 8.1/RPMS/apache-1.3.22-10.1mdk.i586.rpm 27783fc8be6747fb48abc10a3b0c77e2 8.1/RPMS/apache-common-1.3.22-10.1mdk.i586.rpm 1b6574c559c0f3161a8a73caddda146a 8.1/RPMS/apache-devel-1.3.22-10.1mdk.i586.rpm f91416ba4dc54370f047b7bd45dace62 8.1/RPMS/apache-manual-1.3.22-10.1mdk.i586.rpm 40414ad27f48f9da4f0bf097acecdc4b 8.1/RPMS/apache-mod_perl-1.3.22_1.26-4.1mdk.i586.rpm 8209dc54e8880b56a5242d195942a3be 8.1/RPMS/apache-modules-1.3.22-10.1mdk.i586.rpm 417afb2d22aa7eae89ec469ea65d131c 8.1/RPMS/apache-source-1.3.22-10.1mdk.i586.rpm 5e745c184801f2a285740c8d7cf08b72 8.1/RPMS/mod_perl-common-1.3.22_1.26-4.1mdk.i586.rpm 79ffee5c0944f733977502b1c73add5a 8.1/RPMS/mod_perl-devel-1.3.22_1.26-4.1mdk.i586.rpm 861765252ed3a55d8070d5587f1c5a50 8.1/RPMS/HTML-Embperl-1.3.22_1.3.4-4.1mdk.i586.rpm 1ec9d40da21ba65855962c4b05b51f2f 8.1/SRPMS/apache-1.3.22-10.1mdk.src.rpm 5e559e9d0b701fc80aa78c65dbc57a04 8.1/SRPMS/apache-mod_perl-1.3.22_1.26-4.1mdk.src.rpm

Mandrake Linux 8.1/ia64: c33afa1e5f7ea056cbd0ad933aef1a56 ia64/8.1/RPMS/apache-1.3.22-10.1mdk.ia64.rpm 184c43ed1e75453b3a62652156f7a132 ia64/8.1/RPMS/apache-common-1.3.22-10.1mdk.ia64.rpm 6cc2cfb6407648d2a9880da1d5993a78 ia64/8.1/RPMS/apache-devel-1.3.22-10.1mdk.ia64.rpm 562c6ab26a9d0f5324ab8abb8e4fc9f8 ia64/8.1/RPMS/apache-manual-1.3.22-10.1mdk.ia64.rpm 950d02262a7111b53b1832367344089d ia64/8.1/RPMS/apache-mod_perl-1.3.22_1.26-4.1mdk.ia64.rpm 401219d5dc0efeec2aaf19965a67a94b ia64/8.1/RPMS/apache-modules-1.3.22-10.1mdk.ia64.rpm f7e7328bfe89c2050e70af3f676e1e28 ia64/8.1/RPMS/apache-source-1.3.22-10.1mdk.ia64.rpm ae2566087bee798b3d5532b1c1ff2d5d ia64/8.1/RPMS/mod_perl-common-1.3.22_1.26-4.1mdk.ia64.rpm 53aaeb8cbafce545f0fb4f2ae24145ce ia64/8.1/RPMS/mod_perl-devel-1.3.22_1.26-4.1mdk.ia64.rpm d8e950aec1b517d7e43dbeb13a92ca65 ia64/8.1/RPMS/HTML-Embperl-1.3.22_1.3.4-4.1mdk.ia64.rpm 1ec9d40da21ba65855962c4b05b51f2f ia64/8.1/SRPMS/apache-1.3.22-10.1mdk.src.rpm 5e559e9d0b701fc80aa78c65dbc57a04 ia64/8.1/SRPMS/apache-mod_perl-1.3.22_1.26-4.1mdk.src.rpm

Mandrake Linux 8.2: d4b8e74109a6a9a06b77f4ca00703cb4 8.2/RPMS/apache-1.3.23-4.1mdk.i586.rpm 5d31265dfbaeadfbe1166c4724f9c25b 8.2/RPMS/apache-common-1.3.23-4.1mdk.i586.rpm 17bd94c4c80f8b9ce126f0b21bf961f0 8.2/RPMS/apache-devel-1.3.23-4.1mdk.i586.rpm 490f38b5a2151b2cc77c203ae34aa730 8.2/RPMS/apache-manual-1.3.23-4.1mdk.i586.rpm 4f3e54f01aca15c5df969a7064a4f9bd 8.2/RPMS/apache-mod_perl-1.3.23_1.26-5.1mdk.i586.rpm 7d95deff869faee09fe98c724e80f9ef 8.2/RPMS/apache-modules-1.3.23-4.1mdk.i586.rpm f7d87a1c308557aa6239e7fcd9e81a79 8.2/RPMS/apache-source-1.3.23-4.1mdk.i586.rpm f996109f1ac074cdd90e4edd13c252de 8.2/RPMS/mod_perl-common-1.3.23_1.26-5.1mdk.i586.rpm 07c6d444c12e46d4a1a316cd4515261f 8.2/RPMS/mod_perl-devel-1.3.23_1.26-5.1mdk.i586.rpm a978089b6b0166f11fb7470106d4b411 8.2/RPMS/HTML-Embperl-1.3.23_1.3.4-5.1mdk.i586.rpm d95c5a21cc4afa31842be448f3cb6706 8.2/SRPMS/apache-1.3.23-4.1mdk.src.rpm d8cd1dcc8132f3fea8e5859b049cb4e0 8.2/SRPMS/apache-mod_perl-1.3.23_1.26-5.1mdk.src.rpm

Mandrake Linux 8.2/ppc: 5e704d302c63f04fafa1d638b05b727f ppc/8.2/RPMS/apache-1.3.23-4.1mdk.ppc.rpm 40b0cf509f1c61bdb7839b327bf24b11 ppc/8.2/RPMS/apache-common-1.3.23-4.1mdk.ppc.rpm 84baeef6cd679067e8ed749b695c91d0 ppc/8.2/RPMS/apache-devel-1.3.23-4.1mdk.ppc.rpm d37d2b4f7025782f611d5e20df6b5189 ppc/8.2/RPMS/apache-manual-1.3.23-4.1mdk.ppc.rpm 3d5e185655df9bdc6606a21363862bdd ppc/8.2/RPMS/apache-mod_perl-1.3.23_1.26-5.1mdk.ppc.rpm c638e0fff62d6f6778d9a0fdd6d37d12 ppc/8.2/RPMS/apache-modules-1.3.23-4.1mdk.ppc.rpm 7a8212db2441bc3902e62633f081bb38 ppc/8.2/RPMS/apache-source-1.3.23-4.1mdk.ppc.rpm afe9bac22898aec350365823574be78e ppc/8.2/RPMS/mod_perl-common-1.3.23_1.26-5.1mdk.ppc.rpm 5c87d6fdd4c22b8a210a82310c6f8466 ppc/8.2/RPMS/mod_perl-devel-1.3.23_1.26-5.1mdk.ppc.rpm 31e1f7b4a7b4718527ebc3a4cb88f0ba ppc/8.2/RPMS/perl-Apache-Session-1.54-2mdk.noarch.rpm 0ae8d78611012756b767181ff1236553 ppc/8.2/RPMS/HTML-Embperl-1.3.23_1.3.4-5.1mdk.ppc.rpm d95c5a21cc4afa31842be448f3cb6706 ppc/8.2/SRPMS/apache-1.3.23-4.1mdk.src.rpm d8cd1dcc8132f3fea8e5859b049cb4e0 ppc/8.2/SRPMS/apache-mod_perl-1.3.23_1.26-5.1mdk.src.rpm d97cf098556de43b291ada4376a18fc3 ppc/8.2/SRPMS/perl-Apache-Session-1.54-2mdk.src.rpm

Corporate Server 1.0.1: e88a36b186ed910b350ded94ecf017eb 1.0.1/RPMS/apache-1.3.22-10.1mdk.i586.rpm 084e29eb5ea8f07924bd3c3aaa62e166 1.0.1/RPMS/apache-common-1.3.22-10.1mdk.i586.rpm 99ee271be857848a76ee4e5ddba164db 1.0.1/RPMS/apache-devel-1.3.22-10.1mdk.i586.rpm 7419f968d50062a46fdb5c932a4e6a66 1.0.1/RPMS/apache-manual-1.3.22-10.1mdk.i586.rpm a814f93494464cb1dc17ba363d128ade 1.0.1/RPMS/apache-mod_perl-1.3.22_1.26-2.1mdk.i586.rpm 8ad5af9470bf2efc5a9500c0ca0dc1f0 1.0.1/RPMS/apache-modules-1.3.22-10.1mdk.i586.rpm fb6de8872a5f8e378df18f7867167202 1.0.1/RPMS/apache-source-1.3.22-10.1mdk.i586.rpm 6657b308799219bb0adcfd7339c3bacc 1.0.1/RPMS/mod_perl-common-1.3.22_1.26-2.1mdk.i586.rpm f1ec2ba965c0217b346b9c43e2d9ec3f 1.0.1/RPMS/mod_perl-devel-1.3.22_1.26-2.1mdk.i586.rpm f743e6702701f49ec7c7226663e94256 1.0.1/RPMS/HTML-Embperl-1.3.22_1.3.4-2.1mdk.i586.rpm 1ec9d40da21ba65855962c4b05b51f2f 1.0.1/SRPMS/apache-1.3.22-10.1mdk.src.rpm 4a21f924efa9b33df29b63838a0bd283 1.0.1/SRPMS/apache-mod_perl-1.3.22_1.26-2.1mdk.src.rpm

Single Network Firewall 7.2: 24f79880c17c12b1a0106c210e46ec9e snf7.2/RPMS/apache-1.3.20-5.1mdk.i586.rpm 2b8d3b2b0430b78a49fe172e72e7b5a1 snf7.2/RPMS/apache-common-1.3.20-5.1mdk.i586.rpm d104f95454b1d28035db97df19a6460b snf7.2/RPMS/apache-devel-1.3.20-5.1mdk.i586.rpm 7180b8f52e477f89a68bc27a220d3ab2 snf7.2/RPMS/apache-manual-1.3.20-5.1mdk.i586.rpm d9768de21cd57c828deaa36c63839ba0 snf7.2/RPMS/apache-mod_perl-1.3.20_1.24-5.1mdk.i586.rpm 44f05723dc7d10eb6e5590e34b21ce9a snf7.2/RPMS/apache-mod_perl-devel-1.3.20_1.24-5.1mdk.i586.rpm dc20b172adaa53806cc055b1f8ffe50a snf7.2/RPMS/apache-suexec-1.3.20-5.1mdk.i586.rpm 49e9f481c8cc83fff20309e0f24add2e snf7.2/RPMS/HTML-Embperl-1.3b6-5.1mdk.i586.rpm 5be9ae334cabbd773f43719f2d54853f snf7.2/SRPMS/apache-1.3.20-5.1mdk.src.rpm ________________________________________________________________________

Bug IDs fixed (see https://qa.mandrakesoft.com for more information):

________________________________________________________________________

To upgrade automatically, use MandrakeUpdate. The verification of md5 checksums and GPG signatures is performed automatically for you.

If you want to upgrade manually, download the updated package from one of our FTP server mirrors and upgrade with "rpm -Fvh *.rpm". A list of FTP mirrors can be obtained from:

http://www.mandrakesecure.net/en/ftp.php

Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command:

rpm --checksig <filename>

All packages are signed by MandrakeSoft for security. You can obtain the GPG public key of the Mandrake Linux Security Team from:

https://www.mandrakesecure.net/RPM-GPG-KEYS

Please be aware that sometimes it takes the mirrors a few hours to update.

You can view other update advisories for Mandrake Linux at:

http://www.mandrakesecure.net/en/advisories/

MandrakeSoft has several security-related mailing list services that anyone can subscribe to. Information on these lists can be obtained by visiting:

http://www.mandrakesecure.net/en/mlist.php

If you want to report vulnerabilities, please contact

security@linux-mandrake.com ________________________________________________________________________

Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team <security@linux-mandrake.com>

- -----BEGIN PGP PUBLIC KEY BLOCK----- Version: GnuPG v1.0.7 (GNU/Linux)

mQGiBDlp594RBAC2tDozI3ZgQsE7XwxurJCJrX0L5vx7SDByR5GHDdWekGhdiday L4nfUax+SeR9SCoCgTgPW1xB8vtQc8/sinJlMjp9197a2iKM0FOcPlkpa3HcOdt7 WKJqQhlMrHvRcsivzcgqjH44GBBJIT6sygUF8k0lU6YnMHj5MPc/NGWt8wCg9vKo P0l5QVAFSsHtqcU9W8cc7wMEAJzQsAlnvPXDBfBLEH6u7ptWFdp0GvbSuG2wRaPl hynHvRiE01ZvwbJZXsPsKm1z7uVoW+NknKLunWKB5axrNXDHxCYJBzY3jTeFjsqx PFZkIEAQphLTkeXXelAjQ5u9tEshPswEtMvJvUgNiAfbzHfPYmq8D6x5xOw1IySg 2e/LBACxr2UJYCCB2BZ3p508mAB0RpuLGukq+7UWiOizy+kSskIBg2O7sQkVY/Cs iyGEo4XvXqZFMY39RBdfm2GY+WB/5NFiTOYJRKjfprP6K1YbtsmctsX8dG+foKsD LLFs7OuVfaydLQYp1iiN6D+LJDSMPM8/LCWzZsgr9EKJ8NXiyrQ6TGludXggTWFu ZHJha2UgU2VjdXJpdHkgVGVhbSA8c2VjdXJpdHlAbGludXgtbWFuZHJha2UuY29t PohWBBMRAgAWBQI5aefeBAsKBAMDFQMCAxYCAQIXgAAKCRCaqNDQIkWKmK6LAKCy /NInDsaMSI+WHwrquwC5PZrcnQCeI+v3gUDsNfQfiKBvQSANu1hdulqIRgQQEQIA BgUCOtNVGQAKCRBZ5w3um0pAJJWQAKDUoL5He+mKbfrMaTuyU5lmRyJ0fwCgoFAP WdvQlu/kFjphF740XeOwtOqIRgQQEQIABgUCOu8A6QAKCRBynDnb9lq3CnpjAJ4w Pk0SEE9U4r40IxWpwLU+wrWVugCdFfSPllPpZRCiaC7HwbFcfExRmPaIRgQQEQIA BgUCPI+UAwAKCRDniYrgcHcf8xK5AKCm/Mq8qP8GE0o1hEX22QsJMZwH5gCfZ72H 8TacOb3oAmBdprf+K6gkdOiIRgQQEQIABgUCOtOieAAKCRCv2bZyU0yB80MeAJ9K +jXt0cKuaUonRU+CRGetk6t9dgCfTRRL6/puOKdD6md70+K5EBBSvsG0OE1hbmRy YWtlIExpbnV4IFNlY3VyaXR5IFRlYW0gPHNlY3VyaXR5QG1hbmRyYWtlc29mdC5j b20+iFcEExECABcFAjyPnuUFCwcKAwQDFQMCAxYCAQIXgAAKCRCaqNDQIkWKmFi+ OWnn7xAEAOQlTVY4TiNo5V/iP0J1xnqjqlqZsU7yEBKo/gZz6/+hx75RURe1ebiJ 9F779FQbpJ9Epz1KLSXvq974rnVb813zuGdmgFyk+ryA/rTR2RQ8h+EoNkwmATzR xBXVJb57fFQjxOu4eNjZAtfII/YXb0uyXXrdr5dlJ/3eXrcO4p0XAAMFBACCxo6Z 269s+A4v8C6Ui12aarOQcCDlV8cVG9LkyatU3FNTlnasqwo6EkaP572448weJWwN 6SCXVl+xOYLiK0hL/6Jb/O9Agw75yUVdk+RMM2I4fNEi+y4hmfMh2siBv8yEkEvZ jTcl3TpkTfzYky85tu433wmKaLFOv0WjBFSikohGBBgRAgAGBQI5aefvAAoJEJqo 0NAiRYqYid0AoJgeWzXrEdIClBOSW5Q6FzqJJyaqAKC0Y9YI3UFlE4zSIGjcFlLJ EJGXlA== =yGlX - -----END PGP PUBLIC KEY BLOCK-----

-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQE9FNi+mqjQ0CJFipgRAoShAJoCFOLHJV7Qrp3TbaTFjSsLTW7bLQCfZMe5 pOt+zlhH4PjFbQ604bi1d9k= =Iq3W -----END PGP SIGNATURE-----

  Nav
» Read more about: Story Type: Security; Groups: Mandriva

« Return to the newswire homepage

This topic does not have any threads posted yet!

You cannot post until you login.