Mandrake alert: Updated qt3 package fix problems with accelerator keys
A problem with qt3 would cause improper behaviour of using accelerator
keys in KDE applications such as Konqueror, KMail, and others. Using
these keys would either crash the program or simply not work. The
updated packages fix this problem.
|
|
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandrake Linux Update Advisory
_______________________________________________________________________
Package name: qt3
Advisory ID: MDKA-2004:005-1
Date: January 22nd, 2004
Original Advisory Date: January 14th, 2004
Affected versions: 9.2
______________________________________________________________________
Problem Description:
A problem with qt3 would cause improper behaviour of using accelerator
keys in KDE applications such as Konqueror, KMail, and others. Using
these keys would either crash the program or simply not work. The
updated packages fix this problem.
Update:
The previous packages were built with debug information enabled which
caused the size of the binaries to be much larger than normal. These
packages are built without debug information.
______________________________________________________________________
Updated Packages:
Mandrake Linux 9.2:
2d52baee5548fa759a8db4a7fb7b3e37 9.2/RPMS/libqt3-3.1.2-15.3.92mdk.i586.rpm
1173a603471281984ae6b81561cc4734 9.2/RPMS/libqt3-devel-3.1.2-15.3.92mdk.i586.rpm
eb1c89141c6530d455e69e0c89a8c84d 9.2/RPMS/libqt3-mysql-3.1.2-15.3.92mdk.i586.rpm
a1fd60d7895da53536166db21acb841d 9.2/RPMS/libqt3-odbc-3.1.2-15.3.92mdk.i586.rpm
d621eae073a9a3a5c350b83d0530e265 9.2/RPMS/libqt3-psql-3.1.2-15.3.92mdk.i586.rpm
f60a2dbca740413b8ab8eb2140613321 9.2/RPMS/qt3-common-3.1.2-15.3.92mdk.i586.rpm
e8f14877b4b7e9f2f2c3cc4e84400e7b 9.2/RPMS/qt3-example-3.1.2-15.3.92mdk.i586.rpm
589e440bf684e37b8f57f29fffaffefd 9.2/SRPMS/qt3-3.1.2-15.3.92mdk.src.rpm
Mandrake Linux 9.2/AMD64:
0b203f45a88a6345fcc9bf11bcb1190a amd64/9.2/RPMS/lib64qt3-3.1.2-15.3.92mdk.amd64.rpm
9a70360badefa4b022fc0c52f8c9413b amd64/9.2/RPMS/lib64qt3-devel-3.1.2-15.3.92mdk.amd64.rpm
d50f8ee307a2ccf70f1a36378ab4ef78 amd64/9.2/RPMS/lib64qt3-mysql-3.1.2-15.3.92mdk.amd64.rpm
96127cce0edc4e547b6d111ce7620203 amd64/9.2/RPMS/lib64qt3-odbc-3.1.2-15.3.92mdk.amd64.rpm
12cba607321e23945126aaf3d74994ca amd64/9.2/RPMS/lib64qt3-psql-3.1.2-15.3.92mdk.amd64.rpm
5d7c5403af4abc6c32dc12ac530a4c2d amd64/9.2/RPMS/qt3-common-3.1.2-15.3.92mdk.amd64.rpm
2061c6f7da90f55078257260bcce8150 amd64/9.2/RPMS/qt3-example-3.1.2-15.3.92mdk.amd64.rpm
589e440bf684e37b8f57f29fffaffefd amd64/9.2/SRPMS/qt3-3.1.2-15.3.92mdk.src.rpm
_______________________________________________________________________
Bug IDs fixed (see http://bugs.mandrakelinux.com for more information):
28 - Submenu accelerator key problem (and crash)
_______________________________________________________________________
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
A list of FTP mirrors can be obtained from:
http://www.mandrakesecure.net/en/ftp.php
All packages are signed by MandrakeSoft for security. You can obtain
the GPG public key of the Mandrake Linux Security Team by executing:
gpg --recv-keys --keyserver http://www.mandrakesecure.net 0x22458A98
Please be aware that sometimes it takes the mirrors a few hours to
update.
You can view other update advisories for Mandrake Linux at:
http://www.mandrakesecure.net/en/advisories/
MandrakeSoft has several security-related mailing list services that
anyone can subscribe to. Information on these lists can be obtained by
visiting:
http://www.mandrakesecure.net/en/mlist.php
If you want to report vulnerabilities, please contact
security_linux-mandrake.com
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)
iD8DBQFAEGqHmqjQ0CJFipgRAv8YAKCZ2g8lAQ8MiBWxF2nAc1fqJU1eXQCfWYhv
9ZK3ATRTdKJnHDYqRS9FogI=
=9AJg
-----END PGP SIGNATURE-----
|
This topic does not have any threads posted yet!
You cannot post until you login.