[Security Announce] [ MDKA-2006:038 ] - Updated squid package corrects bug on x86_64
[Posted October 17, 2006 by ris]
From: |
| security-AT-mandriva.com |
To: |
| security-announce-AT-mandrivalinux.org |
Subject: |
| [Security Announce] [ MDKA-2006:038 ] - Updated squid package corrects bug on x86_64 |
Date: |
| Fri, 13 Oct 2006 12:29:00 -0600 |
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Advisory MDKA-2006:038
http://www.mandriva.com/security/
_______________________________________________________________________
Package : squid
Date : October 13, 2006
Affected: 2007.0
_______________________________________________________________________
Problem Description:
This update fixes a problem in the squid package as shipped for
Mandriva Linux 2007 which affects only the x86_64 architecture. On
that platform, squid would not start, giving the following message:
FATAL: Bungled Default Configuration line 44: hosts_file
This has been fixed in the updated packages. It is recommended that
all affected users upgrade squid.
_______________________________________________________________________
References:
http://qa.mandriva.com/show_bug.cgi?id=25731
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2007.0:
e76e77cfae2d54f2f3ac09ba96cf71b1 2007.0/i586/squid-2.6.STABLE1-4.1mdv2007.0.i586.rpm
88e730d9e17ad98ec663583651f3c3c6 2007.0/i586/squid-cachemgr-2.6.STABLE1-4.1mdv2007.0.i586.rpm
49882be8e81161b0c0a566b8a2b67305 2007.0/SRPMS/squid-2.6.STABLE1-4.1mdv2007.0.src.rpm
Mandriva Linux 2007.0/X86_64:
f8b03c2f7ea97c441e6aeac974160b2e 2007.0/x86_64/squid-2.6.STABLE1-4.1mdv2007.0.x86_64.rpm
e23871fb4fa91c45d3e3d509e186b05f 2007.0/x86_64/squid-cachemgr-2.6.STABLE1-4.1mdv2007.0.x86_64.rpm
49882be8e81161b0c0a566b8a2b67305 2007.0/SRPMS/squid-2.6.STABLE1-4.1mdv2007.0.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)
iD8DBQFFL7DhmqjQ0CJFipgRAgXrAKDZfCEqKCas8MnCTzUzv73sYPlFpQCgkejF
Wn5UYuZhNy1BRdFkcpdU3Sc=
=bAQa
-----END PGP SIGNATURE-----
To unsubscribe, send a email to sympa@mandrivalinux.org
with this subject : unsubscribe security-announce
_______________________________________________________
Want to buy your Pack or Services from Mandriva?
Go to http://www.mandrivastore.com
Join the Club : http://www.mandrivaclub.com
_______________________________________________________