[go: up one dir, main page]

|
|
Log in / Subscribe / Register

Mandriva update

From:  security-AT-mandriva.com
To:  security-announce-AT-mandrivalinux.org
Subject:  [Security Announce] [ MDKA-2006:022 ] - Updated module-init-tools packages fix CUPS-related bug
Date:  Wed, 26 Apr 2006 20:07:00 -0600


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Advisory                                   MDKA-2006:022
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : module-init-tools
 Date    : April 26, 2006
 Affected: 2006.0
 _______________________________________________________________________
 
 Problem Description:
 
 The default configuration of module-init-tools was to send a HUP signal
 to the CUPS daemon whenever the "usblp" kernel module is loaded, for
 example when a USB printer is plugged in. Due to udev also sending a HUP
 signal to the CUPS daemon on pluggin in a USB printer there were two
 HUPs one shortly after the other which often makes the CUPS daemon
 crashing.
 
 The updated module-init-tools package removes the usblp call
 responsible for this bad behaviour.
 _______________________________________________________________________

 Updated Packages:
 
 Mandriva Linux 2006.0:
 5e9dbb1b640b6ea39bef367dda25f608  2006.0/RPMS/module-init-tools-3.2-0.pre8.2.1.20060mdk.i586.rpm
 728da795addc56680bec0e6da818d5e5  2006.0/SRPMS/module-init-tools-3.2-0.pre8.2.1.20060mdk.src.rpm

 Mandriva Linux 2006.0/X86_64:
 0af8f938e00750f5e659aa12608970a0
x86_64/2006.0/RPMS/module-init-tools-3.2-0.pre8.2.1.20060mdk.x86_64.rpm
 728da795addc56680bec0e6da818d5e5
x86_64/2006.0/SRPMS/module-init-tools-3.2-0.pre8.2.1.20060mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFET/xMmqjQ0CJFipgRAl2DAJ9RR+0oJHTY89559rlG4dVOUl3sHACfbPUX
y0lmMcNiaEuw0BpbIjfgJ5o=
=NusG
-----END PGP SIGNATURE-----


To unsubscribe, send a email to sympa@mandrivalinux.org
with this subject : unsubscribe security-announce
_______________________________________________________
Want to buy your Pack or Services from Mandriva? 
Go to http://www.mandrivastore.com
Join the Club : http://www.mandrivaclub.com
_______________________________________________________




to post comments


Copyright © 2006, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds