Mandriva: Subject: [Security Announce] [ MDVA-2009:092 ] codeina
Posted by Benjamin D. Thomas   
Mandrake A bug in codeina could prevent its cache to not be flushed properly on errors, preventing it to work properly if a erronous file was downloaded previously. This package update fixes this issue and increase startup delay to 30s to improve login time.
 _______________________________________________________________________

 Mandriva Linux Advisory                                   MDVA-2009:092
 http://www.mandriva.com/security/
 _______________________________________________________________________

 Package : codeina
 Date    : June 7, 2009
 Affected: 2009.0, 2009.1
 _______________________________________________________________________

 Problem Description:

 A bug in codeina could prevent its cache to not be flushed properly
 on errors, preventing it to work properly if a erronous file was
 downloaded previously. This package update fixes this issue and
 increase startup delay to 30s to improve login time.
 _______________________________________________________________________

 Updated Packages:

 Mandriva Linux 2009.0:
 fe8ff57811b9047f2e7ba8a3bfb3738b  2009.0/i586/codeina-0.10.2-16.1mdv2009.0.noarch.rpm 
 901da438a3e0595afc7b72b0c105b548  2009.0/SRPMS/codeina-0.10.2-16.1mdv2009.0.src.rpm

 Mandriva Linux 2009.0/X86_64:
 cfe5824b684c383e2e5df5c27248ce54  2009.0/x86_64/codeina-0.10.2-16.1mdv2009.0.noarch.rpm 
 901da438a3e0595afc7b72b0c105b548  2009.0/SRPMS/codeina-0.10.2-16.1mdv2009.0.src.rpm

 Mandriva Linux 2009.1:
 eb1561469acce997821b9184110da62f  2009.1/i586/codeina-0.10.2-25.1mdv2009.1.noarch.rpm 
 2a174dac2ba7096e49c754510b76017f  2009.1/SRPMS/codeina-0.10.2-25.1mdv2009.1.src.rpm

 Mandriva Linux 2009.1/X86_64:
 921561e84534ffa9f5a7160781dccc9b  2009.1/x86_64/codeina-0.10.2-25.1mdv2009.1.noarch.rpm 
 2a174dac2ba7096e49c754510b76017f  2009.1/SRPMS/codeina-0.10.2-25.1mdv2009.1.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team