TITLE: Trustix updates for multiple packages SECUNIA ADVISORY ID: SA19964 VERIFY ADVISORY: http://secunia.com/advisories/19964/ CRITICAL: Moderately critical IMPACT: DoS, System access WHERE: >From remote OPERATING SYSTEM: Trustix Secure Linux 2.2 http://secunia.com/product/4641/ DESCRIPTION: Trustix has issued updates for multiple packages. These fix some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a vulnerable system. For more information: SA19618 SA19838 SA19880 SA19920 SOLUTION: Apply updated packages. Trustix Secure Linux 2.2: 4ce128f09ab5a6aebc814a4a8389cd51 2.2/rpms/clamav-0.88.2-1tr.i586.rpm 7c29e1c6eab44f4380af89384e18ce67 2.2/rpms/clamav-devel-0.88.2-1tr.i586.rpm 251875bae4da0c8812f392645454afeb 2.2/rpms/cyrus-sasl-2.1.20-7tr.i586.rpm 94398d80360b5166a71adc02a700846b 2.2/rpms/cyrus-sasl-devel-2.1.20-7tr.i586.rpm 0c6fe11ab11c80df5725a738b8500eb2 2.2/rpms/cyrus-sasl-md5-2.1.20-7tr.i586.rpm 058d6dc0df428df3c1453df769428e9c 2.2/rpms/cyrus-sasl-otp-2.1.20-7tr.i586.rpm 30d784607cb89d03aaaa860e2ded2902 2.2/rpms/cyrus-sasl-plain-2.1.20-7tr.i586.rpm 0f794362b7795c05d75f2847bcf1245b 2.2/rpms/cyrus-sasl-sql-2.1.20-7tr.i586.rpm 0d064a6ff40a2ae53cd93bfd14dbe10c 2.2/rpms/cyrus-sasl-utils-2.1.20-7tr.i586.rpm 21f4458df3cc75524d89c0ca050d6860 2.2/rpms/libtiff-3.7.3-2tr.i586.rpm cb29f7ab911871682000de6316b8ee01 2.2/rpms/libtiff-devel-3.7.3-2tr.i586.rpm c2f1d749f54379f1a60202eb7e71e79e 2.2/rpms/rsync-2.6.8-1tr.i586.rpm a2ed791cd851db257914372034f448be 2.2/rpms/rsync-server-2.6.8-1tr.i586.rpm ORIGINAL ADVISORY: http://www.trustix.org/errata/2006/0024/ OTHER REFERENCES: SA19618: http://secunia.com/advisories/19618/ SA19838: http://secunia.com/advisories/19838/ SA19880: http://secunia.com/advisories/19880/ SA19920: http://secunia.com/advisories/19920/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------