---------------------------------------------------------------------- Want to work within IT-Security? Secunia is expanding its team of highly skilled security experts. We will help with relocation and obtaining a work permit. Currently the following type of positions are available: http://secunia.com/quality_assurance_analyst/ http://secunia.com/web_application_security_specialist/ http://secunia.com/hardcore_disassembler_and_reverse_engineer/ ---------------------------------------------------------------------- TITLE: Trustix Updates for Multiple Packages SECUNIA ADVISORY ID: SA21954 VERIFY ADVISORY: http://secunia.com/advisories/21954/ CRITICAL: Moderately critical IMPACT: Security Bypass, Exposure of sensitive information, DoS WHERE: >From remote OPERATING SYSTEM: Trustix Secure Linux 2.2 http://secunia.com/product/4641/ DESCRIPTION: Trustix has issued updates for multiple packages. These fix some vulnerabilities, which can be exploited by malicious, local users or by malicious people to disclose potentially sensitive information, bypass certain security restrictions, and cause a DoS (Denial of Service). For more information: SA17114 SA17384 SA17504 SA18523 SA19664 SA20185 SA21476 SA21563 SA21576 SA21709 SA21711 SA21752 SOLUTION: Apply updated packages. edcfc0e0b33e584772b3ab38c2ecc120 2.2/rpms/bind-9.3.2-4tr.i586.rpm 7c10280e5e0e85decd471c740651fcf7 2.2/rpms/bind-devel-9.3.2-4tr.i586.rpm 0b31ab1242338a21373a5b5677b38d15 2.2/rpms/bind-libs-9.3.2-4tr.i586.rpm 8715527a40ead4ce8e279ea85e96945b 2.2/rpms/bind-light-9.3.2-4tr.i586.rpm a6e53d9494c395aa0b9964e91504063f 2.2/rpms/bind-light-devel-9.3.2-4tr.i586.rpm fc9730b297ec56db37babc9d69f0777f 2.2/rpms/bind-utils-9.3.2-4tr.i586.rpm 2cb53a6092ab2de443576fc493c7c61f 2.2/rpms/kernel-2.4.33.3-1tr.i586.rpm 99ebf5b654d17918297f3ade9a188797 2.2/rpms/kernel-BOOT-2.4.33.3-1tr.i586.rpm 9d2325bf115bc51b97f3a1b7858950cd 2.2/rpms/kernel-doc-2.4.33.3-1tr.i586.rpm 22425048536337cfa6a78b50bc50b227 2.2/rpms/kernel-smp-2.4.33.3-1tr.i586.rpm 13aa3038815b939c4385c48738027097 2.2/rpms/kernel-source-2.4.33.3-1tr.i586.rpm 969b1acbb169f601348b429a1cd65d4b 2.2/rpms/kernel-utils-2.4.33.3-1tr.i586.rpm d45c46c044c54a836b0a3e8b0ea61bd8 2.2/rpms/openssl-0.9.7e-7tr.i586.rpm 3d60834f48d77853e81606d2bcfbda81 2.2/rpms/openssl-devel-0.9.7e-7tr.i586.rpm 2bc39b5e84a862657dd28999fdddf43c 2.2/rpms/openssl-python-0.9.7e-7tr.i586.rpm be83cfcd1ceae92288cbaf3d510a0482 2.2/rpms/openssl-support-0.9.7e-7tr.i586.rpm ORIGINAL ADVISORY: http://www.trustix.org/errata/2006/0051/ OTHER REFERENCES: SA17114: http://secunia.com/advisories/17114/ SA17384: http://secunia.com/advisories/17384/ SA17504: http://secunia.com/advisories/17504/ SA18523: http://secunia.com/advisories/18523/ SA19664: http://secunia.com/advisories/19664/ SA20185: http://secunia.com/advisories/20185/ SA21476: http://secunia.com/advisories/21476/ SA21563: http://secunia.com/advisories/21563/ SA21576: http://secunia.com/advisories/21576/ SA21709: http://secunia.com/advisories/21709/ SA21711: http://secunia.com/advisories/21711/ SA21752: http://secunia.com/advisories/21752/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------