Hi, is this normal (TSL 3.0):
server1 10:17:30 /home/users/david $swup --upgrade Fetching upgrade info for site: Community Contrib Fetching upgrade info for site: Trustix Official http Fetching upgrade info for site: Trustix Official ftp Fetching resource info for site: Trustix Official ftp Fetching resource info for site: Trustix Official http Fetching resource info for site: Community Contrib Verifying packages. Done verifying packages. Your system is up to date. server1 10:17:44 /home/users/david $rpm -q -a | grep spam spamassassin-3.0.4-3tr spamassassin-3.0.4-2tr perl-mail-spamassassin-3.0.4-3tr server1 10:17:50 /home/users/david $ Thanks for any help, best regards, David Nived Gopalan wrote: > On Wed, 2006-06-07 at 22:01, Morten Nilsen wrote: >> Sim wrote: >>> SpamAssassin Remote Command Execution Vulnerability (Jun 06 2006 12:00AM ) >> At least it's not vulnerable in the default configuration on TSL >> >> ..you forgot to include a link to your bug report; >> https://bugs.trustix.org/show_bug.cgi?id=1776 > > Fixed in spamassassin-3.0.4-4tr. > > - Nived. > > _______________________________________________ > tsl-discuss mailing list > [email protected] > http://lists.trustix.org/mailman/listinfo/tsl-discuss _______________________________________________ tsl-discuss mailing list [email protected] http://lists.trustix.org/mailman/listinfo/tsl-discuss
