Hi,

is this normal (TSL 3.0):

server1 10:17:30 /home/users/david $swup --upgrade
Fetching upgrade info for site: Community Contrib
Fetching upgrade info for site: Trustix Official http
Fetching upgrade info for site: Trustix Official ftp
Fetching resource info for site: Trustix Official ftp
Fetching resource info for site: Trustix Official http
Fetching resource info for site: Community Contrib
Verifying packages.
Done verifying packages.
Your system is up to date.
server1 10:17:44 /home/users/david $rpm -q -a | grep spam
spamassassin-3.0.4-3tr
spamassassin-3.0.4-2tr
perl-mail-spamassassin-3.0.4-3tr
server1 10:17:50 /home/users/david $

Thanks for any help, best regards,

David


Nived Gopalan wrote:
> On Wed, 2006-06-07 at 22:01, Morten Nilsen wrote:
>> Sim wrote:
>>> SpamAssassin Remote Command Execution Vulnerability (Jun 06 2006 12:00AM )
>> At least it's not vulnerable in the default configuration on TSL
>>
>> ..you forgot to include a link to your bug report;
>> https://bugs.trustix.org/show_bug.cgi?id=1776
> 
> Fixed in spamassassin-3.0.4-4tr. 
> 
> - Nived.
> 
> _______________________________________________
> tsl-discuss mailing list
> [email protected]
> http://lists.trustix.org/mailman/listinfo/tsl-discuss
_______________________________________________
tsl-discuss mailing list
[email protected]
http://lists.trustix.org/mailman/listinfo/tsl-discuss

Reply via email to