TITLE: Mandriva update for hylafax SECUNIA ADVISORY ID: SA18489 VERIFY ADVISORY: http://secunia.com/advisories/18489/ CRITICAL: Moderately critical IMPACT: Security Bypass, System access WHERE: >From remote OPERATING SYSTEM: Mandrakelinux 10.1 http://secunia.com/product/4198/ DESCRIPTION: Mandrake has issued an update for hylafax. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and by malicious users to compromise a vulnerable system. For more information: SA18314 SOLUTION: Apply updated packages. Mandrakelinux 10.1: 2288eb6fa13db28cec0a2936e6da201b 10.1/RPMS/hylafax-4.2.0-1.4.101mdk.i586.rpm ae01aff5e685211d56d782c7107aa643 10.1/RPMS/hylafax-client-4.2.0-1.4.101mdk.i586.rpm 2d160b49e8e9e41beb3a8bd98995a4e7 10.1/RPMS/hylafax-server-4.2.0-1.4.101mdk.i586.rpm 0210a8f6269b741c88f1a08e1fd3bf67 10.1/RPMS/libhylafax4.2.0-4.2.0-1.4.101mdk.i586.rpm 21aad742a2af1af8bef9ec598dcc9808 10.1/RPMS/libhylafax4.2.0-devel-4.2.0-1.4.101mdk.i586.rpm 0db2c22f9b1714b2bc67767be3af086b 10.1/SRPMS/hylafax-4.2.0-1.4.101mdk.src.rpm Mandrakelinux 10.1/X86_64: 204fddbe437c72f04bbc10d9520b29bf x86_64/10.1/RPMS/hylafax-4.2.0-1.4.101mdk.x86_64.rpm 0c0b7f49dc6ba818255066d880b1eeda x86_64/10.1/RPMS/hylafax-client-4.2.0-1.4.101mdk.x86_64.rpm 514b0ae30861e05453665b10c96e0471 x86_64/10.1/RPMS/hylafax-server-4.2.0-1.4.101mdk.x86_64.rpm 0a91eadc96ace924c000932bf7b73f00 x86_64/10.1/RPMS/lib64hylafax4.2.0-4.2.0-1.4.101mdk.x86_64.rpm 1eea0a264c43552015c86490e562f3c3 x86_64/10.1/RPMS/lib64hylafax4.2.0-devel-4.2.0-1.4.101mdk.x86_64.rpm 0db2c22f9b1714b2bc67767be3af086b x86_64/10.1/SRPMS/hylafax-4.2.0-1.4.101mdk.src.rpm ORIGINAL ADVISORY: http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:015 OTHER REFERENCES: SA18314: http://secunia.com/advisories/18314/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------