LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: April 7th, 2014
Linux Advisory Watch: April 4th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Fedora 9 Update: clamav-0.93.3-2.fc9 Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Fedora Security fixes from upstream 0.94 and 0.94.1: CVE-2008-1389 (#461461): Invalid memory access in the CHM unpacker CVE-2008-3912 (#461461): Multiple out-of-memory NULL pointer dereferences CVE-2008-3913 (#461461): Fix memory leak in the error code path in freshclam CVE-2008-3914 (#461461): Multiple file descriptor leaks on the error code path CVE-2008-5050 (#470783): get_unicode_name() off-by-one buffer overflow
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2008-9644
2008-11-14 11:08:19
--------------------------------------------------------------------------------

Name        : clamav
Product     : Fedora 9
Version     : 0.93.3
Release     : 2.fc9
URL         : http://www.clamav.net
Summary     : End-user tools for the Clam Antivirus scanner
Description :
Clam AntiVirus is an anti-virus toolkit for UNIX. The main purpose of this
software is the integration with mail servers (attachment scanning). The
package provides a flexible and scalable multi-threaded daemon, a command
line scanner, and a tool for automatic updating via Internet. The programs
are based on a shared library distributed with the Clam AntiVirus package,
which you can use with your own software. The virus database is based on
the virus database from OpenAntiVirus, but contains additional signatures
(including signatures for popular polymorphic viruses, too) and is KEPT UP
TO DATE.

--------------------------------------------------------------------------------
Update Information:

Security fixes from upstream 0.94 and 0.94.1:    CVE-2008-1389 (#461461):
Invalid memory access in the CHM unpacker  CVE-2008-3912 (#461461): Multiple
out-of-memory NULL pointer dereferences  CVE-2008-3913 (#461461): Fix memory
leak in the error code path in freshclam  CVE-2008-3914 (#461461): Multiple file
descriptor leaks on the error code path  CVE-2008-5050 (#470783):
get_unicode_name() off-by-one buffer overflow
--------------------------------------------------------------------------------
ChangeLog:

* Thu Nov 13 2008 Tomas Hoger  - 0.93.3-2
- Security update - backport security fixes from 0.94:
  CVE-2008-1389 (#461461): Invalid memory access in the CHM unpacker
  CVE-2008-3912 (#461461): Multiple out-of-memory NULL pointer dereferences
  CVE-2008-3913 (#461461): Fix memory leak in the error code path in freshclam
  CVE-2008-3914 (#461461): Multiple file descriptor leaks on the error code path
- Security update - backport security fixes from 0.94.1:
  CVE-2008-5050 (#470783): get_unicode_name() off-by-one buffer overflow
* Sun Jul 13 2008 Enrico Scholz  - 0.93.3-1
- updated to 0.93.3; improved fix for CVE-2008-2713 (out-of-bounds read
  on petite files) - CVE-2008-3215
- put pid instead of pgrp into pidfile of clamav-milter (bz #452359)
* Tue Jun 17 2008 Enrico Scholz  - 0.93.1-1
- updated to 0.93.1
- rediffed -path patch
- CVE-2008-2713 Invalid Memory Access Denial Of Service Vulnerability
* Mon Apr 14 2008 Enrico Scholz  - 0.93-1
- updated to final 0.93
- removed daily.inc + main.inc directories; they are now replaced by
  *.cld containers
- trimmed down MAILTO list of cronjob to 'root' again; every well
  configured system has an alias for this recipient
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #461461 - clamav: multiple security fixes in 0.94 (CVE-2008-1389, CVE-2008-3912, CVE-2008-3913, CVE-2008-3914)
        https://bugzilla.redhat.com/show_bug.cgi?id=461461
  [ 2 ] Bug #470783 - CVE-2008-5050 clamav: get_unicode_name() off-by-one buffer overflow  (< 0.94.1)
        https://bugzilla.redhat.com/show_bug.cgi?id=470783
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use 
su -c 'yum update clamav' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys
--------------------------------------------------------------------------------

_______________________________________________
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Heartbleed: Security experts reality-check the 3 most hysterical fears
Open source trounces proprietary software for code defects, Coverity analysis finds
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.