LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: September 19th, 2014
Linux Security Week: September 15th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Fedora 8 Update: clamav-0.92.1-4.fc8 Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Fedora Security fixes from upstream 0.94 and 0.94.1: CVE-2008-3912 (#461461): Multiple out-of-memory NULL pointer dereferences CVE-2008-3913 (#461461): Fix memory leak in the error code path in freshclam CVE-2008-3914 (#461461): File descriptor leak on the error code path CVE-2008-5050 (#470783): get_unicode_name() off-by-one buffer overflow
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2008-9651
2008-11-14 11:09:18
--------------------------------------------------------------------------------

Name        : clamav
Product     : Fedora 8
Version     : 0.92.1
Release     : 4.fc8
URL         : http://www.clamav.net
Summary     : End-user tools for the Clam Antivirus scanner
Description :
Clam AntiVirus is an anti-virus toolkit for UNIX. The main purpose of this
software is the integration with mail servers (attachment scanning). The
package provides a flexible and scalable multi-threaded daemon, a command
line scanner, and a tool for automatic updating via Internet. The programs
are based on a shared library distributed with the Clam AntiVirus package,
which you can use with your own software. The virus database is based on
the virus database from OpenAntiVirus, but contains additional signatures
(including signatures for popular polymorphic viruses, too) and is KEPT UP
TO DATE.

--------------------------------------------------------------------------------
Update Information:

Security fixes from upstream 0.94 and 0.94.1:    CVE-2008-3912 (#461461):
Multiple out-of-memory NULL pointer dereferences  CVE-2008-3913 (#461461): Fix
memory leak in the error code path in freshclam  CVE-2008-3914 (#461461): File
descriptor leak on the error code path  CVE-2008-5050 (#470783):
get_unicode_name() off-by-one buffer overflow
--------------------------------------------------------------------------------
ChangeLog:

* Thu Nov 13 2008 Tomas Hoger  - 0.92.1-4
- Security update - backport security fixes from 0.94:
  CVE-2008-3912 (#461461): Multiple out-of-memory NULL pointer dereferences
  CVE-2008-3913 (#461461): Fix memory leak in the error code path in freshclam
  CVE-2008-3914 (#461461): File descriptor leak on the error code path
- Security update - backport security fixes from 0.94.1:
  CVE-2008-5050 (#470783): get_unicode_name() off-by-one buffer overflow
* Sun Jul 13 2008 Enrico Scholz  - 0.92.1-3
- disabled check which prevents older freshclam versions to run in <4h
  intervals (bz #453601)
- backported security fixes from 0.93.3:
  CVE-2008-2713: out-of-bounds read on petite files
* Thu Apr 24 2008 Tomas Hoger  - 0.92.1-2
- Security update - backport security fixes from 0.93:
  CVE-2008-1100 (#442360): Upack Processing Buffer Overflow Vulnerability
  CVE-2008-1387 (#442525): Endless loop / hang with crafted arj
  CVE-2008-0314 (#442740): PeSpin Heap Overflow Vulnerability
  CVE-2008-1833 (#442741): PE WWPack Heap Overflow Vulnerability
* Mon Feb 11 2008 Enrico Scholz  - 0.92.1-1
- updated to 0.92.1
* Tue Jan  1 2008 Enrico Scholz  - 0.92-6
- redisabled unrar stuff completely by using clean sources
* Tue Jan  1 2008 Enrico Scholz  - 0.92-5
- use a better way to disable RPATH-generation (needed for '--with
  unrar' builds)
* Mon Dec 31 2007 Enrico Scholz  - 0.92-4
- added a README.fedora to the milter package (#240610)
- ship original sources again; unrar is now licensed correctly (no more
  stolen code put under GPL). Nevertheless, this license is not GPL
  compatible, and to allow libclamav to be used by GPL applications,
  unrar is disabled by a ./configure switch.
- use pkg-config in clamav-config to emulate --cflags and --libs
  operations (fixes partly multilib issues)
- registered some more auto-updated files and marked them as %ghost
* Fri Dec 21 2007 Tom "spot" Callaway  - 0.92-3
- updated to 0.92 (SECURITY):
- CVE-2007-6335 MEW PE File Integer Overflow Vulnerability
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #461461 - clamav: multiple security fixes in 0.94 (CVE-2008-1389, CVE-2008-3912, CVE-2008-3913, CVE-2008-3914)
        https://bugzilla.redhat.com/show_bug.cgi?id=461461
  [ 2 ] Bug #470783 - CVE-2008-5050 clamav: get_unicode_name() off-by-one buffer overflow  (< 0.94.1)
        https://bugzilla.redhat.com/show_bug.cgi?id=470783
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use 
su -c 'yum update clamav' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys
--------------------------------------------------------------------------------

_______________________________________________
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Weekend Edition
Google to turn on encryption by default in next Android version
TOR users become FBI's No.1 hacking target after legal power grab
OWASP Releases Latest App Sec Guide
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.