Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 7 Apr 2006 10:10:20 +0000 (UTC)
From:      Renato Botelho <garga@FreeBSD.org>
To:        ports-committers@FreeBSD.org, cvs-ports@FreeBSD.org, cvs-all@FreeBSD.org
Subject:   cvs commit: ports/security/clamav-devel Makefile distinfo pkg-deinstall pkg-install pkg-plist ports/security/clamav-devel/files clamav-clamd.in clamav-clamd.sh clamav-freshclam.in clamav-freshclam.sh clamav-milter.in ...
Message-ID:  <200604071010.k37AALrv005281@repoman.freebsd.org>

next in thread | raw e-mail | index | archive | help
garga       2006-04-07 10:10:20 UTC

  FreeBSD ports repository

  Modified files:
    security/clamav-devel Makefile distinfo pkg-plist 
  Added files:
    security/clamav-devel/files clamav-clamd.in 
                                clamav-freshclam.in 
                                clamav-milter.in patch-configure 
                                patch-etc_Makefile.in 
                                patch-libclamav_zziplib_zzip-conf.h 
                                pkg-deinstall.in pkg-install.in 
  Removed files:
    security/clamav-devel pkg-deinstall pkg-install 
    security/clamav-devel/files clamav-clamd.sh 
                                clamav-freshclam.sh 
                                clamav-milter.sh patch-Makefile.am 
                                patch-configure.in 
                                patch-etc::Makefile.am 
                                patch-zziplib.h 
  Log:
  - Update to 20060406 snapshot -- fix multiple vulnerabilities
     * CVE-2006-1614
        Damian Put discovered an integer overflow in the PE header parser.
        This is only exploitable if the ArchiveMaxFileSize option is disabled.
     * CVE-2006-1615
        Format string vulnerabilities in the logging code have been discovered,
        which might lead to the execution of arbitrary code.
     * CVE-2006-1630
        David Luyer discovered, that ClamAV can be tricked into an invalid
        memory access in the cli_bitset_set() function, which may lead to
        a denial of service.
  
  - Synchronize with clamav port using SUB_FILES, USE_RC_SUBR
  
  PR:             ports/95425
  Submitted by:   garga
  Security:       VuXML 6a5174bd-c580-11da-9110-00123ffe8333
  
  Revision  Changes    Path
  1.90      +49 -69    ports/security/clamav-devel/Makefile
  1.57      +3 -3      ports/security/clamav-devel/distinfo
  1.1       +35 -0     ports/security/clamav-devel/files/clamav-clamd.in (new)
  1.8       +0 -35     ports/security/clamav-devel/files/clamav-clamd.sh (dead)
  1.1       +35 -0     ports/security/clamav-devel/files/clamav-freshclam.in (new)
  1.7       +0 -35     ports/security/clamav-devel/files/clamav-freshclam.sh (dead)
  1.1       +46 -0     ports/security/clamav-devel/files/clamav-milter.in (new)
  1.9       +0 -48     ports/security/clamav-devel/files/clamav-milter.sh (dead)
  1.2       +0 -10     ports/security/clamav-devel/files/patch-Makefile.am (dead)
  1.3       +48 -0     ports/security/clamav-devel/files/patch-configure (new)
  1.10      +0 -31     ports/security/clamav-devel/files/patch-configure.in (dead)
  1.2       +0 -12     ports/security/clamav-devel/files/patch-etc::Makefile.am (dead)
  1.1       +15 -0     ports/security/clamav-devel/files/patch-etc_Makefile.in (new)
  1.1       +11 -0     ports/security/clamav-devel/files/patch-libclamav_zziplib_zzip-conf.h (new)
  1.2       +0 -12     ports/security/clamav-devel/files/patch-zziplib.h (dead)
  1.1       +13 -0     ports/security/clamav-devel/files/pkg-deinstall.in (new)
  1.1       +71 -0     ports/security/clamav-devel/files/pkg-install.in (new)
  1.4       +0 -13     ports/security/clamav-devel/pkg-deinstall (dead)
  1.21      +0 -71     ports/security/clamav-devel/pkg-install (dead)
  1.33      +1 -7      ports/security/clamav-devel/pkg-plist



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200604071010.k37AALrv005281>