Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 19 Feb 2004 08:38:50 +0200
From:      "David Peall" <david@wcsn.wcape.school.za>
To:        "Thomas T. Veldhouse" <veldy@veldy.net>, <freebsd-ports@freebsd.org>, <freebsd-security@freebsd.org>
Subject:   RE: [Fwd: [gentoo-announce] [ GLSA 200402-07 ] Clamav 0.65 DoSvulnerability]
Message-ID:  <9DCF7A9E7AD27A4F962A37F7E78607B142C360@ukhokho.ct.schoolnet.org.za>

next in thread | raw e-mail | index | archive | help
Hi=20

The FreeBSD port has been updated for the DoS vulnerability but the
version is still=20
the same.

See:
http://www.freebsd.org/cgi/cvsweb.cgi/ports/security/clamav/=20


David Peall
Systems Administrator
Western Cape Schools' Network
http://www.wcsn.org.za/
PO Box 44460, Claremont 7735, Cape Town
Fax +27 (021) 683-6766, Helpdesk +27 (021) 674-9140



> -----Original Message-----
> From: Thomas T. Veldhouse [mailto:veldy@veldy.net]
> Sent: 18 February 2004 04:27 PM
> To: freebsd-ports@freebsd.org; freebsd-security@freebsd.org
> Subject: [Fwd: [gentoo-announce] [ GLSA 200402-07 ] Clamav 0.65
> DoSvulnerability]
>=20
>=20
> Attached is a security alert from Gentoo pertaining to clam=20
> antivirus.=20
> It seems that as of this morning, FreeBSD's ports still contain the=20
> affected version.
>=20
> Thank in advance,
>=20
> Tom Veldhouse
>=20



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?9DCF7A9E7AD27A4F962A37F7E78607B142C360>