lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Fri Apr  7 22:25:07 2006
From: security at mandriva.com (security@...driva.com)
Subject: [ MDKSA-2006:067 ] - Updated clamav packages fix
	vulnerabilities


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2006:067
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : clamav
 Date    : April 7, 2006
 Affected: 10.2, 2006.0, Corporate 3.0
 _______________________________________________________________________
 
 Problem Description:
 
 Damian Put discovered an integer overflow in the PE header parser in
 ClamAV that could be exploited if the ArchiveMaxFileSize option was
 disabled (CVE-2006-1614).
 
 Format strings in the logging code could possibly lead to the execution
 of arbitrary code (CVE-2006-1615).
 
 David Luyer found that ClamAV could be tricked into an invalid memory
 access in the cli_bitset_set() function, which could lead to a Denial
 of Service (CVE-2006-1630).
 
 This update provides ClamAV 0.88.1 which corrects this issue and also
 fixes some other bugs.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1614
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1615
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1630
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 10.2:
 78af90cdd26037ecc4753cc223ef1b46  10.2/RPMS/clamav-0.88.1-0.1.102mdk.i586.rpm
 386742ea0d3fa49e7d4116c883632c40  10.2/RPMS/clamav-db-0.88.1-0.1.102mdk.i586.rpm
 162bac111e036526638c9556404f84ef  10.2/RPMS/clamav-milter-0.88.1-0.1.102mdk.i586.rpm
 790cae6bca4f206d0d41ccdc9aab4172  10.2/RPMS/clamd-0.88.1-0.1.102mdk.i586.rpm
 f4ec987f6de8dbe0fa0a370a8513576c  10.2/RPMS/libclamav1-0.88.1-0.1.102mdk.i586.rpm
 4cf47fde81840efb4c17e24181587fad  10.2/RPMS/libclamav1-devel-0.88.1-0.1.102mdk.i586.rpm
 4ae4f91cb63670f018c84644685708d1  10.2/SRPMS/clamav-0.88.1-0.1.102mdk.src.rpm

 Mandriva Linux 10.2/X86_64:
 d67ab22811cc7329d889fd2953ff98e4  x86_64/10.2/RPMS/clamav-0.88.1-0.1.102mdk.x86_64.rpm
 1750f5d9e63d9e37a170114cee64fe7f  x86_64/10.2/RPMS/clamav-db-0.88.1-0.1.102mdk.x86_64.rpm
 28310e3fb5eba18cb1312591ee94b747  x86_64/10.2/RPMS/clamav-milter-0.88.1-0.1.102mdk.x86_64.rpm
 afa8503930c109873deb561d0bf19637  x86_64/10.2/RPMS/clamd-0.88.1-0.1.102mdk.x86_64.rpm
 90b6e2108b96abc940309dbdf277c15b  x86_64/10.2/RPMS/lib64clamav1-0.88.1-0.1.102mdk.x86_64.rpm
 53b7e0d8aa707a2679121c1ee3e3a68d  x86_64/10.2/RPMS/lib64clamav1-devel-0.88.1-0.1.102mdk.x86_64.rpm
 4ae4f91cb63670f018c84644685708d1  x86_64/10.2/SRPMS/clamav-0.88.1-0.1.102mdk.src.rpm

 Mandriva Linux 2006.0:
 604deb9acc669892e83889e21003da72  2006.0/RPMS/clamav-0.88.1-0.1.20060mdk.i586.rpm
 130c0cd5592f794dff01c816da87a22c  2006.0/RPMS/clamav-db-0.88.1-0.1.20060mdk.i586.rpm
 c70b05eb926c8de70e8c61404ffe878d  2006.0/RPMS/clamav-milter-0.88.1-0.1.20060mdk.i586.rpm
 744662b01972ca7d4e8cf319778f5e70  2006.0/RPMS/clamd-0.88.1-0.1.20060mdk.i586.rpm
 b33e83e43cf31b1cf8b01d4ae0140cb6  2006.0/RPMS/libclamav1-0.88.1-0.1.20060mdk.i586.rpm
 494e3c588012bb49c7539379a1ed7d04  2006.0/RPMS/libclamav1-devel-0.88.1-0.1.20060mdk.i586.rpm
 ee0dad2e6693a49018772d523b31caf7  2006.0/SRPMS/clamav-0.88.1-0.1.20060mdk.src.rpm

 Mandriva Linux 2006.0/X86_64:
 9ed21b8dfaf3cc0e97642c01a60cb77e  x86_64/2006.0/RPMS/clamav-0.88.1-0.1.20060mdk.x86_64.rpm
 6c9774f949aa4d6543fe73465fa18fd3  x86_64/2006.0/RPMS/clamav-db-0.88.1-0.1.20060mdk.x86_64.rpm
 7da7ff8ca78611296e2a9deeb13f3c21  x86_64/2006.0/RPMS/clamav-milter-0.88.1-0.1.20060mdk.x86_64.rpm
 0cdd6ea74f17fb4179d86005a0ee74a0  x86_64/2006.0/RPMS/clamd-0.88.1-0.1.20060mdk.x86_64.rpm
 e029708922271f57d28fb04fbfbc670e  x86_64/2006.0/RPMS/lib64clamav1-0.88.1-0.1.20060mdk.x86_64.rpm
 0c6075c66b0fc5aa791d661e4b356f7e  x86_64/2006.0/RPMS/lib64clamav1-devel-0.88.1-0.1.20060mdk.x86_64.rpm
 ee0dad2e6693a49018772d523b31caf7  x86_64/2006.0/SRPMS/clamav-0.88.1-0.1.20060mdk.src.rpm

 Corporate 3.0:
 338f4fde8dc1b3c025a0aafe7e3f1d16  corporate/3.0/RPMS/clamav-0.88.1-0.1.C30mdk.i586.rpm
 0b103f86de58322decb7eab357ae8303  corporate/3.0/RPMS/clamav-db-0.88.1-0.1.C30mdk.i586.rpm
 872ff963443a695f7339925e17751fb4  corporate/3.0/RPMS/clamav-milter-0.88.1-0.1.C30mdk.i586.rpm
 4398815889ab571ef8a88aaa1cd96d0c  corporate/3.0/RPMS/clamd-0.88.1-0.1.C30mdk.i586.rpm
 422f5145947d02532671885b115a6ef6  corporate/3.0/RPMS/libclamav1-0.88.1-0.1.C30mdk.i586.rpm
 8b14d93a15408fb129c66d1395c3595c  corporate/3.0/RPMS/libclamav1-devel-0.88.1-0.1.C30mdk.i586.rpm
 ad723ef00c23c3b8c36be5aee40abb15  corporate/3.0/SRPMS/clamav-0.88.1-0.1.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 01fd41e817e1d96789b1b9dc43cbd760  x86_64/corporate/3.0/RPMS/clamav-0.88.1-0.1.C30mdk.x86_64.rpm
 434648110ef5603f85049ae02e44b7e4  x86_64/corporate/3.0/RPMS/clamav-db-0.88.1-0.1.C30mdk.x86_64.rpm
 10a1d45e5d53d170112b1698fcdb66ba  x86_64/corporate/3.0/RPMS/clamav-milter-0.88.1-0.1.C30mdk.x86_64.rpm
 c1f38d2e0d753997b096c5e0fbf4f575  x86_64/corporate/3.0/RPMS/clamd-0.88.1-0.1.C30mdk.x86_64.rpm
 b1bd0032ab359f4a25b48675df76e1be  x86_64/corporate/3.0/RPMS/lib64clamav1-0.88.1-0.1.C30mdk.x86_64.rpm
 bc9dfa91d651edaf6957def3c502ec21  x86_64/corporate/3.0/RPMS/lib64clamav1-devel-0.88.1-0.1.C30mdk.x86_64.rpm
 ad723ef00c23c3b8c36be5aee40abb15  x86_64/corporate/3.0/SRPMS/clamav-0.88.1-0.1.C30mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFENquymqjQ0CJFipgRAv1PAKDWy48nobAGlEt7Zy8IYnosPSt52ACgj2jv
itI9Qf3vHSG+ead8P1Sjzvc=
=Nzey
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ