lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1UXCme-0004hT-U8@titan.mandriva.com>
Date: Tue, 30 Apr 2013 17:48:00 +0200
From: security@...driva.com
To: full-disclosure@...ts.grok.org.uk
Subject: [ MDVSA-2013:159 ] clamav

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2013:159
 http://www.mandriva.com/en/support/security/
 _______________________________________________________________________

 Package : clamav
 Date    : April 30, 2013
 Affected: Business Server 1.0, Enterprise Server 5.0
 _______________________________________________________________________

 Problem Description:

 ClamAV 0.97.8 addresses several reported potential security bugs.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2020
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2021
 https://bugzilla.clamav.net/show_bug.cgi?id=7055
 https://bugzilla.clamav.net/show_bug.cgi?id=7053
 https://bugzilla.clamav.net/show_bug.cgi?id=7054
 _______________________________________________________________________

 Updated Packages:

 Mandriva Enterprise Server 5:
 30e3ab69626c478f91388434a924f6df  mes5/i586/clamav-0.97.8-0.1mdvmes5.2.i586.rpm
 0ae1f72fc1b35211d5019c1bf6bf3f42  mes5/i586/clamav-db-0.97.8-0.1mdvmes5.2.i586.rpm
 82ec36d23ab754d0e3033149ec54532d  mes5/i586/clamav-milter-0.97.8-0.1mdvmes5.2.i586.rpm
 6d83bb56870c291a7847884a57b90e3f  mes5/i586/clamd-0.97.8-0.1mdvmes5.2.i586.rpm
 730fa38aaa4319adda74366d9ed956a8  mes5/i586/libclamav6-0.97.8-0.1mdvmes5.2.i586.rpm
 0cbf917853092f8f3f92a06690e8610f  mes5/i586/libclamav-devel-0.97.8-0.1mdvmes5.2.i586.rpm 
 8ee690699cfcaa2ba51ca3bc3bf07980  mes5/SRPMS/clamav-0.97.8-0.1mdvmes5.2.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 718807614000b8061d30136366ff5da2  mes5/x86_64/clamav-0.97.8-0.1mdvmes5.2.x86_64.rpm
 817483a594ca3de878b92a25f179e7c9  mes5/x86_64/clamav-db-0.97.8-0.1mdvmes5.2.x86_64.rpm
 0098bd471d03b1106618f3afc3482849  mes5/x86_64/clamav-milter-0.97.8-0.1mdvmes5.2.x86_64.rpm
 917248674c203ceb5b805aff583c4bd6  mes5/x86_64/clamd-0.97.8-0.1mdvmes5.2.x86_64.rpm
 01386058ab598e14af81be3546d29925  mes5/x86_64/lib64clamav6-0.97.8-0.1mdvmes5.2.x86_64.rpm
 e082c4cf4f3615125527c9370e031ec5  mes5/x86_64/lib64clamav-devel-0.97.8-0.1mdvmes5.2.x86_64.rpm 
 8ee690699cfcaa2ba51ca3bc3bf07980  mes5/SRPMS/clamav-0.97.8-0.1mdvmes5.2.src.rpm

 Mandriva Business Server 1/X86_64:
 1015e2e2eb287d5f836a1aa16270ded4  mbs1/x86_64/clamav-0.97.8-1.mbs1.x86_64.rpm
 4aa730bbcf14c164c71206d4d880e04c  mbs1/x86_64/clamav-db-0.97.8-1.mbs1.noarch.rpm
 a910a0d0e451d26920987ca4211d7b50  mbs1/x86_64/clamav-milter-0.97.8-1.mbs1.x86_64.rpm
 82e73d35b0fd6eeb4e246cfe54a715cd  mbs1/x86_64/clamd-0.97.8-1.mbs1.x86_64.rpm
 beb1c5bf465b4cee50af7abc2cd18872  mbs1/x86_64/lib64clamav6-0.97.8-1.mbs1.x86_64.rpm
 31a5a24c9247aec6f0e9250daca08c2a  mbs1/x86_64/lib64clamav-devel-0.97.8-1.mbs1.x86_64.rpm 
 e546d784ddd2f0f9002d5c4fde8f6571  mbs1/SRPMS/clamav-0.97.8-1.mbs1.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/en/support/security/advisories/

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFRf7vXmqjQ0CJFipgRAstaAKDgQrtue86fd3T7HZFg2efMbaua2gCgl2f7
fwbXHTILN7T8eRWzT53V9RQ=
=Wzsl
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ