update to clamav 0.97.3.
in typical clamav tradition, release notes say "ClamAV 0.97.3 is a minor bugfix release and is recommended for all users", secunia says: A vulnerability has been reported in ClamAV, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. The vulnerability is caused due to errors related to the handling of recursion levels within the "cli_bcapi_extract_new()" (libclamav/bytecode_api.c) and "cli_bytecode_runhook()" (libclamav/bytecode.c) functions, which can be exploited to e.g. cause a crash via specially crafted files.
This commit is contained in:
parent
fca3b56ade
commit
1e6bea521f
@ -1,7 +1,7 @@
|
||||
# $OpenBSD: Makefile,v 1.70 2011/07/26 14:23:45 sthen Exp $
|
||||
# $OpenBSD: Makefile,v 1.71 2011/10/18 18:48:39 sthen Exp $
|
||||
|
||||
COMMENT= virus scanner
|
||||
DISTNAME= clamav-0.97.2
|
||||
DISTNAME= clamav-0.97.3
|
||||
|
||||
CATEGORIES= security
|
||||
SHARED_LIBS= clamav 18.1 \
|
||||
|
@ -1,5 +1,5 @@
|
||||
MD5 (clamav-0.97.2.tar.gz) = yy14tHkP38o7I5DXzoLwtw==
|
||||
RMD160 (clamav-0.97.2.tar.gz) = B5Jq2ckjvN1fOlT52/AvtYZx/0A=
|
||||
SHA1 (clamav-0.97.2.tar.gz) = J9R8atIu3IfAMPbUg/qx4TMgy/c=
|
||||
SHA256 (clamav-0.97.2.tar.gz) = kVA/jP9ILKwfLJUcXWKn2ooXujsy64+igA4pwDx81Yo=
|
||||
SIZE (clamav-0.97.2.tar.gz) = 44703953
|
||||
MD5 (clamav-0.97.3.tar.gz) = XPJe13ePoMtrFArY8Am++w==
|
||||
RMD160 (clamav-0.97.3.tar.gz) = n+5V8LEV+vpiLhCSSD44Cv0Nxbk=
|
||||
SHA1 (clamav-0.97.3.tar.gz) = Jjx7i33BU2ZSq2TjImPRxg4ThlU=
|
||||
SHA256 (clamav-0.97.3.tar.gz) = Oozs5bfmsVQQ9rj5b/VZGyxacvKQ7ooo/v2kTLWuero=
|
||||
SIZE (clamav-0.97.3.tar.gz) = 45793398
|
||||
|
Loading…
Reference in New Issue
Block a user