update to clamav 0.101.4,

- out of bounds write in NSIS bzip2 library
- improvements to the zip bomb mitigations added in 0.101.3, there is now
a maximum scan time limit, defaulting to 2 minutes
This commit is contained in:
sthen 2019-08-22 16:22:07 +00:00
parent 2c7731e662
commit 6f4b8a84c5
3 changed files with 6 additions and 6 deletions

View File

@ -1,7 +1,7 @@
# $OpenBSD: Makefile,v 1.129 2019/08/05 20:09:58 sthen Exp $
# $OpenBSD: Makefile,v 1.130 2019/08/22 16:22:07 sthen Exp $
COMMENT= virus scanner
DISTNAME= clamav-0.101.3
DISTNAME= clamav-0.101.4
CATEGORIES= security

View File

@ -1,2 +1,2 @@
SHA256 (clamav-0.101.3.tar.gz) = aNQqrEqcveKTKIUzqaPD1Vhj3jjyuHB8HvLZh7EmAzg=
SIZE (clamav-0.101.3.tar.gz) = 21389753
SHA256 (clamav-0.101.4.tar.gz) = C/CU8JGdFYpXhCHWa8JWnIyBgSM7oWK7UXIvmMgCvM0=
SIZE (clamav-0.101.4.tar.gz) = 21408145

View File

@ -1,4 +1,4 @@
$OpenBSD: patch-etc_clamd_conf_sample,v 1.7 2018/12/04 12:33:40 sthen Exp $
$OpenBSD: patch-etc_clamd_conf_sample,v 1.8 2019/08/22 16:22:07 sthen Exp $
Index: etc/clamd.conf.sample
--- etc/clamd.conf.sample.orig
+++ etc/clamd.conf.sample
@ -29,7 +29,7 @@ Index: etc/clamd.conf.sample
# Stop daemon when libclamav reports out of memory condition.
#ExitOnOOM yes
@@ -499,7 +499,7 @@ Example
@@ -509,7 +509,7 @@ Example
# deeply the process should be continued.
# Note: setting this limit too high may result in severe damage to the system.
# Default: 16