openbsd-ports/security/clamav/patches/patch-etc-clamd_conf
sthen 9e5aaab242 SECURITY and other bug fixes.
- A vulnerability in ClamAV's chm-parser allowed remote attackers to
cause a denial of service (application crash) via a malformed CHM file
(CVE-2008-1389).

- A vulnerability in libclamav would allow attackers to cause a
denial of service via vectors related to an out-of-memory condition
(CVE-2008-3912).

- Multiple memory leaks were found in ClamAV that could possibly allow
attackers to cause a denial of service via excessive memory consumption
(CVE-2008-3913).

- A number of unspecified vulnerabilities in ClamAV were reported that
have an unknown impact and attack vectors related to file descriptor
leaks (CVE-2008-3914).

various OpenBSD patches rolled in upstream. thanks to sturm@
for looking over systrace.filter (needed for the test of sendmsg()
in configure to enable FD passing).
2008-09-14 15:00:43 +00:00

30 lines
1011 B
Plaintext

--- etc/clamd.conf.orig Tue Sep 2 12:59:05 2008
+++ etc/clamd.conf Fri Sep 5 02:32:34 2008
@@ -11,7 +11,7 @@ Example
# LogFile must be writable for the user running daemon.
# A full path is required.
# Default: disabled
-#LogFile /tmp/clamd.log
+#LogFile /var/log/clamd.log
# By default the log file is locked for writing - the lock protects against
# running clamd multiple times (if want to run another clamd, please
@@ -62,7 +62,7 @@ Example
# Path to the database directory.
# Default: hardcoded (depends on installation options)
-#DatabaseDirectory /var/lib/clamav
+#DatabaseDirectory /var/db/clamav
# The daemon works in a local OR a network mode. Due to security reasons we
# recommend the local mode.
@@ -147,7 +147,7 @@ LocalSocket /tmp/clamd.socket
# Run as another user (clamd must be started by root for this option to work)
# Default: don't drop privileges
-#User clamav
+#User _clamav
# Initialize supplementary group access (clamd must be started by root).
# Default: no