[Bug 227827] New: up-to-date clamav packages are needed
https://bugzilla.novell.com/show_bug.cgi?id=227827 Summary: up-to-date clamav packages are needed Product: SUSE Linux 10.1 Version: Final Platform: x86-64 OS/Version: SuSE Linux 10.1 Status: NEW Severity: Normal Priority: P5 - None Component: Security AssignedTo: security-team@suse.de ReportedBy: admin@eregion.de QAContact: qa@suse.de freshclam says: ClamAV update process started at Tue Dec 12 07:59:01 2006 WARNING: Your ClamAV installation is OUTDATED! WARNING: Local version: 0.88.6 Recommended version: 0.88.7 DON'T PANIC! Read http://www.clamav.net/faq.html main.cvd is up to date (version: 41, sigs: 73809, f-level: 10, builder: tkojm) daily.cvd is up to date (version: 2316, sigs: 6767, f-level: 9, builder: ccordes) mathias@pippin:~> Permission Denied -- Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug, or are watching someone who is.
https://bugzilla.novell.com/show_bug.cgi?id=227827 meissner@novell.com changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |security-team@suse.de AssignedTo|security-team@suse.de |max@novell.com Summary|up-to-date clamav packages |VUL-0: clamav 0.88.7 update |are needed | ------- Comment #1 from meissner@novell.com 2006-12-12 00:35 MST ------- thanks for the report. A denial of service problem is fixed, so we can update due to security reasons. CVE-2006-5874 Clam AntiVirus (ClamAV) 0.88 and earlier allows remote attackers to cause a denial of service (crash) via a malformed base64-encoded MIME attachment that triggers a null pointer dereference. -- Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug, or are watching someone who is.
https://bugzilla.novell.com/show_bug.cgi?id=227827 max@novell.com changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |ASSIGNED -- Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug, or are watching someone who is.
https://bugzilla.novell.com/show_bug.cgi?id=227827 lnussel@novell.com changed: What |Removed |Added ---------------------------------------------------------------------------- Status Whiteboard| |patchinfos submitted ------- Comment #2 from lnussel@novell.com 2006-12-12 08:37 MST ------- MaintenanceTracker-7447 -- Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug, or are watching someone who is.
https://bugzilla.novell.com/show_bug.cgi?id=227827 ------- Comment #3 from max@novell.com 2006-12-12 09:09 MST ------- Packages submitted for STABLE, 10.2, sles10, 10.0, 9.3, and sles9. -- Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug, or are watching someone who is.
https://bugzilla.novell.com/show_bug.cgi?id=227827 max@novell.com changed: What |Removed |Added ---------------------------------------------------------------------------- AssignedTo|max@novell.com |security-team@suse.de Status|ASSIGNED |NEW -- Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug, or are watching someone who is.
https://bugzilla.novell.com/show_bug.cgi?id=227827 ------- Comment #4 from meissner@novell.com 2006-12-13 03:25 MST ------- CVE-2006-6481 Clam AntiVirus (ClamAV) 0.88.6 allows remote attackers to cause a denial of service (stack overflow and application crash) by wrapping many layers of multipart/mixed content around a document, a different vulnerability than CVE-2006-5874 and CVE-2006-6406. CVE-2006-6406 Clam AntiVirus (ClamAV) 0.88.6 allows remote attackers to bypass virus detection by inserting invalid characters into base64 encoded content in a multipart/mixed MIME file, as demonstrated with the EICAR test file. -- Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug, or are watching someone who is.
https://bugzilla.novell.com/show_bug.cgi?id=227827 ------- Comment #6 from mhoppe@novell.com 2006-12-14 08:31 MST ------- Installed and running. I will check it for errors next one hour. -- Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug, or are watching someone who is.
https://bugzilla.novell.com/show_bug.cgi?id=227827 ------- Comment #7 from mhoppe@novell.com 2006-12-14 09:54 MST ------- No errors or chrashed found. Works4me ;-) -- Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug, or are watching someone who is.
https://bugzilla.novell.com/show_bug.cgi?id=227827 meissner@novell.com changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED Resolution| |FIXED ------- Comment #8 from meissner@novell.com 2006-12-15 03:33 MST ------- updates released. -- Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug, or are watching someone who is.
https://bugzilla.novell.com/show_bug.cgi?id=227827 admin@eregion.de changed: What |Removed |Added ---------------------------------------------------------------------------- Status|RESOLVED |CLOSED ------- Comment #9 from admin@eregion.de 2007-01-03 16:08 MST ------- updates installed, btw ;) -- Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug, or are watching someone who is.
participants (1)
-
bugzilla_noreply@novell.com