Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 167717 - punt <=app-antivirus/clamav-0.90.2 due to vulnerabilities
Summary: punt <=app-antivirus/clamav-0.90.2 due to vulnerabilities
Status: RESOLVED INVALID
Alias: None
Product: Gentoo Linux
Classification: Unclassified
Component: New packages (show other bugs)
Hardware: All Linux
: High normal (vote)
Assignee: Antivirus Team
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2007-02-20 05:32 UTC by Brian Harring (RETIRED)
Modified: 2007-08-04 15:03 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Brian Harring (RETIRED) gentoo-dev 2007-02-20 05:32:40 UTC
glsa 200612-18 affecting < 0.88.7; keywording wise, 0.88.5 and 0.88.6 are completely overshadowed by 0.88.7 keywords.

revdep wise, nothing directly depends upon those versions; thus they can be punted.
Comment 1 Andrej Kacian (RETIRED) gentoo-dev 2007-02-20 16:21:41 UTC
Stop telling me how to maintain packages.
Comment 2 Jakub Moc (RETIRED) gentoo-dev 2007-08-04 10:56:49 UTC
Reopening this bug, really don't see any point in keeping stuff affected by 3 GLSAs in the tree. Please remove the vulnerable cruft.

app-antivirus/clamav-0.88.7: vulnerable via glsa(200704-21) ( ver < 0.90.2 ), keywords ('alpha', 'amd64', 'hppa', 'ia64', 'ppc', 'ppc64', 'sparc', 'x86', 'x86-fbsd')
app-antivirus/clamav-0.88.7: vulnerable via glsa(200706-05) ( ver < 0.90.3 ), keywords ('alpha', 'amd64', 'hppa', 'ia64', 'ppc', 'ppc64', 'sparc', 'x86', 'x86-fbsd')
app-antivirus/clamav-0.88.7: vulnerable via glsa(200703-03) ( ver < 0.90 ), keywords ('alpha', 'amd64', 'hppa', 'ia64', 'ppc', 'ppc64', 'sparc', 'x86', 'x86-fbsd')
app-antivirus/clamav-0.88.7-r1: vulnerable via glsa(200704-21) ( ver < 0.90.2 ), keywords ('alpha', 'amd64', 'hppa', 'ia64', 'ppc', 'ppc64', 'sparc', 'x86', 'x86-fbsd')
app-antivirus/clamav-0.88.7-r1: vulnerable via glsa(200706-05) ( ver < 0.90.3 ), keywords ('alpha', 'amd64', 'hppa', 'ia64', 'ppc', 'ppc64', 'sparc', 'x86', 'x86-fbsd')
app-antivirus/clamav-0.88.7-r1: vulnerable via glsa(200703-03) ( ver < 0.90 ), keywords ('alpha', 'amd64', 'hppa', 'ia64', 'ppc', 'ppc64', 'sparc', 'x86', 'x86-fbsd')
app-antivirus/clamav-0.88.7-r2: vulnerable via glsa(200704-21) ( ver < 0.90.2 ), keywords ('alpha', 'amd64', 'hppa', 'ia64', 'ppc', 'ppc64', 'sparc', 'x86', 'x86-fbsd')
app-antivirus/clamav-0.88.7-r2: vulnerable via glsa(200706-05) ( ver < 0.90.3 ), keywords ('alpha', 'amd64', 'hppa', 'ia64', 'ppc', 'ppc64', 'sparc', 'x86', 'x86-fbsd')
app-antivirus/clamav-0.88.7-r2: vulnerable via glsa(200703-03) ( ver < 0.90 ), keywords ('alpha', 'amd64', 'hppa', 'ia64', 'ppc', 'ppc64', 'sparc', 'x86', 'x86-fbsd')
app-antivirus/clamav-0.90: vulnerable via glsa(200704-21) ( ver < 0.90.2 ), keywords ('alpha', 'amd64', 'hppa', 'ia64', 'ppc', 'ppc64', 'sparc', 'x86', 'x86-fbsd')
app-antivirus/clamav-0.90: vulnerable via glsa(200706-05) ( ver < 0.90.3 ), keywords ('alpha', 'amd64', 'hppa', 'ia64', 'ppc', 'ppc64', 'sparc', 'x86', 'x86-fbsd')
app-antivirus/clamav-0.90.1: vulnerable via glsa(200704-21) ( ver < 0.90.2 ), keywords ('alpha', 'amd64', 'hppa', 'ia64', 'ppc', 'ppc64', 'sparc', 'x86', 'x86-fbsd')
app-antivirus/clamav-0.90.1: vulnerable via glsa(200706-05) ( ver < 0.90.3 ), keywords ('alpha', 'amd64', 'hppa', 'ia64', 'ppc', 'ppc64', 'sparc', 'x86', 'x86-fbsd')
app-antivirus/clamav-0.90.1-r1: vulnerable via glsa(200704-21) ( ver < 0.90.2 ), keywords ('alpha', 'amd64', 'hppa', 'ia64', 'ppc', 'ppc64', 'sparc', 'x86', 'x86-fbsd')
app-antivirus/clamav-0.90.1-r1: vulnerable via glsa(200706-05) ( ver < 0.90.3 ), keywords ('alpha', 'amd64', 'hppa', 'ia64', 'ppc', 'ppc64', 'sparc', 'x86', 'x86-fbsd')
app-antivirus/clamav-0.90.2: vulnerable via glsa(200706-05) ( ver < 0.90.3 ), keywords ('alpha', 'amd64', 'hppa', 'ia64', 'ppc', 'ppc64', 'sparc', 'x86', 'x86-fbsd')
Comment 3 Jakub Moc (RETIRED) gentoo-dev 2007-08-04 15:03:39 UTC
This kind of attitude really rocks, thanks a lot again.