Summary: | New version of clamav (fixes overflow vulnerability) | ||
---|---|---|---|
Product: | Gentoo Linux | Reporter: | Thomas Bullinger <consult> |
Component: | New packages | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | critical | CC: | amd64, antivirus, driver, hanno, mips, rockoo, sparc |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.secunia.com/advisories/10826/ | ||
Whiteboard: | |||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 41855 | ||
Bug Blocks: |
Description
Thomas Bullinger
2004-02-11 07:38:30 UTC
*** Bug 41237 has been marked as a duplicate of this bug. *** Most archs have 0.65 has unstable, 0.60 is stable for x86, ppc, sparc. Hanno, can you take a look at this? *added package maintainer hanno@gentoo.org *** Bug 41686 has been marked as a duplicate of this bug. *** I've just commited 0.67-ebuild. We should mark it stable on all platforms as soon as possible. A GLSA should be written about two issues: 1. the security vulnerability 2. 0.60 uses a deprecated virus-db-format, so you won't get updates for up-to-date viruses could you arch peeps please emerge 0.67 and make sure everything is ok for stable ? Everything looks good. Marked stable on sparc. All set on alpha and ia64 As we've already released the GLSA on this, is there any reason not to close? aight well i just marked it stable for mips/arm/amd64 i'll let hanno clean out the old ebuilds |