Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

clamav-0.91.2-1tr RPM for i586

From Trustix 3.0 for i586

Name: clamav Distribution: Trustix Secure Linux
Version: 0.91.2 Vendor: Comodo Trustix
Release: 1tr Build date: Tue Aug 21 19:03:34 2007
Group: Trustix Official Build host: ttrmgtnived.comodo.net
Size: 12894890 Source RPM: clamav-0.91.2-1tr.src.rpm
Packager: Comodo Trustix <http://www.trustix.com>
Url: http://www.clamav.net/
Summary: An antivirus toolkit for Unix
Clam AntiVirus is a GPL anti-virus toolkit for UNIX. The main purpose of this
software is the integration with mail servers (attachment scanning).
The package provides a flexible and scalable multi-threaded daemon,
a command line scanner, and a tool for automatic updating via Internet.
The programs are based on a shared library distributed with package,
which you can use with your own software.
Most importantly, the virus database is kept up to date .

Provides

Requires

License

GPL

Changelog

* Tue Aug 21 2007 Nived Gopalan <nived at trustix dot org> 0.91.2-1tr
  - New Upstream.
* Tue Aug 14 2007 Nived Gopalan <nived at trustix dot org> 0.91.1-1tr
  - New Upstream.
* Fri Jul 13 2007 Nived Gopalan <nived at trustix dot org> 0.91-1tr
  - New Upstream.
  - SECURITY Fix: Metaeye SG has reported a vulnerability in ClamAV,
    caused due to a NULL-pointer dereference error within
    libclamav/unrar/unrarvm.c when handling RAR archives. This can
    be exploited to cause a crash via a specially crafted RAR
    archive (SA26038).
* Mon Jun 04 2007 Nived Gopalan <nived at trustix dot org> 0.90.3-1tr
  - New Upstream.
  - SECURITY Fix: Victor Stinner has reported a vulnerability in ClamAV,
    caused due to an error within the OLE2 parser when handling objects
    with malformed FAT partitions and large property sizes. This can be
    exploited to cause a DoS due to storage and CPU resource consumption
    by scanning a specially crafted OLE2 file. 
  
    The Common Vulnerabilities and Exposures project has assigned the
    name CVE-2007-2650 to this issue.
* Mon Apr 16 2007 Bipin S <bipin at trustix dot org> 0.90.2-1tr
  - New upstream.
  - SECURITY Fix: A file descriptor leak error in  the
    "chm_decompress_stream()" [libclamav/chmunpack.c] function,
    which could be exploited by attackers to crash an affected system
    via a specially crafted CHM file.
                                                                                                                               
    A buffer overflow error in the "cab_unstore()" [libclamav/cab.c]
    function when processing a negative value read from a CAB file,
    which could be exploited by attackers to crash an affected
    application or compromise a vulnerable system via a specially
    crafted CAB file.
                                                                                                                               
    The Common Vulnerabilities and Exposures project has assigned the
    names CVE-2007-1745 and CVE-2007-1997 to these issues.
* Mon Mar 05 2007 Bipin S <bipin at trustix dot org> 0.90.1-1tr
  - New upstream.
* Mon Feb 19 2007 Bipin S <bipin at trustix dot org> 0.90-1tr
  - New upstream.
  - SECURITY Fix: Input validation error when parsing multipart messages
    with a header containing a specially crafted "id" parameter, which
    could be exploited by malware to overwrite certain files (e.g. the
    virus database) via a directory traversal attack and bypass security
    checks.
  - Vulnerability due to a file descriptor leak when processing CAB
    files with a record length of zero, which could be exploited by
    attackers or malware to prevent a vulnerable application from scanning
    certain archives (e.g. ZIP or TAR) via a specially crafted cabinet file.
                                                                                                                               
    The Common Vulnerabilities and Exposures project has assigned the
    names CVE-2007-0897 and CVE-2007-0898 to these issues.
* Wed Dec 13 2006 Bipin S <bipin at trustix dot org> 0.88.7-1tr
  - New Upstream.
  - SECURITY Fix: Hendrik Weimer has reported a vulnerability in ClamAV,
    which can be exploited by malicious people to cause a DoS (Denial of
    Service). The vulnerability is caused due to a stack overflow when
    scanning messages with deeply nested multipart content. This can be
    exploited to crash the service by sending specially crafted emails to a
    vulnerable system.
                                                                                                                               
    The Common Vulnerabilities and Exposures project has assigned the
    name CVE-2006-6481 to this issue.
* Tue Nov 07 2006 Bipin S <bipin at trustix dot org> 0.88.6-1tr
  - New Upstream.
* Mon Oct 16 2006 Nived Gopalan <nived at trustix dot org> 0.88.5-1tr
  - New Upstream.
  - SECURITY Fix: Two vulnerabilities have been reported in Clam AntiVirus,
    which can be exploited by malicious people to cause a DoS (SA22370).
  - Fixes an unspecified error in the CHM unpacker in chmunpack.c which
    can be exploited to cause a DoS.
  - Fixes an unspecified error in rebuildpe.c when rebuilding PE files
    after unpacking which can be exploited to cause a heap-based buffer
    overflow.
* Tue Aug 08 2006 Bipin S <bipin at trustix dot org> 0.88.4-1tr
  - New Upstream.
  - SECURITY Fix: Damian Put has discovered a vulnerability in ClamAV,
    which is caused due to an boundary error in the "pefromupx()"
    function in libclamav/upx.c when unpacking PE executable files
    compressed with UPX. This can be exploited to cause a heap-based
    buffer overflow via a specially crafted UPX compressed file.
  
    The Common Vulnerabilities and Exposures project has assigned the
    name CVE-2006-4018 this issue.
* Tue Jul 04 2006 Bipin S <bipin at trustix dot org> 0.88.3-1tr
  - New Upstream.
  - Fixes handling of large binhex files and multiple alternatives
    in virus signatures.
* Tue May 02 2006 Nived Gopalan <nived at trustix dot org> 0.88.2-1tr
  - New Upstream.
  - SECURITY Fix: A vulnerability has been reported in ClamAV caused due to
    a boundary error within the HTTP client in the Freshclam command line
    utility. This can be exploited to cause a stack-based buffer overflow 
    when the HTTP headers received from a web server exceeds 8KB.
   
    The Common Vulnerabilities and Exposures project has assigned the
    name CVE-2006-1989 this issue.
* Wed Apr 05 2006 Bipin S <bipin at trustix dot org> 0.88.1-1tr
  - New Upstream
  - Minor bugfixes done.
* Thu Jan 12 2006 Nived Gopalan <nived at trustix dot org> 0.88-1tr
  - New Upstream.
  - Fixes possible heap overflow in libclamav/upx.c.
* Mon Nov 14 2005 Nived Gopalan <nived at trustix dot org> 0.87.1-2tr
  - Moved libclamav.pc to devel, Bug #1379.
* Mon Nov 07 2005 Bipin S <bipin at comodo dot com> 0.87.1-1tr
  - New upstream and Multiple Security Fixes.
  - Fixes buffer overflow error in "fsg.c" when unpacking malformed FSG files.
  - Fixes infinite loop vulnerability in "tnef.c" when processing malformed TNEF files.
  - Fixes OLE2 unpacker potential denial of service vulnerability (CVE-2005-3239).
  - Fixes cabinet-file handling denial of service vulnerability (CVE-2005-3501).
                                                                                                                               
    The Common Vulnerabilities and Exposures project has assigned the names
    CVE-2005-3239 and CVE-2005-3501.
* Mon Sep 19 2005 Syed Shabir Zakiullah <syedshabir at comodo dot com> 0.87-1tr
  - New Upstream
  - Fixes vulnerabilities in handling of UPX and FSG compressed executables
* Mon Jul 25 2005 Syed Shabir Zakiullah <syedshabir at comodo dot com> 0.86.2-1tr
  - New Upstream
  - Fixes for three possible integer overflows in libclamav, improved scanning of 
    Cabinet and FSG compressed files, better database handling in clamav-milter.
* Mon Jun 27 2005 Hasher Jamaludeen <hasher at comodo dot com> 0.86.1-2tr
  - Fixed freshclam.sh which prevents starting of freshclam when $LOGFILE 
    is empty. With reference to Bug #976.
* Fri Jun 24 2005 Bipin S <bipin at comodo dot com> 0.86.1-1tr
  - New upstream
  - A possible crash in the libmspack's Quantum decompressor has been fixed. Bug #969
* Tue Jun 21 2005 Syed Shabir Zakiullah <syedshabir at comodo dot com> 0.86-1tr
  - New Upstream
  - Possible descriptor leaks in archive unpackers and mishandling of fast track 
    uuencoded files have been fixed in libclamav.
  - Database reloading in clamav-milter has been improved.
  - Fix potential directory traversal in cvd unpacker (a low risk problem since 
    all databases are digitally signed).
* Wed May 18 2005 Syed Shabir Zakiullah <syedshabir at comodo dot com> 0.85.1-1tr
  - New Upstream
  - A problem where an email with more than one content-disposition type line,
    one or more of which was empty, could crash libclamav has been fixed. Other
    minor bugfixes have been made.
* Sat Apr 30 2005 Syed Shabir Zakiullah <syedshabir at comodo dot com> 0.84-1tr
  - New Upstream, improves detection of JPEG (MS04-028) based exploits, introduces
    support for TNEF files and new detection mechanisms. Various bugfixes
    (including problems with scanning of digest mail files) and improvements
    have been made.
* Wed Apr 20 2005 Thushara Gopalakrishnan <thushara at comodo dot com>  0.83-4tr
  - Changed init priority
* Tue Mar 15 2005 Hasher Jamaludeen <hasher at comodo dot com> 0.83-2tr
  - Rebuilt
* Fri Feb 18 2005 Raghu <raghu at comodo dot com> 0.83-2tr
  - New Upstream
* Mon Oct 11 2004 Erlend Midttun <erlendbm at trustix dot org> 0.75-2tr
  - Now PreReq chkconfig.
* Mon Oct 04 2004 Syed Shabir <syedshabir at comodo dot com> 0.75-1tr
  - New Upstream.
* Mon May 03 2004 Erlend Midttun <erlendbm at trustix dot org> 0.70-1em
  - New upstream.
* Mon Mar 08 2004 Chr. Toldnes <christht at trustix dot org>
  - Rebuilt for TSL 2.1
* Mon Mar 01 2004 Erlend Midttun <erlendbm at trustix dot org> 0.66-5em
  - Fixed user/group in logrotate.
* Fri Feb 27 2004 Goetz Bock <bg at trustix dot org> 066-4bg
  - fixed user/group setup
  - added some build requirements
* Sun Feb 15 2004 Erlend Midttun <erlendbm at trustix dot org> 0.66-3em
  - Now create log files in logrotate.
  - Added "notifempyty" as well.
  - Added /usr/lib/*.so to -devel.
* Fri Feb 13 2004 Gerald Dachs <gda at trustix dot org> 0.66-2gd
  - added DatabaseMirror for freshclam in clamav.conf
* Fri Feb 13 2004 Gerald Dachs <gda at trustix dot org> 0.66-1gd
  - New upstream
* Mon Feb 09 2004 Erlend Midttun <erlendbm at trustix dot org>
  - Added strlen patch to prevent DoS.
  - Also fixed uid of logrotate.d/*.
* Fri Jan 30 2004 Erlend Midttun <erlendbm at trustix dot org>
  - Take II, now with better adding of users and a better config file.
* Fri Jan 30 2004 Erlend Midttun <erlendbm at trustix dot org>
  - Adapted to Trustix Contrib.
* Sun Dec 07 2003 Petr Kri⊃tof <Petr@Kristof.CZ>
  - Fix Epoch dependencies by Eduardo Kaftanski <eduardo@linuxcenter.cl>
* Sun Nov 23 2003 Petr Kri⊃tof <Petr@Kristof.CZ>
  - Update .spec file
  - Fix RH-7.3 program-prefix by Kenneth Porter <shiva@sewingwitch.com>
  - Rebuild on FC1
* Sun Nov 16 2003 Petr Kri⊃tof <Petr@Kristof.CZ>
  - Fix doc errors
  - Fix dependencies
  - Patch for RH-7.3 by Lionel Bouton <Lionel.Bouton@inet6.fr>
  - Patch for RH-7.3 by Chris de Vidal <chris@devidal.tv>
  - Option --without-milter by Ján Ondrej (SAL) <ondrejj@salstar.sk>
* Wed Nov 12 2003 Petr Kri⊃tof <Petr@Kristof.CZ>
  - Removed package db
  - Added LogWatch support
  - Added FreshClam support
  - Moved logfiles to own subdirectory
  - Update to 0.65
* Wed Sep 10 2003 Petr Kri⊃tof <Petr@Kristof.CZ>
  - Option for build without clamavdb
* Thu Jul 10 2003 Petr Kri⊃tof <Petr@Kristof.CZ>
  - Split package to clamav, db, milter, devel
* Sun Jun 22 2003 Petr Kri⊃tof <Petr@Kristof.CZ>
  - Update to 0.60
* Tue Jun 10 2003 Petr Kri⊃tof <Petr@Kristof.CZ>
  - Fixed post, preun, postun scripts
  - Update to 2003xxxx snapshots
* Tue Feb 04 2003 Petr Kri⊃tof <Petr@Kristof.CZ>
  - Rebuild on RH-8.0
* Sun Dec 01 2002 Petr Kri⊃tof <Petr@Kristof.CZ>
  - Based on PLD package
  - Initial RH-7.3 build

Files

/etc/clamd.conf
/etc/freshclam.conf
/etc/init.d/clamd
/etc/init.d/freshclam
/etc/logrotate.d/clamd
/etc/logrotate.d/freshclam
/etc/sysconfig/freshclam
/usr/bin/clamav-config
/usr/bin/clamconf
/usr/bin/clamdscan
/usr/bin/clamscan
/usr/bin/freshclam
/usr/bin/sigtool
/usr/lib/libclamav.so.2
/usr/lib/libclamav.so.2.0.8
/usr/sbin/clamd
/usr/share/doc/clamav-0.91.2
/usr/share/doc/clamav-0.91.2/AUTHORS
/usr/share/doc/clamav-0.91.2/BUGS
/usr/share/doc/clamav-0.91.2/COPYING
/usr/share/doc/clamav-0.91.2/ChangeLog
/usr/share/doc/clamav-0.91.2/FAQ
/usr/share/doc/clamav-0.91.2/INSTALL
/usr/share/doc/clamav-0.91.2/NEWS
/usr/share/doc/clamav-0.91.2/README
/usr/share/doc/clamav-0.91.2/clamav-mirror-howto.pdf
/usr/share/doc/clamav-0.91.2/clamdoc.pdf
/usr/share/doc/clamav-0.91.2/html
/usr/share/doc/clamav-0.91.2/html/clamdoc.css
/usr/share/doc/clamav-0.91.2/html/clamdoc.html
/usr/share/doc/clamav-0.91.2/html/contents.png
/usr/share/doc/clamav-0.91.2/html/footnode.html
/usr/share/doc/clamav-0.91.2/html/img1.png
/usr/share/doc/clamav-0.91.2/html/img2.png
/usr/share/doc/clamav-0.91.2/html/img3.png
/usr/share/doc/clamav-0.91.2/html/img4.png
/usr/share/doc/clamav-0.91.2/html/index.html
/usr/share/doc/clamav-0.91.2/html/next.png
/usr/share/doc/clamav-0.91.2/html/next_g.png
/usr/share/doc/clamav-0.91.2/html/node1.html
/usr/share/doc/clamav-0.91.2/html/node10.html
/usr/share/doc/clamav-0.91.2/html/node11.html
/usr/share/doc/clamav-0.91.2/html/node12.html
/usr/share/doc/clamav-0.91.2/html/node13.html
/usr/share/doc/clamav-0.91.2/html/node14.html
/usr/share/doc/clamav-0.91.2/html/node15.html
/usr/share/doc/clamav-0.91.2/html/node16.html
/usr/share/doc/clamav-0.91.2/html/node17.html
/usr/share/doc/clamav-0.91.2/html/node18.html
/usr/share/doc/clamav-0.91.2/html/node19.html
/usr/share/doc/clamav-0.91.2/html/node2.html
/usr/share/doc/clamav-0.91.2/html/node20.html
/usr/share/doc/clamav-0.91.2/html/node21.html
/usr/share/doc/clamav-0.91.2/html/node22.html
/usr/share/doc/clamav-0.91.2/html/node23.html
/usr/share/doc/clamav-0.91.2/html/node24.html
/usr/share/doc/clamav-0.91.2/html/node25.html
/usr/share/doc/clamav-0.91.2/html/node26.html
/usr/share/doc/clamav-0.91.2/html/node27.html
/usr/share/doc/clamav-0.91.2/html/node28.html
/usr/share/doc/clamav-0.91.2/html/node29.html
/usr/share/doc/clamav-0.91.2/html/node3.html
/usr/share/doc/clamav-0.91.2/html/node30.html
/usr/share/doc/clamav-0.91.2/html/node31.html
/usr/share/doc/clamav-0.91.2/html/node32.html
/usr/share/doc/clamav-0.91.2/html/node33.html
/usr/share/doc/clamav-0.91.2/html/node34.html
/usr/share/doc/clamav-0.91.2/html/node35.html
/usr/share/doc/clamav-0.91.2/html/node36.html
/usr/share/doc/clamav-0.91.2/html/node37.html
/usr/share/doc/clamav-0.91.2/html/node38.html
/usr/share/doc/clamav-0.91.2/html/node39.html
/usr/share/doc/clamav-0.91.2/html/node4.html
/usr/share/doc/clamav-0.91.2/html/node40.html
/usr/share/doc/clamav-0.91.2/html/node41.html
/usr/share/doc/clamav-0.91.2/html/node42.html
/usr/share/doc/clamav-0.91.2/html/node43.html
/usr/share/doc/clamav-0.91.2/html/node44.html
/usr/share/doc/clamav-0.91.2/html/node45.html
/usr/share/doc/clamav-0.91.2/html/node46.html
/usr/share/doc/clamav-0.91.2/html/node47.html
/usr/share/doc/clamav-0.91.2/html/node48.html
/usr/share/doc/clamav-0.91.2/html/node49.html
/usr/share/doc/clamav-0.91.2/html/node5.html
/usr/share/doc/clamav-0.91.2/html/node50.html
/usr/share/doc/clamav-0.91.2/html/node51.html
/usr/share/doc/clamav-0.91.2/html/node52.html
/usr/share/doc/clamav-0.91.2/html/node53.html
/usr/share/doc/clamav-0.91.2/html/node54.html
/usr/share/doc/clamav-0.91.2/html/node6.html
/usr/share/doc/clamav-0.91.2/html/node7.html
/usr/share/doc/clamav-0.91.2/html/node8.html
/usr/share/doc/clamav-0.91.2/html/node9.html
/usr/share/doc/clamav-0.91.2/html/prev.png
/usr/share/doc/clamav-0.91.2/html/prev_g.png
/usr/share/doc/clamav-0.91.2/html/up.png
/usr/share/doc/clamav-0.91.2/html/up_g.png
/usr/share/doc/clamav-0.91.2/signatures.pdf
/usr/share/man/man1/clamconf.1.gz
/usr/share/man/man1/clamdscan.1.gz
/usr/share/man/man1/clamscan.1.gz
/usr/share/man/man1/freshclam.1.gz
/usr/share/man/man1/sigtool.1.gz
/usr/share/man/man5/clamd.conf.5.gz
/usr/share/man/man5/freshclam.conf.5.gz
/usr/share/man/man8/clamd.8.gz
/var/lib/clamav
/var/lib/clamav/daily.cvd
/var/lib/clamav/main.cvd
/var/log/clamav
/var/run/clamav


Generated by rpm2html 1.8.1

Fabrice Bellet, Mon Sep 15 21:53:16 2014