Revisions of clamav
Stefan Lijewski (lijews)
accepted
request 176113
from
Stefan Lijewski (lijews)
(revision 8)
- New version 0.97.8 (bnc#816865): * CVE-2013-2020: Fix heap corruption * CVE-2013-2021: Fix overflow due to PDF key length computation.
Stefan Lijewski (lijews)
accepted
request 160547
from
Stefan Lijewski (lijews)
(revision 7)
- Version 0.97.7 (bnc#809945) * several hardening fixes. - update to 0.97.6
Stefan Lijewski (lijews)
accepted
request 136293
from
Togan Muftuoglu (toganm)
(revision 6)
- Package for Evergreen - update to 0.97.6 * libclamav: bb#5751 - cl_scansis() may returan a file descriptor instead of a valid return code - avoid make check on qemu build - CVE-2012-1457: allows to bypass malware detection via a TAR archive - CVE-2012-1459: allows to bypass malware detection via a TAR archive entry with a length field corresponding to that entire entry, plus - also addresses stability issues in portions of the bytecode engine - add a definitions snapshot as {main,daily}.cvd no longer in tarball - Add clamav-gcc47.patch: Fix build with gcc 4.7. - New version 0.97.4 * libclamav/bytecode.c: reset to BYTECODE_AUTO mode at db reload so that we don't fail to re-enable or re-disable it again (bb#3789) * misc: performance improvement for HP-UX PA-RISC - patch from Michael Pelletier <michael.v.pelletier*raytheon.com> (bb#3926) * libclamav/pe.c: parse vinfo where varfileinfo occours before stringfileinfo (bb#3062) * clamd: add support for on-access scanning on OS X with ClamAuth (beta) * libclamav/bytecode_api*: Fix Sparc crash (bb #4324) * libclamav: fix bytecode whitelisting * libclamav: fix macro detection in OLE2BlockMacros (bb#4269)
Stefan Lijewski (lijews)
accepted
request 126882
from
Togan Muftuoglu (toganm)
(revision 5)
- package for Evergreen project -------------------------------------------------------------------- - update to 0.95.5 [bnc#767574] - addresses possible evasion cases in some archive formats - CVE-2012-1457: allows to bypass malware detection via a TAR archive entry with a length field that exceeds the total TAR file size - CVE-2012-1458: allows to bypass malware detection via a crafted reset interval in the LZXC header of a CHM file - CVE-2012-1459: allows to bypass malware detection via a TAR archive entry with a length field corresponding to that entire entry, plus part of the header of the next entry - also addresses stability issues in portions of the bytecode engine - update clamav-conf.patch for moved lines - add a definitions snapshot as {main,daily}.cvd no longer in tarball - fix file-contains-date-and-time rpmlint warning
Stefan Lijewski (lijews)
committed
(revision 4)
osc copypac from project:openSUSE:11.3:Update:Test package:clamav revision:13
Stefan Lijewski (lijews)
committed
(revision 3)
osc copypac from project:openSUSE:11.3:Update:Test package:clamav revision:11
Stefan Lijewski (lijews)
accepted
request 74227
from
Wolfgang Rosenauer (wrosenauer)
(revision 2)
0.97.1
unknown
committed
(revision 1)
Displaying all 8 revisions