David Peall
2004-Feb-19 02:15 UTC
[Fwd: [gentoo-announce] [ GLSA 200402-07 ] Clamav 0.65 DoSvulnerability]
Hi The FreeBSD port has been updated for the DoS vulnerability but the version is still the same. See: http://www.freebsd.org/cgi/cvsweb.cgi/ports/security/clamav/ David Peall Systems Administrator Western Cape Schools' Network http://www.wcsn.org.za/ PO Box 44460, Claremont 7735, Cape Town Fax +27 (021) 683-6766, Helpdesk +27 (021) 674-9140> -----Original Message----- > From: Thomas T. Veldhouse [mailto:veldy@veldy.net] > Sent: 18 February 2004 04:27 PM > To: freebsd-ports@freebsd.org; freebsd-security@freebsd.org > Subject: [Fwd: [gentoo-announce] [ GLSA 200402-07 ] Clamav 0.65 > DoSvulnerability] > > > Attached is a security alert from Gentoo pertaining to clam > antivirus. > It seems that as of this morning, FreeBSD's ports still contain the > affected version. > > Thank in advance, > > Tom Veldhouse >
Peter Pentchev
2004-Feb-19 05:18 UTC
[Fwd: [gentoo-announce] [ GLSA 200402-07 ] Clamav 0.65 DoSvulnerability]
On Thu, Feb 19, 2004 at 08:38:50AM +0200, David Peall wrote:> Hi > > The FreeBSD port has been updated for the DoS vulnerability but the > version is still > the same. > > See: > http://www.freebsd.org/cgi/cvsweb.cgi/ports/security/clamav/Err.. strictly speaking, the port's version is not the same: it is now 0.65_7, it was 0.65_6 before. The 'port revision' number was introduced for precisely this purpose: to provide an indicator that something important has changed in the FreeBSD port even when the mainstream version of the ported software remains the same. G'luck, Peter -- Peter Pentchev roam@ringlet.net roam@sbnd.net roam@FreeBSD.org PGP key: http://people.FreeBSD.org/~roam/roam.key.asc Key fingerprint FDBA FD79 C26F 3C51 C95E DF9E ED18 B68D 1619 4553 If I were you, who would be reading this sentence? -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 187 bytes Desc: not available Url : http://lists.freebsd.org/pipermail/freebsd-security/attachments/20040219/07a9b68a/attachment.bin
Apparently Analagous Threads
- [Fwd: [gentoo-announce] [ GLSA 200402-07 ] Clamav 0.65 DoS vulnerability]
- dvd+rw+r for FreeBSD -- Progress but no success
- [gentoo-announce] [ GLSA 200803-25 ] Dovecot: Multiple vulnerabilities
- [Fwd: [Full-disclosure] [ GLSA 200507-05 ] zlib: Buffer overflow]
- Update ports on 6.3 or update OS to 7.1(RC2) and update ports?