Commit graph

2 commits

Author SHA1 Message Date
Renato Botelho
1e933b6086 - Update to 20090218
- All clamav-milter command line parameters were moved to clamav-milter.conf,
  modify startup script acordingly
- Remove pidfile from clamd startup script since this can be changed in
  clamav-clamd.conf
2009-02-18 11:41:57 +00:00
Renato Botelho
1832cf4035 - Update to 20060406 snapshot -- fix multiple vulnerabilities
* CVE-2006-1614
      Damian Put discovered an integer overflow in the PE header parser.
      This is only exploitable if the ArchiveMaxFileSize option is disabled.
   * CVE-2006-1615
      Format string vulnerabilities in the logging code have been discovered,
      which might lead to the execution of arbitrary code.
   * CVE-2006-1630
      David Luyer discovered, that ClamAV can be tricked into an invalid
      memory access in the cli_bitset_set() function, which may lead to
      a denial of service.

- Synchronize with clamav port using SUB_FILES, USE_RC_SUBR

PR:		ports/95425
Submitted by:	garga
Security:	VuXML 6a5174bd-c580-11da-9110-00123ffe8333
2006-04-07 10:10:20 +00:00
Renamed from security/clamav-devel/files/patch-etc::Makefile.am (Browse further)