- All clamav-milter command line parameters were moved to clamav-milter.conf,
modify startup script acordingly
- Remove pidfile from clamd startup script since this can be changed in
clamav-clamd.conf
* CVE-2006-1614
Damian Put discovered an integer overflow in the PE header parser.
This is only exploitable if the ArchiveMaxFileSize option is disabled.
* CVE-2006-1615
Format string vulnerabilities in the logging code have been discovered,
which might lead to the execution of arbitrary code.
* CVE-2006-1630
David Luyer discovered, that ClamAV can be tricked into an invalid
memory access in the cli_bitset_set() function, which may lead to
a denial of service.
- Synchronize with clamav port using SUB_FILES, USE_RC_SUBR
PR: ports/95425
Submitted by: garga
Security: VuXML 6a5174bd-c580-11da-9110-00123ffe8333
2006-04-07 10:10:20 +00:00
Renamed from security/clamav-devel/files/patch-etc::Makefile.am (Browse further)