2022-08-10 15:38:00 +02:00
|
|
|
$NetBSD: distinfo,v 1.43 2022/08/10 13:38:00 taca Exp $
|
2010-12-24 08:11:05 +01:00
|
|
|
|
2022-08-10 15:38:00 +02:00
|
|
|
BLAKE2s (clamav-0.103.7.tar.gz) = dd6ecbd43fa6b1835bade917b0758b1516b9e80b770125529a60a3ba059b90c2
|
|
|
|
SHA512 (clamav-0.103.7.tar.gz) = d426169889d94411b20a2c9c9579fc22a15090c9847849822c63fc6b404075feba0ff3663ee1382b2af5300394c7a93669844736f7473bfdce3250e1fd130326
|
|
|
|
Size (clamav-0.103.7.tar.gz) = 16501741 bytes
|
security/clamav: update to 0.103.0
Update clamav package to 0.103.0.
Quote from release announce:
ClamAV 0.103.0 highlights
With your feedback on the previous candidates, we've fixed these additional
issues:
* The freshclam PID file was not readable by other users in previous release
candidates but is now readable by all.
* An issue with how freshclam was linked with the autotools build system
caused SysLog settings to be ignored.
* The real-path checks introduced to clamscan and clamdscan in 0.102.4 broke
scanning of some files with Unicode filenames and files on network shares
for Windows users.
Thanks to the users for your help in fixing these bugs.
Major changes
* clamd can now reload the signature database without blocking
scanning. This multi-threaded database reload improvement was made
possible thanks to a community effort.
* Non-blocking database reloads are now the default behavior. Some systems
that are more constrained on RAM may need to disable non-blocking reloads,
as it will temporarily consume double the amount of memory. We added a new
clamd config option ConcurrentDatabaseReload, which may be set to no.
Special thanks to those who made this feature a reality:
* Alberto Wu
* Alexander Sulfrian
* Arjen de Korte
* David Heidelberg
* Ged Haywood
* Julius Plenz
* Michael Orlitzky
Notable changes
* The DLP module has been enhanced with additional credit card ranges and a
new engine option that allows ClamAV to alert only on credit cards (and
not, for instance, gift cards) when scanning with the DLP module. John
Schember developed this feature, with input from Alexander Sulfrian.
* We added support for Adobe Reader X PDF encryption and overhauled the
PNG-scanning tool to detect PNG-specific exploits. We also made a major
change to GIF parsing that now makes it more tolerant of problematic files
and adds the ability to scan overlays, all thanks to work and patches
submitted by Aldo Mazzeo.
* clamdtop.exe is now available for Windows users. The functionality is
somewhat limited when compared to clamdtop on Linux. PDCurses is required
to build clamdtop.exe for ClamAV on Windows.
* The phishing detection module will now print "Suspicious link found!"
along with the "Real URL" and "Display URL" each time ClamAV detects
phishing. In a future version, we would like to print out alert-related
metadata like this at the end of a scan, but for now, this detail will
help users understand why a given file is being flagged as phishing.
* Added new *experimental* CMake build tooling. CMake is not yet recommended
for production builds. Our team would appreciate any assistance improving
the CMake build tooling so we can one day deprecate autotools and remove
the Visual Studio solutions.
- Please see the new CMake installation instructions found in
INSTALL.cmake.md for detailed instructions on how to build ClamAV
with CMake.
* Added --ping and --wait options to the clamdscan and clamonacc client
applications.
* The --ping (-p) command will attempt to ping clamd up to a specified
maximum number of attempts at an optional interval. If the interval isn't
specified, a default one-second interval is used. It will exit with
status code `0` when it receives a PONG from clamd or status code `21` if
the timeout expires before it receives a response.
2020-09-19 15:41:42 +02:00
|
|
|
SHA1 (patch-Makefile.in) = 51e0f42323f07b7ae0cb35a640469dce4e1a2041
|
|
|
|
SHA1 (patch-aa) = c07a7b6e883f384ce278964645f0658c0d986ab5
|
2019-08-05 16:44:20 +02:00
|
|
|
SHA1 (patch-ab) = 78793f0267ce8c820b51937186dc17dabb4a1ccf
|
2015-03-17 07:00:07 +01:00
|
|
|
SHA1 (patch-af) = d217633ed33c72b6d01a9aeef03f0f5dd33b4336
|
2022-08-10 15:38:00 +02:00
|
|
|
SHA1 (patch-configure) = ea2ecb0f84ef7a617cbbd5d0ed551ebcf7a1d5cb
|
security/clamav: update to 0.103.0
Update clamav package to 0.103.0.
Quote from release announce:
ClamAV 0.103.0 highlights
With your feedback on the previous candidates, we've fixed these additional
issues:
* The freshclam PID file was not readable by other users in previous release
candidates but is now readable by all.
* An issue with how freshclam was linked with the autotools build system
caused SysLog settings to be ignored.
* The real-path checks introduced to clamscan and clamdscan in 0.102.4 broke
scanning of some files with Unicode filenames and files on network shares
for Windows users.
Thanks to the users for your help in fixing these bugs.
Major changes
* clamd can now reload the signature database without blocking
scanning. This multi-threaded database reload improvement was made
possible thanks to a community effort.
* Non-blocking database reloads are now the default behavior. Some systems
that are more constrained on RAM may need to disable non-blocking reloads,
as it will temporarily consume double the amount of memory. We added a new
clamd config option ConcurrentDatabaseReload, which may be set to no.
Special thanks to those who made this feature a reality:
* Alberto Wu
* Alexander Sulfrian
* Arjen de Korte
* David Heidelberg
* Ged Haywood
* Julius Plenz
* Michael Orlitzky
Notable changes
* The DLP module has been enhanced with additional credit card ranges and a
new engine option that allows ClamAV to alert only on credit cards (and
not, for instance, gift cards) when scanning with the DLP module. John
Schember developed this feature, with input from Alexander Sulfrian.
* We added support for Adobe Reader X PDF encryption and overhauled the
PNG-scanning tool to detect PNG-specific exploits. We also made a major
change to GIF parsing that now makes it more tolerant of problematic files
and adds the ability to scan overlays, all thanks to work and patches
submitted by Aldo Mazzeo.
* clamdtop.exe is now available for Windows users. The functionality is
somewhat limited when compared to clamdtop on Linux. PDCurses is required
to build clamdtop.exe for ClamAV on Windows.
* The phishing detection module will now print "Suspicious link found!"
along with the "Real URL" and "Display URL" each time ClamAV detects
phishing. In a future version, we would like to print out alert-related
metadata like this at the end of a scan, but for now, this detail will
help users understand why a given file is being flagged as phishing.
* Added new *experimental* CMake build tooling. CMake is not yet recommended
for production builds. Our team would appreciate any assistance improving
the CMake build tooling so we can one day deprecate autotools and remove
the Visual Studio solutions.
- Please see the new CMake installation instructions found in
INSTALL.cmake.md for detailed instructions on how to build ClamAV
with CMake.
* Added --ping and --wait options to the clamdscan and clamonacc client
applications.
* The --ping (-p) command will attempt to ping clamd up to a specified
maximum number of attempts at an optional interval. If the interval isn't
specified, a default one-second interval is used. It will exit with
status code `0` when it receives a PONG from clamd or status code `21` if
the timeout expires before it receives a response.
2020-09-19 15:41:42 +02:00
|
|
|
SHA1 (patch-etc_clamav-milter.conf.sample) = fa65d9b25cb51c62365b1d5a8b6dafe89d505057
|
|
|
|
SHA1 (patch-etc_clamd.conf.sample) = e2c60b81675e73600409f76457fbc7cd8ec51a8f
|
|
|
|
SHA1 (patch-etc_freshclam.conf.sample) = 804df5480560acb915f9fcb5f2097673c657ae34
|
2021-11-08 15:49:23 +01:00
|
|
|
SHA1 (patch-libclamav_fmap.c) = d608faf56aebfcb32146b04a21ab587ee4a1a06d
|
|
|
|
SHA1 (patch-libclamav_fmap.h) = 4511c7670e871ff5a67e5fa4c7c2a2fd2ceca7b1
|