Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 8 Jul 2008 15:42:33 +0200
From: Tomas Hoger <thoger@...hat.com>
To: oss-security@...ts.openwall.com
Cc: steffen.joeris@...lelinux.de
Subject: Re: CVE id request: Clamav

On Mon, 16 Jun 2008 16:41:27 +0200 Tomas Hoger <thoger@...hat.com>
wrote:

> On Sun, 15 Jun 2008 21:21:30 +1000 Steffen Joeris
> <steffen.joeris@...lelinux.de> wrote:
> 
> > The upstream changelog says:
> > * libclamav/petite.c: fix possible invalid memory access (bb#1000)
> > 				Reported by Damian Put
> 
> For the sake of CVE description completeness, I'm adding that it's
> from the clamav 0.93.1 changelog.
> 
> Applied patch:
> 
> http://svn.clamav.net/websvn/diff.php?repname=clamav-devel&path=/branches/0.93/libclamav/petite.c&rev=3886

Btw, following is mentioned in the 0.93.2 changelog:

Thu Jul  3 16:15:23 CEST 2008
-----------------------------
  * libclamav/petite.c: fix another out of bounds memory read (bb#1000)
                        Reported by Secunia (CVE-2008-2713)

Referring to the same bug as before, which is now restricted (was it
publicly accessible before?).

The announcement mentions it too, but without specifying any
implications:

http://lurker.clamav.net/message/20080707.155612.ad411b00.en.html

The fix does not even seem to be committed in the public clamav SVN
(either trunk or 0.93 branch).

Does anyone have more info?  From commit message, it looks like DoS, so
probably worth new id for an incomplete fix.

-- 
Tomas Hoger / Red Hat Security Response Team

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.