Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 15 Jul 2008 09:21:40 +0200
From: Tomas Hoger <thoger@...hat.com>
To: oss-security@...ts.openwall.com
Cc: steffen.joeris@...lelinux.de, coley@...re.org
Subject: Re: CVE id request: Clamav

On Tue, 8 Jul 2008 15:42:33 +0200 Tomas Hoger <thoger@...hat.com> wrote:

> > > The upstream changelog says:
> > > * libclamav/petite.c: fix possible invalid memory access (bb#1000)
> > > 				Reported by Damian Put
> > 
> > For the sake of CVE description completeness, I'm adding that it's
> > from the clamav 0.93.1 changelog.

[ ... ]

> Btw, following is mentioned in the 0.93.2 changelog:
> 
> Thu Jul  3 16:15:23 CEST 2008
> -----------------------------
>   * libclamav/petite.c: fix another out of bounds memory read
> (bb#1000) Reported by Secunia (CVE-2008-2713)
> 
> Referring to the same bug as before, which is now restricted (was it
> publicly accessible before?).

Upstream bug report is no longer restricted and mentions original fix
was incomplete:

https://wwws.clamav.net/bugzilla/show_bug.cgi?id=1000#c4

Steven, this seems to deserve a CVE id as an incomplete fix for
CVE-2008-2713.

[ ... ]

> The fix does not even seem to be committed in the public clamav SVN
> (either trunk or 0.93 branch).

Change now committed as:

http://svn.clamav.net/websvn/diff.php?repname=clamav-devel&path=/branches/0.93/libclamav/
petite.c&rev=3920

-- 
Tomas Hoger / Red Hat Security Response Team

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.