Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Fri, 15 Mar 2013 10:08:19 -0400 (EDT)
From: Jan Lieskovsky <>
To: Mateusz ‘j00ru’ Jurczyk <>,
        "Gynvael \"GynDream\" Coldwind" <>
Subject: Further issue details about flaws corrected in upstream ClamAV
 0.97.7 version

Hello Mateusz, Gynvael, vendors,

  this is due the following ones:

I have tried to grep CLamAV's git log for further information, but many
of the commits prior to 2013-02-20 have form of:

'Fix CID#...' :(.

The only two security related ones seem to be the following two:
commit b2212def1bb92b5ac45c82da100dc0d1376de6a3
Author: Steve Morgan <>
Date:   Thu Feb 14 18:29:53 2013 -0500

    cid 10776 - fix double free

commit 71990820d01c246e4e61408a3659dd9d92949b38
Author: Ryan Pentney <>
Date:   Fri Feb 15 03:10:50 2013 -0800

    Fixed heap corruption in wwunpack.c

We to be better able to tell, which concrete security flaws
got corrected in 0.97.7 version and based on that to properly
allocate CVE identifiers, could you please provide further
information about:
a) how many and what kind of issues got corrected in that
b) links to relevant upstream patches? (since patch log telling
   CID# wouldn't be enough either to find out the appropriate

Thank you for your time, look && cooperation in advance.

Regards, Jan.
Jan iankko Lieskovsky / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.