exploit the possibilities

Mandriva Linux Security Advisory 2013-159

Mandriva Linux Security Advisory 2013-159
Posted Apr 30, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-159 - ClamAV 0.97.8 addresses several reported potential security bugs.

tags | advisory
systems | linux, mandriva
advisories | CVE-2013-2020, CVE-2013-2021
MD5 | e7305358b3dc61842a9f6010a0b2e9fb

Mandriva Linux Security Advisory 2013-159

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2013:159
http://www.mandriva.com/en/support/security/
_______________________________________________________________________

Package : clamav
Date : April 30, 2013
Affected: Business Server 1.0, Enterprise Server 5.0
_______________________________________________________________________

Problem Description:

ClamAV 0.97.8 addresses several reported potential security bugs.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2020
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2021
https://bugzilla.clamav.net/show_bug.cgi?id=7055
https://bugzilla.clamav.net/show_bug.cgi?id=7053
https://bugzilla.clamav.net/show_bug.cgi?id=7054
_______________________________________________________________________

Updated Packages:

Mandriva Enterprise Server 5:
30e3ab69626c478f91388434a924f6df mes5/i586/clamav-0.97.8-0.1mdvmes5.2.i586.rpm
0ae1f72fc1b35211d5019c1bf6bf3f42 mes5/i586/clamav-db-0.97.8-0.1mdvmes5.2.i586.rpm
82ec36d23ab754d0e3033149ec54532d mes5/i586/clamav-milter-0.97.8-0.1mdvmes5.2.i586.rpm
6d83bb56870c291a7847884a57b90e3f mes5/i586/clamd-0.97.8-0.1mdvmes5.2.i586.rpm
730fa38aaa4319adda74366d9ed956a8 mes5/i586/libclamav6-0.97.8-0.1mdvmes5.2.i586.rpm
0cbf917853092f8f3f92a06690e8610f mes5/i586/libclamav-devel-0.97.8-0.1mdvmes5.2.i586.rpm
8ee690699cfcaa2ba51ca3bc3bf07980 mes5/SRPMS/clamav-0.97.8-0.1mdvmes5.2.src.rpm

Mandriva Enterprise Server 5/X86_64:
718807614000b8061d30136366ff5da2 mes5/x86_64/clamav-0.97.8-0.1mdvmes5.2.x86_64.rpm
817483a594ca3de878b92a25f179e7c9 mes5/x86_64/clamav-db-0.97.8-0.1mdvmes5.2.x86_64.rpm
0098bd471d03b1106618f3afc3482849 mes5/x86_64/clamav-milter-0.97.8-0.1mdvmes5.2.x86_64.rpm
917248674c203ceb5b805aff583c4bd6 mes5/x86_64/clamd-0.97.8-0.1mdvmes5.2.x86_64.rpm
01386058ab598e14af81be3546d29925 mes5/x86_64/lib64clamav6-0.97.8-0.1mdvmes5.2.x86_64.rpm
e082c4cf4f3615125527c9370e031ec5 mes5/x86_64/lib64clamav-devel-0.97.8-0.1mdvmes5.2.x86_64.rpm
8ee690699cfcaa2ba51ca3bc3bf07980 mes5/SRPMS/clamav-0.97.8-0.1mdvmes5.2.src.rpm

Mandriva Business Server 1/X86_64:
1015e2e2eb287d5f836a1aa16270ded4 mbs1/x86_64/clamav-0.97.8-1.mbs1.x86_64.rpm
4aa730bbcf14c164c71206d4d880e04c mbs1/x86_64/clamav-db-0.97.8-1.mbs1.noarch.rpm
a910a0d0e451d26920987ca4211d7b50 mbs1/x86_64/clamav-milter-0.97.8-1.mbs1.x86_64.rpm
82e73d35b0fd6eeb4e246cfe54a715cd mbs1/x86_64/clamd-0.97.8-1.mbs1.x86_64.rpm
beb1c5bf465b4cee50af7abc2cd18872 mbs1/x86_64/lib64clamav6-0.97.8-1.mbs1.x86_64.rpm
31a5a24c9247aec6f0e9250daca08c2a mbs1/x86_64/lib64clamav-devel-0.97.8-1.mbs1.x86_64.rpm
e546d784ddd2f0f9002d5c4fde8f6571 mbs1/SRPMS/clamav-0.97.8-1.mbs1.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/en/support/security/advisories/

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFRf7vXmqjQ0CJFipgRAstaAKDgQrtue86fd3T7HZFg2efMbaua2gCgl2f7
fwbXHTILN7T8eRWzT53V9RQ=
=Wzsl
-----END PGP SIGNATURE-----


Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

April 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    60 Files
  • 2
    Apr 2nd
    18 Files
  • 3
    Apr 3rd
    0 Files
  • 4
    Apr 4th
    0 Files
  • 5
    Apr 5th
    0 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    0 Files
  • 9
    Apr 9th
    0 Files
  • 10
    Apr 10th
    0 Files
  • 11
    Apr 11th
    0 Files
  • 12
    Apr 12th
    0 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    0 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close