|
Message-ID: <517EC996.9000601@redhat.com> Date: Mon, 29 Apr 2013 13:27:18 -0600 From: Kurt Seifried <kseifried@...hat.com> To: oss-security@...ts.openwall.com CC: Felix Gröbert <groebert@...gle.com>, Henri Salo <henri@...v.fi>, Jan Lieskovsky <jlieskov@...hat.com>, "Steven M. Christey" <coley@...us.mitre.org>, draynor@...rcefire.com Subject: Re: Multiple potential security issues fixed in ClamAV 0.97.8 - any further details? -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 04/27/2013 04:49 PM, Felix Gröbert wrote: > Hi, > > sorry for the delayed response, I'm OOO. > > The bugs should be public now: > > https://bugzilla.clamav.net/show_bug.cgi?id=7055 heap corruption, > potentially exploitable. Please use CVE-2013-2020 for this issue. > https://bugzilla.clamav.net/show_bug.cgi?id=7053 overflow due to > PDF key length computation. Potentially exploitable. Please use CVE-2013-2020 for this issue. > https://bugzilla.clamav.net/show_bug.cgi?id=7054 NULL pointer > dereference in sis parsing. I can't view this bug so no details/no CVE. Can you open the bug up? Thanks. > > When building clamav I recommend disabling legacy or unneeded > features (e.g. sis). I guess that's common sense though. > > Cheers Felix > - -- Kurt Seifried Red Hat Security Response Team (SRT) PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.13 (GNU/Linux) iQIcBAEBAgAGBQJRfsmWAAoJEBYNRVNeJnmTBFAP/j2Ccm0unfgN99v+ijDdpgTo IGB1WxGAdVi2NtWYA+jTrPlabMVR1ywnNJuNTFXJOmH/zWVMulM7f4ejmnM+yS4m I3c6Z1rlAjuJ76oJR2C2qPX2sFRrJP5N0UEv4GxOF3suuFBpiqktef4tZVpmx5Uj D5TIg+3Vjyh0QMJ93mNsZPohMT6/KUBD9TtNaEnqv//eTDx/BI24MtcVUADwX4R7 Fbh7d1v9wvtTdVtKiLVlkNDB9GfH0/YuzMR7NZ2JNrhKVtWH6G68fYyt6HgbTmmE IT2CQgiqIuHGKfuRlDRcpdl2xNNl0MJwXZzozWYUi07+CXBO1UCw/wS1/w9LQxR2 LgiulBhUiX+m7D8bRUoD64DNX74RhZrKMQrVIHuQfiFnCR/NXwOqqCcTSUDWb/vw mVu7i07zGZsPjwT8Wt6p+vQUwGbjVoLlMlbNjR7HR+INYYoEtcd8Ip9+txUIzZ1d Vymsw11J0F3quBo5lv9ngi6k0koBCtZEyJuVg3Y6w1nBcWOpYsNxno1fkoxOfIrj pkhu6yooL4C/6qTwL3e8VhrYhIATPu7nAh0U9fnMjF1ohaBIA1uUefNc1A7nmOSU wiRNJoBm0YXxZgCRu6FMrBosUVJ3jxtEx3tN2AyroG+PgAX+899XACzs7Dnozb2Z iJ3J/DetrQjrbG4JrxoM =l4CM -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.