The following Fedora EPEL 4 Security updates need testing:
https://admin.fedoraproject.org/updates/clamav-0.97-4.el4
The following builds have been pushed to Fedora EPEL 4 updates-testing
boost141-1.41.0-2.el4
clamav-0.97-4.el4
Details about builds:
================================================================================
boost141-1.41.0-2.el4 (FEDORA-EPEL-2011-2790)
The free peer-reviewed portable C++ source libraries
--------------------------------------------------------------------------------
Update Information:
Boost provides free peer-reviewed portable C++ source libraries. The emphasis
is on libraries which work well with the C++ Standard Library, in the hopes of
establishing "existing practice" for extensions and providing reference
implementations so that the Boost libraries are suitable for eventual
standardization. (Some of the libraries have already been proposed for
inclusion in the C++ Standards Committee's upcoming C++ Standard Library
Technical Report.)
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #673839 - Review Request: boost141 - The free peer-reviewed
portable C++ source libraries
https://bugzilla.redhat.com/show_bug.cgi?id=673839
--------------------------------------------------------------------------------
================================================================================
clamav-0.97-4.el4 (FEDORA-EPEL-2011-2789)
Anti-virus software
--------------------------------------------------------------------------------
Update Information:
--------------------------------------------------------------------------------
ChangeLog:
* Sun Mar 13 2011 Jan-Frode Myklebust <[email protected]> - 0.97-4
- Add back clamd-wrapper to stay compatible with users
of old packaging (amavisd-new).
* Wed Feb 23 2011 Nick Bebout <[email protected]> - 0.097-3
- Move db to /var/lib/clamav
- Ship empty directory /etc/clamd.d for amavisd-new
* Thu Feb 17 2011 Kevin Fenzi <[email protected]> - 0.97-2
- Disable llvm.
* Tue Feb 8 2011 Kevin Fenzi <[email protected]> - 0.97-1
- Update to 0.97
- Fix up for current guidelines.
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #667203 - CVE-2010-1639 Clam AntiVirus: Heap-based overflow, when
processing malicious PDF file(s) [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=667203
[ 2 ] Bug #679793 - CVE-2011-1003 clamav: Double free error by reading VBA
project strings [epel-4]
https://bugzilla.redhat.com/show_bug.cgi?id=679793
[ 3 ] Bug #655636 - clamav-scanner, clamav-scanner-sysvinit in EPEL
https://bugzilla.redhat.com/show_bug.cgi?id=655636
[ 4 ] Bug #538425 - Wrong milter.conf file template in clamav-milter
https://bugzilla.redhat.com/show_bug.cgi?id=538425
[ 5 ] Bug #495502 - 0.95.1 is busted
https://bugzilla.redhat.com/show_bug.cgi?id=495502
[ 6 ] Bug #579370 - Update to newest version 0.96
https://bugzilla.redhat.com/show_bug.cgi?id=579370
--------------------------------------------------------------------------------
_______________________________________________
epel-devel-list mailing list
[email protected]
https://www.redhat.com/mailman/listinfo/epel-devel-list