clamav-milter-sysv-0.94.2-1.PU_IAS.5.x86_64.rpm


Advertisement

Description

clamav-milter-sysv - SysV initscripts for the clamav sendmail-milter

Distribution: CentOS 5
Repository: PUIAS Unsupported x86_64
Package name: clamav-milter-sysv
Package version: 0.94.2
Package release: 1.PU_IAS.5
Package architecture: x86_64
Package type: rpm
Installed size: 2.43 KB
Download size: 18.92 KB
Official Mirror: springdale.math.ias.edu
The SysV initscripts for clamav-milter.

Provides

  • clamav-milter-sysv = 0.94.2-1.PU_IAS.5
  • config(clamav-milter-sysv) = 0.94.2-1.PU_IAS.5
  • init(clamav-milter) = sysv

    Install Howto

    1. Create the repository config file /etc/yum.repos.d/puias-unsupported.repo:
      [puias-unsupported]
      name=PUIAS Unsupported
      baseurl=http://springdale.math.ias.edu/data/puias/unsupported/5/x86_64/
      enabled=1
      gpgcheck=0
      
    2. Install clamav-milter-sysv rpm package:
      # yum install clamav-milter-sysv

    Files

    • /etc/rc.d/init.d/clamav-milter
    • /etc/sysconfig/clamav-milter

    Changelog

    2008-07-14 - Robert Scheck <robert@fedoraproject.org> - 0.93.3-1 - Upgrade to 0.93.3 (SECURITY), rediffed -initoff patch: - CVE-2008-2713 Out-of-bounds read on petite files - Put pid instead of pgrp into pid file of clamav-milter (#452359)

    2008-06-18 - Robert Scheck <robert@fedoraproject.org> - 0.93.1-1 - Upgrade to 0.93.1 (SECURITY), rediffed -path patch: - CVE-2008-2713 Invalid Memory Access Denial Of Service Vulnerability

    2008-04-14 - Robert Scheck <robert@fedoraproject.org> - 0.93-1 - Upgrade to 0.93 (SECURITY): - CVE-2008-1100 Upack processing buffer overflow (#442360) - Removed *.inc directories; got replaced by *.cld containers

    2008-02-14 - Robert Scheck <robert@fedoraproject.org> - 0.92.1-1 - Upgrade to 0.92.1 (SECURITY): - CVE-2008-0318 Integer overflow in libclamav (#432623)

    2007-12-21 - Tom "spot" Callaway <tcallawa@redhat.com> - 0.92-4 - EPEL fixes

    2007-12-21 - Tom "spot" Callaway <tcallawa@redhat.com> - 0.92-3 - updated to 0.92 (SECURITY): - CVE-2007-6335 MEW PE File Integer Overflow Vulnerability

    2007-10-29 - Tom "spot" Callaway <tcallawa@redhat.com> - 0.91.2-3 - remove RAR decompression code from source tarball because of legal problems (resolves 334371) - correct license tag

    2007-09-24 - Jesse Keating <jkeating@redhat.com> - 0.91.2-2 - Bump release for upgrade path.

    2007-08-25 - Enrico Scholz <enrico.scholz@informatik.tu-chemnitz.de> - 0.91.2-1 - updated to 0.91.2 (SECURITY): - CVE-2007-4510 DOS in RTF parser - DOS in html normalizer - arbitrary command execution by special crafted recipients in clamav-milter's black-hole mode - fixed an open(2) issue

    2007-07-17 - Enrico Scholz <enrico.scholz@informatik.tu-chemnitz.de> - 0.91.1-0 - updated to 0.91.1

    Advertisement
    Advertisement