USN-770-1: ClamAV vulnerability
Publication date
4 May 2009
Overview
ClamAV vulnerability
Releases
Packages
- clamav -
Details
A flaw was discovered in the clamav-milter initscript which caused the
ownership of the current working directory to be changed to the 'clamav'
user. This update attempts to repair the incorrect ownership for standard
system directories, but it is recommended that the following command be
performed to report any other directories that may be affected:
$ sudo find -H / -type d -user clamav ! -group clamav 2>/dev/null
Systems configured to run clamav as a user other than the default 'clamav'
user will need to adjust the above command accordingly.
A flaw was discovered in the clamav-milter initscript which caused the
ownership of the current working directory to be changed to the 'clamav'
user. This update attempts to repair the incorrect ownership for standard
system directories, but it is recommended that the following command be
performed to report any other directories that may be affected:
$ sudo find -H / -type d -user clamav ! -group clamav 2>/dev/null
Systems configured to run clamav as a user other than the default 'clamav'
user will need to adjust the above command accordingly.
Update instructions
In general, a standard system upgrade is sufficient to effect the necessary changes.
Learn more about how to get the fixes.The problem can be corrected by updating your system to the following package versions:
Ubuntu Release | Package Version | ||
---|---|---|---|
9.04 jaunty | clamav-milter – 0.95.1+dfsg-1ubuntu1.2 |
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.