From 590f97793ccf46b162c43fa653b4ebb6ab007be8 Mon Sep 17 00:00:00 2001 From: Enrico Scholz Date: Sat, 16 Jun 2012 12:22:58 +0200 Subject: [PATCH] ship local copy of virus database Although it is a welcome change that database was removed from upstream tarball, this seems to happened by accident only. To avoid big changes until situation has been clarified ship a manually downloaded copy for now. --- clamav.spec | 7 +++++++ sources | 2 ++ 2 files changed, 9 insertions(+) diff --git a/clamav.spec b/clamav.spec index a140b7c..4e21241 100644 --- a/clamav.spec +++ b/clamav.spec @@ -69,6 +69,9 @@ Source999: http://download.sourceforge.net/sourceforge/clamav/%name-%version%{?p # make clean-sources [TARBALL=] [VERSION=] Source0: %name-%version%{?prerelease}-norar.tar.xz %endif +Source10: http://db.local.clamav.net/main-54.cvd +Source11: http://db.local.clamav.net/daily-15050.cvd + Patch24: clamav-0.92-private.patch Patch25: clamav-0.92-open.patch Patch26: clamav-0.95-cliopts.patch @@ -498,6 +501,8 @@ rm -f $RPM_BUILD_ROOT%_sysconfdir/clamd.conf \ touch $RPM_BUILD_ROOT%homedir/daily.cld touch $RPM_BUILD_ROOT%homedir/main.cld +install -D -m 0644 -p %SOURCE10 $RPM_BUILD_ROOT%homedir/main.cvd +install -D -m 0644 -p %SOURCE11 $RPM_BUILD_ROOT%homedir/daily.cvd ## prepare the server-files install -D -m 0644 -p %SOURCE2 _doc_server/clamd.sysconfig @@ -876,6 +881,8 @@ test "$1" != "0" || /sbin/initctl -q stop clamav-milter || : - CVE-2012-1459: allows to bypass malware detection via a TAR archive entry with a length field corresponding to that entire entry, plus part of the header of the next entry +- ship local copy of virus database; it was removed by accident from + 0.97.5 tarball * Fri Apr 13 2012 Enrico Scholz - 0.97.4-1801 - build with -fPIE diff --git a/sources b/sources index 94f05dd..7f41adc 100644 --- a/sources +++ b/sources @@ -1 +1,3 @@ f8e88e6adc82349e5babfa6ee7bb98fa clamav-0.97.5-norar.tar.xz +a7d25938fe8fcc4694a52937d15bd2cc daily-15050.cvd +eb12490fda87d602e476d4b163f8a34b main-54.cvd