Bug 392551 (CVE-2007-6029)
Summary: | CVE-2007-6029 clamav code execution via unspecified vulnerability | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Tomas Hoger <thoger> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED CANTFIX | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | extras-orphan, rh-bugzilla |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-6029 | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2008-04-25 09:06:02 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Tomas Hoger
2007-11-20 15:23:52 UTC
According to referenced blog post, this is impact=critical vulnerability. However, without any details about vulnerability, there's probably not much we or clamav upstream can do to properly address it... So this bug was mainly created for tracking purposes. There's still not public information regarding this issue. I'm closing CANTFIX, as there's not a lot more we can do. Other vendors seem to have taken the same approach: http://security-tracker.debian.net/tracker/CVE-2007-6029 http://bugs.gentoo.org/show_bug.cgi?id=199823 |