Edwin:

I've been around the 'net quite some time (1983), please excuse me if I'm 
expecting too  much.

I think releasing the clamav item before there were bzip2 libraries out 
there to compile against for major distros (Fedora Core 13, RHEL4 and 
RHEL5 are not small install bases) and many if not most run the RPM builds 
(not tar.gz compiles) in a business setting for control in a large 
environment was probably not a great idea - though I understand you can't 
control the distro vendors I do know you can work with them on security 
issues, its done by other vendors all the time and they can get RPMs out 
quickly in cases like this.
For example the bzip2 RPMs for Red Hat came out about 430pm (you released 
0.96.3 at 17:09 CEST  about 11am Chicago time USA) leaving alot of folks 
wondering what to do about bzip2 RPMs on the day you released clamav...if 
you had waited even 6 hours or so or contacted Red Hat alot of pain would 
have been avoided(similar story for other vendors I'm sure they all have 
security areas and contacts and most are pretty eager to assist). And as 
far as upgrade notes on the web site there's nothing out there at all 
about upgrading/updating bzip2 components...I just looked it says under 
0.96.3 Upgrade Notes "Known Issues and Workarounds - None yet."
Guys, I'm not trying to pick a fight here, but this isn't the first time a 
release of clamav has gone a little sideways in the last 12 months or 
so....and I realize that there is a free vs. commercial product provided 
by Sourcefire. We would be happy to go with the latter but its not 
available for the platform we're on and we were told if you are willing to 
help out by running a test build platform on the OS you need it to run on 
things will go smoother after the last set of issues that occurred, so we 
have been. Yet, here we are again with the last 2 releases having issues 
either with JIT copiler/llvm or now this type of thing(bzip libraries, 
etc). I'll admit our info security folks are picky but we have to live 
with that here. 

We're not running a home based server here, this is a production 
environment that serves near to over 1 million emails a day and clamav is 
running in the core of that process as well as on near 50 other linux 
hosts to scan for virus issues on a routine basis as well.

What can we on a sytem admin end do to help this process in the future 
because frankly I'm at a loss, I'm not (and have no desire to be) a 
programmer hacking code. 

In any case its a past event and something to keep in mind next time 
probably.

Thanks for the fish,

George

_______________________________________
George R. Kasica | Systems Analyst – Technical Services | Mortgage 
Guaranty Insurance Corporation
270 E. Kilbourn Ave. | Milwaukee, WI  53202 USA | ( 1.414.347.6491(work) 
1.414.732.8503 (cell) | 7 1.888.601.4440 or 1.414.347.2601 (fax) | * 
george_kas...@mgic.com or kasica_pa...@mgic.com
P Please consider the environment before printing this email.

This message is intended for use only by the person(s) addressed above and 
may contain privileged and confidential information. Disclosure or use of 
this message by any other person is strictly prohibited. If this message 
is received in error, please notify the sender immediately and delete this 
message.




From:
Török Edwin <edwinto...@gmail.com>
To:
ClamAV users ML <clamav-users@lists.clamav.net>
Cc:
george_kas...@mgic.com
Date:
09/22/2010 11:23
Subject:
Re: [Clamav-users] What ever happened to the Release Candidate for 
0.96.3??
Sent by:
clamav-users-boun...@lists.clamav.net



On Wed, 22 Sep 2010 10:14:57 -0500
George Kasica <george_kas...@mgic.com> wrote:

> Tomaz:
> 
> Typical issues as in the past...first no clue it was coming out(no
> release candidate no announcement)...it just appeared, no idea it
> would have issues with bzip2

There is a problem with security updates and release candidates (or
announcements):
 - we can release only after the vulnerability is disclosed (in case of
   3rdparty libraries)
 - we were watching upstream bzip2 to release, and released soon after
   that, we didn't have a reliable release date in advance
 - we could have told you that we are preparing a new version to fix the
   bzip2 vulnerability, but we couldn't release an RC with the bzip2
   fix included (since that would've disclosed the vulnerability prior
   to upstream having a fix)
 - even if we were able to provide an RC, it would have told you that
   your bzip2 is buggy and you need to upgrade. That would have
   caused even more confusion, since there was no new
   upstream bzip2 version with the fix.

Considering all this, do you think it would be useful to provide
advance warning about a new security fix release in the future?

Best regards,
--Edwin
_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml



_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml

Reply via email to