Revision Date: | 2020-12-22 | Version: | 1 |
Title: | Security update for clamav (Important) |
Description: |
This update for clamav fixes the following issues:
clamav was updated to 0.103.0 to implement jsc#ECO-3010 and bsc#1118459.
clamd can now reload the signature database without blocking scanning. This multi-threaded database reload improvement was made possible thanks to a community effort. - Non-blocking database reloads are now the default behavior. Some systems that are more constrained on RAM may need to disable non-blocking reloads as it will temporarily consume two times as much memory. We added a new clamd config option ConcurrentDatabaseReload, which may be set to no. * Fix clamav-milter.service (requires clamd.service to run) * bsc#1119353, clamav-fips.patch: Fix freshclam crash in FIPS mode. * Partial sync with SLE15.
Update to version 0.102.4
Accumulated security fixes:
CVE-2020-3350: Fix a vulnerability wherein a malicious user could replace a scan target's directory with a symlink to another path to trick clamscan, clamdscan, or clamonacc into removing or moving a different file (eg. a critical system file). The issue would affect users that use the --move or --remove options for clamscan, clamdscan, and clamonacc. (bsc#1174255) * CVE-2020-3327: Fix a vulnerability in the ARJ archive parsing module in ClamAV 0.102.3 that could cause a Denial-of-Service (DoS) condition. Improper bounds checking results in an out-of-bounds read which could cause a crash. The previous fix for this CVE in 0.102.3 was incomplete. This fix correctly resolves the issue. * CVE-2020-3481: Fix a vulnerability in the EGG archive module in ClamAV 0.102.0 - 0.102.3 could cause a Denial-of-Service (DoS) condition. Improper error handling may result in a crash due to a NULL pointer dereference. This vulnerability is mitigated for those using the official ClamAV signature databases because the file type signatures in daily.cvd will not enable the EGG archive parser in versions affected by the vulnerability. (bsc#1174250) * CVE-2020-3341: Fix a vulnerability in the PDF parsing module in ClamAV 0.101 - 0.102.2 that could cause a Denial-of-Service (DoS) condition. Improper size checking of a buffer used to initialize AES decryption routines results in an out-of-bounds read which may cause a crash. (bsc#1171981) * CVE-2020-3123: A denial-of-service (DoS) condition may occur when using the optional credit card data-loss-prevention (DLP) feature. Improper bounds checking of an unsigned variable resulted in an out-of-bounds read, which causes a crash. * CVE-2019-15961: A Denial-of-Service (DoS) vulnerability may occur when scanning a specially crafted email file as a result of excessively long scan times. The issue is resolved by implementing several maximums in parsing MIME messages and by optimizing use of memory allocation. (bsc#1157763). * CVE-2019-12900: An out of bounds write in the NSIS bzip2 (bsc#1149458) * CVE-2019-12625: Introduce a configurable time limit to mitigate zip bomb vulnerability completely. Default is 2 minutes, configurable useing the clamscan --max-scantime and for clamd using the MaxScanTime config option (bsc#1144504)
Update to version 0.101.3:
ZIP bomb causes extreme CPU spikes (bsc#1144504)
Update to version 0.101.2 (bsc#1118459):
Support for RAR v5 archive extraction. * Incompatible changes to the arguments of cl_scandesc, cl_scandesc_callback, and cl_scanmap_callback. * Scanning options have been converted from a single flag bit-field into a structure of multiple categorized flag bit-fields. * The CL_SCAN_HEURISTIC_ENCRYPTED scan option was replaced by 2 new scan options: CL_SCAN_HEURISTIC_ENCRYPTED_ARCHIVE, and CL_SCAN_HEURISTIC_ENCRYPTED_DOC * Incompatible clamd.conf and command line interface changes. * Heuristic Alerts' (aka 'Algorithmic Detection') options have been changed to make the names more consistent. The original options are deprecated in 0.101, and will be removed in a future feature release. * For details, see https://blog.clamav.net/2018/12/clamav-01010-has-been-released.html
|
Family: | unix | Class: | patch |
Status: | | Reference(s): | 1012382 1032680 1042286 1047002 1054028 1056995 1062604 1064232 1065364 1082519 1082863 1083125 1084536 1085042 1085447 1088810 1089066 1090368 1090646 1090869 1092903 1094466 1095218 1095219 1095344 1096547 1097104 1099597 1099811 1099813 1099844 1099845 1099846 1099849 1099863 1099864 1099922 1099993 1099999 1100000 1100001 1100152 1102517 1102715 1102870 1103445 1104319 1104495 1105292 1105296 1105322 1105348 1105396 1105437 1105459 1105460 1105536 1106016 1106095 1106369 1106509 1106511 1106512 1106594 1106923 1107689 1107735 1107966 1108239 1108399 1108835 1109105 1109252 1109333 1110445 1111278 1111479 1111480 1112024 1112209 1112229 1113083 1113534 1113632 1113652 1113665 1113742 1117022 1117274 1117313 1117327 1117331 1118319 1118459 1119353 1130103 1133528 1138459 1141853 1144504 1149458 1157471 1157763 1171981 1172140 1172437 1174250 1174255 903543 CVE-2008-0928 CVE-2008-1945 CVE-2008-2382 CVE-2008-4539 CVE-2011-0904 CVE-2011-0905 CVE-2011-1164 CVE-2012-3515 CVE-2013-4148 CVE-2013-4149 CVE-2013-4150 CVE-2013-4151 CVE-2013-4526 CVE-2013-4527 CVE-2013-4529 CVE-2013-4530 CVE-2013-4531 CVE-2013-4533 CVE-2013-4534 CVE-2013-4535 CVE-2013-4536 CVE-2013-4537 CVE-2013-4538 CVE-2013-4539 CVE-2013-4540 CVE-2013-4541 CVE-2013-4542 CVE-2013-4544 CVE-2013-6399 CVE-2014-0142 CVE-2014-0143 CVE-2014-0144 CVE-2014-0145 CVE-2014-0146 CVE-2014-0147 CVE-2014-0150 CVE-2014-0182 CVE-2014-0222 CVE-2014-0223 CVE-2014-3461 CVE-2014-3640 CVE-2014-3970 CVE-2014-7840 CVE-2014-8106 CVE-2015-1779 CVE-2015-3209 CVE-2015-3456 CVE-2015-4037 CVE-2015-5154 CVE-2015-5198 CVE-2015-5199 CVE-2015-5200 CVE-2015-5225 CVE-2015-5278 CVE-2015-5279 CVE-2015-5745 CVE-2015-6815 CVE-2015-6855 CVE-2015-7295 CVE-2015-7512 CVE-2015-7549 CVE-2015-8345 CVE-2015-8504 CVE-2015-8558 CVE-2015-8567 CVE-2015-8568 CVE-2015-8613 CVE-2015-8619 CVE-2015-8743 CVE-2015-8744 CVE-2015-8745 CVE-2016-1568 CVE-2016-1714 CVE-2016-1922 CVE-2016-1981 CVE-2016-2198 CVE-2016-3710 CVE-2016-3712 CVE-2016-4002 CVE-2016-4020 CVE-2016-4439 CVE-2016-4441 CVE-2016-4453 CVE-2016-4454 CVE-2016-4952 CVE-2016-4964 CVE-2016-5105 CVE-2016-5106 CVE-2016-5107 CVE-2016-5126 CVE-2016-5238 CVE-2016-5337 CVE-2016-5338 CVE-2016-5403 CVE-2016-6351 CVE-2016-6490 CVE-2016-6833 CVE-2016-6836 CVE-2016-6888 CVE-2016-7116 CVE-2016-7155 CVE-2016-7156 CVE-2016-7157 CVE-2017-10790 CVE-2017-11462 CVE-2017-13166 CVE-2018-0734 CVE-2018-10844 CVE-2018-10845 CVE-2018-10846 CVE-2018-10853 CVE-2018-1087 CVE-2018-10876 CVE-2018-10877 CVE-2018-10878 CVE-2018-10879 CVE-2018-10880 CVE-2018-10881 CVE-2018-10882 CVE-2018-10883 CVE-2018-10902 CVE-2018-10938 CVE-2018-10940 CVE-2018-11233 CVE-2018-11235 CVE-2018-12896 CVE-2018-13093 CVE-2018-13094 CVE-2018-13095 CVE-2018-14617 CVE-2018-14678 CVE-2018-15572 CVE-2018-15594 CVE-2018-15686 CVE-2018-15688 CVE-2018-16276 CVE-2018-16658 CVE-2018-17182 CVE-2018-17183 CVE-2018-17961 CVE-2018-18073 CVE-2018-18284 CVE-2018-19409 CVE-2018-19475 CVE-2018-19476 CVE-2018-19477 CVE-2018-20852 CVE-2018-5407 CVE-2018-6554 CVE-2018-6555 CVE-2018-7480 CVE-2018-7757 CVE-2018-8781 CVE-2018-8897 CVE-2018-9363 CVE-2018-9568 CVE-2019-10160 CVE-2019-12900 CVE-2019-15666 CVE-2019-15961 CVE-2019-19191 CVE-2019-3859 CVE-2020-10757 CVE-2020-3123 CVE-2020-3327 CVE-2020-3341 CVE-2020-3350 CVE-2020-3481 SUSE-SU-2017:2659-1 SUSE-SU-2018:1545-1 SUSE-SU-2018:1566-1 SUSE-SU-2018:2825-2 SUSE-SU-2018:3084-1 SUSE-SU-2018:3767-1 SUSE-SU-2018:3866-1 SUSE-SU-2018:4090-1 SUSE-SU-2018:4154-1 SUSE-SU-2019:1060-1 SUSE-SU-2019:2091-1 SUSE-SU-2020:0115-1 SUSE-SU-2020:1767-1
|
Platform(s): | openSUSE Leap 15.0 openSUSE Leap 15.1 SUSE Linux Enterprise Server 12 SP1-LTSS SUSE Linux Enterprise Server 12 SP2 SUSE Linux Enterprise Server 12 SP2-BCL SUSE Linux Enterprise Server 12 SP2-ESPOS SUSE Linux Enterprise Server 12 SP2-LTSS SUSE Linux Enterprise Server 12 SP3 SUSE Linux Enterprise Server 12 SP3-ESPOS SUSE Linux Enterprise Server 12 SP3-LTSS SUSE Linux Enterprise Server 12 SP3-TERADATA SUSE Linux Enterprise Server 12 SP4 SUSE OpenStack Cloud 7 SUSE OpenStack Cloud 8 SUSE OpenStack Cloud Crowbar 8
| Product(s): | |
Definition Synopsis |
openSUSE Leap 15.0 is installed AND Package Information
ntp-4.2.8p13-lp150.8 is installed
OR ntp-doc-4.2.8p13-lp150.8 is installed
|
Definition Synopsis |
openSUSE Leap 15.1 is installed
AND Package Information
evolution-3.26.6-lp151.4.3 is installed
OR evolution-devel-3.26.6-lp151.4.3 is installed
OR evolution-lang-3.26.6-lp151.4.3 is installed
OR evolution-plugin-bogofilter-3.26.6-lp151.4.3 is installed
OR evolution-plugin-pst-import-3.26.6-lp151.4.3 is installed
OR evolution-plugin-spamassassin-3.26.6-lp151.4.3 is installed
OR glade-catalog-evolution-3.26.6-lp151.4.3 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP1-LTSS is installed
AND Package Information
kgraft-patch-3_12_74-60_64_104-default-4-2 is installed
OR kgraft-patch-3_12_74-60_64_104-xen-4-2 is installed
OR kgraft-patch-SLE12-SP1_Update_31-4-2 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP2 is installed
AND Package Information
libpulse-mainloop-glib0-5.0-2 is installed
OR libpulse-mainloop-glib0-32bit-5.0-2 is installed
OR libpulse0-5.0-2 is installed
OR libpulse0-32bit-5.0-2 is installed
OR pulseaudio-5.0-2 is installed
OR pulseaudio-esound-compat-5.0-2 is installed
OR pulseaudio-gdm-hooks-5.0-2 is installed
OR pulseaudio-lang-5.0-2 is installed
OR pulseaudio-module-x11-5.0-2 is installed
OR pulseaudio-module-zeroconf-5.0-2 is installed
OR pulseaudio-utils-5.0-2 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP2-BCL is installed
AND Package Information
gnutls-3.2.15-18.6 is installed
OR libgnutls-openssl27-3.2.15-18.6 is installed
OR libgnutls28-3.2.15-18.6 is installed
OR libgnutls28-32bit-3.2.15-18.6 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP2-ESPOS is installed
AND Package Information
java-1_8_0-openjdk-1.8.0.171-27.19 is installed
OR java-1_8_0-openjdk-demo-1.8.0.171-27.19 is installed
OR java-1_8_0-openjdk-devel-1.8.0.171-27.19 is installed
OR java-1_8_0-openjdk-headless-1.8.0.171-27.19 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP2-LTSS is installed
AND Package Information
kgraft-patch-4_4_74-92_38-default-9-2 is installed
OR kgraft-patch-SLE12-SP2_Update_13-9-2 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP3 is installed
AND Package Information
bzip2-1.0.6-29 is installed
OR bzip2-doc-1.0.6-29 is installed
OR libbz2-1-1.0.6-29 is installed
OR libbz2-1-32bit-1.0.6-29 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP3-ESPOS is installed
AND clamav-0.103.0-33.32.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP3-LTSS is installed
AND Package Information
kgraft-patch-4_4_178-94_91-default-3-2 is installed
OR kgraft-patch-SLE12-SP3_Update_25-3-2 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP3-TERADATA is installed
AND Package Information
rsyslog-8.24.0-3.19 is installed
OR rsyslog-diag-tools-8.24.0-3.19 is installed
OR rsyslog-doc-8.24.0-3.19 is installed
OR rsyslog-module-gssapi-8.24.0-3.19 is installed
OR rsyslog-module-gtls-8.24.0-3.19 is installed
OR rsyslog-module-mysql-8.24.0-3.19 is installed
OR rsyslog-module-pgsql-8.24.0-3.19 is installed
OR rsyslog-module-relp-8.24.0-3.19 is installed
OR rsyslog-module-snmp-8.24.0-3.19 is installed
OR rsyslog-module-udpspoof-8.24.0-3.19 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP4 is installed
AND Package Information
guestfs-data-1.32.4-21.3 is installed
OR guestfs-tools-1.32.4-21.3 is installed
OR guestfsd-1.32.4-21.3 is installed
OR libguestfs0-1.32.4-21.3 is installed
OR perl-Sys-Guestfs-1.32.4-21.3 is installed
OR python-libguestfs-1.32.4-21.3 is installed
OR virt-p2v-1.32.4-21.3 is installed
OR virt-v2v-1.32.4-21.3 is installed
|
Definition Synopsis |
SUSE OpenStack Cloud 7 is installed
AND Package Information
git-2.12.3-27.14 is installed
OR git-core-2.12.3-27.14 is installed
OR git-doc-2.12.3-27.14 is installed
|
Definition Synopsis |
SUSE OpenStack Cloud 8 is installed
AND cobbler-2.6.6-49.9 is installed
|
Definition Synopsis |
SUSE OpenStack Cloud Crowbar 8 is installed
AND Package Information
MozillaFirefox-60.8.0-109.83 is installed
OR MozillaFirefox-translations-common-60.8.0-109.83 is installed
OR libfreebl3-3.44.1-58.28 is installed
OR libfreebl3-32bit-3.44.1-58.28 is installed
OR libfreebl3-hmac-3.44.1-58.28 is installed
OR libfreebl3-hmac-32bit-3.44.1-58.28 is installed
OR libsoftokn3-3.44.1-58.28 is installed
OR libsoftokn3-32bit-3.44.1-58.28 is installed
OR libsoftokn3-hmac-3.44.1-58.28 is installed
OR libsoftokn3-hmac-32bit-3.44.1-58.28 is installed
OR mozilla-nss-3.44.1-58.28 is installed
OR mozilla-nss-32bit-3.44.1-58.28 is installed
OR mozilla-nss-certs-3.44.1-58.28 is installed
OR mozilla-nss-certs-32bit-3.44.1-58.28 is installed
OR mozilla-nss-sysinit-3.44.1-58.28 is installed
OR mozilla-nss-sysinit-32bit-3.44.1-58.28 is installed
OR mozilla-nss-tools-3.44.1-58.28 is installed
|