Oval Definition:oval:org.opensuse.security:def:57842
Revision Date:2020-12-22Version:1
Title:Security update for clamav (Important)
Description:

This update for clamav fixes the following issues:

clamav was updated to 0.103.0 to implement jsc#ECO-3010 and bsc#1118459.

clamd can now reload the signature database without blocking scanning. This multi-threaded database reload improvement was made possible thanks to a community effort. - Non-blocking database reloads are now the default behavior. Some systems that are more constrained on RAM may need to disable non-blocking reloads as it will temporarily consume two times as much memory. We added a new clamd config option ConcurrentDatabaseReload, which may be set to no. * Fix clamav-milter.service (requires clamd.service to run) * bsc#1119353, clamav-fips.patch: Fix freshclam crash in FIPS mode. * Partial sync with SLE15.

Update to version 0.102.4

Accumulated security fixes:

CVE-2020-3350: Fix a vulnerability wherein a malicious user could replace a scan target's directory with a symlink to another path to trick clamscan, clamdscan, or clamonacc into removing or moving a different file (eg. a critical system file). The issue would affect users that use the --move or --remove options for clamscan, clamdscan, and clamonacc. (bsc#1174255) * CVE-2020-3327: Fix a vulnerability in the ARJ archive parsing module in ClamAV 0.102.3 that could cause a Denial-of-Service (DoS) condition. Improper bounds checking results in an out-of-bounds read which could cause a crash. The previous fix for this CVE in 0.102.3 was incomplete. This fix correctly resolves the issue. * CVE-2020-3481: Fix a vulnerability in the EGG archive module in ClamAV 0.102.0 - 0.102.3 could cause a Denial-of-Service (DoS) condition. Improper error handling may result in a crash due to a NULL pointer dereference. This vulnerability is mitigated for those using the official ClamAV signature databases because the file type signatures in daily.cvd will not enable the EGG archive parser in versions affected by the vulnerability. (bsc#1174250) * CVE-2020-3341: Fix a vulnerability in the PDF parsing module in ClamAV 0.101 - 0.102.2 that could cause a Denial-of-Service (DoS) condition. Improper size checking of a buffer used to initialize AES decryption routines results in an out-of-bounds read which may cause a crash. (bsc#1171981) * CVE-2020-3123: A denial-of-service (DoS) condition may occur when using the optional credit card data-loss-prevention (DLP) feature. Improper bounds checking of an unsigned variable resulted in an out-of-bounds read, which causes a crash. * CVE-2019-15961: A Denial-of-Service (DoS) vulnerability may occur when scanning a specially crafted email file as a result of excessively long scan times. The issue is resolved by implementing several maximums in parsing MIME messages and by optimizing use of memory allocation. (bsc#1157763). * CVE-2019-12900: An out of bounds write in the NSIS bzip2 (bsc#1149458) * CVE-2019-12625: Introduce a configurable time limit to mitigate zip bomb vulnerability completely. Default is 2 minutes, configurable useing the clamscan --max-scantime and for clamd using the MaxScanTime config option (bsc#1144504)

Update to version 0.101.3:

ZIP bomb causes extreme CPU spikes (bsc#1144504)

Update to version 0.101.2 (bsc#1118459):

Support for RAR v5 archive extraction. * Incompatible changes to the arguments of cl_scandesc, cl_scandesc_callback, and cl_scanmap_callback. * Scanning options have been converted from a single flag bit-field into a structure of multiple categorized flag bit-fields. * The CL_SCAN_HEURISTIC_ENCRYPTED scan option was replaced by 2 new scan options: CL_SCAN_HEURISTIC_ENCRYPTED_ARCHIVE, and CL_SCAN_HEURISTIC_ENCRYPTED_DOC * Incompatible clamd.conf and command line interface changes. * Heuristic Alerts' (aka 'Algorithmic Detection') options have been changed to make the names more consistent. The original options are deprecated in 0.101, and will be removed in a future feature release. * For details, see https://blog.clamav.net/2018/12/clamav-01010-has-been-released.html
Family:unixClass:patch
Status:Reference(s):1012382
1032680
1042286
1047002
1054028
1056995
1062604
1064232
1065364
1082519
1082863
1083125
1084536
1085042
1085447
1088810
1089066
1090368
1090646
1090869
1092903
1094466
1095218
1095219
1095344
1096547
1097104
1099597
1099811
1099813
1099844
1099845
1099846
1099849
1099863
1099864
1099922
1099993
1099999
1100000
1100001
1100152
1102517
1102715
1102870
1103445
1104319
1104495
1105292
1105296
1105322
1105348
1105396
1105437
1105459
1105460
1105536
1106016
1106095
1106369
1106509
1106511
1106512
1106594
1106923
1107689
1107735
1107966
1108239
1108399
1108835
1109105
1109252
1109333
1110445
1111278
1111479
1111480
1112024
1112209
1112229
1113083
1113534
1113632
1113652
1113665
1113742
1117022
1117274
1117313
1117327
1117331
1118319
1118459
1119353
1130103
1133528
1138459
1141853
1144504
1149458
1157471
1157763
1171981
1172140
1172437
1174250
1174255
903543
CVE-2008-0928
CVE-2008-1945
CVE-2008-2382
CVE-2008-4539
CVE-2011-0904
CVE-2011-0905
CVE-2011-1164
CVE-2012-3515
CVE-2013-4148
CVE-2013-4149
CVE-2013-4150
CVE-2013-4151
CVE-2013-4526
CVE-2013-4527
CVE-2013-4529
CVE-2013-4530
CVE-2013-4531
CVE-2013-4533
CVE-2013-4534
CVE-2013-4535
CVE-2013-4536
CVE-2013-4537
CVE-2013-4538
CVE-2013-4539
CVE-2013-4540
CVE-2013-4541
CVE-2013-4542
CVE-2013-4544
CVE-2013-6399
CVE-2014-0142
CVE-2014-0143
CVE-2014-0144
CVE-2014-0145
CVE-2014-0146
CVE-2014-0147
CVE-2014-0150
CVE-2014-0182
CVE-2014-0222
CVE-2014-0223
CVE-2014-3461
CVE-2014-3640
CVE-2014-3970
CVE-2014-7840
CVE-2014-8106
CVE-2015-1779
CVE-2015-3209
CVE-2015-3456
CVE-2015-4037
CVE-2015-5154
CVE-2015-5198
CVE-2015-5199
CVE-2015-5200
CVE-2015-5225
CVE-2015-5278
CVE-2015-5279
CVE-2015-5745
CVE-2015-6815
CVE-2015-6855
CVE-2015-7295
CVE-2015-7512
CVE-2015-7549
CVE-2015-8345
CVE-2015-8504
CVE-2015-8558
CVE-2015-8567
CVE-2015-8568
CVE-2015-8613
CVE-2015-8619
CVE-2015-8743
CVE-2015-8744
CVE-2015-8745
CVE-2016-1568
CVE-2016-1714
CVE-2016-1922
CVE-2016-1981
CVE-2016-2198
CVE-2016-3710
CVE-2016-3712
CVE-2016-4002
CVE-2016-4020
CVE-2016-4439
CVE-2016-4441
CVE-2016-4453
CVE-2016-4454
CVE-2016-4952
CVE-2016-4964
CVE-2016-5105
CVE-2016-5106
CVE-2016-5107
CVE-2016-5126
CVE-2016-5238
CVE-2016-5337
CVE-2016-5338
CVE-2016-5403
CVE-2016-6351
CVE-2016-6490
CVE-2016-6833
CVE-2016-6836
CVE-2016-6888
CVE-2016-7116
CVE-2016-7155
CVE-2016-7156
CVE-2016-7157
CVE-2017-10790
CVE-2017-11462
CVE-2017-13166
CVE-2018-0734
CVE-2018-10844
CVE-2018-10845
CVE-2018-10846
CVE-2018-10853
CVE-2018-1087
CVE-2018-10876
CVE-2018-10877
CVE-2018-10878
CVE-2018-10879
CVE-2018-10880
CVE-2018-10881
CVE-2018-10882
CVE-2018-10883
CVE-2018-10902
CVE-2018-10938
CVE-2018-10940
CVE-2018-11233
CVE-2018-11235
CVE-2018-12896
CVE-2018-13093
CVE-2018-13094
CVE-2018-13095
CVE-2018-14617
CVE-2018-14678
CVE-2018-15572
CVE-2018-15594
CVE-2018-15686
CVE-2018-15688
CVE-2018-16276
CVE-2018-16658
CVE-2018-17182
CVE-2018-17183
CVE-2018-17961
CVE-2018-18073
CVE-2018-18284
CVE-2018-19409
CVE-2018-19475
CVE-2018-19476
CVE-2018-19477
CVE-2018-20852
CVE-2018-5407
CVE-2018-6554
CVE-2018-6555
CVE-2018-7480
CVE-2018-7757
CVE-2018-8781
CVE-2018-8897
CVE-2018-9363
CVE-2018-9568
CVE-2019-10160
CVE-2019-12900
CVE-2019-15666
CVE-2019-15961
CVE-2019-19191
CVE-2019-3859
CVE-2020-10757
CVE-2020-3123
CVE-2020-3327
CVE-2020-3341
CVE-2020-3350
CVE-2020-3481
SUSE-SU-2017:2659-1
SUSE-SU-2018:1545-1
SUSE-SU-2018:1566-1
SUSE-SU-2018:2825-2
SUSE-SU-2018:3084-1
SUSE-SU-2018:3767-1
SUSE-SU-2018:3866-1
SUSE-SU-2018:4090-1
SUSE-SU-2018:4154-1
SUSE-SU-2019:1060-1
SUSE-SU-2019:2091-1
SUSE-SU-2020:0115-1
SUSE-SU-2020:1767-1
Platform(s):openSUSE Leap 15.0
openSUSE Leap 15.1
SUSE Linux Enterprise Server 12 SP1-LTSS
SUSE Linux Enterprise Server 12 SP2
SUSE Linux Enterprise Server 12 SP2-BCL
SUSE Linux Enterprise Server 12 SP2-ESPOS
SUSE Linux Enterprise Server 12 SP2-LTSS
SUSE Linux Enterprise Server 12 SP3
SUSE Linux Enterprise Server 12 SP3-ESPOS
SUSE Linux Enterprise Server 12 SP3-LTSS
SUSE Linux Enterprise Server 12 SP3-TERADATA
SUSE Linux Enterprise Server 12 SP4
SUSE OpenStack Cloud 7
SUSE OpenStack Cloud 8
SUSE OpenStack Cloud Crowbar 8
Product(s):
Definition Synopsis
  • openSUSE Leap 15.0 is installed
  • AND Package Information
  • ntp-4.2.8p13-lp150.8 is installed
  • OR ntp-doc-4.2.8p13-lp150.8 is installed
  • Definition Synopsis
  • openSUSE Leap 15.1 is installed
  • AND Package Information
  • evolution-3.26.6-lp151.4.3 is installed
  • OR evolution-devel-3.26.6-lp151.4.3 is installed
  • OR evolution-lang-3.26.6-lp151.4.3 is installed
  • OR evolution-plugin-bogofilter-3.26.6-lp151.4.3 is installed
  • OR evolution-plugin-pst-import-3.26.6-lp151.4.3 is installed
  • OR evolution-plugin-spamassassin-3.26.6-lp151.4.3 is installed
  • OR glade-catalog-evolution-3.26.6-lp151.4.3 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP1-LTSS is installed
  • AND Package Information
  • kgraft-patch-3_12_74-60_64_104-default-4-2 is installed
  • OR kgraft-patch-3_12_74-60_64_104-xen-4-2 is installed
  • OR kgraft-patch-SLE12-SP1_Update_31-4-2 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP2 is installed
  • AND Package Information
  • libpulse-mainloop-glib0-5.0-2 is installed
  • OR libpulse-mainloop-glib0-32bit-5.0-2 is installed
  • OR libpulse0-5.0-2 is installed
  • OR libpulse0-32bit-5.0-2 is installed
  • OR pulseaudio-5.0-2 is installed
  • OR pulseaudio-esound-compat-5.0-2 is installed
  • OR pulseaudio-gdm-hooks-5.0-2 is installed
  • OR pulseaudio-lang-5.0-2 is installed
  • OR pulseaudio-module-x11-5.0-2 is installed
  • OR pulseaudio-module-zeroconf-5.0-2 is installed
  • OR pulseaudio-utils-5.0-2 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP2-BCL is installed
  • AND Package Information
  • gnutls-3.2.15-18.6 is installed
  • OR libgnutls-openssl27-3.2.15-18.6 is installed
  • OR libgnutls28-3.2.15-18.6 is installed
  • OR libgnutls28-32bit-3.2.15-18.6 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP2-ESPOS is installed
  • AND Package Information
  • java-1_8_0-openjdk-1.8.0.171-27.19 is installed
  • OR java-1_8_0-openjdk-demo-1.8.0.171-27.19 is installed
  • OR java-1_8_0-openjdk-devel-1.8.0.171-27.19 is installed
  • OR java-1_8_0-openjdk-headless-1.8.0.171-27.19 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP2-LTSS is installed
  • AND Package Information
  • kgraft-patch-4_4_74-92_38-default-9-2 is installed
  • OR kgraft-patch-SLE12-SP2_Update_13-9-2 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP3 is installed
  • AND Package Information
  • bzip2-1.0.6-29 is installed
  • OR bzip2-doc-1.0.6-29 is installed
  • OR libbz2-1-1.0.6-29 is installed
  • OR libbz2-1-32bit-1.0.6-29 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP3-ESPOS is installed
  • AND clamav-0.103.0-33.32.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP3-LTSS is installed
  • AND Package Information
  • kgraft-patch-4_4_178-94_91-default-3-2 is installed
  • OR kgraft-patch-SLE12-SP3_Update_25-3-2 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP3-TERADATA is installed
  • AND Package Information
  • rsyslog-8.24.0-3.19 is installed
  • OR rsyslog-diag-tools-8.24.0-3.19 is installed
  • OR rsyslog-doc-8.24.0-3.19 is installed
  • OR rsyslog-module-gssapi-8.24.0-3.19 is installed
  • OR rsyslog-module-gtls-8.24.0-3.19 is installed
  • OR rsyslog-module-mysql-8.24.0-3.19 is installed
  • OR rsyslog-module-pgsql-8.24.0-3.19 is installed
  • OR rsyslog-module-relp-8.24.0-3.19 is installed
  • OR rsyslog-module-snmp-8.24.0-3.19 is installed
  • OR rsyslog-module-udpspoof-8.24.0-3.19 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP4 is installed
  • AND Package Information
  • guestfs-data-1.32.4-21.3 is installed
  • OR guestfs-tools-1.32.4-21.3 is installed
  • OR guestfsd-1.32.4-21.3 is installed
  • OR libguestfs0-1.32.4-21.3 is installed
  • OR perl-Sys-Guestfs-1.32.4-21.3 is installed
  • OR python-libguestfs-1.32.4-21.3 is installed
  • OR virt-p2v-1.32.4-21.3 is installed
  • OR virt-v2v-1.32.4-21.3 is installed
  • Definition Synopsis
  • SUSE OpenStack Cloud 7 is installed
  • AND Package Information
  • git-2.12.3-27.14 is installed
  • OR git-core-2.12.3-27.14 is installed
  • OR git-doc-2.12.3-27.14 is installed
  • Definition Synopsis
  • SUSE OpenStack Cloud 8 is installed
  • AND cobbler-2.6.6-49.9 is installed
  • Definition Synopsis
  • SUSE OpenStack Cloud Crowbar 8 is installed
  • AND Package Information
  • MozillaFirefox-60.8.0-109.83 is installed
  • OR MozillaFirefox-translations-common-60.8.0-109.83 is installed
  • OR libfreebl3-3.44.1-58.28 is installed
  • OR libfreebl3-32bit-3.44.1-58.28 is installed
  • OR libfreebl3-hmac-3.44.1-58.28 is installed
  • OR libfreebl3-hmac-32bit-3.44.1-58.28 is installed
  • OR libsoftokn3-3.44.1-58.28 is installed
  • OR libsoftokn3-32bit-3.44.1-58.28 is installed
  • OR libsoftokn3-hmac-3.44.1-58.28 is installed
  • OR libsoftokn3-hmac-32bit-3.44.1-58.28 is installed
  • OR mozilla-nss-3.44.1-58.28 is installed
  • OR mozilla-nss-32bit-3.44.1-58.28 is installed
  • OR mozilla-nss-certs-3.44.1-58.28 is installed
  • OR mozilla-nss-certs-32bit-3.44.1-58.28 is installed
  • OR mozilla-nss-sysinit-3.44.1-58.28 is installed
  • OR mozilla-nss-sysinit-32bit-3.44.1-58.28 is installed
  • OR mozilla-nss-tools-3.44.1-58.28 is installed
  • BACK