Overview

Request 975241 accepted

- Update to 0.103.6
* CVE-2022-20770: Fixed a possible infinite loop vulnerability in the CHM
file parser. Issue affects versions 0.104.0 through 0.104.2 and LTS
version 0.103.5 and prior versions.
* CVE-2022-20796: Fixed a possible NULL-pointer dereference crash in the
scan verdict cache check. Issue affects versions 0.103.4, 0.103.5,
0.104.1, and 0.104.2.
* CVE-2022-20771: Fixed a possible infinite loop vulnerability in the
TIFF file parser. Issue affects versions 0.104.0 through 0.104.2 and
LTS version 0.103.5 and prior versions. The issue only occurs if the
"--alert-broken-media" ClamScan option is enabled. For ClamD, the
affected option is "AlertBrokenMedia yes", and for libclamav it is the
"CL_SCAN_HEURISTIC_BROKEN_MEDIA" scan option.
* CVE-2022-20785: Fixed a possible memory leak in the HTML file parser /
Javascript normalizer. Issue affects versions 0.104.0 through 0.104.2
and LTS version 0.103.5 and prior versions.
* CVE-2022-20792: Fixed a possible multi-byte heap buffer overflow write
vulnerability in the signature database load module. The fix was to
update the vendored regex library to the latest version. Issue affects
versions 0.104.0 through 0.104.2 and LTS version 0.103.5 and prior
versions.
* ClamOnAcc: Fixed a number of assorted stability issues and added
niceties for debugging ClamOnAcc.
* Fixed an issue causing byte-compare subsignatures to cause an alert
when they match even if other conditions of the given logical
signatures were not met.
* Fix memleak when using multiple byte-compare subsignatures. This fix
was backported from 0.104.0.
* Assorted bug fixes and improvements.
- Remove upstreamed clamav-ck_assert_msg.patch

Loading...

Robert Frohl's avatar

there are boo# references missing for the CVEs, but maybe they can just be added in place in security instead of resubmitting

Request History
Arjen de Korte's avatar

adkorte created request

- Update to 0.103.6
* CVE-2022-20770: Fixed a possible infinite loop vulnerability in the CHM
file parser. Issue affects versions 0.104.0 through 0.104.2 and LTS
version 0.103.5 and prior versions.
* CVE-2022-20796: Fixed a possible NULL-pointer dereference crash in the
scan verdict cache check. Issue affects versions 0.103.4, 0.103.5,
0.104.1, and 0.104.2.
* CVE-2022-20771: Fixed a possible infinite loop vulnerability in the
TIFF file parser. Issue affects versions 0.104.0 through 0.104.2 and
LTS version 0.103.5 and prior versions. The issue only occurs if the
"--alert-broken-media" ClamScan option is enabled. For ClamD, the
affected option is "AlertBrokenMedia yes", and for libclamav it is the
"CL_SCAN_HEURISTIC_BROKEN_MEDIA" scan option.
* CVE-2022-20785: Fixed a possible memory leak in the HTML file parser /
Javascript normalizer. Issue affects versions 0.104.0 through 0.104.2
and LTS version 0.103.5 and prior versions.
* CVE-2022-20792: Fixed a possible multi-byte heap buffer overflow write
vulnerability in the signature database load module. The fix was to
update the vendored regex library to the latest version. Issue affects
versions 0.104.0 through 0.104.2 and LTS version 0.103.5 and prior
versions.
* ClamOnAcc: Fixed a number of assorted stability issues and added
niceties for debugging ClamOnAcc.
* Fixed an issue causing byte-compare subsignatures to cause an alert
when they match even if other conditions of the given logical
signatures were not met.
* Fix memleak when using multiple byte-compare subsignatures. This fix
was backported from 0.104.0.
* Assorted bug fixes and improvements.
- Remove upstreamed clamav-ck_assert_msg.patch


Robert Frohl's avatar

rfrohl accepted request

lgtm, will fix the missing references

openSUSE Build Service is sponsored by