Commit Graph

6 Commits

Author SHA256 Message Date
Reinhard Max
b6dec3dc1b Accepting request 883689 from home:adkorte
- Update to 0.103.2
  * CVE-2021-1386: Fix for UnRAR DLL load privilege escalation.
    Affects 0.103.1 and prior on Windows only.
  * CVE-2021-1252: Fix for Excel XLM parser infinite loop. Affects
    0.103.0 and 0.103.1 only.
  * CVE-2021-1404: Fix for PDF parser buffer over-read; possible
    crash. Affects 0.103.0 and 0.103.1 only.
  * CVE-2021-1405: Fix for mail parser NULL-dereference crash.
    Affects 0.103.1 and prior.
  * Fix possible memory leak in PNG parser.
  * Fix ClamOnAcc scan on file-creation race condition so files are
    scanned after their contents are written.
  * FreshClam: Deprecate the SafeBrowsing config option. The
    SafeBrowsing option will no longer do anything.
  * For more details, see our blog post from last year about the
    future of the ClamAV Safe Browsing database.
  * FreshClam: Improved HTTP 304, 403, & 429 handling.
  * FreshClam: Added back the mirrors.dat file to the database directory.
  * FreshClam will now exit with a failure in daemon mode if an HTTP 403
    (Forbidden) was received, because retrying later won't help any. The
    FreshClam user will have to take actions to get unblocked.
  * Fix the FreshClam mirror-sync issue where a downloaded database is
    "older than the version advertised."
- Update package signing key (from https://www.clamav.net/downloads)
  % clamav.keyring

- Package clamav-milter in a subpackage
- Remove virus signatures upon uninstall
- Check for database existence before starting clamd
- Restart clamd when it exits

OBS-URL: https://build.opensuse.org/request/show/883689
OBS-URL: https://build.opensuse.org/package/show/security/clamav?expand=0&rev=219
2021-04-08 08:27:46 +00:00
Reinhard Max
1c959d22c6 Accepting request 803374 from home:adkorte
- Update to 0.102.3
  * CVE-2020-3327: Fix a vulnerability in the ARJ archive parsing
    module in ClamAV 0.102.2 that could cause a Denial-of-Service (DoS)
    condition. Improper bounds checking of an unsigned variable results
    in an out-of-bounds read which causes a crash.
  * CVE-2020-3341: Fix a vulnerability in the PDF parsing module in
    ClamAV 0.101 - 0.102.2 that could cause a Denial-of-Service (DoS)
    condition. Improper size checking of a buffer used to initialize AES
    decryption routines results in an out-of-bounds read which may cause
    a crash.
  * Fix "Attempt to allocate 0 bytes" error when parsing some PDF
    documents.
  * Fix a couple of minor memory leaks.
  * Updated libclamunrar to UnRAR 5.9.2.

OBS-URL: https://build.opensuse.org/request/show/803374
OBS-URL: https://build.opensuse.org/package/show/security/clamav?expand=0&rev=205
2020-05-12 18:00:54 +00:00
Reinhard Max
61f3c20dcc - bsc#1151839: Increase the startup timeout of clamd to 5 minutes
to cater for the grown virus database as a workaround until
  clamd has learned to talk to systemd to extend the timeout as
  long as needed.

OBS-URL: https://build.opensuse.org/package/show/security/clamav?expand=0&rev=191
2019-10-25 14:54:38 +00:00
Reinhard Max
0165340747 Accepting request 576006 from home:varkoly:branches:security
- bsc=983938 `After=syslog.target` left-overs in several unit files

OBS-URL: https://build.opensuse.org/request/show/576006
OBS-URL: https://build.opensuse.org/package/show/security/clamav?expand=0&rev=153
2018-02-14 00:04:03 +00:00
Reinhard Max
d1e009b238 Accepting request 314711 from home:pluskalm:branches:security
- Make clamd and clamav-milter services depend on freshclam as
  they need it

OBS-URL: https://build.opensuse.org/request/show/314711
OBS-URL: https://build.opensuse.org/package/show/security/clamav?expand=0&rev=120
2015-07-01 13:01:41 +00:00
e543ab3c80 Accepting request 226920 from home:bmanojlovic:branches:security
- initial systemd support unit files

OBS-URL: https://build.opensuse.org/request/show/226920
OBS-URL: https://build.opensuse.org/package/show/security/clamav?expand=0&rev=95
2014-03-28 16:04:21 +00:00