* [CVE-2024-20506, bsc#1230162]: Changed the logging module to
disable following symlinks on Linux and Unix systems so as to
prevent an attacker with existing access to the 'clamd' or
'freshclam' services from using a symlink to corrupt system
files.
* [CVE-2024-20505, bsc#1230161]: Fixed a possible out-of-bounds
read bug in the PDF file parser that could cause a
denial-of-service (DoS) condition.
* https://blog.clamav.net/2024/09/clamav-141-132-107-and-010312-security.html
- New version 1.4.0:
* Added support for extracting ALZ archives.
* Added support for extracting LHA/LZH archives.
* Added the ability to disable image fuzzy hashing, if needed.
For context, image fuzzy hashing is a detection mechanism
useful for identifying malware by matching images included with
the malware or phishing email/document.
* https://blog.clamav.net/2024/08/clamav-140-feature-release-and-clamav.html
OBS-URL: https://build.opensuse.org/package/show/security/clamav?expand=0&rev=264
- New version 1.3.2:
* CVE-2024-20506: Changed the logging module to disable following
symlinks on Linux and Unix systems so as to prevent an attacker
with existing access to the 'clamd' or 'freshclam' services from
using a symlink to corrupt system files.
* CVE-2024-20505: Fixed a possible out-of-bounds read bug in the PDF
file parser that could cause a denial-of-service condition.
* Removed unused Python modules from freshclam tests including
deprecated 'cgi' module that is expected to cause test failures in
Python 3.13.
* Fix unit test caused by expiring signing certificate.
* Fixed a build issue on Windows with newer versions of Rust. Also
upgraded GitHub Actions imports to fix CI failures.
* Fixed an unaligned pointer dereference issue on select architectures.
* Fixes to Jenkins CI pipeline.
- Remove upstreamed 1305.patch
OBS-URL: https://build.opensuse.org/request/show/1198813
OBS-URL: https://build.opensuse.org/package/show/security/clamav?expand=0&rev=263
* CVE-2024-20380: Fixed a possible crash in the HTML file parser
that could cause a denial-of-service (DoS) condition.
* Updated select Rust dependencies to the latest versions.
* Fixed a bug causing some text to be truncated when converting
from UTF-16.
* Fixed assorted complaints identified by Coverity static
analysis.
* Fixed a bug causing CVDs downloaded by the DatabaseCustomURL
Freshclam config option to be pruned and then re-downloaded
with every update.
* Added the new 'valhalla' database name to the list of optional
databases in preparation for future work.
- Drop clamav-disable-yara.patch as yara cannot be disabled anymore
OBS-URL: https://build.opensuse.org/package/show/security/clamav?expand=0&rev=254
- New version: 1.3.0:
* Added support for extracting and scanning attachments found in
Microsoft OneNote section files. OneNote parsing will be
enabled by default, but may be optionally disabled.
* Added file type recognition for compiled Python (`.pyc`) files.
* Improved support for decrypting PDFs with empty passwords.
* Fixed a warning when scanning some HTML files.
* ClamOnAcc: Fixed an infinite loop when a watched directory
does not exist.
* ClamOnAcc: Fixed an infinite loop when a file has been deleted
before a scan.
- Use %patch -P N instead of deprecated %patchN.
- New version: 1.2.0:
* Added support for extracting Universal Disk Format (UDF)
partitions.
* Added an option to customize the size of ClamAV's clean file
cache.
* Raised the MaxScanSize limit so the total amount of data
scanned when scanning a file or archive may exceed 4 gigabytes.
* Added ability for Freshclam to use a client certificate PEM
file and a private key PEM file for authentication to a private
mirror.
* Fix an issue extracting files from ISO9660 partitions where the
files are listed in the plain ISO tree and there also exists an
empty Joliet tree.
* PID and socket are now located under /run/clamav/clamd.pid and
/run/clamav/clamd.sock .
* bsc#1211594: Fixed an issue where ClamAV does not abort the
signature load process after partially loading an invalid
signature.
OBS-URL: https://build.opensuse.org/request/show/1161540
OBS-URL: https://build.opensuse.org/package/show/security/clamav?expand=0&rev=252
- Update to 0.103.8
* CVE-2023-20032: Fixed a possible remote code execution vulnerability
in the HFS+ file parser. Issue affects versions 1.0.0 and earlier,
0.105.1 and earlier, and 0.103.7 and earlier. (bsc#1208363)
* CVE-2023-20052: Fixed a possible remote information leak
vulnerability in the DMG file parser. Issue affects versions 1.0.0
and earlier, 0.105.1 and earlier, and 0.103.7 and earlier.
(bsc#1208365)
* Update vendored libmspack library to version 0.11alpha.
- Package huge .html documentation in a separate subpackage.
OBS-URL: https://build.opensuse.org/request/show/1066149
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/clamav?expand=0&rev=120
- Update to 0.103.8
* CVE-2023-20032: Fixed a possible remote code execution vulnerability
in the HFS+ file parser. Issue affects versions 1.0.0 and earlier,
0.105.1 and earlier, and 0.103.7 and earlier.
* CVE-2023-20052: Fixed a possible remote information leak
vulnerability in the DMG file parser. Issue affects versions 1.0.0
and earlier, 0.105.1 and earlier, and 0.103.7 and earlier.
* Update vendored libmspack library to version 0.11alpha.
- Package huge .html documentation in a separate subpackage.
OBS-URL: https://build.opensuse.org/request/show/1066029
OBS-URL: https://build.opensuse.org/package/show/security/clamav?expand=0&rev=238
- Update to 0.103.6
* CVE-2022-20770: Fixed a possible infinite loop vulnerability in the CHM
file parser. Issue affects versions 0.104.0 through 0.104.2 and LTS
version 0.103.5 and prior versions.
* CVE-2022-20796: Fixed a possible NULL-pointer dereference crash in the
scan verdict cache check. Issue affects versions 0.103.4, 0.103.5,
0.104.1, and 0.104.2.
* CVE-2022-20771: Fixed a possible infinite loop vulnerability in the
TIFF file parser. Issue affects versions 0.104.0 through 0.104.2 and
LTS version 0.103.5 and prior versions. The issue only occurs if the
"--alert-broken-media" ClamScan option is enabled. For ClamD, the
affected option is "AlertBrokenMedia yes", and for libclamav it is the
"CL_SCAN_HEURISTIC_BROKEN_MEDIA" scan option.
* CVE-2022-20785: Fixed a possible memory leak in the HTML file parser /
Javascript normalizer. Issue affects versions 0.104.0 through 0.104.2
and LTS version 0.103.5 and prior versions.
* CVE-2022-20792: Fixed a possible multi-byte heap buffer overflow write
vulnerability in the signature database load module. The fix was to
update the vendored regex library to the latest version. Issue affects
versions 0.104.0 through 0.104.2 and LTS version 0.103.5 and prior
versions.
* ClamOnAcc: Fixed a number of assorted stability issues and added
niceties for debugging ClamOnAcc.
* Fixed an issue causing byte-compare subsignatures to cause an alert
when they match even if other conditions of the given logical
signatures were not met.
* Fix memleak when using multiple byte-compare subsignatures. This fix
was backported from 0.104.0.
* Assorted bug fixes and improvements.
- Remove upstreamed clamav-ck_assert_msg.patch
OBS-URL: https://build.opensuse.org/request/show/975241
OBS-URL: https://build.opensuse.org/package/show/security/clamav?expand=0&rev=232
- Update to 0.103.5
* CVE-2022-20698: Fix for invalid pointer read that may cause a crash.
This issue affects 0.104.1, 0.103.4 and prior when ClamAV is compiled
with libjson-c and the CL_SCAN_GENERAL_COLLECT_METADATA scan option
(the clamscan --gen-json option) is enabled.
* Fixed ability to disable the file size limit with libclamav C API,
like this:
cl_engine_set_num(engine, CL_ENGINE_MAX_FILESIZE, 0);
This issue didn't affect ClamD or ClamScan which also can disable the
limit by setting it to zero using MaxFileSize 0 in clamd.conf for ClamD,
or clamscan --max-filesize=0 for ClamScan.
Note: Internally, the max file size is still set to 2 GiB. Disabling the
limit for a scan will fall back on the internal 2 GiB limitation.
* Increased the maximum line length for ClamAV config files from 512 bytes
to 1,024 bytes to allow for longer config option strings.
* SigTool: Fix insufficient buffer size for --list-sigs that caused a
failure when listing a database containing one or more very long
signatures. This fix was backported from 0.104.
OBS-URL: https://build.opensuse.org/request/show/945934
OBS-URL: https://build.opensuse.org/package/show/security/clamav?expand=0&rev=229
document that files over a certain size by default will silently not be
scanned and how this can be adjusted (bsc#1187509)
--------------------------------------------------------------------
- bsc#1192346: Update to 0.103.4
- bsc#1188284: Update to 0.103.3
* obsoletes clamav-disable-timestamps.patch
OBS-URL: https://build.opensuse.org/package/show/security/clamav?expand=0&rev=225
- Update to 0.103.4
* FreshClam:
- Add a 24-hour cool-down for FreshClam clients that have received
an HTTP 403 (Forbidden) response from the CDN. This is to reduce
the volume of 403-response data served to blocked FreshClam
clients that are configured with a tight update-loop.
- Fixed a bug where FreshClam treats an empty CDIFF as an
incremental update failure instead of as an intentional request
to download the whole CVD.
* ClamDScan: Fix a scan error when broken symlinks are encountered on
macOS with "FollowDirectorySymlinks" and "FollowFileSymlinks"
options disabled.
* Overhauled the scan recursion / nested archive extraction logic and
added new limits on embedded file-type recognition performed during
the "raw" scan of each file. This limits embedded file-type
misidentification and prevents detecting embedded file content that
is found/extracted and scanned at other layers in the scanning
process.
* Fix an issue with the FMap module that failed to read from some
nested files.
* Fixed an issue where failing to load some rules from a Yara file
containing multiple rules may cause a crash.
* Fixed assorted compiler warnings.
* Fixed assorted Coverity static code analysis issues.
* Scan limits:
- Added virus-name suffixes to the alerts that trigger when a scan
limit has been exceeded. Rather than simply
Heuristics.Limits.Exceeded, you may now see limit-specific
virus-names, to include:
+ Heuristics.Limits.Exceeded.MaxFileSize
OBS-URL: https://build.opensuse.org/request/show/929092
OBS-URL: https://build.opensuse.org/package/show/security/clamav?expand=0&rev=224