clamav/clamav-freshclam-exit.patch
Reinhard Max 16df387343 - Update to version 0.100.2:
* bsc#1110723, CVE-2018-15378: Vulnerability in ClamAV's MEW
    unpacking feature that could allow an unauthenticated, remote
    attacker to cause a denial of service (DoS) condition on an
    affected device.
  * bsc#1103040, CVE-2018-14680, CVE-2018-14681, CVE-2018-14682:
    more fixes for embedded libmspack.
  * Make freshclam more robust against lagging signature mirrors.
  * On-Access "Extra Scanning", an opt-in minor feature of
    OnAccess scanning on Linux systems, has been disabled due to a
    known issue with resource cleanup OnAccessExtraScanning will
    be re-enabled in a future release when the issue is
    resolved. In the mean-time, users who enabled the feature in
    clamd.conf will see a warning informing them that the feature
    is not active. For details, see:
    https://bugzilla.clamav.net/show_bug.cgi?id=12048
- Restore exit code compatibility of freshclam with versions before
  0.100.0 when the virus database is already up to date
  (bsc#1104457, clamav-freshclam-exit.patch).

OBS-URL: https://build.opensuse.org/package/show/security/clamav?expand=0&rev=177
2018-10-04 09:52:49 +00:00

16 lines
346 B
Diff

--- freshclam/freshclam.c.orig
+++ freshclam/freshclam.c
@@ -714,6 +714,12 @@ main (int argc, char **argv)
execute ("OnErrorExecute", opt->strarg, opts);
}
+ if (ret == FC_UPTODATE)
+ {
+ /* Restore exit code compatibility with ClamAV < 0.100.0 */
+ ret = 0;
+ }
+
if (pidfile)
{
unlink (pidfile);