You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa clamav

Sigurnosni nedostaci programskog paketa clamav

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LSU

openSUSE Security Update: Security update for clamav
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:3315-1
Rating: moderate
References: #1103040 #1104457 #1110723
Cross-References: CVE-2018-14680 CVE-2018-14681 CVE-2018-14682
CVE-2018-15378
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________

An update that fixes four vulnerabilities is now available.

Description:

This update for clamav fixes the following issues:

clamav was updated to version 0.100.2.

Following security issues were fixed:

– CVE-2018-15378: Vulnerability in ClamAV’s MEW unpacking feature that
could allow an unauthenticated, remote attacker to cause a denial of
service (DoS) condition on an affected device. (bsc#1110723)
– CVE-2018-14680, CVE-2018-14681, CVE-2018-14682: more fixes for embedded
libmspack. (bsc#1103040)

Following non-security issues were addressed:

– Make freshclam more robust against lagging signature mirrors.
– On-Access “Extra Scanning”, an opt-in minor feature of OnAccess scanning
on Linux systems, has been disabled due to a known issue with resource
cleanup OnAccessExtraScanning will be re-enabled in a future release
when the issue is resolved. In the mean-time, users who enabled the
feature in clamd.conf will see a warning informing them that the feature
is not active. For details, see:
https://bugzilla.clamav.net/show_bug.cgi?id=12048
– Restore exit code compatibility of freshclam with versions before
0.100.0 when the virus database is already up to date (bsc#1104457)

This update was imported from the SUSE:SLE-15:Update update project.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– openSUSE Leap 15.0:

zypper in -t patch openSUSE-2018-1227=1

Package List:

– openSUSE Leap 15.0 (x86_64):

clamav-0.100.2-lp150.2.6.1
clamav-debuginfo-0.100.2-lp150.2.6.1
clamav-debugsource-0.100.2-lp150.2.6.1
clamav-devel-0.100.2-lp150.2.6.1
libclamav7-0.100.2-lp150.2.6.1
libclamav7-debuginfo-0.100.2-lp150.2.6.1
libclammspack0-0.100.2-lp150.2.6.1
libclammspack0-debuginfo-0.100.2-lp150.2.6.1

References:

https://www.suse.com/security/cve/CVE-2018-14680.html
https://www.suse.com/security/cve/CVE-2018-14681.html
https://www.suse.com/security/cve/CVE-2018-14682.html
https://www.suse.com/security/cve/CVE-2018-15378.html
https://bugzilla.suse.com/1103040
https://bugzilla.suse.com/1104457
https://bugzilla.suse.com/1110723


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

AutorToni Vugdelija
Cert idNCERT-REF-2018-10-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa MySQL

Otkriveni su sigurnosni nedostaci u programskom paketu MySQL za operacijski sustav Ubuntu. Otkriveni nedostaci potencijalnim napadačima omogućuju izvođenje napada uskraćivanjem...

Close