Security update for clamav
Announcement ID: | SUSE-SU-2022:1647-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves five vulnerabilities can now be installed.
Description:
This update for clamav fixes the following issues:
- CVE-2022-20770: Fixed a possible infinite loop vulnerability in the CHM file parser (bsc#1199242).
- CVE-2022-20796: Fixed a possible NULL-pointer dereference crash in the scan verdict cache check (bsc#1199246).
- CVE-2022-20771: Fixed a possible infinite loop vulnerability in the TIFF file parser (bsc#1199244).
- CVE-2022-20785: Fixed a possible memory leak in the HTML file parser / Javascript normalizer (bsc#1199245).
- CVE-2022-20792: Fixed a possible multi-byte heap buffer overflow write vulnerability in the signature database load module (bsc#1199274).
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise High Performance Computing 12 SP5
zypper in -t patch SUSE-SLE-SERVER-12-SP5-2022-1647=1
-
SUSE Linux Enterprise Server 12 SP5
zypper in -t patch SUSE-SLE-SERVER-12-SP5-2022-1647=1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP5
zypper in -t patch SUSE-SLE-SERVER-12-SP5-2022-1647=1
Package List:
-
SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64)
- clamav-debugsource-0.103.6-3.18.1
- clamav-debuginfo-0.103.6-3.18.1
- clamav-0.103.6-3.18.1
-
SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64)
- clamav-debugsource-0.103.6-3.18.1
- clamav-debuginfo-0.103.6-3.18.1
- clamav-0.103.6-3.18.1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64)
- clamav-debugsource-0.103.6-3.18.1
- clamav-debuginfo-0.103.6-3.18.1
- clamav-0.103.6-3.18.1
References:
- https://www.suse.com/security/cve/CVE-2022-20770.html
- https://www.suse.com/security/cve/CVE-2022-20771.html
- https://www.suse.com/security/cve/CVE-2022-20785.html
- https://www.suse.com/security/cve/CVE-2022-20792.html
- https://www.suse.com/security/cve/CVE-2022-20796.html
- https://bugzilla.suse.com/show_bug.cgi?id=1199242
- https://bugzilla.suse.com/show_bug.cgi?id=1199244
- https://bugzilla.suse.com/show_bug.cgi?id=1199245
- https://bugzilla.suse.com/show_bug.cgi?id=1199246
- https://bugzilla.suse.com/show_bug.cgi?id=1199274