Security update for clamav
Announcement ID: | SUSE-SU-2018:2230-1 |
---|---|
Rating: | moderate |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves two vulnerabilities and has two security fixes can now be installed.
Description:
This update for clamav to version 0.100.1 fixes the following issues:
The following security vulnerabilities were addressed:
- CVE-2018-0360: HWP integer overflow, infinite loop vulnerability (bsc#1101410)
- CVE-2018-0361: PDF object length check, unreasonably long time to parse relatively small file (bsc#1101412)
- Buffer over-read in unRAR code due to missing max value checks in table initialization
- Libmspack heap buffer over-read in CHM parser (bsc#1103040)
- PDF parser bugs
The following other changes were made:
- Disable YARA support for licensing reasons (bsc#1101654).
- Add HTTPS support for clamsubmit
- Fix for DNS resolution for users on IPv4-only machines where IPv6 is not available or is link-local only
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
Basesystem Module 15
zypper in -t patch SUSE-SLE-Module-Basesystem-15-2018-1509=1
Package List:
-
Basesystem Module 15 (aarch64 ppc64le s390x x86_64)
- clamav-devel-0.100.1-3.3.1
- libclammspack0-debuginfo-0.100.1-3.3.1
- libclamav7-debuginfo-0.100.1-3.3.1
- libclammspack0-0.100.1-3.3.1
- libclamav7-0.100.1-3.3.1
- clamav-0.100.1-3.3.1
- clamav-debuginfo-0.100.1-3.3.1
- clamav-debugsource-0.100.1-3.3.1
References:
- https://www.suse.com/security/cve/CVE-2018-0360.html
- https://www.suse.com/security/cve/CVE-2018-0361.html
- https://bugzilla.suse.com/show_bug.cgi?id=1101410
- https://bugzilla.suse.com/show_bug.cgi?id=1101412
- https://bugzilla.suse.com/show_bug.cgi?id=1101654
- https://bugzilla.suse.com/show_bug.cgi?id=1103040