--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2018-847fe2ed61
2018-10-30 17:13:37.317354
--------------------------------------------------------------------------------
Name : clamav
Product : Fedora 29
Version : 0.100.2
Release : 2.fc29
URL :
https://www.clamav.net/
Summary : End-user tools for the Clam Antivirus scanner
Description :
Clam AntiVirus is an anti-virus toolkit for UNIX. The main purpose of this
software is the integration with mail servers (attachment scanning). The
package provides a flexible and scalable multi-threaded daemon, a command
line scanner, and a tool for automatic updating via Internet. The programs
are based on a shared library distributed with the Clam AntiVirus package,
which you can use with your own software. The virus database is based on
the virus database from OpenAntiVirus, but contains additional signatures
(including signatures for popular polymorphic viruses, too) and is KEPT UP
TO DATE.
--------------------------------------------------------------------------------
Update Information:
ClamAV 0.100.2 has been released! This is a patch release to address several
vulnerabilities. Fixes for the following ClamAV vulnerabilities:
CVE-2018-15378: Vulnerability in ClamAV's MEW unpacking feature that
could allow an unauthenticated, remote attacker to cause a denial-of-service
(DoS) condition on an affected device. Reported by Secunia Research
at Flexera. Fix for a two-byte buffer over-read bug in ClamAV's PDF
parsing code. Reported by Alex Gaynor. Fixes for the
following vulnerabilities in bundled third-party libraries:
CVE-2018-14680: An issue was discovered in mspack/chmd.c in
libmspack before 0.7alpha. It does not reject blank CHM filenames.
CVE-2018-14681: An issue was discovered in kwajd_read_headers in
mspack/kwajd.c in libmspack before 0.7alpha. Bad KWAJ file header extensions
could cause a one- or two-byte overwrite. CVE-2018-14682: An
issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. There is an
off-by-one error in the TOLOWER() macro for CHM decompression. Additionally,
0.100.2 reverted 0.100.1's patch for CVE-2018-14679, and applied libmspack's
version of the fix in its place Other changes: Some users have
reported freshclam signature update failures as a result of a delay between the
time the new signature database content is announced and the time that the
content-delivery-network has the content available for download. To mitigate
these errors, this patch release includes some modifications to freshclam to
make it more lenient, and to reduce the time that freshclam will ignore a mirror
when it detects an issue. On-Access "Extra Scanning," an opt-in minor
feature of OnAccess scanning on Linux systems, has been disabled due to a known
issue with resource cleanup OnAccessExtraScanning will be re-enabled in a future
release when the issue is resolved. In the mean-time, users who enabled the
feature in clamd.conf will see a warning informing them that the feature is not
active. For details, click here.
--------------------------------------------------------------------------------
ChangeLog:
* Thu Oct 4 2018 S��rgio Basto <sergio(a)serjux.com> - 0.100.2-2
- Revert unwanted committed parts of commit "clean whitespace"
* Thu Oct 4 2018 S��rgio Basto <sergio(a)serjux.com> - 0.100.2-1
- Update to 0.100.2
- Fix logrotate example (#1610735)
- Improve clamd@.service (enter in commit "clean whitespace" by mistake sorry)
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #1636603 - CVE-2018-15378 clamav: denial-of-service in MEW unpacking feature
https://bugzilla.redhat.com/show_bug.cgi?id=1636603
--------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2018-847fe2ed61' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------