Mageia 2020-0226: clamav security update
Summary
Updated clamav packages fix security vulnerabilities:
Fixed a vulnerability in the ARJ archive-parsing module in ClamAV 0.102.2
that could cause a denial-of-service condition. Improper bounds checking
of an unsigned variable results in an out-of-bounds read which causes a
crash. Special thanks to Daehui Chang and Fady Othman for helping identify
the ARJ parsing vulnerability (CVE-2020-3327).
Fixed a vulnerability in the PDF-parsing module in ClamAV 0.101 - 0.102.2
that could cause a denial-of-service condition. Improper size checking of
a buffer used to initialize AES decryption routines results in an
out-of-bounds read, which may cause a crash. OSS-Fuzz discovered this
vulnerability (CVE-2020-3341)
References
- https://bugs.mageia.org/show_bug.cgi?id=26653
- https://blog.clamav.net/2020/05/clamav-01023-security-patch-released.html
- https://www.debian.org/lts/security/2020/dla-2215
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3327
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3341
Resolution
MGASA-2020-0226 - Updated clamav packages fix security vulnerabilities
SRPMS
- 7/core/clamav-0.102.3-1.mga7