SUSE-SU-2018:3250-1

Source
https://www.suse.com/support/update/announcement/2018/suse-su-20183250-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2018:3250-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2018:3250-1
Related
Published
2018-10-19T13:06:26Z
Modified
2018-10-19T13:06:26Z
Summary
Security update for clamav
Details

This update for clamav fixes the following issues:

clamav was updated to version 0.100.2.

Following security issues were fixed:

  • CVE-2018-15378: Vulnerability in ClamAV's MEW unpacking feature that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. (bsc#1110723)
  • CVE-2018-14680, CVE-2018-14681, CVE-2018-14682: more fixes for embedded libmspack. (bsc#1103040)

Following non-security issues were addressed:

  • Make freshclam more robust against lagging signature mirrors.
  • On-Access 'Extra Scanning', an opt-in minor feature of OnAccess scanning on Linux systems, has been disabled due to a known issue with resource cleanup OnAccessExtraScanning will be re-enabled in a future release when the issue is resolved. In the mean-time, users who enabled the feature in clamd.conf will see a warning informing them that the feature is not active. For details, see: https://bugzilla.clamav.net/show_bug.cgi?id=12048
  • Restore exit code compatibility of freshclam with versions before 0.100.0 when the virus database is already up to date (bsc#1104457)
References

Affected packages

SUSE:Linux Enterprise Module for Basesystem 15 / clamav

Package

Name
clamav
Purl
purl:rpm/suse/clamav&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.100.2-3.6.4

Ecosystem specific

{
    "binaries": [
        {
            "clamav": "0.100.2-3.6.4",
            "libclamav7": "0.100.2-3.6.4",
            "libclammspack0": "0.100.2-3.6.4",
            "clamav-devel": "0.100.2-3.6.4"
        }
    ]
}