From owner-freebsd-ports@freebsd.org Thu Jul 16 23:00:16 2020 Return-Path: Delivered-To: freebsd-ports@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 99E2F370386 for ; Thu, 16 Jul 2020 23:00:16 +0000 (UTC) (envelope-from doctor@doctor.nl2k.ab.ca) Received: from doctor.nl2k.ab.ca (doctor.nl2k.ab.ca [204.209.81.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4B78q34nR8z4CGy for ; Thu, 16 Jul 2020 23:00:15 +0000 (UTC) (envelope-from doctor@doctor.nl2k.ab.ca) Received: from doctor by doctor.nl2k.ab.ca with local (Exim 4.93.0.4) (envelope-from ) id 1jwCjU-000Frm-Rt for freebsd-ports@freebsd.org; Thu, 16 Jul 2020 16:52:04 -0600 Date: Thu, 16 Jul 2020 16:52:04 -0600 From: The Doctor To: freebsd-ports@freebsd.org Subject: [jesler@cisco.com: [Clamav-announce] ClamAV? blog: ClamAV 0.102.4 security patch released] Message-ID: <20200716225204.GA60260@doctor.nl2k.ab.ca> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Rspamd-Queue-Id: 4B78q34nR8z4CGy X-Spamd-Bar: / X-Spamd-Result: default: False [0.13 / 15.00]; RCVD_TLS_LAST(0.00)[]; ARC_NA(0.00)[]; MID_RHS_MATCH_FROM(0.00)[]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; R_SPF_ALLOW(-0.20)[+a]; MIME_GOOD(-0.10)[text/plain]; TO_DN_NONE(0.00)[]; NEURAL_HAM_LONG(-0.68)[-0.679]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_HAM_MEDIUM(-0.29)[-0.288]; NEURAL_HAM_SHORT(-0.11)[-0.105]; DMARC_POLICY_ALLOW(-0.50)[nl2k.ab.ca,quarantine]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:6171, ipnet:204.209.81.0/24, country:CA]; INTRODUCTION(2.00)[]; SUBJECT_HAS_QUESTION(0.00)[]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-ports@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Porting software to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 16 Jul 2020 23:00:16 -0000 Heads up! ----- Forwarded message from "Joel Esler (jesler)" ----- Date: Thu, 16 Jul 2020 19:32:35 +0000 From: "Joel Esler (jesler)" To: ClamAV users ML , ClamAV Development , "clamav-announce@lists.clamav.net" Subject: [Clamav-announce] ClamAV? blog: ClamAV 0.102.4 security patch released x-mailer: Apple Mail (2.3608.120.23.2.1) > https://blog.clamav.net/2020/07/clamav-01024-security-patch-released.html ClamAV 0.102.4 is out now. Users can head over to clamav.net/downloads to download the release materials. ClamAV 0.102.4 is a bug patch release to address the following issues: CVE-2020-3350 Fixed a vulnerability a malicious user could exploit to replace a scan target's directory with a symlink to another path to trick clamscan, clamdscan, or clamonacc into removing or moving a different file (such as a critical system file). The issue would affect users that use the --move or --remove options for clamscan, clamdscan and clamonacc. For more information about AV quarantine attacks using links, see RACK911 Lab's report . CVE-2020-3327 Fixed a vulnerability in the ARJ archive-parsing module in ClamAV 0.102.3 that could cause a denial-of-service (DoS) condition. Improper bounds checking resulted in an out-of-bounds read that could cause a crash. The previous fix for this CVE in version 0.102.3 was incomplete. This fix correctly resolves the issue. CVE-2020-3481 Fixed a vulnerability in the EGG archive module in ClamAV 0.102.0 - 0.102.3 that could cause a denial-of-service (DoS) condition. Improper error handling could cause a crash due to a NULL pointer dereference. This vulnerability is mitigated for those using the official ClamAV signature databases because the file type signatures in daily.cvd will not enable the EGG archive parser in affected versions. We will be publishing a release candidate for version 0.103.0 in the next couple of weeks. Stay tuned! -- Joel Esler Manager, Communities Division Cisco Talos Intelligence Group http://www.talosintelligence.com | https://www.snort.org _______________________________________________ clamav-announce mailing list clamav-announce@lists.clamav.net https://lists.clamav.net/mailman/listinfo/clamav-announce http://www.clamav.net/contact.html#ml ----- End forwarded message ----- -- Member - Liberal International This is doctor@@nl2k.ab.ca Ici doctor@@nl2k.ab.ca Yahweh, Queen & country!Never Satan President Republic!Beware AntiChrist rising! https://www.empire.kred/ROOTNK?t=94a1f39b We were not instructed to succumb to the world. -unknown