Date: Fri, 17 Jul 2020 05:44:10 +0000 (UTC) From: Kurt Jaeger <pi@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r542407 - head/security/vuxml Message-ID: <202007170544.06H5iAjQ022782@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: pi Date: Fri Jul 17 05:44:10 2020 New Revision: 542407 URL: https://svnweb.freebsd.org/changeset/ports/542407 Log: security/vuxml: Document multiple vulnerabilities in clamav - CVE-2020-3350, CVE-2020-3327, CVE-2020-3481 PR: 248027 Submitted by: Yasuhiro KIMURA <yasu@utahime.org> Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Fri Jul 17 05:40:38 2020 (r542406) +++ head/security/vuxml/vuln.xml Fri Jul 17 05:44:10 2020 (r542407) @@ -58,9 +58,65 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="f7a02651-c798-11ea-81d6-6805cabe6ebb"> + <topic>clamav -- multiple vulnerabilities</topic> + <affects> + <package> + <name>clamav</name> + <range><lt>0.102.4,1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Micah Snyder reports:</p> + <blockquote cite="https://blog.clamav.net/2020/07/clamav-01024-security-patch-released.html"> + <dl> + <dt>CVE-2020-3350</dt> + <dd> + Fixed a vulnerability a malicious user could exploit to replace + a scan target's directory with a symlink to another path to trick + clamscan, clamdscan, or clamonacc into removing or moving a different + file (such as a critical system file). The issue would affect users + that use the --move or --remove options for clamscan, clamdscan and + clamonacc. + </dd> + <dt>CVE-2020-3327</dt> + <dd> + Fixed a vulnerability in the ARJ archive-parsing module in ClamAV + 0.102.3 that could cause a denial-of-service (DoS) condition. + Improper bounds checking resulted in an out-of-bounds read that could + cause a crash. The previous fix for this CVE in version 0.102.3 was + incomplete. This fix correctly resolves the issue. + </dd> + <dt>CVE-2020-3481</dt> + <dd> + Fixed a vulnerability in the EGG archive module in ClamAV 0.102.0 + - 0.102.3 that could cause a denial-of-service (DoS) condition. + Improper error handling could cause a crash due to a NULL pointer + dereference. This vulnerability is mitigated for those using the + official ClamAV signature databases because the file type signatures + in daily.cvd will not enable the EGG archive parser in affected + versions. + </dd> + </dl> + </blockquote> + </body> + </description> + <references> + <url>https://blog.clamav.net/2020/07/clamav-01024-security-patch-released.html</url> + <cvename>CVE-2020-3350</cvename> + <cvename>CVE-2020-3327</cvename> + <cvename>CVE-2020-3481</cvename> + </references> + <dates> + <discovery>2020-07-16</discovery> + <entry>2020-07-16</entry> + </dates> + </vuln> + <vuln vid="714e6c35-c75b-11ea-aa29-d74973d1f9f3"> <topic>OpenEXR/ilmbase 2.5.2 -- patch release with various bug/security fixes</topic> - <affects> + <affects> <package> <name>ilmbase</name> <range><lt>2.5.2</lt></range>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202007170544.06H5iAjQ022782>