Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 17 Jul 2020 05:44:10 +0000 (UTC)
From:      Kurt Jaeger <pi@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r542407 - head/security/vuxml
Message-ID:  <202007170544.06H5iAjQ022782@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: pi
Date: Fri Jul 17 05:44:10 2020
New Revision: 542407
URL: https://svnweb.freebsd.org/changeset/ports/542407

Log:
  security/vuxml: Document multiple vulnerabilities in clamav
  
  - CVE-2020-3350, CVE-2020-3327, CVE-2020-3481
  
  PR:		248027
  Submitted by:	Yasuhiro KIMURA <yasu@utahime.org>

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Fri Jul 17 05:40:38 2020	(r542406)
+++ head/security/vuxml/vuln.xml	Fri Jul 17 05:44:10 2020	(r542407)
@@ -58,9 +58,65 @@ Notes:
   * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="f7a02651-c798-11ea-81d6-6805cabe6ebb">
+    <topic>clamav -- multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>clamav</name>
+	<range><lt>0.102.4,1</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>Micah Snyder reports:</p>
+	<blockquote cite="https://blog.clamav.net/2020/07/clamav-01024-security-patch-released.html">;
+	  <dl>
+	    <dt>CVE-2020-3350</dt>
+	    <dd>
+	      Fixed a vulnerability a malicious user could exploit to replace
+	      a scan target's directory with a symlink to another path to trick
+	      clamscan, clamdscan, or clamonacc into removing or moving a different
+	      file (such as a critical system file). The issue would affect users
+	      that use the --move or --remove options for clamscan, clamdscan and
+	      clamonacc.
+	    </dd>
+	    <dt>CVE-2020-3327</dt>
+	    <dd>
+	      Fixed a vulnerability in the ARJ archive-parsing module in ClamAV
+	      0.102.3 that could cause a denial-of-service (DoS) condition.
+	      Improper bounds checking resulted in an out-of-bounds read that could
+	      cause a crash. The previous fix for this CVE in version 0.102.3 was
+	      incomplete. This fix correctly resolves the issue.
+	    </dd>
+	    <dt>CVE-2020-3481</dt>
+	    <dd>
+	      Fixed a vulnerability in the EGG archive module in ClamAV 0.102.0
+	      - 0.102.3 that could cause a denial-of-service (DoS) condition.
+	      Improper error handling could cause a crash due to a NULL pointer
+	      dereference. This vulnerability is mitigated for those using the
+	      official ClamAV signature databases because the file type signatures
+	      in daily.cvd will not enable the EGG archive parser in affected
+	      versions.
+	    </dd>
+	  </dl>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <url>https://blog.clamav.net/2020/07/clamav-01024-security-patch-released.html</url>;
+      <cvename>CVE-2020-3350</cvename>
+      <cvename>CVE-2020-3327</cvename>
+      <cvename>CVE-2020-3481</cvename>
+    </references>
+    <dates>
+      <discovery>2020-07-16</discovery>
+      <entry>2020-07-16</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="714e6c35-c75b-11ea-aa29-d74973d1f9f3">
     <topic>OpenEXR/ilmbase 2.5.2 -- patch release with various bug/security fixes</topic>
-    <affects>
+     <affects>
       <package>
 	<name>ilmbase</name>
 	<range><lt>2.5.2</lt></range>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202007170544.06H5iAjQ022782>