Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in clamav
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in clamav
ID: SUSE-SU-2018:3436-2
Distribution: SUSE
Plattformen: SUSE Linux Enterprise Server for SAP 12-SP1
Datum: So, 28. April 2019, 08:56
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14680
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14682
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15378
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14681
Applikationen: Clam Antivirus

Originalnachricht


SUSE Security Update: Security update for clamav
______________________________________________________________________________

Announcement ID: SUSE-SU-2018:3436-2
Rating: moderate
References: #1103040 #1104457 #1110723
Cross-References: CVE-2018-14680 CVE-2018-14681 CVE-2018-14682
CVE-2018-15378
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
______________________________________________________________________________

An update that fixes four vulnerabilities is now available.

Description:

This update for clamav fixes the following issues:

clamav was updated to version 0.100.2:

- CVE-2018-15378: Vulnerability in ClamAV's MEW unpacking feature that
could allow an unauthenticated, remote attacker to cause a denial of
service (DoS) condition on an affected device. (bsc#1110723)
- CVE-2018-14680, CVE-2018-14681, CVE-2018-14682: more fixes for embedded
libmspack. (bsc#1103040)

- Make freshclam more robust against lagging signature mirrors.
- On-Access "Extra Scanning", an opt-in minor feature of OnAccess
scanning
on Linux systems, has been disabled due to a known issue with resource
cleanup OnAccessExtraScanning will be re-enabled in a future release
when the issue is resolved. In the mean-time, users who enabled the
feature in clamd.conf will see a warning informing them that the feature
is not active. For details, see:
https://bugzilla.clamav.net/show_bug.cgi?id=12048

- Restore exit code compatibility of freshclam with versions before
0.100.0 when the virus database is already up to date (bsc#1104457).


Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- SUSE Linux Enterprise Server for SAP 12-SP1:

zypper in -t patch SUSE-SLE-SAP-12-SP1-2019-1071=1



Package List:

- SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):

clamav-0.100.2-33.18.1
clamav-debuginfo-0.100.2-33.18.1
clamav-debugsource-0.100.2-33.18.1


References:

https://www.suse.com/security/cve/CVE-2018-14680.html
https://www.suse.com/security/cve/CVE-2018-14681.html
https://www.suse.com/security/cve/CVE-2018-14682.html
https://www.suse.com/security/cve/CVE-2018-15378.html
https://bugzilla.suse.com/1103040
https://bugzilla.suse.com/1104457
https://bugzilla.suse.com/1110723

_______________________________________________
sle-security-updates mailing list
sle-security-updates@lists.suse.com
http://lists.suse.com/mailman/listinfo/sle-security-updates
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung