> 
> https://blog.clamav.net/2019/03/clamav-01012-and-01003-patches-have.html 
> <https://blog.clamav.net/2019/03/clamav-01012-and-01003-patches-have.html>
> 
> ClamAV 0.101.2 and 0.100.3 patches have been released!
> 
> ClamAV 0.101.2
> 
> ClamAV 0.101.2 is a patch release to address a handful of security related 
> bugs.
> 
> This patch release is being released alongside the 0.100.3 patch so that users
> who are unable to upgrade to 0.101 due to libclamav API changes are protected.
> 
> This release includes 3 extra security related bug fixes that do not apply to
> prior versions.  In addition, it includes a number of minor bug fixes and
> improvements.
> 
> - Fixes for the following vulnerabilities affecting 0.101.1 and prior:
>   - CVE-2019-1787 
> <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1787>:
>     An out-of-bounds heap read condition may occur when scanning PDF
>     documents. The defect is a failure to correctly keep track of the number
>     of bytes remaining in a buffer when indexing file data.
>   - CVE-2019-1789 
> <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1789>:
>     An out-of-bounds heap read condition may occur when scanning PE files
>     (i.e. Windows EXE and DLL files) that have been packed using Aspack as a
>     result of inadequate bound-checking.
>   - CVE-2019-1788 
> <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1788>:
>     An out-of-bounds heap write condition may occur when scanning OLE2 files
>     such as Microsoft Office 97-2003 documents. The invalid write happens when
>     an invalid pointer is mistakenly used to initialize a 32bit integer to
>     zero. This is likely to crash the application.
> 
> - Fixes for the following vulnerabilities affecting 0.101.1 and 0.101.0 only:
>   - CVE-2019-1786 
> <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1786>:
>     An out-of-bounds heap read condition may occur when scanning malformed PDF
>     documents as a result of improper bounds-checking.
>   - CVE-2019-1785 
> <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1785>:
>     A path-traversal write condition may occur as a result of improper input
>     validation when scanning RAR archives. Issue reported by aCaB.
>   - CVE-2019-1798 
> <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1798>:
>     A use-after-free condition may occur as a result of improper error
>     handling when scanning nested RAR archives. Issue reported by David L.
> 
> - Fixes for the following assorted bugs:
>   - Added checks to prevent shifts from causing undefined behavior in HTML
>     normalizer, UPX unpacker, ARJ extractor, CPIO extractor, OLE2 parser,
>     LZW decompressor used in the PDF parser, Xz decompressor, and UTF-16 to
>     ASCII transcoder.
>   - Added checks to prevent integer overflow in UPX unpacker.
>   - Fix for minor memory leak in OLE2 parser.
>   - Fix to speed up PDF parser when handling truncated (or malformed) PDFs.
>   - Fix for memory leak in ARJ decoder failure condition.
>   - Fix for potential memory and file descriptor leak in HTML normalization 
> code.
> 
> - Removed use of problematic feature that converted file descriptors to
>   file paths. The feature was intended to improve performance when scanning
>   file types, notably RAR archives, for which the API requires a file path.
>   This feature caused issues in environments where the ClamAV engine is run
>   in a low-permissions or sandboxed process. RAR archives are still supported
>   with this change, but performance may suffer slightly if the file path is 
> not
>   provided in calls to `cl_scandesc_callback()`.
>   - Added filename and tempfile names to scandesc calls in clamd.
>   - Added general scan option `CL_SCAN_GENERAL_UNPRIVILEGED` to treat the scan
>     engine as unprivileged, meaning that the scan engine will not have read
>     access to the file. Provided file paths are for logging purposes only.
>   - Added ability to create a temp file when scanning RAR archives when the
>     process does not have read access to the file path provided (i.e.
>     unprivileged is set, or an access check fails).
> 
> Thank you to the Google OSS-Fuzz project for identifying and reporting many of
> the bugs patched in this release.
> 
> Additional thanks to the following community members for submitting bug 
> reports:
> 
> - aCaB
> - David L.
> 
> ClamAV 0.100.3
> 
> ClamAV 0.100.3 is a patch release to address a few security related bugs.
> 
> This patch release is being released alongside the 0.101.2 patch so that users
> who are unable to upgrade to 0.101 due to libclamav API changes are protected.
> 
> The bug fixes in this release are limited to security-related bugs only.
> Users are encouraged to upgrade to 0.101.2 for additional improvements.
> 
> - Fixes for the following vulnerabilities:
>   - CVE-2019-1787 
> <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1787>:
>     An out-of-bounds heap read condition may occur when scanning PDF
>     documents. The defect is a failure to correctly keep track of the number
>     of bytes remaining in a buffer when indexing file data.
>   - CVE-2019-1789 
> <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1789>:
>     An out-of-bounds heap read condition may occur when scanning PE files
>     (i.e. Windows EXE and DLL files) that have been packed using Aspack as a
>     result of inadequate bound-checking.
>   - CVE-2019-1788 
> <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1788>:
>     An out-of-bounds heap write condition may occur when scanning OLE2 files
>     such as Microsoft Office 97-2003 documents. The invalid write happens when
>     an invalid pointer is mistakenly used to initialize a 32bit integer to
>     zero. This is likely to crash the application.
> 
> Thank you to the Google OSS-Fuzz project for identifying and reporting the 
> bugs
> patched in this release.
> 
> Both of these can be found on ClamAV's downloads site 
> <http://www.clamav.net/downloads>, with 0.101.2 as the main release and 
> 0.100.3 under "Previous Stable Releases"  

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________

clamav-users mailing list
clamav-users@lists.clamav.net
https://lists.clamav.net/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to