Path to this page:
./
security/clamav,
Anti-virus toolkit
Branch: pkgsrc-2022Q1,
Version: 0.103.6,
Package name: clamav-0.103.6,
Maintainer: pkgsrc-usersClam AntiVirus is an anti-virus toolkit written from scratch. It is licensed
under GNU GPL2 and uses the virus database from OpenAntiVirus, which is an
another free anti-virus project. In contrast to OpenAntiVirus (which is written
in Java), Clam AntiVirus is written entirely in C and its database is KEPT UP
TO DATE. It also detects polymorphic viruses as well.
DEINSTALL [+/-]# $NetBSD: DEINSTALL,v 1.1.1.1 2010/12/24 07:11:05 kefren Exp $
case ${STAGE} in
DEINSTALL)
# Unconditionally remove the virus databases when deinstalling.
${RM} -f @CLAMAV_DBDIR@/daily.cvd
${RM} -f @CLAMAV_DBDIR@/main.cvd
;;
esac
Master sites:
Filesize: 16105.235 KB
Version history: (Expand)
- (2022-05-09) Updated to version: clamav-0.103.6
- (2022-03-31) Package added to pkgsrc.se, version clamav-0.103.5 (created)
CVS history: (Expand)
2022-05-08 17:28:34 by Benny Siegert | Files touched by this commit (3) | |
Log message:
Pullup ticket #6625 - requested by taca
security/clamav: security fix
Revisions pulled up:
- security/clamav/Makefile 1.84
- security/clamav/Makefile.common 1.23
- security/clamav/buildlink3.mk 1.16
- security/clamav/distinfo 1.42
---
Module Name: pkgsrc
Committed By: taca
Date: Thu May 5 00:44:07 UTC 2022
Modified Files:
pkgsrc/security/clamav: Makefile Makefile.common buildlink3.mk distinfo
Log message:
security/clamav: update to 0.103.6
0.103.6 (2022-05-04)
ClamAV 0.103.6 is a critical patch release with the following fixes:
- [CVE-2022-20770](CVE-2022-20770): Fixed a possible infinite loop vulner=
ability
in the CHM file parser.
Issue affects versions 0.104.0 through 0.104.2 and LTS version 0.103.5 =
and
prior versions.
Thank you to Micha=A9=A9 Dardas for reporting this issue.
- [CVE-2022-20796](CVE-2022-20796): Fixed a possible NULL-pointer derefer=
ence
crash in the scan verdict cache check.
Issue affects versions 0.103.4, 0.103.5, 0.104.1, and 0.104.2.
Thank you to Alexander Patrakov and Antoine Gatineau for reporting this=
issue.
- [CVE-2022-20771](CVE-2022-20771): Fixed a possible infinite loop vulner=
ability
in the TIFF file parser.
Issue affects versions 0.104.0 through 0.104.2 and LTS version 0.103.5 =
and
prior versions.
The issue only occurs if the "--alert-broken-media" ClamScan option is
enabled. For ClamD, the affected option is "AlertBrokenMedia \
yes", and =
for
libclamav it is the "CL_SCAN_HEURISTIC_BROKEN_MEDIA" scan option.
Thank you to Micha=A9=A9 Dardas for reporting this issue.
- [CVE-2022-20785](CVE-2022-20785): Fixed a possible memory leak in the
HTML file parser / Javascript normalizer.
Issue affects versions 0.104.0 through 0.104.2 and LTS version 0.103.5 =
and
prior versions.
Thank you to Micha=A9=A9 Dardas for reporting this issue.
- [CVE-2022-20792](CVE-2022-20792): Fixed a possible multi-byte heap buff=
er
overflow write vulnerability in the signature database load module.
The fix was to update the vendored regex library to the latest version.
Issue affects versions 0.104.0 through 0.104.2 and LTS version 0.103.5 =
and
prior versions.
Thank you to Micha=A9=A9 Dardas for reporting this issue.
- ClamOnAcc: Fixed a number of assorted stability issues and added niceti=
es for
debugging ClamOnAcc. Patches courtesy of Frank Fegert.
- Fixed an issue causing byte-compare subsignatures to cause an alert whe=
n they
match even if other conditions of the given logical signatures were not=
met.
- Fix memleak when using multiple byte-compare subsignatures.
This fix was backported from 0.104.0.
Thank you to Andrea De Pasquale for contributing the fix.
- Assorted bug fixes and improvements.
Special thanks to the following people for code contributions and bug rep=
orts:
- Alexander Patrakov
- Andrea De Pasquale
- Antoine Gatineau
- Frank Fegert
- Micha=A9=A9 Dardas
|