Revisions of clamav

buildservice-autocommit accepted request 750886 from Lars Vogdt's avatar Lars Vogdt (lrupp) (revision 194)
baserev update by copy to link target
Lars Vogdt's avatar Lars Vogdt (lrupp) accepted request 750749 from Arjen de Korte's avatar Arjen de Korte (adkorte) (revision 193)
- update to 0.102.1
  * CVE-2019-15961: A Denial-of-Service (DoS) vulnerability may
    occur when scanning a specially crafted email file as a result
    of excessively long scan times. The issue is resolved by
    implementing several maximums in parsing MIME messages and by
    optimizing use of memory allocation.
  * Build system fixes to build clamav-milter, to correctly link
    with libxml2 when detected, and to correctly detect fanotify
    for on-access scanning feature support.
  * Signature load time is significantly reduced by changing to a
    more efficient algorithm for loading signature patterns and
    allocating the AC trie. Patch courtesy of Alberto Wu.
  * Introduced a new configure option to statically link libjson-c
    with libclamav. Static linking with libjson is highly
    recommended to prevent crashes in applications that use
    libclamav alongside another JSON parsing library.
  * Null-dereference fix in email parser when using the
    --gen-json metadata option.
  * Fixes for Authenticode parsing and certificate signature
    (.crb database) bugs.
- dropped clamav-fix_building_milter.patch (upstreamed)
- update to 0.102.0
  * The On-Access Scanning feature has been migrated out of clamd
    and into a brand new utility named clamonacc. This utility is
    similar to clamdscan and clamav-milter in that it acts as a
    client to clamd. This separation from clamd means that clamd no
    longer needs to run with root privileges while scanning potentially
    malicious files. Instead, clamd may drop privileges to run under an
    account that does not have super-user. In addition to improving the
    security posture of running clamd with On-Access enabled, this
    update fixed a few outstanding defects:
    - On-Access scanning for created and moved files (Extra-Scanning)
      is fixed.
    - VirusEvent for On-Access scans is fixed.
    - With clamonacc, it is now possible to copy, move, or remove a
      file if the scan triggered an alert, just like with clamdscan.
  * The freshclam database update utility has undergone a significant
    update. This includes:
    - Added support for HTTPS.
    - Support for database mirrors hosted on ports other than 80.
    - Removal of the mirror management feature (mirrors.dat).
    - An all new libfreshclam library API.
- created new subpackage libfreshclam2
- dropped clamav-max_patch.patch (upstreamed)
- added clamav-fix_building_milter.patch to fix build of milter
buildservice-autocommit accepted request 742982 from Reinhard Max's avatar Reinhard Max (rmax) (revision 192)
baserev update by copy to link target
Reinhard Max's avatar Reinhard Max (rmax) committed (revision 191)
- bsc#1151839: Increase the startup timeout of clamd to 5 minutes
  to cater for the grown virus database as a workaround until
  clamd has learned to talk to systemd to extend the timeout as
  long as needed.
buildservice-autocommit accepted request 729457 from Marcus Meissner's avatar Marcus Meissner (msmeissn) (revision 190)
baserev update by copy to link target
Marcus Meissner's avatar Marcus Meissner (msmeissn) accepted request 728340 from Andreas Stieger's avatar Andreas Stieger (AndreasStieger) (revision 189)
- update to 0.101.4:
* CVE-2019-12900: An out of bounds write in the NSIS bzip2
(boo#1149458)
* CVE-2019-12625: Introduce a configurable time limit to mitigate
zip bomb vulnerability completely. Default is 2 minutes,
configurable useing the clamscan --max-scantime and for clamd
using the MaxScanTime` config option (boo#1144504)
buildservice-autocommit accepted request 721852 from Reinhard Max's avatar Reinhard Max (rmax) (revision 188)
baserev update by copy to link target
Reinhard Max's avatar Reinhard Max (rmax) committed (revision 187)
- Update to version 0.101.3:
  * bsc#1144504: ZIP bomb causes extreme CPU spikes
buildservice-autocommit accepted request 689824 from Reinhard Max's avatar Reinhard Max (rmax) (revision 186)
baserev update by copy to link target
Reinhard Max's avatar Reinhard Max (rmax) committed (revision 185)
silently adopt sr#689821.
Reinhard Max's avatar Reinhard Max (rmax) committed (revision 184)
  * CVE-2019-1786:
    An out-of-bounds heap read condition may occur when scanning malformed
    PDF documents as a result of improper bounds-checking.
  * CVE-2019-1785:
    A path-traversal write condition may occur as a result of improper
    input validation when scanning RAR archives.
  * CVE-2019-1798:
    A use-after-free condition may occur as a result of improper error
    handling when scanning nested RAR archives.
  * Add missing headers to fix build of packages against libclamav.
Marcus Meissner's avatar Marcus Meissner (msmeissn) committed (revision 183)
- dropped clamav-freshclam-exit.patch
Marcus Meissner's avatar Marcus Meissner (msmeissn) committed (revision 182)
- Update to version 0.101.2 (bsc#1130721)
Marcus Meissner's avatar Marcus Meissner (msmeissn) accepted request 689169 from Andrey Karepin's avatar Andrey Karepin (EGDFree) (revision 181)
- Update to version 0.101.2
  * CVE-2019-1787:
    An out-of-bounds heap read condition may occur when scanning PDF
    documents. The defect is a failure to correctly keep track of the number
    of bytes remaining in a buffer when indexing file data.
  * CVE-2019-1789:
    An out-of-bounds heap read condition may occur when scanning PE files
    (i.e. Windows EXE and DLL files) that have been packed using Aspack as a
    result of inadequate bound-checking.
  * CVE-2019-1788:
    An out-of-bounds heap write condition may occur when scanning OLE2 files
    such as Microsoft Office 97-2003 documents. The invalid write happens when
    an invalid pointer is mistakenly used to initialize a 32bit integer to
    zero. This is likely to crash the application.
- added clamav-max_patch.patch to fix build
Reinhard Max's avatar Reinhard Max (rmax) committed (revision 180)
- Update to version 0.101.1:
  * more details will be added later
- Add missing include for str.h to libclamav/others_common.c
  (clamav-str-h.patch)
buildservice-autocommit accepted request 639958 from Reinhard Max's avatar Reinhard Max (rmax) (revision 179)
baserev update by copy to link target
Reinhard Max's avatar Reinhard Max (rmax) committed (revision 178)
whitespace
Reinhard Max's avatar Reinhard Max (rmax) committed (revision 177)
- Update to version 0.100.2:
  * bsc#1110723, CVE-2018-15378: Vulnerability in ClamAV's MEW
    unpacking feature that could allow an unauthenticated, remote
    attacker to cause a denial of service (DoS) condition on an
    affected device.
  * bsc#1103040, CVE-2018-14680, CVE-2018-14681, CVE-2018-14682:
    more fixes for embedded libmspack.
  * Make freshclam more robust against lagging signature mirrors.
  * On-Access "Extra Scanning", an opt-in minor feature of
    OnAccess scanning on Linux systems, has been disabled due to a
    known issue with resource cleanup OnAccessExtraScanning will
    be re-enabled in a future release when the issue is
    resolved. In the mean-time, users who enabled the feature in
    clamd.conf will see a warning informing them that the feature
    is not active. For details, see:
    https://bugzilla.clamav.net/show_bug.cgi?id=12048
- Restore exit code compatibility of freshclam with versions before
  0.100.0 when the virus database is already up to date
  (bsc#1104457, clamav-freshclam-exit.patch).
buildservice-autocommit accepted request 626690 from Reinhard Max's avatar Reinhard Max (rmax) (revision 176)
baserev update by copy to link target
Reinhard Max's avatar Reinhard Max (rmax) committed (revision 175)
- Unclutter the spec file.
Displaying revisions 61 - 80 of 254
openSUSE Build Service is sponsored by