MGASA-2020-0226 - Updated clamav packages fix security vulnerabilities

Publication date: 24 May 2020
URL: https://advisories.mageia.org/MGASA-2020-0226.html
Type: security
Affected Mageia releases: 7
CVE: CVE-2020-3327,
     CVE-2020-3341

Updated clamav packages fix security vulnerabilities:

Fixed a vulnerability in the ARJ archive-parsing module in ClamAV 0.102.2
that could cause a denial-of-service condition. Improper bounds checking
of an unsigned variable results in an out-of-bounds read which causes a
crash. Special thanks to Daehui Chang and Fady Othman for helping identify
the ARJ parsing vulnerability (CVE-2020-3327).

Fixed a vulnerability in the PDF-parsing module in ClamAV 0.101 - 0.102.2
that could cause a denial-of-service condition. Improper size checking of
a buffer used to initialize AES decryption routines results in an
out-of-bounds read, which may cause a crash. OSS-Fuzz discovered this
vulnerability (CVE-2020-3341)

References:
- https://bugs.mageia.org/show_bug.cgi?id=26653
- https://blog.clamav.net/2020/05/clamav-01023-security-patch-released.html
- https://www.debian.org/lts/security/2020/dla-2215
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3327
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3341

SRPMS:
- 7/core/clamav-0.102.3-1.mga7

Mageia 2020-0226: clamav security update

Updated clamav packages fix security vulnerabilities: Fixed a vulnerability in the ARJ archive-parsing module in ClamAV 0.102.2 that could cause a denial-of-service condition

Summary

Updated clamav packages fix security vulnerabilities:
Fixed a vulnerability in the ARJ archive-parsing module in ClamAV 0.102.2 that could cause a denial-of-service condition. Improper bounds checking of an unsigned variable results in an out-of-bounds read which causes a crash. Special thanks to Daehui Chang and Fady Othman for helping identify the ARJ parsing vulnerability (CVE-2020-3327).
Fixed a vulnerability in the PDF-parsing module in ClamAV 0.101 - 0.102.2 that could cause a denial-of-service condition. Improper size checking of a buffer used to initialize AES decryption routines results in an out-of-bounds read, which may cause a crash. OSS-Fuzz discovered this vulnerability (CVE-2020-3341)

References

- https://bugs.mageia.org/show_bug.cgi?id=26653

- https://blog.clamav.net/2020/05/clamav-01023-security-patch-released.html

- https://www.debian.org/lts/security/2020/dla-2215

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3327

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3341

Resolution

MGASA-2020-0226 - Updated clamav packages fix security vulnerabilities

SRPMS

- 7/core/clamav-0.102.3-1.mga7

Severity
Publication date: 24 May 2020
URL: https://advisories.mageia.org/MGASA-2020-0226.html
Type: security
CVE: CVE-2020-3327, CVE-2020-3341

Related News