SUSE Security Update: Security update for clamav
______________________________________________________________________________

Announcement ID:    SUSE-SU-2019:3053-1
Rating:             moderate
References:         #1144504 #1149458 #1151839 
Cross-References:   CVE-2019-12625 CVE-2019-12900
Affected Products:
                    SUSE Linux Enterprise Module for Basesystem 15-SP1
                    SUSE Linux Enterprise Module for Basesystem 15
______________________________________________________________________________

   An update that solves two vulnerabilities and has one
   errata is now available.

Description:

   This update for clamav fixes the following issues:

   Security issue fixed:

   - CVE-2019-12625: Fixed a ZIP bomb issue by adding detection and
     heuristics for zips with overlapping files (bsc#1144504).
   - CVE-2019-12900: Fixed an out-of-bounds write in decompress.c with many
     selectors (bsc#1149458).

   Non-security issues fixed:

   - Added the --max-scantime clamscan option and MaxScanTime clamd
     configuration option (bsc#1144504).
   - Increased the startup timeout of clamd to 5 minutes to cater for the
     grown virus database as a workaround until clamd has learned to talk to
     systemd to extend the timeout as long as needed (bsc#1151839).


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Module for Basesystem 15-SP1:

      zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP1-2019-3053=1

   - SUSE Linux Enterprise Module for Basesystem 15:

      zypper in -t patch SUSE-SLE-Module-Basesystem-15-2019-3053=1



Package List:

   - SUSE Linux Enterprise Module for Basesystem 15-SP1 (aarch64 ppc64le s390x x86_64):

      clamav-0.100.3-3.14.1
      clamav-debuginfo-0.100.3-3.14.1
      clamav-debugsource-0.100.3-3.14.1
      clamav-devel-0.100.3-3.14.1
      libclamav7-0.100.3-3.14.1
      libclamav7-debuginfo-0.100.3-3.14.1
      libclammspack0-0.100.3-3.14.1
      libclammspack0-debuginfo-0.100.3-3.14.1

   - SUSE Linux Enterprise Module for Basesystem 15 (aarch64 ppc64le s390x x86_64):

      clamav-0.100.3-3.14.1
      clamav-debuginfo-0.100.3-3.14.1
      clamav-debugsource-0.100.3-3.14.1
      clamav-devel-0.100.3-3.14.1
      libclamav7-0.100.3-3.14.1
      libclamav7-debuginfo-0.100.3-3.14.1
      libclammspack0-0.100.3-3.14.1
      libclammspack0-debuginfo-0.100.3-3.14.1


References:

   https://www.suse.com/security/cve/CVE-2019-12625.html
   https://www.suse.com/security/cve/CVE-2019-12900.html
   https://bugzilla.suse.com/1144504
   https://bugzilla.suse.com/1149458
   https://bugzilla.suse.com/1151839

_______________________________________________
sle-security-updates mailing list
sle-security-updates@lists.suse.com
http://lists.suse.com/mailman/listinfo/sle-security-updates

SUSE: 2019:3053-1 moderate: clamav

November 25, 2019
An update that solves two vulnerabilities and has one errata is now available

Summary

This update for clamav fixes the following issues: Security issue fixed: - CVE-2019-12625: Fixed a ZIP bomb issue by adding detection and heuristics for zips with overlapping files (bsc#1144504). - CVE-2019-12900: Fixed an out-of-bounds write in decompress.c with many selectors (bsc#1149458). Non-security issues fixed: - Added the --max-scantime clamscan option and MaxScanTime clamd configuration option (bsc#1144504). - Increased the startup timeout of clamd to 5 minutes to cater for the grown virus database as a workaround until clamd has learned to talk to systemd to extend the timeout as long as needed (bsc#1151839). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Module for Basesystem 15-SP1: zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP1-2019-3053=1 - SUSE Linux Enterprise Module for Basesystem 15: zypper in -t patch SUSE-SLE-Module-Basesystem-15-2019-3053=1 Package List: - SUSE Linux Enterprise Module for Basesystem 15-SP1 (aarch64 ppc64le s390x x86_64): clamav-0.100.3-3.14.1 clamav-debuginfo-0.100.3-3.14.1 clamav-debugsource-0.100.3-3.14.1 clamav-devel-0.100.3-3.14.1 libclamav7-0.100.3-3.14.1 libclamav7-debuginfo-0.100.3-3.14.1 libclammspack0-0.100.3-3.14.1 libclammspack0-debuginfo-0.100.3-3.14.1 - SUSE Linux Enterprise Module for Basesystem 15 (aarch64 ppc64le s390x x86_64): clamav-0.100.3-3.14.1 clamav-debuginfo-0.100.3-3.14.1 clamav-debugsource-0.100.3-3.14.1 clamav-devel-0.100.3-3.14.1 libclamav7-0.100.3-3.14.1 libclamav7-debuginfo-0.100.3-3.14.1 libclammspack0-0.100.3-3.14.1 libclammspack0-debuginfo-0.100.3-3.14.1

References

#1144504 #1149458 #1151839

Cross- CVE-2019-12625 CVE-2019-12900

Affected Products:

SUSE Linux Enterprise Module for Basesystem 15-SP1

SUSE Linux Enterprise Module for Basesystem 15

https://www.suse.com/security/cve/CVE-2019-12625.html

https://www.suse.com/security/cve/CVE-2019-12900.html

https://bugzilla.suse.com/1144504

https://bugzilla.suse.com/1149458

https://bugzilla.suse.com/1151839

Severity
Announcement ID: SUSE-SU-2019:3053-1
Rating: moderate

Related News