Security update for clamav
SUSE Security Update: Security update for clamav
clamav was updated to version 0.98.6 to fix four security issues.
These security issues have been fixed:
* CVE-2015-1462: ClamAV allowed remote attackers to have unspecified
impact via a crafted upx packer file, related to a heap out of
bounds condition (bnc#916214).
* CVE-2015-1463: ClamAV allowed remote attackers to cause a denial of
service (crash) via a crafted petite packer file, related to an
incorrect compiler optimization (bnc#916215).
* CVE-2014-9328: ClamAV allowed remote attackers to have unspecified
impact via a crafted upack packer file, related to a heap out of
bounds condition (bnc#915512).
* CVE-2015-1461: ClamAV allowed remote attackers to have unspecified
impact via a crafted (1) Yoda's crypter or (2) mew packer file,
related to a heap out of bounds condition (bnc#916217).
Security Issues:
* CVE-2015-1462
* CVE-2014-9328
* CVE-2015-1463
* CVE-2015-1461
Announcement ID: | SUSE-SU-2015:0298-1 |
Rating: | important |
References: | #915512 #916214 #916215 #916217 |
Affected Products: |
An update that fixes four vulnerabilities is now available. It includes one version update.
Description:
clamav was updated to version 0.98.6 to fix four security issues.
These security issues have been fixed:
* CVE-2015-1462: ClamAV allowed remote attackers to have unspecified
impact via a crafted upx packer file, related to a heap out of
bounds condition (bnc#916214).
* CVE-2015-1463: ClamAV allowed remote attackers to cause a denial of
service (crash) via a crafted petite packer file, related to an
incorrect compiler optimization (bnc#916215).
* CVE-2014-9328: ClamAV allowed remote attackers to have unspecified
impact via a crafted upack packer file, related to a heap out of
bounds condition (bnc#915512).
* CVE-2015-1461: ClamAV allowed remote attackers to have unspecified
impact via a crafted (1) Yoda's crypter or (2) mew packer file,
related to a heap out of bounds condition (bnc#916217).
Security Issues:
* CVE-2015-1462
* CVE-2014-9328
* CVE-2015-1463
* CVE-2015-1461
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 11 SP3 for VMware:
zypper in -t patch slessp3-clamav=10283
- SUSE Linux Enterprise Server 11 SP3:
zypper in -t patch slessp3-clamav=10283
- SUSE Linux Enterprise Server 11 SP2 LTSS:
zypper in -t patch slessp2-clamav=10285
- SUSE Linux Enterprise Server 11 SP1 LTSS:
zypper in -t patch slessp1-clamav=10284
- SUSE Linux Enterprise Desktop 11 SP3:
zypper in -t patch sledsp3-clamav=10283
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64) [New Version: 0.98.6]:
- clamav-0.98.6-0.6.1
- SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64) [New Version: 0.98.6]:
- clamav-0.98.6-0.6.1
- SUSE Linux Enterprise Server 11 SP2 LTSS (i586 s390x x86_64) [New Version: 0.98.6]:
- clamav-0.98.6-0.6.1
- SUSE Linux Enterprise Server 11 SP1 LTSS (i586 s390x x86_64) [New Version: 0.98.6]:
- clamav-0.98.6-0.6.1
- SUSE Linux Enterprise Server 10 SP4 LTSS (i586 s390x x86_64) [New Version: 0.98.6]:
- clamav-0.98.6-0.8.1
- SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64) [New Version: 0.98.6]:
- clamav-0.98.6-0.6.1
References:
- http://support.novell.com/security/cve/CVE-2014-9328.html
- http://support.novell.com/security/cve/CVE-2015-1461.html
- http://support.novell.com/security/cve/CVE-2015-1462.html
- http://support.novell.com/security/cve/CVE-2015-1463.html
- https://bugzilla.suse.com/915512
- https://bugzilla.suse.com/916214
- https://bugzilla.suse.com/916215
- https://bugzilla.suse.com/916217
- http://download.suse.com/patch/finder/?keywords=2f44be276ad7a4e53a81812520e256c5
- http://download.suse.com/patch/finder/?keywords=b856018fc4dcd95c039167b1ea1c6e5d
- http://download.suse.com/patch/finder/?keywords=b857e6f07106efda6eeb4c842640e58f
- http://download.suse.com/patch/finder/?keywords=cabd1033f09ef394f7aad5c3fbd890a1