From nobody Tue Sep 10 03:58:14 2024 X-Original-To: dev-commits-ports-main@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4X2qgC3W8Bz5WXTm; Tue, 10 Sep 2024 03:58:15 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R11" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4X2qgC0gHDz4wJC; Tue, 10 Sep 2024 03:58:15 +0000 (UTC) (envelope-from git@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1725940695; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=xzJnCsfp+k4+mrJCQnsVXAjNw0T1bfDFzy+9KFOntJg=; b=YYNfO/mWqNuGVFJG9scIVyB7fxLrnnlci2QP+Euajq67atTZoddBvBi7SKHfLAeiUjeEZJ 0G3GEe0EhUAQAdqTb6QtPKRwdxvVsnkkJ7lizYtQDjeaKPLvdu0XLqmq43M1d8Szxz+17R Z0L10atek46UXfPps/HwfWUkf70Q3ynt7xKm0gIVggRBx3vr8U/B+Wp6vumvMTKLpFvDEk cptJ7XVMd4JoemJQGFygSCQ9T0jzMn8G8FsuLRODDC2xu2l04VkLKGi5AZaq5DuPIBeO1h ZvBYMeC8HmUEEqxHg5wcQsQDf4Ye470pY3n2iun9bq8kGvLMBmqbnfHdyG/VKw== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1725940695; a=rsa-sha256; cv=none; b=D9e70kjRWi8cHinLMNc7HMjGPFjs2Bztzk+SD69bMXktMkME6Uei/zQ1ECWQjxVfFsdDjt 87Wjo4fBhktjKIvejh/1QVKM2gIx04EIyYrbeVyrZq4lIAnVW2YNBn2PYh6l3IAZju1pSf QqXM6xGrlFqzluHv7sfikL1X8f7W/RURkY8kWuCQl89eXt0iYBr02PxwgXSvMiZsc9XJcf +p09PcqW3vdmSH8bRhEr0ldc52I99EGezAvugr+3oqjAizxiwL3teIqPvv9tzQV5nSR5xq vmcKo7haFis85eGemc/hxqaERExhGMfPF+Z+vSyeZQ0STUEdaYXQXbxQQNNHrA== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1725940695; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=xzJnCsfp+k4+mrJCQnsVXAjNw0T1bfDFzy+9KFOntJg=; b=aaViOEDxTliG35cqsIzGMwIEemzc8Yhc6eaoYvLHi4vkeKbfUoDJ1j1u5ADzOR+bUwAngP oQ5BdoO7/fVuzSZ6O5aFz/qgZpI2XRFBgqe4Bm8jHuI0WH3H6ARAGIIKgInF4+23Mtts6h GdxShVhBLbJt1dW7QZJs3rkLNQi4nCGP5PuBT90hiUqAlsSMQdBLDFCqAc8qMYXxWcANop XD/oUbEYRVohH4vGVG4Ch48eZQxBHnjuLj0mYS6Iu4NeeXVU2BlFVOVnnQ5OCZxo7n9fJS eqhP+0jITVxFv+fD8Rlb8KMSoQRjsjlzbV6KwRAM5yN+DSMjfp4xyGlYEuOxBA== Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4X2qgC0H3YzX9M; Tue, 10 Sep 2024 03:58:15 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.18.1/8.18.1) with ESMTP id 48A3wEiC053796; Tue, 10 Sep 2024 03:58:14 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.18.1/8.18.1/Submit) id 48A3wEsm053793; Tue, 10 Sep 2024 03:58:14 GMT (envelope-from git) Date: Tue, 10 Sep 2024 03:58:14 GMT Message-Id: <202409100358.48A3wEsm053793@gitrepo.freebsd.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org From: Yasuhiro Kimura Subject: git: b689d061639d - main - security/vuxml: Document multiple vulnerabilities in ClamAV List-Id: Commits to the main branch of the FreeBSD ports repository List-Archive: https://lists.freebsd.org/archives/dev-commits-ports-main List-Help: List-Post: List-Subscribe: List-Unsubscribe: X-BeenThere: dev-commits-ports-main@freebsd.org Sender: owner-dev-commits-ports-main@FreeBSD.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: yasu X-Git-Repository: ports X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: b689d061639db8480e916ee7872c67f4141bef79 Auto-Submitted: auto-generated The branch main has been updated by yasu: URL: https://cgit.FreeBSD.org/ports/commit/?id=b689d061639db8480e916ee7872c67f4141bef79 commit b689d061639db8480e916ee7872c67f4141bef79 Author: Yasuhiro Kimura AuthorDate: 2024-09-09 22:31:20 +0000 Commit: Yasuhiro Kimura CommitDate: 2024-09-10 03:57:15 +0000 security/vuxml: Document multiple vulnerabilities in ClamAV --- security/vuxml/vuln/2024.xml | 60 ++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 60 insertions(+) diff --git a/security/vuxml/vuln/2024.xml b/security/vuxml/vuln/2024.xml index 14bbfcb956f0..571820f6d037 100644 --- a/security/vuxml/vuln/2024.xml +++ b/security/vuxml/vuln/2024.xml @@ -1,3 +1,63 @@ + + clamav -- Multiple vulnerabilities + + + clamav + 1.3.0,11.3.2,1 + 1.4.0,11.4.1,1 + + + clamav-lts + 1.0.0,11.0.6,1 + + + + +

The ClamAV project reports:

+
+
+
CVE-2024-20505
+
+ A vulnerability in the PDF parsing module of Clam + AntiVirus (ClamAV) could allow an unauthenticated, + remote attacker to cause a denial of service (DoS) + condition on an affected device. The vulnerability is + due to an out of bounds read. An attacker could exploit + this vulnerability by submitting a crafted PDF file to + be scanned by ClamAV on an affected device. An exploit + could allow the attacker to terminate the scanning + process. +
+
CVE-2024-20506
+
+ A vulnerability in the ClamD service module of Clam + AntiVirus (ClamAV) could allow an authenticated, local + attacker to corrupt critical system files. The + vulnerability is due to allowing the ClamD process to + write to its log file while privileged without checking + if the logfile has been replaced with a symbolic + link. An attacker could exploit this vulnerability if + they replace the ClamD log file with a symlink to a + critical system file and then find a way to restart the + ClamD process. An exploit could allow the attacker to + corrupt a critical system file by appending ClamD log + messages after restart. +
+
+
+ +
+ + CVE-2024-20505 + CVE-2024-20506 + https://blog.clamav.net/2024/09/clamav-141-132-107-and-010312-security.html + + + 2024-09-04 + 2024-09-09 + +
+ netatalk3 -- multiple WolfSSL vulnerabilities