Lines 58-63
Link Here
|
58 |
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.) |
58 |
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.) |
59 |
--> |
59 |
--> |
60 |
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> |
60 |
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> |
|
|
61 |
<vuln vid="f7a02651-c798-11ea-81d6-6805cabe6ebb"> |
62 |
<topic>clamav -- multiple vulnerabilities</topic> |
63 |
<affects> |
64 |
<package> |
65 |
<name>clamav</name> |
66 |
<range><lt>0.102.4,1</lt></range> |
67 |
</package> |
68 |
</affects> |
69 |
<description> |
70 |
<body xmlns="http://www.w3.org/1999/xhtml"> |
71 |
<p>Micah Snyder reports:</p> |
72 |
<blockquote cite="https://blog.clamav.net/2020/07/clamav-01024-security-patch-released.html"> |
73 |
<dl> |
74 |
<dt>CVE-2020-3350</dt> |
75 |
<dd> |
76 |
Fixed a vulnerability a malicious user could exploit to replace |
77 |
a scan target's directory with a symlink to another path to trick |
78 |
clamscan, clamdscan, or clamonacc into removing or moving a different |
79 |
file (such as a critical system file). The issue would affect users |
80 |
that use the --move or --remove options for clamscan, clamdscan and |
81 |
clamonacc. |
82 |
</dd> |
83 |
<dt>CVE-2020-3327</dt> |
84 |
<dd> |
85 |
Fixed a vulnerability in the ARJ archive-parsing module in ClamAV |
86 |
0.102.3 that could cause a denial-of-service (DoS) condition. |
87 |
Improper bounds checking resulted in an out-of-bounds read that could |
88 |
cause a crash. The previous fix for this CVE in version 0.102.3 was |
89 |
incomplete. This fix correctly resolves the issue. |
90 |
</dd> |
91 |
<dt>CVE-2020-3481</dt> |
92 |
<dd> |
93 |
Fixed a vulnerability in the EGG archive module in ClamAV 0.102.0 |
94 |
- 0.102.3 that could cause a denial-of-service (DoS) condition. |
95 |
Improper error handling could cause a crash due to a NULL pointer |
96 |
dereference. This vulnerability is mitigated for those using the |
97 |
official ClamAV signature databases because the file type signatures |
98 |
in daily.cvd will not enable the EGG archive parser in affected |
99 |
versions. |
100 |
</dd> |
101 |
</dl> |
102 |
</blockquote> |
103 |
</body> |
104 |
</description> |
105 |
<references> |
106 |
<url>https://blog.clamav.net/2020/07/clamav-01024-security-patch-released.html</url> |
107 |
<cvename>CVE-2020-3350</cvename> |
108 |
<cvename>CVE-2020-3327</cvename> |
109 |
<cvename>CVE-2020-3481</cvename> |
110 |
</references> |
111 |
<dates> |
112 |
<discovery>2020-07-16</discovery> |
113 |
<entry>2020-07-16</entry> |
114 |
</dates> |
115 |
</vuln> |
116 |
|
61 |
<vuln vid="870d59b0-c6c4-11ea-8015-e09467587c17"> |
117 |
<vuln vid="870d59b0-c6c4-11ea-8015-e09467587c17"> |
62 |
<topic>chromium -- multiple vulnerabilities</topic> |
118 |
<topic>chromium -- multiple vulnerabilities</topic> |
63 |
<affects> |
119 |
<affects> |