<html>
<head>
<base href="https://bugzilla.rosalinux.ru/">
</head>
<body><table border="1" cellspacing="0" cellpadding="8">
<tr>
<th>Platform</th>
<td>2021.1
</td>
</tr>
<tr>
<th>Bug ID</th>
<td><a class="bz_bug_link
bz_status_CONFIRMED "
title="CONFIRMED - [CVE 21] clamav 0.103.3 CVEs found"
href="https://bugzilla.rosalinux.ru/show_bug.cgi?id=13505">13505</a>
</td>
</tr>
<tr>
<th>Summary</th>
<td>[CVE 21] clamav 0.103.3 CVEs found
</td>
</tr>
<tr>
<th>Classification</th>
<td>ROSA-based products
</td>
</tr>
<tr>
<th>Product</th>
<td>ROSA Fresh
</td>
</tr>
<tr>
<th>Version</th>
<td>All
</td>
</tr>
<tr>
<th>Hardware</th>
<td>All
</td>
</tr>
<tr>
<th>URL</th>
<td>CVE-2022-20698, CVE-2022-20785,
</td>
</tr>
<tr>
<th>OS</th>
<td>Linux
</td>
</tr>
<tr>
<th>Status</th>
<td>CONFIRMED
</td>
</tr>
<tr>
<th>Severity</th>
<td>normal
</td>
</tr>
<tr>
<th>Priority</th>
<td>Normal
</td>
</tr>
<tr>
<th>Component</th>
<td>System (kernel, glibc, systemd, bash, PAM...)
</td>
</tr>
<tr>
<th>Assignee</th>
<td>bugs@lists.rosalinux.ru
</td>
</tr>
<tr>
<th>Reporter</th>
<td>y.tumanov@rosalinux.ru
</td>
</tr>
<tr>
<th>QA Contact</th>
<td>bugs@lists.rosalinux.ru
</td>
</tr>
<tr>
<th>CC</th>
<td>e.kosachev@rosalinux.ru, s.matveev@rosalinux.ru, y.tumanov@rosalinux.ru
</td>
</tr>
<tr>
<th>Target Milestone</th>
<td>---
</td>
</tr>
<tr>
<th>Flags</th>
<td>secteam_verified?
</td>
</tr></table>
<p>
<div>
<pre>Please patch CVEs for package clamav version 0.103.3
INFO (CVEs are): clamav 0.103.3
cves found
CVE-2022-20698
Desc: A vulnerability in the OOXML parsing module in Clam AntiVirus (ClamAV)
Software version 0.104.1 and LTS version 0.103.4 and prior versions could allow
an unauthenticated, remote attacker to cause a denial of service condition on
an affected device. The vulnerability is due to improper checks that may result
in an invalid pointer read. An attacker could exploit this vulnerability by
sending a crafted OOXML file to an affected device. An exploit could allow the
attacker to cause the ClamAV scanning process to crash, resulting in a denial
of service condition.
Link: <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-20698">https://nvd.nist.gov/vuln/detail/CVE-2022-20698</a>
Severity: HIGH
CVE-2022-20785
Desc: On April 20, 2022, the following vulnerability in the ClamAV scanning
library versions 0.103.5 and earlier and 0.104.2 and earlier was disclosed: A
vulnerability in HTML file parser of Clam AntiVirus (ClamAV) versions 0.104.0
through 0.104.2 and LTS version 0.103.5 and prior versions could allow an
unauthenticated, remote attacker to cause a denial of service condition on an
affected device. For a description of this vulnerability, see the ClamAV blog.
This advisory will be updated as additional information becomes available.
Link: <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-20785">https://nvd.nist.gov/vuln/detail/CVE-2022-20785</a>
Severity: HIGH</pre>
</div>
</p>
<hr>
<span>You are receiving this mail because:</span>
<ul>
<li>You are the QA Contact for the bug.</li>
<li>You are the assignee for the bug.</li>
</ul>
</body>
</html>