<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
	<title type="html"><![CDATA[HyperForum — [solved] ClamAV contains a remote code execution vulnerability]]></title>
	<link rel="self" href="https://forums.hyperbola.info/extern.php?action=feed&amp;tid=815&amp;type=atom" />
	<updated>2023-03-05T11:11:28Z</updated>
	<generator>PunBB</generator>
	<id>https://forums.hyperbola.info/viewtopic.php?id=815</id>
		<entry>
			<title type="html"><![CDATA[Re: [solved] ClamAV contains a remote code execution vulnerability]]></title>
			<link rel="alternate" href="https://forums.hyperbola.info/viewtopic.php?pid=5805#p5805" />
			<content type="html"><![CDATA[<p>Yes, absolutely. <img src="https://forums.hyperbola.info/img/smilies/smile.png" width="15" height="15" alt="smile" /></p>]]></content>
			<author>
				<name><![CDATA[throgh]]></name>
				<uri>https://forums.hyperbola.info/profile.php?id=347</uri>
			</author>
			<updated>2023-03-05T11:11:28Z</updated>
			<id>https://forums.hyperbola.info/viewtopic.php?pid=5805#p5805</id>
		</entry>
		<entry>
			<title type="html"><![CDATA[Re: [solved] ClamAV contains a remote code execution vulnerability]]></title>
			<link rel="alternate" href="https://forums.hyperbola.info/viewtopic.php?pid=5804#p5804" />
			<content type="html"><![CDATA[<p>Thanks. Will it be part of the current repos of just in the next release?</p>]]></content>
			<author>
				<name><![CDATA[aloniv]]></name>
				<uri>https://forums.hyperbola.info/profile.php?id=387</uri>
			</author>
			<updated>2023-03-05T08:32:31Z</updated>
			<id>https://forums.hyperbola.info/viewtopic.php?pid=5804#p5804</id>
		</entry>
		<entry>
			<title type="html"><![CDATA[Re: [solved] ClamAV contains a remote code execution vulnerability]]></title>
			<link rel="alternate" href="https://forums.hyperbola.info/viewtopic.php?pid=5794#p5794" />
			<content type="html"><![CDATA[<p>Fixed: <a href="https://git.hyperbola.info:50100/~team/packages/extra.git/commit/?h=throgh&amp;id=b61c956e7fc52886a367cbc55622af24157fce79">https://git.hyperbola.info:50100/~team/ … 24157fce79</a></p>]]></content>
			<author>
				<name><![CDATA[throgh]]></name>
				<uri>https://forums.hyperbola.info/profile.php?id=347</uri>
			</author>
			<updated>2023-03-03T11:10:07Z</updated>
			<id>https://forums.hyperbola.info/viewtopic.php?pid=5794#p5794</id>
		</entry>
		<entry>
			<title type="html"><![CDATA[Re: [solved] ClamAV contains a remote code execution vulnerability]]></title>
			<link rel="alternate" href="https://forums.hyperbola.info/viewtopic.php?pid=5738#p5738" />
			<content type="html"><![CDATA[<p>We cannot use this PKGBUILD as we need elementary mksource: Distributing the source with clamav contain non-free unrar violates our social contract and the FSDG itself. ClamAV will receive an update.</p>]]></content>
			<author>
				<name><![CDATA[throgh]]></name>
				<uri>https://forums.hyperbola.info/profile.php?id=347</uri>
			</author>
			<updated>2023-02-21T06:57:13Z</updated>
			<id>https://forums.hyperbola.info/viewtopic.php?pid=5738#p5738</id>
		</entry>
		<entry>
			<title type="html"><![CDATA[Re: [solved] ClamAV contains a remote code execution vulnerability]]></title>
			<link rel="alternate" href="https://forums.hyperbola.info/viewtopic.php?pid=5737#p5737" />
			<content type="html"><![CDATA[<p>Updated PKGBUILD (I removed mksource and copied the relevant part to prepare and to the list of sources)<br /></p><div class="codebox"><pre><code># Maintainer (Arch): Levente Polyak &lt;anthraxx[at]archlinux[dot]org&gt;
# Maintainer (Arch): Giancarlo Razzolini &lt;grazzolini@archlinux.org&gt;
# Contributor (Arch): Dale Blount &lt;dale@archlinux.org&gt;
# Contributor (Arch): Gregor Ibic &lt;gregor.ibic@intelicom.si&gt;
# Contributor (Arch): Gaetan Bisson &lt;bisson@archlinux.org&gt;
# Maintainer (Parabola): Omar Vega Ramos &lt;ovruni@gnu.org.pe&gt;
# Contributor (Parabola): Isaac David &lt;isacdaavid@at@isacdaavid@dot@info&gt;
# Contributor (Artix): artoo &lt;artoo@cromnix.org&gt;
# Maintainer: André Silva &lt;emulatorman@hyperbola.info&gt;
# Contributor: Tobias Dausend &lt;throgh@hyperbola.info&gt;

pkgname=clamav
pkgver=0.103.8
_debver=$pkgver
_debrel=0
pkgrel=1
pkgdesc=&#039;Anti-virus toolkit for Unix&#039;
url=&#039;https://www.clamav.net/&#039;
license=(&#039;GPL-2&#039; &#039;custom:bzip2&#039; &#039;zlib&#039; &#039;Simplified-BSD&#039; &#039;Modified-BSD&#039; &#039;Expat&#039; &#039;LGPL-2.1&#039; &#039;Apache-2.0&#039; &#039;custom:Apache-2.0+LLVM-Exceptions&#039; &#039;custom:Apache-2.0+YARA-Exceptions&#039;)
arch=(&#039;i686&#039; &#039;x86_64&#039;)
depends=(&#039;bzip2&#039; &#039;libltdl&#039; &#039;libxml2&#039; &#039;curl&#039; &#039;pcre2&#039; &#039;json-c&#039; &#039;libmspack&#039;)
makedepends=(&#039;libmilter&#039; &#039;quilt&#039;)
backup=(&#039;etc/clamav/clamd.conf&#039;
        &#039;etc/clamav/freshclam.conf&#039;
        &#039;etc/clamav/clamav-milter.conf&#039;
        &#039;etc/logrotate.d/clamav&#039;)
install=clamav.install
source=(&quot;https://www.clamav.net/downloads/production/${pkgname}-${pkgver}.tar.gz&quot;{,.sig}
        &quot;https://deb.debian.org/debian/pool/main/c/clamav/clamav_${_debver}+dfsg-${_debrel}+deb11u1.debian.tar.xz&quot;
        &quot;clamav-milter.conf&quot;
        &quot;clamav-milter.initd&quot;
        &quot;clamav-milter.run&quot;
        &quot;clamd.conf&quot;
        &quot;clamd.initd&quot;
        &quot;clamd.run&quot;
        &quot;freshclam.conf&quot;
        &quot;freshclam.initd&quot;
        &quot;freshclam.run&quot;
        &quot;clamav.logrotate&quot;)
sha512sums=(&#039;8e030fef5788cf4df8f4d878363df1e5d9abcaa209b9f998f57334ede481d755b33958b5e9bb82be9643cb7442814711e4c9978314cadd7eb9161fee03b74439&#039;
            &#039;SKIP&#039;
            &#039;721df9042117bb9878ef1a5a4f560b12bdc859d3775788699afc182013892ac2af75d9b5c2c38ee47e56e2355234a95ef4146cddccb89a5d5728665abc023b39&#039;
            &#039;5b4b411b813ed83507323e4a5c0033cb57024b28a20aeadbf7920cdb947cf22b076113890b1d428c1cc248e12531e4b1321e35afd53b74d7ef65affe7bd00856&#039;
            &#039;d45fe161088df88b887e11470c61bc785e8d5f0b6221e1a029f210a61501fe818166f579754ed0cc887ad9e2ffb580f44c9d8f0aed7b6b2302cb771d79e8c601&#039;
            &#039;aaffc1af5b54ea0448bb1f4c7371f3e18f58100ab4d03ba6f8637080a81400eb43b8dda06e83d5131c0b9628d9afa79db557f924a09dc7eb4ac43c2704fef296&#039;
            &#039;6b37da795e2167f43294d1919020037eeeab45fe02d2976bcfd02980ec124f8b25401bee8dcb87363a21626f96950e5d7913f9c6d09279a13ecd1f1da9046e6a&#039;
            &#039;8b1a8571bc1f5e8e81bc3a2c0223a60f7b8ac453ff58dc2b0474741664718cf5b9342fa2648417d937a656a8302aedd228134f22deb4653639d3ed8770e39af3&#039;
            &#039;c6082d4ce54e4080edbb03a292932daa9ad0cb954e60069deea2e66ca348d4db7a9c2170c88b52f386bd1f2c8386440e1cc0e892ead9a79f6a78286d216912e1&#039;
            &#039;5d8a65aa4e0b711b96103a29fdcd38d7438603257c3df424dfe9cc2cbfd94c4f07c45447808f6e6bf161e9f0b121d59d6423dab7ff889c9954576eac8760250b&#039;
            &#039;63352877dc4d17d427df9145ccd5d2992e6d11a551ee378e148635aa515fc1dfe3cea4acef85b9565a493cddce9cfa8adbce026b67abee67d2e6e3f7f87e3c31&#039;
            &#039;845534dbc2660e7ee14ef588936beb78be9ff663ba26bb9b099d7c9f57536ee11a4b4febde8a3b5f48c9ef2740ec3d075f5b2b070112a8a3e70df56f1f331d3e&#039;
            &#039;d64c5d714608ebe138dce10371c498f04153639c72f936d74ee8e1fe6f41f77a5e93560524f35b1e5d5a0d07ba133327ac0ae55661418f2e1251f8ae4bf71c06&#039;)
validpgpkeys=(&#039;E34DB95B374B31570496CD3F609B024F2B3EDD07&#039;  # Talos (Talos, Cisco Systems Inc.) &lt;research@sourcefire.com&gt;
              &#039;C92BAA713B8D53D3CAE63FC9E6974752F9704456&#039;) # André Silva


prepare() {
  cd &quot;${srcdir}/${pkgname}-${pkgver}&quot;
    
  # Remove nonfree unRAR utility files from the source
  rm -rv libclamunrar
  rm -v COPYING.unrar

  if [[ ${pkgver%.*} = ${_debver%.*} ]]; then
    # Debian patches
    export QUILT_PATCHES=debian/patches
    export QUILT_REFRESH_ARGS=&#039;-p ab --no-timestamps --no-index&#039;
    export QUILT_DIFF_ARGS=&#039;--no-timestamps&#039;

    mv &quot;$srcdir&quot;/debian .

    quilt push -av
  fi

  autoreconf -fiv
}

build() {
  cd &quot;${srcdir}/${pkgname}-${pkgver}&quot;

  # --disable-zlib-vcheck because the configure script thinks that
  # zlib 1.2.11 is older than 1.2.2
  ./configure \
    --prefix=/usr \
    --sysconfdir=/etc/clamav \
    --with-dbdir=/var/lib/clamav \
    --with-user=clamav \
    --with-group=clamav \
    --with-system-libmspack \
    --disable-rpath \
    --disable-clamav \
    --disable-llvm \
    --disable-unrar \
    --enable-zlib-vcheck \
    --enable-milter \
    --enable-clamdtop

  sed -i -e &#039;s/ -shared / -Wl,-O1,--as-needed\0/g&#039; libtool
  make
}

package() {
  cd &quot;${srcdir}/${pkgname}-${pkgver}&quot;
  make DESTDIR=&quot;${pkgdir}&quot; install

  install -Dm644 ${srcdir}/clamav-milter.conf &quot;${pkgdir}&quot;/etc/clamav/clamav-milter.conf
  install -Dm644 ${srcdir}/clamd.conf &quot;${pkgdir}&quot;/etc/clamav/clamd.conf
  install -Dm644 ${srcdir}/freshclam.conf &quot;${pkgdir}&quot;/etc/clamav/freshclam.conf
  for f in clamav-milter clamd freshclam; do
    install -Dm755 ${srcdir}/$f.initd &quot;${pkgdir}&quot;/etc/init.d/$f
  done
  install -Dm755 ${srcdir}/clamav-milter.run ${pkgdir}/etc/sv/clamav-milter/run
  install -Dm755 ${srcdir}/clamd.run ${pkgdir}/etc/sv/clamd/run
  install -Dm755 ${srcdir}/freshclam.run ${pkgdir}/etc/sv/freshclam/run
  install -Dm644 ${srcdir}/clamav.logrotate &quot;${pkgdir}&quot;/etc/logrotate.d/clamav

  install -d -o 64 -g 64 &quot;${pkgdir}&quot;/var/log/clamav
  install -d -o 64 -g 64 &quot;${pkgdir}&quot;/var/lib/clamav

  install -d -m755 &quot;${pkgdir}&quot;/usr/share/licenses/clamav
  install -m644 COPYING* &quot;${pkgdir}&quot;/usr/share/licenses/clamav
}</code></pre></div>]]></content>
			<author>
				<name><![CDATA[aloniv]]></name>
				<uri>https://forums.hyperbola.info/profile.php?id=387</uri>
			</author>
			<updated>2023-02-21T05:02:53Z</updated>
			<id>https://forums.hyperbola.info/viewtopic.php?pid=5737#p5737</id>
		</entry>
		<entry>
			<title type="html"><![CDATA[[solved] ClamAV contains a remote code execution vulnerability]]></title>
			<link rel="alternate" href="https://forums.hyperbola.info/viewtopic.php?pid=5736#p5736" />
			<content type="html"><![CDATA[<p><a href="https://blog.clamav.net/2023/02/clamav-01038-01052-and-101-patch.html">https://blog.clamav.net/2023/02/clamav- … patch.html</a></p><p>ClamAV 0.103.8 is a critical patch release with the following fixes:</p><p>&nbsp; &nbsp; CVE-2023-20032: Fixed a possible remote code execution vulnerability in the HFS+ file parser. The issue affects versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier. Thank you to Simon Scannell for reporting this issue.</p><p>&nbsp; &nbsp; CVE-2023-20052: Fixed a possible remote information leak vulnerability in the DMG file parser. The issue affects versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier. Thank you to Simon Scannell for reporting this issue.</p><p>&nbsp; &nbsp; Update the vendored libmspack library to version 0.11alpha.</p><p>&nbsp; &nbsp; &nbsp; &nbsp; GitHub pull request: <a href="https://github.com/Cisco-Talos/clamav/pull/830">https://github.com/Cisco-Talos/clamav/pull/830</a></p>]]></content>
			<author>
				<name><![CDATA[aloniv]]></name>
				<uri>https://forums.hyperbola.info/profile.php?id=387</uri>
			</author>
			<updated>2023-02-21T04:20:29Z</updated>
			<id>https://forums.hyperbola.info/viewtopic.php?pid=5736#p5736</id>
		</entry>
</feed>
