USN-5423-2: ClamAV vulnerabilities
17 May 2022
Several security issues were fixed in ClamAV.
Releases
Packages
- clamav - Anti-virus utility for Unix
Details
USN-5423-1 fixed several vulnerabilities in ClamAV. This update provides
the corresponding update for Ubuntu 14.04 ESM and 16.04 ESM.
Original advisory details:
Michał Dardas discovered that ClamAV incorrectly handled parsing CHM files.
A remote attacker could possibly use this issue to cause ClamAV to stop
responding, resulting in a denial of service. (CVE-2022-20770)
Michał Dardas discovered that ClamAV incorrectly handled parsing TIFF
files. A remote attacker could possibly use this issue to cause ClamAV to
stop responding, resulting in a denial of service. (CVE-2022-20771)
Michał Dardas discovered that ClamAV incorrectly handled parsing HTML
files. A remote attacker could possibly use this issue to cause ClamAV to
consume resources, resulting in a denial of service. (CVE-2022-20785)
Michał Dardas discovered that ClamAV incorrectly handled loading the
signature database. A remote attacker could possibly use this issue to
cause ClamAV to crash, resulting in a denial of service, or possibly
execute arbitrary code. (CVE-2022-20792)
Alexander Patrakov and Antoine Gatineau discovered that ClamAV incorrectly
handled the scan verdict cache check. A remote attacker could possibly use
this issue to cause ClamAV to crash, resulting in a denial of service, or
possibly execute arbitrary code.(CVE-2022-20796)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04
-
clamav
-
0.103.6+dfsg-0ubuntu0.16.04.1+esm1
Available with Ubuntu Pro
Ubuntu 14.04
-
clamav
-
0.103.6+dfsg-0ubuntu0.14.04.1+esm1
Available with Ubuntu Pro
This update uses a new upstream release, which includes additional bug
fixes. In general, a standard system update will make all the necessary
changes.