Linux repositories inspector

libclammspack0-debuginfo - Debug information for package libclammspack0

This package provides debug information for package libclammspack0. Debug information is useful when developing applications that use this package or when debugging this package.
0.100.3
OpenSUSE iconOpenSUSE Leap 15.0
OpenSUSE iconOpenSUSE Leap 15.1
0.100.2
OpenSUSE iconOpenSUSE Leap 15.0
0.100.1
OpenSUSE iconOpenSUSE Leap 15.0
0.100.0
OpenSUSE iconOpenSUSE Leap 15.0
DistributionVersionSincePackageInstalledPackager
OpenSUSE iconOpenSUSE Leap 15.0 debug/ossrpm0.100.0-lp150.1.1Jan 17108 kiB240 kiBhttps://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 15.0 debug/update/ossrpm0.100.3-lp150.2.10.1Jun 17111 kiB240 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 15.0 debug/update/ossrpm0.100.2-lp150.2.6.1Jan 18110 kiB240 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 15.0 debug/update/ossrpm0.100.1-lp150.2.3.1Jan 18109 kiB240 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 15.1 debug/ossrpm0.100.3-lp151.1.1Apr 0988.6 kiB240 kiBhttps://bugs.opensuse.org

Latest updates

OpenSUSE Leap 15.0 icon

OpenSUSE Leap 15.0 debug/update/oss: Updated from 0.100.2-lp150.2.6.1 to 0.100.3-lp150.2.10.1

Jun 17
  • Update to version 0.100.3 (bsc#1130721):
    • CVE-2019-1787: An out-of-bounds heap read condition may occur when scanning PDF documents. The defect is a failure to correctly keep track of the number of bytes remaining in a buffer when indexing file data.
    • CVE-2019-1789: An out-of-bounds heap read condition may occur when scanning PE files (i.e. Windows EXE and DLL files) that have been packed using Aspack as a result of inadequate bound-checking.
    • CVE-2019-1788: An out-of-bounds heap write condition may occur when scanning OLE2 files such as Microsoft Office 97-2003 documents. The invalid write happens when an invalid pointer is mistakenly used to initialize a 32bit integer to zero. This is likely to crash the application.
OpenSUSE Tumbleweed icon

OpenSUSE Tumbleweed debug/oss: Version 0.100.2-1.3 removed

Apr 09
OpenSUSE Leap 15.1 icon

OpenSUSE Leap 15.1 debug/oss: Updated from 0.100.2-lp151.1.2 to 0.100.3-lp151.1.1

Apr 09
  • Update to version 0.100.3 (bsc#1130721):
    • CVE-2019-1787: An out-of-bounds heap read condition may occur when scanning PDF documents. The defect is a failure to correctly keep track of the number of bytes remaining in a buffer when indexing file data.
    • CVE-2019-1789: An out-of-bounds heap read condition may occur when scanning PE files (i.e. Windows EXE and DLL files) that have been packed using Aspack as a result of inadequate bound-checking.
    • CVE-2019-1788: An out-of-bounds heap write condition may occur when scanning OLE2 files such as Microsoft Office 97-2003 documents. The invalid write happens when an invalid pointer is mistakenly used to initialize a 32bit integer to zero. This is likely to crash the application.
OpenSUSE Leap 15.0 icon

OpenSUSE Leap 15.0 debug/update/oss: Version 0.100.2-lp150.2.6.1 reintroduced

Mar 24
  • Update to version 0.100.2:
    • bsc#1110723, CVE-2018-15378: Vulnerability in ClamAV's MEW unpacking feature that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
    • bsc#1103040, CVE-2018-14680, CVE-2018-14681, CVE-2018-14682: more fixes for embedded libmspack.
    • Make freshclam more robust against lagging signature mirrors.
    • On-Access "Extra Scanning", an opt-in minor feature of OnAccess scanning on Linux systems, has been disabled due to a known issue with resource cleanup OnAccessExtraScanning will be re-enabled in a future release when the issue is resolved. In the mean-time, users who enabled the feature in clamd.conf will see a warning informing them that the feature is not active. For details, see:
      https://bugzilla.clamav.net/show_bug.cgi?id=12048
  • Restore exit code compatibility of freshclam with versions before
    1. 100.0 when the virus database is already up to date
    (bsc#1104457, clamav-freshclam-exit.patch).
OpenSUSE Leap 15.0 icon

OpenSUSE Leap 15.0 debug/update/oss: Version 0.100.1-lp150.2.3.1 reintroduced

Mar 24
  • Disable YARA support for licensing reasons (bsc#1101654). clamav-disable-yara.patch
OpenSUSE Leap 15.0 icon

OpenSUSE Leap 15.0 debug/update/oss: Version 0.100.2-lp150.2.6.1 removed

Mar 22
OpenSUSE Leap 15.0 icon

OpenSUSE Leap 15.0 debug/update/oss: Version 0.100.1-lp150.2.3.1 removed

Mar 22
OpenSUSE Tumbleweed icon

OpenSUSE Tumbleweed debug/oss: Updated from 0.100.2-1.2 to 0.100.2-1.3

Feb 03
  • Update to version 0.100.2:
    • bsc#1110723, CVE-2018-15378: Vulnerability in ClamAV's MEW unpacking feature that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
    • bsc#1103040, CVE-2018-14680, CVE-2018-14681, CVE-2018-14682: more fixes for embedded libmspack.
    • Make freshclam more robust against lagging signature mirrors.
    • On-Access "Extra Scanning", an opt-in minor feature of OnAccess scanning on Linux systems, has been disabled due to a known issue with resource cleanup OnAccessExtraScanning will be re-enabled in a future release when the issue is resolved. In the mean-time, users who enabled the feature in clamd.conf will see a warning informing them that the feature is not active. For details, see:
      https://bugzilla.clamav.net/show_bug.cgi?id=12048
  • Restore exit code compatibility of freshclam with versions before
    1. 100.0 when the virus database is already up to date
    (bsc#1104457, clamav-freshclam-exit.patch).
OpenSUSE Leap 15.1 icon

OpenSUSE Leap 15.1 debug/oss: Version 0.100.2-lp151.1.2 introduced

Jan 23
  • Update to version 0.100.2:
    • bsc#1110723, CVE-2018-15378: Vulnerability in ClamAV's MEW unpacking feature that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
    • bsc#1103040, CVE-2018-14680, CVE-2018-14681, CVE-2018-14682: more fixes for embedded libmspack.
    • Make freshclam more robust against lagging signature mirrors.
    • On-Access "Extra Scanning", an opt-in minor feature of OnAccess scanning on Linux systems, has been disabled due to a known issue with resource cleanup OnAccessExtraScanning will be re-enabled in a future release when the issue is resolved. In the mean-time, users who enabled the feature in clamd.conf will see a warning informing them that the feature is not active. For details, see:
      https://bugzilla.clamav.net/show_bug.cgi?id=12048
  • Restore exit code compatibility of freshclam with versions before
    1. 100.0 when the virus database is already up to date
    (bsc#1104457, clamav-freshclam-exit.patch).
OpenSUSE Leap 15.0 icon

OpenSUSE Leap 15.0 debug/update/oss: Updated from 0.100.1-lp150.2.3.1 to 0.100.2-lp150.2.6.1

Jan 18
  • Update to version 0.100.2:
    • bsc#1110723, CVE-2018-15378: Vulnerability in ClamAV's MEW unpacking feature that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
    • bsc#1103040, CVE-2018-14680, CVE-2018-14681, CVE-2018-14682: more fixes for embedded libmspack.
    • Make freshclam more robust against lagging signature mirrors.
    • On-Access "Extra Scanning", an opt-in minor feature of OnAccess scanning on Linux systems, has been disabled due to a known issue with resource cleanup OnAccessExtraScanning will be re-enabled in a future release when the issue is resolved. In the mean-time, users who enabled the feature in clamd.conf will see a warning informing them that the feature is not active. For details, see:
      https://bugzilla.clamav.net/show_bug.cgi?id=12048
  • Restore exit code compatibility of freshclam with versions before
    1. 100.0 when the virus database is already up to date
    (bsc#1104457, clamav-freshclam-exit.patch).
OpenSUSE Leap 15.0 icon

OpenSUSE Leap 15.0 debug/update/oss: Version 0.100.1-lp150.2.3.1 introduced

Jan 18
  • Disable YARA support for licensing reasons (bsc#1101654). clamav-disable-yara.patch
OpenSUSE Leap 15.0 icon

OpenSUSE Leap 15.0 debug/oss: Version 0.100.0-lp150.1.1 introduced

Jan 17
  • Update to version 0.100.0 (bsc#1089502):
    • Add interfaces to the Prelude SIEM open source package for collecting ClamAV virus events.
    • Support libmspack internal code or as a shared object library. The internal library is the default and includes modifications to enable parsing of CAB files that do not entirely adhere to the CAB file format.
    • Link with OpenSSL 1.1.0.
    • Deprecate of the AllowSupplementaryGroups parameter statement in clamd, clamav-milter, and freshclam.
      Use of supplementary is now in effect by default.
    • Deprecate internal LLVM code support.
    • Compute and check PE import table hash (a.k.a. "imphash") signatures.
    • Support file property collection and analysis for MHTML files.
    • Raw scanning of PostScript files.
    • Fix clamsubmit to use the new virus and false positive submission web interface.
    • Optionally, flag files with the virus
      "Heuristic.Limits.Exceeded" when size limitations are exceeded.
    • Improved decoders for PDF files.
    • Reduced number of compile time warnings.
    • Improved support for C++11.
    • Improved detection of system installed libraries.
    • Fixes to ClamAV's Container system and the introduction of Intermediates for more descriptive signatures.
    • Improvements to clamd's On-Access scanning capabilities for Linux.
    • Obsoletes clamav-fix_newer_zlib.patch
  • Update key ring and add signature file.
  • Turn off LLVM for now, because the bundled copy is deprecated, the versions we have are too new and the performance gain over the byte code interpreter are negligable, according to upstream.
  • Move pkgconfig stuff from main to devel package.
  • Re-introduce removed options as deprecated, so that clamd and freshclam don't exit on startup with an old config file
    (clamav-obsolete-config.patch).
  • Put libclammspack0 into its own subpackage to follow the letter of the shlib packaging policy, even though it really makes no sense here.
OpenSUSE Tumbleweed icon

OpenSUSE Tumbleweed debug/oss: Version 0.100.2-1.2 introduced

Jan 17
  • Update to security release 0.99.3 (bsc#1077732)
    • CVE-2017-12376 (ClamAV Buffer Overflow in handle_pdfname Vulnerability)
    • CVE-2017-12377 (ClamAV Mew Packet Heap Overflow Vulnerability)
    • CVE-2017-12379 (ClamAV Buffer Overflow in messageAddArgument Vulnerability)
    • these vulnerabilities could have allowed an unauthenticated, remote attacker to cause a denial of service (DoS) condition or potentially execute arbitrary code on an affected device.
    • CVE-2017-12374 (ClamAV use-after-free Vulnerabilities)
    • CVE-2017-12375 (ClamAV Buffer Overflow Vulnerability)
    • CVE-2017-12378 (ClamAV Buffer Over Read Vulnerability)
    • CVE-2017-12380 (ClamAV Null Dereference Vulnerability)
    • these vulnerabilities could have allowed an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
    • CVE-2017-6420 (bsc#1052448)
    • this vulnerability allowed remote attackers to cause a denial of service (use-after-free) via a crafted PE file with WWPack compression.
    • CVE-2017-6419 (bsc#1052449)
    • ClamAV allowed remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted CHM file.
    • CVE-2017-11423 (bsc#1049423)
    • The cabd_read_string function in mspack/cabd.c in libmspack 0.5alpha allowed remote attackers to cause a denial of service
      (stack-based buffer over-read and application crash) via a crafted CAB file.
    • CVE-2017-6418 (bsc#1052466)
    • ClamAV 0.99.2 allowed remote attackers to cause a denial of service (out-of-bounds read) via a crafted e-mail message.
  • drop clamav-0.99.2-openssl-1.1.patch (upstream)

Related packages

libclammspack0 - ClamAV antivirus engine runtime
⇧ Top