Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package clamav for openSUSE:Factory checked 
in at 2024-12-18 20:11:19
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/clamav (Old)
 and      /work/SRC/openSUSE:Factory/.clamav.new.29675 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "clamav"

Wed Dec 18 20:11:19 2024 rev:127 rq:1231926 version:1.4.1

Changes:
--------
--- /work/SRC/openSUSE:Factory/clamav/clamav.changes    2024-07-29 
21:53:49.180198578 +0200
+++ /work/SRC/openSUSE:Factory/.clamav.new.29675/clamav.changes 2024-12-18 
20:12:10.694396310 +0100
@@ -1,0 +2,48 @@
+Wed Dec 18 16:00:45 UTC 2024 - Andreas Stieger <andreas.stie...@gmx.de>
+
+- fix factory submission (clam.tcl, clamscan.log)
+
+-------------------------------------------------------------------
+Tue Sep 10 13:05:08 UTC 2024 - Reinhard Max <m...@suse.com>
+
+- New version 1.4.1:
+  * [CVE-2024-20506, bsc#1230162]: Changed the logging module to
+    disable following symlinks on Linux and Unix systems so as to
+    prevent an attacker with existing access to the 'clamd' or
+    'freshclam' services from using a symlink to corrupt system
+    files.
+  * [CVE-2024-20505, bsc#1230161]: Fixed a possible out-of-bounds
+    read bug in the PDF file parser that could cause a
+    denial-of-service (DoS) condition.
+  * https://blog.clamav.net/2024/09/clamav-141-132-107-and-010312-security.html
+
+- New version 1.4.0:
+  * Added support for extracting ALZ archives.
+  * Added support for extracting LHA/LZH archives.
+  * Added the ability to disable image fuzzy hashing, if needed.
+    For context, image fuzzy hashing is a detection mechanism
+    useful for identifying malware by matching images included with
+    the malware or phishing email/document.
+  * https://blog.clamav.net/2024/08/clamav-140-feature-release-and-clamav.html
+
+-------------------------------------------------------------------
+Wed Sep  4 19:29:48 UTC 2024 - Arjen de Korte <suse+bu...@de-korte.org>
+
+- New version 1.3.2:
+  * CVE-2024-20506: Changed the logging module to disable following
+    symlinks on Linux and Unix systems so as to prevent an attacker
+    with existing access to the 'clamd' or 'freshclam' services from
+    using a symlink to corrupt system files.
+  * CVE-2024-20505: Fixed a possible out-of-bounds read bug in the PDF
+    file parser that could cause a denial-of-service condition.
+  * Removed unused Python modules from freshclam tests including
+    deprecated 'cgi' module that is expected to cause test failures in
+    Python 3.13.
+  * Fix unit test caused by expiring signing certificate.
+  * Fixed a build issue on Windows with newer versions of Rust. Also
+    upgraded GitHub Actions imports to fix CI failures.
+  * Fixed an unaligned pointer dereference issue on select architectures.
+  * Fixes to Jenkins CI pipeline.
+- Remove upstreamed 1305.patch
+  
+-------------------------------------------------------------------

Old:
----
  1305.patch
  clamav-1.3.1.tar.gz
  clamav-1.3.1.tar.gz.sig

New:
----
  clamav-1.4.1.tar.gz
  clamav-1.4.1.tar.gz.sig

BETA DEBUG BEGIN:
  Old:  * Fixes to Jenkins CI pipeline.
- Remove upstreamed 1305.patch
  
BETA DEBUG END:

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ clamav.spec ++++++
--- /var/tmp/diff_new_pack.TukRuz/_old  2024-12-18 20:12:13.874528875 +0100
+++ /var/tmp/diff_new_pack.TukRuz/_new  2024-12-18 20:12:13.886529376 +0100
@@ -2,6 +2,7 @@
 # spec file for package clamav
 #
 # Copyright (c) 2024 SUSE LLC
+# Copyright (c) 2024 Andreas Stieger <andreas.stie...@gmx.de>
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -25,14 +26,14 @@
 %if 0%{?suse_version} <= 1500
 %define vgcc 13
 %if 0%{?sle_version} < 150400
-%define vrust 1.69
+%define vrust 1.78
 %define vcmake 3
 %endif
 %endif
 %global confdir %_prefix%_sysconfdir
 
 Name:           clamav
-Version:        1.3.1
+Version:        1.4.1
 Release:        0
 Summary:        Antivirus Toolkit
 License:        GPL-2.0-only
@@ -55,15 +56,12 @@
 Patch12:        clamav-fips.patch
 Patch14:        clamav-document-maxsize.patch
 Patch15:        clamav-format.patch
-Patch16:        https://github.com/Cisco-Talos/clamav/pull/1305.patch
 ExcludeArch:    %{arml}
 
 BuildRequires:  cargo%{?vrust}
 BuildRequires:  cmake%{?vcmake}
 BuildRequires:  gcc%{?vgcc}
 BuildRequires:  gcc%{?vgcc}-c++
-# temp for Patch16
-BuildRequires:  git-core
 BuildRequires:  libbz2-devel
 BuildRequires:  libjson-c-devel
 BuildRequires:  libopenssl-devel >= 1.0.2
@@ -187,7 +185,6 @@
 %patch -P 12
 %patch -P 14
 %patch -P 15
-git apply %{PATCH16}
 chmod -x docs/html/images/flamegraph.svg
 
 %build
@@ -209,6 +206,7 @@
     -DENABLE_CLAMONACC=ON \
     -DENABLE_MILTER=ON \
     -DSYSTEMD_UNIT_DIR=%{_unitdir} \
+    -DPCRE2_LIBRARY=%{_libdir}/libpcre2-8.so \
 %if %{without clammspack}
     -DENABLE_EXTERNAL_MSPACK=ON
 %endif

++++++ clamav-1.3.1.tar.gz -> clamav-1.4.1.tar.gz ++++++
/work/SRC/openSUSE:Factory/clamav/clamav-1.3.1.tar.gz 
/work/SRC/openSUSE:Factory/.clamav.new.29675/clamav-1.4.1.tar.gz differ: char 
5, line 1

++++++ clamav-conf.patch ++++++
--- /var/tmp/diff_new_pack.TukRuz/_old  2024-12-18 20:12:14.382550052 +0100
+++ /var/tmp/diff_new_pack.TukRuz/_new  2024-12-18 20:12:14.438552387 +0100
@@ -123,7 +123,7 @@
  
  # Stop daemon when libclamav reports out of memory condition.
  #ExitOnOOM yes
-@@ -708,7 +704,7 @@ Example
+@@ -727,7 +723,7 @@ Example
  # multiple OnAccessIncludePath directives but each directory must be added
  # in a separate line.
  # Default: disabled
@@ -132,7 +132,7 @@
  #OnAccessIncludePath /students
  
  # Set the exclude paths. All subdirectories are also excluded.
-@@ -778,7 +774,7 @@ Example
+@@ -797,7 +793,7 @@ Example
  # It has the same potential race condition limitations of the
  # OnAccessExcludeUID option.
  # Default: disabled
@@ -156,8 +156,8 @@
 -
  # Path to the database directory.
  # WARNING: It must match clamd.conf's directive!
- # Default: hardcoded (depends on installation options)
-@@ -52,12 +48,12 @@ Example
+ # WARNING: It must already exist, be an absolute path, be writeable by
+@@ -54,12 +50,12 @@ Example
  # It is recommended that the directory where this file is stored is
  # also owned by root to keep other users from tampering with it.
  # Default: disabled
@@ -172,7 +172,7 @@
  
  # Use DNS to verify virus database version. FreshClam uses DNS TXT records
  # to verify database and software versions. With this directive you can change
-@@ -148,7 +144,7 @@ DatabaseMirror database.clamav.net
+@@ -150,7 +146,7 @@ DatabaseMirror database.clamav.net
  
  # Send the RELOAD command to clamd.
  # Default: no

++++++ clamav-format.patch ++++++
--- /var/tmp/diff_new_pack.TukRuz/_old  2024-12-18 20:12:14.586558557 +0100
+++ /var/tmp/diff_new_pack.TukRuz/_new  2024-12-18 20:12:14.614559723 +0100
@@ -64,7 +64,7 @@
      }
 --- libclamav/pe.c.orig
 +++ libclamav/pe.c
-@@ -5185,12 +5185,12 @@ cl_error_t cli_peheader(fmap_t *map, str
+@@ -5117,12 +5117,12 @@ cl_error_t cli_peheader(fmap_t *map, str
  
                  /* If a section is truncated, adjust its size value */
                  if (!CLI_ISCONTAINED_0_TO(fsize, section->raw, section->rsz)) 
{
@@ -81,7 +81,7 @@
              }
 --- libfreshclam/libfreshclam_internal.c.orig
 +++ libfreshclam/libfreshclam_internal.c
-@@ -226,7 +226,7 @@ fc_error_t load_freshclam_dat(void)
+@@ -229,7 +229,7 @@ fc_error_t load_freshclam_dat(void)
              if (-1 == lseek(handle, strlen(MIRRORS_DAT_MAGIC), SEEK_SET)) {
                  char error_message[260];
                  cli_strerror(errno, error_message, 260);
@@ -92,7 +92,7 @@
  
 --- unit_tests/check_clamav.c.orig
 +++ unit_tests/check_clamav.c
-@@ -1939,7 +1939,7 @@ void diff_file_mem(int fd, const char *r
+@@ -1925,7 +1925,7 @@ void diff_file_mem(int fd, const char *r
  
      ck_assert_msg(!!buf, "unable to malloc buffer: %zu", len);
      p = read(fd, buf, len);
@@ -101,7 +101,7 @@
      p = 0;
      while (len > 0) {
          c1 = ref[p];
-@@ -1950,10 +1950,10 @@ void diff_file_mem(int fd, const char *r
+@@ -1936,10 +1936,10 @@ void diff_file_mem(int fd, const char *r
          len--;
      }
      if (len > 0)
@@ -114,7 +114,7 @@
      close(fd);
  }
  
-@@ -1969,7 +1969,7 @@ void diff_files(int fd, int ref_fd)
+@@ -1955,7 +1955,7 @@ void diff_files(int fd, int ref_fd)
  
      ck_assert_msg(lseek(ref_fd, 0, SEEK_SET) == 0, "lseek failed");
      nread = read(ref_fd, ref, siz);
@@ -154,7 +154,7 @@
      rc = memcmp(p, expect, expect_len);
 --- libclamav/others_common.c.orig
 +++ libclamav/others_common.c
-@@ -312,7 +312,7 @@ char *cli_strdup(const char *s)
+@@ -362,7 +362,7 @@ char *cli_safer_strdup(const char *s)
      }
  
      alloc = strdup(s);
@@ -162,5 +162,5 @@
 +    
      if (!alloc) {
          perror("strdup_problem");
-         cli_errmsg("cli_strdup(): Can't allocate memory (%u bytes).\n", 
(unsigned int)strlen(s));
+         cli_errmsg("cli_safer_strdup(): Can't allocate memory (%u bytes).\n", 
(unsigned int)strlen(s));
 

++++++ clamav-obsolete-config.patch ++++++
--- /var/tmp/diff_new_pack.TukRuz/_old  2024-12-18 20:12:14.746565226 +0100
+++ /var/tmp/diff_new_pack.TukRuz/_new  2024-12-18 20:12:14.774566393 +0100
@@ -1,6 +1,6 @@
 --- common/optparser.c.orig
 +++ common/optparser.c
-@@ -598,6 +598,13 @@ const struct clam_option __clam_options[
+@@ -602,6 +602,13 @@ const struct clam_option __clam_options[
      {"MailFollowURLs", "mail-follow-urls", 0, CLOPT_TYPE_BOOL, MATCH_BOOL, 
-1, NULL, 0, OPT_CLAMD | OPT_CLAMSCAN | OPT_DEPRECATED, "", ""},
      {"AllowSupplementaryGroups", NULL, 0, CLOPT_TYPE_BOOL, MATCH_BOOL, 0, 
NULL, 0, OPT_CLAMD | OPT_FRESHCLAM | OPT_MILTER | OPT_DEPRECATED, "Initialize a 
supplementary group access (the process must be started by root).", "no"},
      {"ScanOnAccess", NULL, 0, CLOPT_TYPE_BOOL, MATCH_BOOL, -1, NULL, 0, 
OPT_CLAMD | OPT_DEPRECATED, "", ""},

Reply via email to