Fedora EPEL 5 Security Update: clamav-0.98.7-1.el5

Resolved Bugs
1217014 – clamav-0.98.7 is available
1217206 – CVE-2015-2221: clamav Infinite loop condition on crafted y0da cryptor file
1217207 – CVE-2015-2222 clamav: crash on crafted petite packed file
1217208 – CVE-2015-2668 clamav: Infinite loop condition on a crafted “xz” archive file
1217209 – CVE-2015-2170: clamav: Crash in upx decoder with crafted file
1217514 – clamav: multiple issues fixed in 0.98.7 [epel-all]<br
ClamAV 0.98.7
=============
This release contains new scanning features and bug fixes.
– Improvements to PDF processing: decryption, escape sequence handling, and file property collection.
– Scanning/analysis of additional Microsoft Office 2003 XML format.
– Fix infinite loop condition on crafted y0da cryptor file. Identified and patch suggested by Sebastian Andrzej Siewior. CVE-2015-2221.
– Fix crash on crafted petite packed file. Reported and patch supplied by Sebastian Andrzej Siewior. CVE-2015-2222.
– Fix false negatives on files within iso9660 containers. This issue was reported by Minzhuan Gong.
– Fix a couple crashes on crafted upack packed file. Identified and patches supplied by Sebastian Andrzej Siewior.
– Fix a crash during algorithmic detection on crafted PE file. Identified and patch supplied by Sebastian Andrzej Siewior.
– Fix an infinite loop condition on a crafted “xz” archive file. This was reported by Dimitri Kirchner and Goulven Guiheux. CVE-2015-2668.
– Fix compilation error after ./configure –disable-pthreads. Reported and fix suggested by John E. Krokes.
– Apply upstream patch for possible heap overflow in Henry Spencer’s regex library. CVE-2015-2305.
– Fix crash in upx decoder with crafted file. Discovered and patch supplied by Sebastian Andrzej Siewior. CVE-2015-2170.
– Fix segfault scanning certain HTML files. Reported with sample by Kai Risku.
– Improve detections within xar/pkg files.

Fedora EPEL 6 Security Update: clamav-0.98.7-1.el6

Resolved Bugs
1217014 – clamav-0.98.7 is available
1217206 – CVE-2015-2221: clamav Infinite loop condition on crafted y0da cryptor file
1217207 – CVE-2015-2222 clamav: crash on crafted petite packed file
1217208 – CVE-2015-2668 clamav: Infinite loop condition on a crafted “xz” archive file
1217209 – CVE-2015-2170: clamav: Crash in upx decoder with crafted file
1217514 – clamav: multiple issues fixed in 0.98.7 [epel-all]<br
ClamAV 0.98.7
=============
This release contains new scanning features and bug fixes.
– Improvements to PDF processing: decryption, escape sequence handling, and file property collection.
– Scanning/analysis of additional Microsoft Office 2003 XML format.
– Fix infinite loop condition on crafted y0da cryptor file. Identified and patch suggested by Sebastian Andrzej Siewior. CVE-2015-2221.
– Fix crash on crafted petite packed file. Reported and patch supplied by Sebastian Andrzej Siewior. CVE-2015-2222.
– Fix false negatives on files within iso9660 containers. This issue was reported by Minzhuan Gong.
– Fix a couple crashes on crafted upack packed file. Identified and patches supplied by Sebastian Andrzej Siewior.
– Fix a crash during algorithmic detection on crafted PE file. Identified and patch supplied by Sebastian Andrzej Siewior.
– Fix an infinite loop condition on a crafted “xz” archive file. This was reported by Dimitri Kirchner and Goulven Guiheux. CVE-2015-2668.
– Fix compilation error after ./configure –disable-pthreads. Reported and fix suggested by John E. Krokes.
– Apply upstream patch for possible heap overflow in Henry Spencer’s regex library. CVE-2015-2305.
– Fix crash in upx decoder with crafted file. Discovered and patch supplied by Sebastian Andrzej Siewior. CVE-2015-2170.
– Fix segfault scanning certain HTML files. Reported with sample by Kai Risku.
– Improve detections within xar/pkg files.

Ubuntu Security Notice USN-2588-1

Ubuntu Security Notice 2588-1 – A stack overflow was discovered in the the microcode loader for the intel x86 platform. A local attacker could exploit this flaw to cause a denial of service (kernel crash) or to potentially execute code with kernel privileges. It was discovered that the Linux kernel’s IPv6 networking stack has a flaw that allows using route advertisement (RA) messages to set the ‘hop_limit’ to values that are too low. An unprivileged attacker on a local network could exploit this flaw to cause a denial of service (IPv6 messages dropped). Various other issues were also addressed.

Ubuntu Security Notice USN-2590-1

Ubuntu Security Notice 2590-1 – Jan Beulich discovered the Xen virtual machine subsystem of the Linux kernel did not properly restrict access to PCI command registers. A local guest user could exploit this flaw to cause a denial of service (host crash). A stack overflow was discovered in the the microcode loader for the intel x86 platform. A local attacker could exploit this flaw to cause a denial of service (kernel crash) or to potentially execute code with kernel privileges. Various other issues were also addressed.

Ubuntu Security Notice USN-2589-1

Ubuntu Security Notice 2589-1 – Jan Beulich discovered the Xen virtual machine subsystem of the Linux kernel did not properly restrict access to PCI command registers. A local guest user could exploit this flaw to cause a denial of service (host crash). A stack overflow was discovered in the the microcode loader for the intel x86 platform. A local attacker could exploit this flaw to cause a denial of service (kernel crash) or to potentially execute code with kernel privileges. Various other issues were also addressed.

Ubuntu Security Notice USN-2585-1

Ubuntu Security Notice 2585-1 – It was discovered that the Linux kernel’s IPv6 networking stack has a flaw that allows using route advertisement (RA) messages to set the ‘hop_limit’ to values that are too low. An unprivileged attacker on a local network could exploit this flaw to cause a denial of service (IPv6 messages dropped).

Ubuntu Security Notice USN-2591-1

Ubuntu Security Notice 2591-1 – Paras Sethia discovered that curl could incorrectly re-use NTLM HTTP credentials when subsequently connecting to the same host over HTTP. Hanno B=C3=B6ck discovered that curl incorrectly handled zero-length host names. If a user or automated system were tricked into using a specially crafted host name, an attacker could possibly use this issue to cause curl to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 14.10 and Ubuntu 15.04. Various other issues were also addressed.