From mboxrd@z Thu Jan 1 00:00:00 1970 From: Matthias Fischer To: development@lists.ipfire.org Subject: [PATCH] clamav: Update to 1.0.0 Date: Thu, 01 Dec 2022 21:01:39 +0100 Message-ID: <20221201200139.3521678-1-matthias.fischer@ipfire.org> MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="===============9214312550967099257==" List-Id: --===============9214312550967099257== Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable [Please note: This 'clamav' version needs rust >1.56] For details see: https://blog.clamav.net/2022/11/clamav-100-lts-released.html Excerpt: "Major changes Support for decrypting read-only OLE2-based XLS files that are encrypted = with the default password. Use of the default password will now appear in the metadata JSON. Overhauled the implementation of the all-match feature. The newer code is= more reliable and easier to maintain. This project fixed several known issues with signature detection in a= ll- match mode: Enabled embedded file-type recognition signatures to match when a= malware signature also matched in a scan of the same layer. Enabled bytecode signatures to run in all-match mode after a matc= h has occurred. Fixed an assortment of all-match edge case issues. Added multiple test cases to verify correct all-match behavior. Added a new callback to the public API for inspecting file content during= a scan at each layer of archive extraction. The new callback function type is=C2=A0clcb_file_inspection=C2=A0defi= ned in=C2=A0clamav.h. The function=C2=A0cl_engine_set_clcb_file_inspection()=C2=A0may be us= ed to enable the callback prior to performing a scan. This new callback is to be considered=C2=A0unstable=C2=A0for the 1.0 = release. We may alter this function in a subsequent feature version. Added a new function to the public API for unpacking CVD signature archiv= es. The new function is=C2=A0cl_cvdunpack(). The last parameter for the f= unction may be set to verify if a CVD's signature is valid before unpacking the CVD content to the destinatio= n directory. The option to build with an external TomsFastMath library has been remove= d. ClamAV requires non-default build options for TomsFastMath to support bigger floating point numbers. = Without this change, database and Windows EXE/DLL authenticode certificate validation may fail. The=C2=A0EN= ABLE_EXTERNAL_TOMSFASTMATH=C2=A0build is now ignored. Moved the Dockerfile and supporting scripts from the main ClamAV reposito= ry over to a new repository:=C2=A0https://github.com/Cisco-Talos/clamav-docker The separate repository will make it easier to update the images and fix = issues with images for released ClamAV versions. Any users building the ClamAV Docker image rather than pulling them from = Docker Hub will have to get the latest Docker files from the new location. Increased the SONAME major version for libclamav because of ABI changes b= etween the 0.103 LTS release and the 1.0 LTS release. Other improvements Add checks to limit PDF object extraction recursion. Increased the limit for memory allocations based on untrusted input and a= ltered the warning message when the limit is exceeded so that it is more helpful and less dramatic. Dramatically improved the build time of libclamav-Rust unit tests. The un= it test build is included in the time limit for the test itself and was timing out on slower systems. The = ClamAV Rust code modules now share the same build directory, which also reduces the amount of disk space use= d for the build. For Windows: The debugging symbol (PDB) files are now installed alongside= the DLL and LIB library files when built in "RelWithDebInfo" or "Debug" mode. Relaxed the constraints on the check for overlapping ZIP file entries so = as not to alert on slightly malformed, but non-malicious, Java (JAR) archives. Increased the time limit in FreshClam before warning if the DNS entry is = stale. In combination with changes to update the DNS entry more frequently, this should prevent false alarms= of failures in the database publication system. Docker: The C library header files are now included in the Docker image. = Patch courtesy of GitHub user TerminalFi. Show the BYTECODE_RUNTIME build options when using the=C2=A0ccmake=C2=A0G= UI for CMake. Patch courtesy of =D0=94=D0=B8=D0=BB=D1=8F=D0=BD =D0=9F=D0=B0=D0=BB=D0=B0=D1=83=D0=B7=D0=BE= =D0=B2. Added explicit minimum and maximum supported LLVM versions so that the bu= ild will fail if you try to build with a version that is too old or too new and will print a helpful messag= e rather than simply failing to compile because of compatibility issues. Patch courtesy of Matt Jolly. Fixed compiler warnings that may turn into errors in Clang 16. Patch cour= tesy of Michael Orlitzky. Allow building with a custom RPATH so that the executables may be moved a= fter build in a development environment to a final installation directory. Bug fixes Assorted code quality fixes. These are not security issues and will not b= e backported to prior feature versions: Several heap buffer overflows while loading PDB and WDB databases wer= e found by OSS-Fuzz and by Michal Dardas. oss-fuzz 43843: heap buffer overflow read (1) cli_sigopts_handler oss-fuzz 44849: heap buffer overflow read (4) in HTML/js-norm oss-fuzz 43816: heap buffer overflow read (8) in cli_bcomp_freemeta oss-fuzz 43832: heap buffer overflow read (2) in cli_parse_add oss-fuzz 44493: integer overflow in cli_scannulsft CIFuzz leak detected in IDB parser oss-fuzz assorted signature parser leaks oss-fuzz 40601: leak detected in pdf_parseobj Fixed a build failure when using LIBCLAMAV_ONLY mode with tests enabled. Fixed an issue verifying EXE/DLL authenticode signatures to determine a g= iven file can be trusted (skipped). Fixed a caching bug relating to the Container and Intermediates logical s= ignature condition. Fixed a build issue when build with RAR disabled or when building with an= external libmspack library rather than the bundled library. Fixed the capitalization of the=C2=A0-W=C2=A0option for=C2=A0clamonacc=C2= =A0in the=C2=A0clamonacc=C2=A0manpage. Patch courtesy of GitHub user monkz. macOS: Fixed an issue with memory-map (mmap) system call detection affect= ing versions 0.105 and 0.104. Memory maps may be used in ClamAV to improve signature load performance a= nd scan performance, as well as RAM usage. Fixed a performance issue with Rust code when the build type is not expli= citly set to "Release" or "RelWithDebInfo". The Rust default build type is now "RelWithDebInfo" jus= t like the C code, instead of Debug. This means it is now optimized by default. Fixed an issue loading Yara rules containing regex strings with an escape= d forward-slash (\/) followed by a colon (:). Fixed an issue detecting and scanning ZIP file entries appended to very s= mall files. The fix is part of the all-match feature overhaul. Fixed a detection issue with EXE/DLL import-address-table hash signatures= that specify a wildcard (*) for the size field. The fix is part of the all-match feature overhaul. Fixed the default bytecode timeout value listed in the manpages and in th= e sample config files. Patches courtesy of Liam Jarvis and Ben Bodenmiller. Fixed an issue building the libclamav_rust test program when running=C2= =A0ctest=C2=A0if building with=C2=A0BYTECODE_RUNTIME=3Dllvm=C2=A0and when the=C2=A0FindLLVM.cmake= =C2=A0module is used to find the LLVM libraries. Patch courtesy of GitHub user teoberi. Fixed an issue where scans sent to=C2=A0clamd=C2=A0with the all-match mod= e enabled caused all subsequent scans to also use all-match mode. Fixed bug when starting=C2=A0clamonacc=C2=A0with the=C2=A0--log=3DFILE=C2= =A0option that created randomly named files in the current directory. Other assorted bug fixes." Signed-off-by: Matthias Fischer --- config/rootfiles/packages/clamav | 12 ++++++------ lfs/clamav | 9 ++++----- 2 files changed, 10 insertions(+), 11 deletions(-) diff --git a/config/rootfiles/packages/clamav b/config/rootfiles/packages/cla= mav index 588c34eb4..fd3c4c0c9 100644 --- a/config/rootfiles/packages/clamav +++ b/config/rootfiles/packages/clamav @@ -13,17 +13,17 @@ usr/bin/sigtool #usr/include/clamav.h #usr/include/libfreshclam.h usr/lib/libclamav.so -usr/lib/libclamav.so.9 -usr/lib/libclamav.so.9.1.0 +usr/lib/libclamav.so.11 +usr/lib/libclamav.so.11.0.0 usr/lib/libclammspack.so usr/lib/libclammspack.so.0 usr/lib/libclammspack.so.0.8.0 usr/lib/libclamunrar.so -usr/lib/libclamunrar.so.9 -usr/lib/libclamunrar.so.9.1.0 +usr/lib/libclamunrar.so.11 +usr/lib/libclamunrar.so.11.0.0 usr/lib/libclamunrar_iface.so -usr/lib/libclamunrar_iface.so.9 -usr/lib/libclamunrar_iface.so.9.1.0 +usr/lib/libclamunrar_iface.so.11 +usr/lib/libclamunrar_iface.so.11.0.0 usr/lib/libfreshclam.so usr/lib/libfreshclam.so.2 usr/lib/libfreshclam.so.2.0.2 diff --git a/lfs/clamav b/lfs/clamav index 1cd15ea27..673ae90f1 100644 --- a/lfs/clamav +++ b/lfs/clamav @@ -26,16 +26,15 @@ include Config =20 SUMMARY =3D Antivirus Toolkit =20 -VER =3D 0.105.1 -SUBVER =3D -2 +VER =3D 1.0.0 =20 THISAPP =3D clamav-$(VER) -DL_FILE =3D $(THISAPP)$(SUBVER).tar.gz +DL_FILE =3D $(THISAPP).tar.gz DL_FROM =3D $(URL_IPFIRE) DIR_APP =3D $(DIR_SRC)/$(THISAPP) TARGET =3D $(DIR_INFO)/$(THISAPP) PROG =3D clamav -PAK_VER =3D 63 +PAK_VER =3D 64 =20 DEPS =3D =20 @@ -51,7 +50,7 @@ objects =3D $(DL_FILE) =20 $(DL_FILE) =3D $(DL_FROM)/$(DL_FILE) =20 -$(DL_FILE)_BLAKE2 =3D 09e67f4ae4f9689e634aa18cd672b16d8a4cb8b3923527c7c92ffa= 264b415dc49b5ee82ceaa518cf701a910b49a344753c7d0de894a772b0b871e492c95d60f4 +$(DL_FILE)_BLAKE2 =3D 62d00a9ceb1849d1517f34194daaa3bb8bbc904e81e3a20791cf0b= 5f557587cc497e23feb38cdfbb8b152446821eb20d9a4bce18a0c83d1c31474bfed9944c69 =20 install : $(TARGET) =20 --=20 2.34.1 --===============9214312550967099257==--