public inbox for development@lists.ipfire.org
 help / color / mirror / Atom feed
From: Michael Tremer <michael.tremer@ipfire.org>
To: development@lists.ipfire.org
Subject: Re: Vulnerabilities flagged in clamav-0.105.1
Date: Tue, 08 Nov 2022 11:09:48 +0000	[thread overview]
Message-ID: <7DDEFA78-4E5B-4F08-A0FA-3CB4A88BD084@ipfire.org> (raw)
In-Reply-To: <7d43a4e5-817b-06c4-95a0-2e19fe3fa2c5@ipfire.org>

[-- Attachment #1: Type: text/plain, Size: 1935 bytes --]

Great!

I suppose a lot of the confusion from the release announcement seems to come from clamav shipping copies of those libraries (at least I think they still do so).

So they will have to release another tarball with the bundled libraries even if they didn’t change anything. I consider this a really bad practise because that meant that Peter’s update zlib actually didn’t fix it for clamav.

In IPFire 3 we try to track bundled libraries, but it is manual effort which is not 100% accurate.

Ideal would be to always link against the “system version”. Sometimes the configure script hast a “—-with-system-zlib” switch, which should ALWAYS be used over the bundled version.

Best,
-Michael

> On 7 Nov 2022, at 20:51, Adolf Belka <adolf.belka(a)ipfire.org> wrote:
> 
> Hi all,
> 
> I have just checked the change logs for the latest versions of zlib and libxml2 that I am building and they include fixes to the vulnerabilities flagged up in the clamav-0.105.1 announcement.
> 
> 
> The vulnerability for zlib was already fixed in CU171 with the two patch files that Peter added. This patch set has now been integrated into the latest zlib.
> 
> 
> The vulnerabilities for libxml2 have fixes for both CVE's in the latest version of libxml2 that was released on October 14th. Both of the CVE's are listed in the CVE website as reserved but with no details but clearly the info has been circulated to the zlib and libxml2 developers and fixes were made a while ago.
> 
> Not sure how to find out if CVE's have been raised on packages that IPFire is using so we can use any fixes developed as soon as possible. I knew about the issues with zlib and libxml2 because I saw the announcement of the clamav-0.105.1 release.
> 
> 
> Anyway good news, the patches I will submit soon will contain the fixes to the CVE's mentioned in the clamav announcement.
> 
> 
> Regards,
> 
> Adolf.
> 


      reply	other threads:[~2022-11-08 11:09 UTC|newest]

Thread overview: 2+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2022-11-07 20:51 Adolf Belka
2022-11-08 11:09 ` Michael Tremer [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=7DDEFA78-4E5B-4F08-A0FA-3CB4A88BD084@ipfire.org \
    --to=michael.tremer@ipfire.org \
    --cc=development@lists.ipfire.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox