public inbox for development@lists.ipfire.org
 help / color / mirror / Atom feed
* Vulnerabilities flagged in clamav-0.105.1
@ 2022-11-07 20:51 Adolf Belka
  2022-11-08 11:09 ` Michael Tremer
  0 siblings, 1 reply; 2+ messages in thread
From: Adolf Belka @ 2022-11-07 20:51 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 1091 bytes --]

Hi all,

I have just checked the change logs for the latest versions of zlib and libxml2 that I am building and they include fixes to the vulnerabilities flagged up in the clamav-0.105.1 announcement.


The vulnerability for zlib was already fixed in CU171 with the two patch files that Peter added. This patch set has now been integrated into the latest zlib.


The vulnerabilities for libxml2 have fixes for both CVE's in the latest version of libxml2 that was released on October 14th. Both of the CVE's are listed in the CVE website as reserved but with no details but clearly the info has been circulated to the zlib and libxml2 developers and fixes were made a while ago.

Not sure how to find out if CVE's have been raised on packages that IPFire is using so we can use any fixes developed as soon as possible. I knew about the issues with zlib and libxml2 because I saw the announcement of the clamav-0.105.1 release.


Anyway good news, the patches I will submit soon will contain the fixes to the CVE's mentioned in the clamav announcement.


Regards,

Adolf.


^ permalink raw reply	[flat|nested] 2+ messages in thread

* Re: Vulnerabilities flagged in clamav-0.105.1
  2022-11-07 20:51 Vulnerabilities flagged in clamav-0.105.1 Adolf Belka
@ 2022-11-08 11:09 ` Michael Tremer
  0 siblings, 0 replies; 2+ messages in thread
From: Michael Tremer @ 2022-11-08 11:09 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 1935 bytes --]

Great!

I suppose a lot of the confusion from the release announcement seems to come from clamav shipping copies of those libraries (at least I think they still do so).

So they will have to release another tarball with the bundled libraries even if they didn’t change anything. I consider this a really bad practise because that meant that Peter’s update zlib actually didn’t fix it for clamav.

In IPFire 3 we try to track bundled libraries, but it is manual effort which is not 100% accurate.

Ideal would be to always link against the “system version”. Sometimes the configure script hast a “—-with-system-zlib” switch, which should ALWAYS be used over the bundled version.

Best,
-Michael

> On 7 Nov 2022, at 20:51, Adolf Belka <adolf.belka(a)ipfire.org> wrote:
> 
> Hi all,
> 
> I have just checked the change logs for the latest versions of zlib and libxml2 that I am building and they include fixes to the vulnerabilities flagged up in the clamav-0.105.1 announcement.
> 
> 
> The vulnerability for zlib was already fixed in CU171 with the two patch files that Peter added. This patch set has now been integrated into the latest zlib.
> 
> 
> The vulnerabilities for libxml2 have fixes for both CVE's in the latest version of libxml2 that was released on October 14th. Both of the CVE's are listed in the CVE website as reserved but with no details but clearly the info has been circulated to the zlib and libxml2 developers and fixes were made a while ago.
> 
> Not sure how to find out if CVE's have been raised on packages that IPFire is using so we can use any fixes developed as soon as possible. I knew about the issues with zlib and libxml2 because I saw the announcement of the clamav-0.105.1 release.
> 
> 
> Anyway good news, the patches I will submit soon will contain the fixes to the CVE's mentioned in the clamav announcement.
> 
> 
> Regards,
> 
> Adolf.
> 


^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2022-11-08 11:09 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2022-11-07 20:51 Vulnerabilities flagged in clamav-0.105.1 Adolf Belka
2022-11-08 11:09 ` Michael Tremer

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox