Releases: Cisco-Talos/clamav
ClamAV 1.4.1
ClamAV 1.4.1 is a critical patch release with the following fixes:
-
CVE-2024-20506:
Changed the logging module to disable following symlinks on Linux and Unix
systems so as to prevent an attacker with existing access to the 'clamd' or
'freshclam' services from using a symlink to corrupt system files.This issue affects all currently supported versions. It will be fixed in:
- 1.4.1
- 1.3.2
- 1.0.7
- 0.103.12
Thank you to Detlef for identifying this issue.
-
CVE-2024-20505:
Fixed a possible out-of-bounds read bug in the PDF file parser that could
cause a denial-of-service (DoS) condition.This issue affects all currently supported versions. It will be fixed in:
- 1.4.1
- 1.3.2
- 1.0.7
- 0.103.12
Thank you to OSS-Fuzz for identifying this issue.
-
Removed unused Python modules from freshclam tests including deprecated
'cgi' module that is expected to cause test failures in Python 3.13.
ClamAV 1.3.2
ClamAV 1.3.2 is a patch release with the following fixes:
-
CVE-2024-20506:
Changed the logging module to disable following symlinks on Linux and Unix
systems so as to prevent an attacker with existing access to the 'clamd' or
'freshclam' services from using a symlink to corrupt system files.This issue affects all currently supported versions. It will be fixed in:
- 1.4.1
- 1.3.2
- 1.0.7
- 0.103.12
Thank you to Detlef for identifying this issue.
-
CVE-2024-20505:
Fixed a possible out-of-bounds read bug in the PDF file parser that could
cause a denial-of-service (DoS) condition.This issue affects all currently supported versions. It will be fixed in:
- 1.4.1
- 1.3.2
- 1.0.7
- 0.103.12
Thank you to OSS-Fuzz for identifying this issue.
-
Removed unused Python modules from freshclam tests including deprecated
'cgi' module that is expected to cause test failures in Python 3.13. -
Fix unit test caused by expiring signing certificate.
- Backport of GitHub pull request
-
Fixed a build issue on Windows with newer versions of Rust.
Also upgraded GitHub Actions imports to fix CI failures.
Fixes courtesy of liushuyu.- Backport of GitHub pull request
-
Fixed an unaligned pointer dereference issue on select architectures.
Fix courtesy of Sebastian Andrzej Siewior.- Backport of GitHub pull request
-
Fixes to Jenkins CI pipeline.
For details, see GitHub pull request
ClamAV 1.0.7
ClamAV 1.0.7 is a patch release with the following fixes:
-
CVE-2024-20506:
Changed the logging module to disable following symlinks on Linux and Unix
systems so as to prevent an attacker with existing access to the 'clamd' or
'freshclam' services from using a symlink to corrupt system files.This issue affects all currently supported versions. It will be fixed in:
- 1.4.1
- 1.3.2
- 1.0.7
- 0.103.12
Thank you to Detlef for identifying this issue.
-
CVE-2024-20505:
Fixed a possible out-of-bounds read bug in the PDF file parser that could
cause a denial-of-service (DoS) condition.This issue affects all currently supported versions. It will be fixed in:
- 1.4.1
- 1.3.2
- 1.0.7
- 0.103.12
Thank you to OSS-Fuzz for identifying this issue.
-
Removed unused Python modules from freshclam tests including deprecated
'cgi' module that is expected to cause test failures in Python 3.13. -
Fix unit test caused by expiring signing certificate.
- Backport of GitHub pull request
-
Fixed a build issue on Windows with newer versions of Rust.
Also upgraded GitHub Actions imports to fix CI failures.
Fixes courtesy of liushuyu.- Backport of GitHub pull request
-
Fixed an unaligned pointer dereference issue on select architectures.
Fix courtesy of Sebastian Andrzej Siewior.- Backport of GitHub pull request
-
Fixes to Jenkins CI pipeline.
For details, see GitHub pull request
ClamAV 0.103.12
ClamAV 0.103.12 is a patch release with the following fixes:
-
CVE-2024-20506:
Changed the logging module to disable following symlinks on Linux and Unix
systems so as to prevent an attacker with existing access to the 'clamd' or
'freshclam' services from using a symlink to corrupt system files.This issue affects all currently supported versions. It will be fixed in:
- 1.4.1
- 1.3.2
- 1.0.7
- 0.103.12
Thank you to Detlef for identifying this issue.
-
CVE-2024-20505:
Fixed a possible out-of-bounds read bug in the PDF file parser that could
cause a denial-of-service (DoS) condition.This issue affects all currently supported versions. It will be fixed in:
- 1.4.1
- 1.3.2
- 1.0.7
- 0.103.12
Thank you to OSS-Fuzz for identifying this issue.
-
ClamOnAcc: Fixed an infinite loop when a watched directory does not exist.
-
Fixed a bug causing CVDs downloaded by the
DatabaseCustomURL
Freshclam
config option to be pruned and then re-downloaded with every update.
Also added the new 'valhalla' database name to the list of optional databases
in preparation for future work.- Backport of GitHub pull request
-
Fixed an unaligned pointer dereference issue on select architectures.
Fix courtesy of Sebastian Andrzej Siewior.- Backport of GitHub pull request
ClamAV 1.4.0
ClamAV 1.4.0 includes the following improvements and changes:
Major changes
-
Added support for extracting ALZ archives.
The new ClamAV file type for ALZ archives isCL_TYPE_ALZ
.
Added a DCONF
option to enable or disable ALZ archive support.Tip: DCONF (Dynamic CONFiguration) is a feature that allows for some
configuration changes to be made via ClamAV.cfg
"signatures". -
Added support for extracting LHA/LZH archives.
The new ClamAV file type for LHA/LZH archives isCL_TYPE_LHA_LZH
.
Added a DCONF
option to enable or disable LHA/LZH archive support. -
Added the ability to disable image fuzzy hashing, if needed. For context,
image fuzzy hashing is a detection mechanism useful for identifying malware
by matching images included with the malware or phishing email/document.New ClamScan options:
--scan-image[=yes(*)/no] --scan-image-fuzzy-hash[=yes(*)/no]
New ClamD config options:
ScanImage yes(*)/no ScanImageFuzzyHash yes(*)/no
New libclamav scan options:
options.parse &= ~CL_SCAN_PARSE_IMAGE; options.parse &= ~CL_SCAN_PARSE_IMAGE_FUZZY_HASH;
Added a DCONF
option to enable or disable image fuzzy hashing support.
Other improvements
-
Added cross-compiling instructions for targeting ARM64/aarch64 processors for
Windows
and
Linux. -
Improved the Freshclam warning messages when being blocked or rate limited
so as to include the Cloudflare Ray ID, which helps with issue triage. -
Removed unnecessary memory allocation checks when the size to be allocated
is fixed or comes from a trusted source.
We also renamed internal memory allocation functions and macros, so it is
more obvious what each function does. -
Improved the Freshclam documentation to make it clear that the
--datadir
option must be an absolute path to a directory that already exists, is
writable by Freshclam, and is readable by ClamScan and ClamD. -
Added an optimization to avoid calculating the file hash if the clean file
cache has been disabled. The file hash may still be calculated as needed to
perform hash-based signature matching if any hash-based signatures exist that
target a file of the same size, or if any hash-based signatures exist that
target "any" file size. -
Added an improvement to the SystemD service file for ClamOnAcc so that the
service will shut down faster on some systems. -
Added a CMake build dependency on the version map files so that the build
will re-run if changes are made to the version map files.
Work courtesy of Sebastian Andrzej Siewior. -
Added an improvement to the CMake build so that the RUSTFLAGS settings
are inherited from the environment.
Work courtesy of liushuyu.
Bug fixes
-
Silenced confusing warning message when scanning some HTML files.
-
Fixed minor compiler warnings.
-
Since the build system changed from Autotools to CMake, ClamAV no longer
supports building with configurations where bzip2, libxml2, libz, libjson-c,
or libpcre2 are not available. Libpcre is no longer supported in favor of
libpcre2. In this release, we removed all the dead code associated with those
unsupported build configurations. -
Fixed assorted typos. Patch courtesy of RainRat.
-
Added missing documentation for the ClamScan
--force-to-disk
option. -
Fixed an issue where ClamAV unit tests would prefer an older
libclamunrar_iface library from the install path, if present, rather than
the recently compiled library in the build path. -
Fixed a build issue on Windows with newer versions of Rust.
Also upgraded GitHub Actions imports to fix CI failures.
Fixes courtesy of liushuyu. -
Fixed an unaligned pointer dereference issue on select architectures.
Fix courtesy of Sebastian Andrzej Siewior. -
Fixed a bug that prevented loading plaintext (non-CVD) signature files
when using the--fail-if-cvd-older-than=DAYS
/FailIfCvdOlderThan
option.
Fix courtesy of Bark.
Acknowledgments
Special thanks to the following people for code contributions and bug reports:
- Bark
- liushuyu
- Sebastian Andrzej Siewior
- RainRat
ClamAV 1.4.0-rc
ClamAV 1.4.0 Release Candidate includes the following improvements and changes:
Major changes
-
Added support for extracting ALZ archives.
The new ClamAV file type for ALZ archives isCL_TYPE_ALZ
.
Added a DCONF option to enable or disable ALZ archive support.Tip: DCONF (Dynamic CONFiguration) is a feature that allows for some configuration changes to be made via ClamAV
.cfg
"signatures". -
Added support for extracting LHA/LZH archives.
The new ClamAV file type for ALZ archives isCL_TYPE_LHA_LZH
.
Added a DCONF option to enable or disable LHA/LZH archive support. -
Added the ability to disable image fuzzy hashing, if needed. For context, image fuzzy hashing is a detection mechanism useful for identifying malware by matching images included with the malware or phishing email/document.
New ClamScan options:
--scan-image[=yes(*)/no] --scan-image-fuzzy-hash[=yes(*)/no]
New ClamD config options:
ScanImage yes(*)/no ScanImageFuzzyHash yes(*)/no
New libclamav scan options:
options.parse &= ~CL_SCAN_PARSE_IMAGE; options.parse &= ~CL_SCAN_PARSE_IMAGE_FUZZY_HASH;
Added a DCONF option to enable or disable image fuzzy hashing support.
Other improvements
-
Added cross-compiling instructions for targeting ARM64/aarch64 processors for Windows and Linux.
-
Improved the Freshclam warning messages when being blocked or rate limited so as to include the Cloudflare Ray ID, which helps with issue triage.
-
Removed unnecessary memory allocation checks when the size to be allocated is fixed or comes from a trusted source.
We also renamed internal memory allocation functions and macros, so it is more obvious what each function does. -
Improved the Freshclam documentation to make it clear that the
--datadir
option must be an absolute path to a directory that already exists, is writable by Freshclam, and is readable by ClamScan and ClamD. -
Added an optimization to avoid calculating the file hash if the clean file cache has been disabled. The file hash may still be calculated as needed to perform hash-based signature matching if any hash-based signatures exist that target a file of the same size, or if any hash-based signatures exist that target "any" file size.
-
Added an improvement to the SystemD service file for ClamOnAcc so that the service will shut down faster on some systems.
Bug fixes
-
Silenced confusing warning message when scanning some HTML files.
-
Fixed minor compiler warnings.
-
Since the build system changed from Autotools to CMake, ClamAV no longer supports building with configurations where bzip2, libxml2, libz, libjson-c, or libpcre2 are not available. Libpcre is no longer supported in favor of libpcre2. In this release, we removed all the dead code associated with those unsupported build configurations.
-
Fixed assorted typos. Patch courtesy of RainRat.
-
Added missing documentation for the ClamScan
--force-to-disk
option. -
Fixed an issue where ClamAV unit tests would prefer an older libclamunrar_iface library from the install path, if present, rather than
the recently compiled library in the build path.
Acknowledgments
Special thanks to the following people for code contributions and bug reports:
- RainRat
ClamAV 1.3.1
ClamAV 1.3.1 is a critical patch release with the following fixes:
-
CVE-2024-20380:
Fixed a possible crash in the HTML file parser that could cause a
denial-of-service (DoS) condition.This issue affects version 1.3.0 only and does not affect prior versions.
Thank you to Błażej Pawłowski for identifying this issue.
-
Updated select Rust dependencies to the latest versions.
This resolved Cargo audit complaints and included PNG parser bug fixes. -
Fixed a bug causing some text to be truncated when converting from UTF-16.
-
Fixed assorted complaints identified by Coverity static analysis.
-
Fixed a bug causing CVDs downloaded by the
DatabaseCustomURL
Freshclam
config option to be pruned and then re-downloaded with every update. -
Added the new 'valhalla' database name to the list of optional databases in
preparation for future work. -
Added symbols to the
libclamav.map
file to enable additional build
configurations.Patch courtesy of Neil Wilson.
ClamAV 1.2.3
ClamAV 1.2.3 is a critical patch release with the following fixes:
-
Updated select Rust dependencies to the latest versions.
This resolved Cargo audit complaints and included PNG parser bug fixes. -
Fixed a bug causing some text to be truncated when converting from UTF-16.
-
Fixed assorted complaints identified by Coverity static analysis.
-
Fixed a bug causing CVDs downloaded by the
DatabaseCustomURL
Freshclam
config option to be pruned and then re-downloaded with every update. -
Added the new 'valhalla' database name to the list of optional databases in
preparation for future work. -
Silenced a warning "Unexpected early end-of-file" that occured when
scanning some PNG files.
ClamAV 1.0.6
ClamAV 1.0.6 is a critical patch release with the following fixes:
-
Updated select Rust dependencies to the latest versions.
This resolved Cargo audit complaints and included PNG parser bug fixes. -
Fixed a bug causing some text to be truncated when converting from UTF-16.
-
Fixed assorted complaints identified by Coverity static analysis.
-
Fixed a bug causing CVDs downloaded by the
DatabaseCustomURL
Freshclam
config option to be pruned and then re-downloaded with every update. -
Added the new 'valhalla' database name to the list of optional databases in
preparation for future work. -
Silenced a warning "Unexpected early end-of-file" that occured when
scanning some PNG files.
ClamAV 1.3.0
ClamAV 1.3.0 includes the following improvements and changes:
Major changes
- Added support for extracting and scanning attachments found in Microsoft
OneNote section files.
OneNote parsing will be enabled by default, but may be optionally disabled
using one of the following options:
a. Theclamscan
command line option:--scan-onenote=no
,
b. Theclamd.conf
config option:ScanOneNote no
,
c. The libclamav scan optionoptions.parse &= ~CL_SCAN_PARSE_ONENOTE;
,
d. A signature change to thedaily.cfg
dynamic configuration (DCONF).
Other improvements
-
Fixed issue when building ClamAV on the Haiku (BeOS-like) operating system.
Patch courtesy of Luca D'Amico -
ClamD: When starting, ClamD will now check if the directory specified by
TemporaryDirectory
inclamd.conf
exists. If it doesn't, ClamD
will print an error message and will exit with exit code 1.
Patch courtesy of Andrew Kiggins. -
CMake: If configured to build static libraries, CMake will now also
install the libclamav_rust, libclammspack, libclamunrar_iface, and
libclamunrar static libraries required by libclamav.Note: These libraries are all linked into the clamscan, clamd, sigtool,
and freshclam programs, which is why they did not need to be installed
to function. However, these libraries would be required if you wish to
build some other program that uses the libclamav static library.Patch courtesy of driverxdw.
-
Added file type recognition for compiled Python (
.pyc
) files.
The file type appears as a string parameter for these callback functions:clcb_pre_cache
clcb_pre_scan
clcb_file_inspection
When scanning a.pyc
file, thetype
parameter will now show
"CL_TYPE_PYTHON_COMPILED" instead of "CL_TYPE_BINARY_DATA".- GitHub pull request
-
Improved support for decrypting PDF's with empty passwords.
-
Assorted minor improvements and typo fixes.
Bug fixes
-
Fixed a warning when scanning some HTML files.
-
Fixed an issue decrypting some PDF's with an empty password.
-
ClamOnAcc: Fixed an infinite loop when a watched directory does not exist.
-
ClamOnAcc: Fixed an infinite loop when a file has been deleted before a scan.
Patch courtesy of gsuehiro. -
Fixed a possible crash when processing VBA files on HP-UX/IA 64bit.
Patch courtesy of Albert Chin-A-Young. -
ClamConf: Fixed an issue printing
MaxScanSize
introduced with the change
to allow a MaxScanSize greater than 4 GiB.
Fix courtesy of teoberi. -
Fixed an issue building a ClamAV RPM in some configurations.
The issue was caused by faulty CMake logic that intended to create an
empty database directory during the install.
Acknowledgments
Special thanks to the following people for code contributions and bug reports:
- Albert Chin-A-Young
- Andrew Kiggins
- driverxdw
- gsuehiro
- Luca D'Amico
- RainRat
- teoberi