|Category:||SuSE Local Security Checks|
|Title:||SUSE: Security Advisory (SUSE-SU-2018:3441-1)|
|Summary:||The remote host is missing an update for the 'clamav' package(s) announced via the SUSE-SU-2018:3441-1 advisory.|
The remote host is missing an update for the 'clamav' package(s) announced via the SUSE-SU-2018:3441-1 advisory.
This update for clamav fixes the following issues:
Clamav was updated to version 0.100.2:
CVE-2018-15378: Vulnerability in ClamAV's MEW unpacking feature that
could allow an unauthenticated, remote attacker to cause a denial of
service (DoS) condition on an affected device. (bsc#1110723)
CVE-2018-14680, CVE-2018-14681, CVE-2018-14682: more fixes for embedded
Make freshclam more robust against lagging signature mirrors.
On-Access 'Extra Scanning', an opt-in minor feature of OnAccess scanning
on Linux systems, has been disabled due to a known issue with resource
cleanup OnAccessExtraScanning will be re-enabled in a future release
when the issue is resolved. In the mean-time, users who enabled the
feature in clamd.conf will see a warning informing them that the feature
is not active. For details, see:
[link moved to references] Restore exit code compatibility of freshclam with versions before
0.100.0 when the virus database is already up to date (bsc#1104457).
'clamav' package(s) on SUSE Linux Enterprise Server 11-SP4, SUSE Linux Enterprise Server 11-SP3, SUSE Linux Enterprise Point of Sale 11-SP3, SUSE Linux Enterprise Debuginfo 11-SP4, SUSE Linux Enterprise Debuginfo 11-SP3
Please install the updated package(s).
Common Vulnerability Exposure (CVE) ID: CVE-2018-14680|
Common Vulnerability Exposure (CVE) ID: CVE-2018-14681
Common Vulnerability Exposure (CVE) ID: CVE-2018-14682
Common Vulnerability Exposure (CVE) ID: CVE-2018-15378
|Copyright||Copyright (C) 2021 Greenbone Networks GmbH|
|This is only one of 97459 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.