Skip to content

Releases: Cisco-Talos/clamav

ClamAV 0.103.8

15 Feb 16:44
Compare
Choose a tag to compare

ClamAV 0.103.8 is a critical patch release with the following fixes:

  • CVE-2023-20032:
    Fixed a possible remote code execution vulnerability in the HFS+ file parser.
    Issue affects versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and
    earlier.
    Thank you to Simon Scannell for reporting this issue.

  • CVE-2023-20052:
    Fixed a possible remote information leak vulnerability in the DMG file parser.
    Issue affects versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and
    earlier.
    Thank you to Simon Scannell for reporting this issue.

  • Update vendored libmspack library to version 0.11alpha.

    • GitHub pull request: #830

Special thanks to the following people for code contributions and bug reports:

  • Simon Scannell

ClamAV 1.0.0

28 Nov 20:09
09f373f
Compare
Choose a tag to compare

ClamAV 1.0.0 includes the following improvements and changes.

Major changes

  • Support for decrypting read-only OLE2-based XLS files that are encrypted with
    the default password.
    Use of the default password will now appear in the metadata JSON.

    • GitHub pull request: #700
  • Overhauled the implementation of the all-match feature. The newer code is more
    reliable and easier to maintain.

    • This project fixed several known issues with signature detection in all-
      match mode:
      • Enabled embedded file-type recognition signatures to match when a malware
        signature also matched in a scan of the same layer.
      • Enabled bytecode signatures to run in all-match mode after a match has
        occurred.
      • Fixed an assortment of all-match edge case issues.
    • Added multiple test cases to verify correct all-match behavior.
    • GitHub pull request: #687
  • Added a new callback to the public API for inspecting file content during a
    scan at each layer of archive extraction.

    • The new callback function type is clcb_file_inspection defined in
      clamav.h.
    • The function cl_engine_set_clcb_file_inspection() may be used to enable
      the callback prior to performing a scan.
    • This new callback is to be considered unstable for the 1.0 release.
      We may alter this function in a subsequent feature version.
    • GitHub pull request: #170
  • Added a new function to the public API for unpacking CVD signature archives.

    • The new function is cl_cvdunpack(). The last parameter for the function
      may be set to verify if a CVD's signature is valid before unpacking the CVD
      content to the destination directory.
    • GitHub pull request: #690
  • The option to build with an external TomsFastMath library has been removed.
    ClamAV requires non-default build options for TomsFastMath to support bigger
    floating point numbers. Without this change, database and Windows EXE/DLL
    authenticode certificate validation may fail.
    The ENABLE_EXTERNAL_TOMSFASTMATH build is now ignored.

    • GitHub pull request: #742
  • Moved the Dockerfile and supporting scripts from the main ClamAV repository
    over to a new repository: https://github.com/Cisco-Talos/clamav-docker

    The separate repository will make it easier to update the images and fix
    issues with images for released ClamAV versions.

    Any users building the ClamAV Docker image rather than pulling them from
    Docker Hub will have to get the latest Docker files from the new location.

    • GitHub pull request: #764
  • Increased the SONAME major version for libclamav because of ABI changes
    between the 0.103 LTS release and the 1.0 LTS release.

    • GitHub pull request: #778

Other improvements

  • Add checks to limit PDF object extraction recursion.

    • GitHub pull request: #629
  • Increased the limit for memory allocations based on untrusted input and
    altered the warning message when the limit is exceeded so that it is more
    helpful and less dramatic.

    • GitHub pull request: #723
  • Dramatically improved the build time of libclamav-Rust unit tests.
    The unit test build is included in the time limit for the test itself and was
    timing out on slower systems. The ClamAV Rust code modules now share the same
    build directory, which also reduces the amount of disk space used for the
    build.

    • GitHub pull request: #694
  • For Windows: The debugging symbol (PDB) files are now installed alongside the
    DLL and LIB library files when built in "RelWithDebInfo" or "Debug" mode.

    • GitHub pull request: #669
  • Relaxed the constraints on the check for overlapping ZIP file entries so as
    not to alert on slightly malformed, but non-malicious, Java (JAR) archives.

    • GitHub pull request: #561
  • Increased the time limit in FreshClam before warning if the DNS entry is
    stale. In combination with changes to update the DNS entry more
    frequently, this should prevent false alarms of failures in the database
    publication system.

    • GitHub pull request: #597
  • Docker: The C library header files are now included in the Docker image.
    Patch courtesy of GitHub user TerminalFi.

    • GitHub pull request: #693
  • Show the BYTECODE_RUNTIME build options when using the ccmake GUI for CMake.
    Patch courtesy of Дилян Палаузов.

    • GitHub pull request: #678
  • Added explicit minimum and maximum supported LLVM versions so that the build
    will fail if you try to build with a version that is too old or too new and
    will print a helpful message rather than simply failing to compile because of
    compatibility issues. Patch courtesy of Matt Jolly.

    • GitHub pull request: #692
  • Fixed compiler warnings that may turn into errors in Clang 16.
    Patch courtesy of Michael Orlitzky.

    • GitHub pull request: #767
  • Allow building with a custom RPATH so that the executables may be moved after
    build in a development environment to a final installation directory.

    • GitHub pull request: #768

Bug fixes

  • Assorted code quality fixes. These are not security issues and will not be
    backported to prior feature versions:

    • Several heap buffer overflows while loading PDB and WDB databases were found
      by OSS-Fuzz and by Michał Dardas.

      • GitHub pull request: #530
      • Follow-up Optimization: #712
    • oss-fuzz 43843: heap buffer overflow read (1) cli_sigopts_handler

      • GitHub pull request: #560
    • oss-fuzz 44849: heap buffer overflow read (4) in HTML/js-norm

      • GitHub pull request: #503
    • oss-fuzz 43816: heap buffer overflow read (8) in cli_bcomp_freemeta

      • GitHub pull request: #583
    • oss-fuzz 43832: heap buffer overflow read (2) in cli_parse_add

      • GitHub pull request: #611
    • oss-fuzz 44493: integer overflow in cli_scannulsft

      • GitHub pull request: #554
    • CIFuzz leak detected in IDB parser

      • GitHub pull request: #547
    • oss-fuzz assorted signature parser leaks

    • oss-fuzz 40601: leak detected in pdf_parseobj

      • GitHub pull request: #553
  • Fixed a build failure when using LIBCLAMAV_ONLY mode with tests enabled.

    • GitHub pull request: #714
  • Fixed an issue verifying EXE/DLL authenticode signatures to determine a given
    file can be trusted (skipped).

    • GitHub pull request: #727
  • Fixed a caching bug relating to the Container and Intermediates logical
    signature condition.

    • GitHub pull request: #724
  • Fixed a build issue when build with RAR disabled or when building with an
    external libmspack library rather than the bundled library.

    • GitHub pull request: #672
  • Fixed the capitalization of the -W option for clamonacc in the clamonacc
    manpage. Patch courtesy of GitHub user monkz.

  • macOS: Fixed an issue with memory-map (mmap) system call detection affecting
    versions 0.105 and 0.104. Memory maps may be used in ClamAV to improve
    signature load performance and scan performance, as well as RAM usage.

    • GitHub pull request: #705
  • Fixed a performance issue with Rust code when the build type is not explicitly
    set to "Release" or "RelWithDebInfo". The Rust default build type is now
    "RelWithDebInfo" just like the C code, instead of Debug.
    This means it is now optimized by default.

    • GitHub pull request: #701
  • Fixed an issue loading Yara rules containing regex strings with an escaped
    forward-slash (\/) followed by a colon (:).

    • GitHub pull request: #696
  • Fixed an issue detecting and scanning ZIP file entries appended to very small
    files. The fix is part of the all-match feature overhaul.

  • Fixed a detection issue with EXE/DLL import-address-table hash signatures that
    specify a wildcard (*) for the size field. The fix is part of the all-match
    feature overhaul.

  • Fixed the default bytecode timeout value listed in the manpages and in the
    sample config files. Patches courtesy of Liam Jarvis and Ben Bodenmiller.

  • Fixed an issue building the libclamav_rust test program when running ctest
    if building with `BYTEC...

Read more

ClamAV 1.0.0 Release Candidate 2

15 Nov 22:50
Compare
Choose a tag to compare
Pre-release

ClamAV 1.0.0 includes the following improvements and changes.

Major changes

  • Support for decrypting read-only OLE2-based XLS files that are encrypted with
    the default "VelvetSweatshop" password.
    Use of the VelvetSweatshop password will now appear in the metadata JSON.

    • GitHub pull request: #700
  • Overhauled the implementation of the all-match feature. The newer code is more
    reliable and easier to maintain.

    • This project fixed several known issues with signature detection in all-
      match mode:
      • Enabled embedded file-type-recognition-signatures to match when a malware
        signature also matched in a scan of the same layer.
      • Enabled bytecode signatures to run in all-match mode after a match has
        occurred.
      • Fixed an assortment of all-match edge case issues.
    • Added multiple test cases to verify correct all-match behavior.
    • GitHub pull request: #687
  • Added a new callback to the public API for inspecting file content during a
    scan at each layer of archive extraction.

    • The new callback function type is clcb_file_inspection defined in
      clamav.h.
    • The function cl_engine_set_clcb_file_inspection() may be used to enable
      the callback prior to performing a scan.
    • This new callback is to be considered unstable for the 1.0 release.
      We may alter this function in a subsequent feature version.
    • GitHub pull request: #170
  • Added a new function to the public API for unpacking CVD signature archives.

    • The new function is cl_cvdunpack(). The last parameter for the function
      may be set to verify if a CVD's signature is valid before unpacking the CVD
      content to the destination directory.
    • GitHub pull request: #690
  • The option to build with an external TomsFastMath library has been removed.
    ClamAV requires non-default build options for TomsFastMath to support bigger
    floating point numbers. Without this change, database and Windows EXE/DLL
    authenticode certificate validation may fail.
    The ENABLE_EXTERNAL_TOMSFASTMATH build is now ignored.

    • GitHub pull request: #742

Other improvements

  • Add checks to limit PDF object extraction recursion.

    • GitHub pull request: #629
  • Increased the limit for memory allocations based on untrusted input and
    altered the warning message when the limit is exceeded so that it is more
    helpful and less dramatic.

    • GitHub pull request: #723
  • Dramatically improved the build time of libclamav-Rust unit tests.
    The unit test build is included in the time limit for the test itself and was
    timing out on slower systems. The ClamAV Rust code modules now share the same
    build directory, which also reduces the amount of disk space used for the
    build.

    • GitHub pull request: #694
  • Windows: The debugging symbol (PDB) files are now installed alongside the DLL

  • and LIB library files when built in "RelWithDebInfo" or "Debug" mode.

    • GitHub pull request: #669
  • Relaxed the constraints on the check for overlapping ZIP file entries so as
    not to alert on slightly malformed, but non-malicious, Java (JAR) archives.

    • Talos escalations issues:
    • GitHub pull request: #561
  • Increased the time limit in FreshClam before warning if the DNS entry is
    stale. In combination with changes to update the DNS entry more
    frequently, this should prevent false alarms of failures in the database
    publication system.

    • GitHub pull request: #597
  • Docker: The C library header files are now included in the Docker image.
    Patch courtesy of GitHub user TerminalFi.

    • GitHub pull request: #693
  • Show the BYTECODE_RUNTIME build options when using the ccmake GUI for CMake.
    Patch courtesy of Дилян Палаузов.

    • GitHub pull request: #678
  • Added explicit minimum and maximum supported LLVM versions so that the build
    will fail if you try to build with the version that is too old or too new and
    will print a helpful message rather than simply failing to compile because of
    compatibility issues. Patch courtesy of Matt Jolly.

    • GitHub pull request: #692

Bug fixes

  • Assorted code quality fixes. These are not security issues and will not be
    backported to prior feature versions:

    • Several heap buffer overflows while loading PDB and WDB databases were found
      by OSS-Fuzz and by Michał Dardas.

      • GitHub pull request: #530
      • Follow-up Optimization: #712
    • oss-fuzz 43843: heap buffer overflow read (1) cli_sigopts_handler

      • GitHub pull request: #560
    • oss-fuzz 44849: heap buffer overflow read (4) in HTML/js-norm

      • GitHub pull request: #503
    • oss-fuzz 43816: heap buffer overflow read (8) in cli_bcomp_freemeta

      • GitHub pull request: #583
    • oss-fuzz 43832: heap buffer overflow read (2) in cli_parse_add

      • GitHub pull request: #611
    • oss-fuzz 44493: integer overflow in cli_scannulsft

      • GitHub pull request: #554
    • CIFuzz leak detected in IDB parser

      • GitHub pull request: #547
    • oss-fuzz assorted signature parser leaks

    • oss-fuzz 40601: leak detected in pdf_parseobj

      • GitHub pull request: #553
  • Fixed a build failure when using LIBCLAMAV_ONLY mode with tests enabled.

    • GitHub pull request: #714
  • Fixed an issue verifying EXE/DLL authenticode signatures to determine a given
    file can be trusted (skipped).

    • GitHub pull request: #727
  • Fixed a caching bug relating to the Container and Intermediates logical
    signature condition.

    • GitHub pull request: #724
  • Fixed a build issues when build with RAR disabled or when building with an
    external libmspack library rather than the vendored library.

    • GitHub pull request: #672
  • Fixed the capitalization of the -W option for clamonacc in the clamonacc
    manpage. Patch courtesy of GitHub user monkz.

  • macOS: Fixed an issue with memory-map (mmap) system call detection affecting
    versions 0.105 and 0.104. Memory maps may be used in ClamAV to improve
    signature load performance, scan performance, and RAM usage.

    • GitHub pull request: #705
  • Fixed a performance issue with Rust code when the build type is not explicitly
    set to "Release" or "RelWithDebInfo". The Rust default build type is now
    "RelWithDebInfo" just like the C code, instead of Debug.
    This means it is now optimized by default.

    • GitHub pull request: #701
  • Fixed an issue loading Yara rules containing regex strings with an escaped
    forward-slash (\/) followed by a colon (:).

    • GitHub pull request: #696
  • Fixed an issue detecting and scanning ZIP file entries appended to very small
    files. The fix is part of the all-match feature overhaul.

  • Fixed a detection issue with EXE/DLL import-address-table hash signatures that
    specify a wildcard (*) for the size field. The fix is part of the all-match
    feature overhaul.

  • Fixed the default bytecode timeout value listed in the manpages and in the
    sample config files. Patches courtesy of Liam Jarvis and Ben Bodenmiller.

  • Fixed an issue building the libclamav_rust test program when running ctest
    if building with BYTECODE_RUNTIME=llvm and when the FindLLVM.cmake module
    is used to find the LLVM libraries. Patch courtesy of GitHub user teoberi.

    • GitHub pull request: #572
  • Fixed an issue where scans sent to clamd with the all-match mode enabled
    caused all subsequent scans to also use all-match mode.

    • GitHub pull request: #741

Acknowledgments

Special thanks to the following people for code contributions and bug reports:

  • Ben Bodenmiller
  • Дилян Палаузов
  • Liam Jarvis
  • Matt Jolly
  • monkz
  • teoberi
  • TerminalFi

ClamAV 1.0.0 Release Candidate

25 Oct 18:56
Compare
Choose a tag to compare
Pre-release

ClamAV 1.0.0 includes the following improvements and changes.

Major changes

  • Support for decrypting read-only OLE2-based XLS files that are encrypted with
    the default "VelvetSweatshop" password.
    Use of the VelvetSweatshop password will now appear in the metadata JSON.

    • GitHub pull request: #700
  • Overhauled the implementation of the all-match feature. The newer code is more
    reliable and easier to maintain.

    • This project fixed several known issues with signature detection in all-
      match mode:
      • Enabled embedded file-type-recognition-signatures to match when a malware
        signature also matched in a scan of the same layer.
      • Enabled bytecode signatures to run in all-match mode after a match has
        occurred.
      • Fixed an assortment of all-match edge case issues:
    • Added multiple test cases to verify correct all-match behavior.
    • GitHub pull request: #687
  • Added a new callback to the public API for inspecting file content during a
    scan at each layer of archive extraction.

    • The new callback function type is clcb_file_inspection defined in
      clamav.h.
    • The function cl_engine_set_clcb_file_inspection() may be used to enable
      the callback prior to performing a scan.
    • This new callback is to be considered unstable for the 1.0 release.
      We may alter this function in a subsequent feature version.
    • GitHub pull request: #170
  • Added a new function to the public API for unpacking CVD signature archives.

    • The new function is cl_cvdunpack(). The last parameter for the function
      may be set to verify if a CVD's signature is valid before unpacking the CVD
      content to the destination directory.
    • GitHub pull request: #690

Other improvements

  • Add checks to limit PDF object extraction recursion.

    • GitHub pull request: #629
  • Increased the limit for memory allocations based on untrusted input and
    altered the warning message when the limit is exceeded so that it is more
    helpful and less dramatic.

    • GitHub pull request: #723
  • Dramatically improved the build time of libclamav-Rust unit tests.
    The unit test build is included in the time limit for the test itself and was
    timing out on slower systems. The ClamAV Rust code modules now share the same
    build directory, which also reduces the amount of disk space used for the
    build.

    • GitHub pull request: #694
  • Windows: The debugging symbol (PDB) files are now installed alongside the DLL

  • and LIB library files when built in "RelWithDebInfo" or "Debug" mode.

    • GitHub pull request: #669
  • Relaxed the constraints on the check for overlapping ZIP file entries so as
    not to alert on slightly malformed, but non-malicious, Java (JAR) archives.

    • Talos escalations issues:
    • GitHub pull request: #561
  • Increased the time limit in FreshClam before warning if the DNS entry is
    stale. In combination with changes to update the DNS entry more
    frequently, this should prevent false alarms of failures in the database
    publication system.

    • GitHub pull request: #597
  • Docker: The C library header files are now included in the Docker image.
    Patch courtesy of GitHub user TerminalFi.

    • GitHub pull request: #693
  • Show the BYTECODE_RUNTIME build options when using the ccmake GUI for CMake.
    Patch courtesy of Дилян Палаузов.

    • GitHub pull request: #678
  • Added explicit minimum and maximum supported LLVM versions so that the build
    will fail if you try to build with the version that is too old or too new and
    will print a helpful message rather than simply failing to compile because of
    compatibility issues. Patch courtesy of Matt Jolly.

    • GitHub pull request: #692

Bug fixes

  • Assorted code quality fixes. These are not security issues and will not be
    backported to prior feature versions:

    • Several heap buffer overflows while loading PDB and WDB databases were found
      by OSS-Fuzz and by Michał Dardas.

      • GitHub pull request: #530
      • Follow-up Optimization: #712
    • oss-fuzz 43843: heap buffer overflow read (1) cli_sigopts_handler

      • GitHub pull request: #560
    • oss-fuzz 44849: heap buffer overflow read (4) in HTML/js-norm

      • GitHub pull request: #503
    • oss-fuzz 43816: heap buffer overflow read (8) in cli_bcomp_freemeta

      • GitHub pull request: #583
    • oss-fuzz 43832: heap buffer overflow read (2) in cli_parse_add

      • GitHub pull request: #611
    • oss-fuzz 44493: integer overflow in cli_scannulsft

      • GitHub pull request: #554
    • CIFuzz leak detected in IDB parser

      • GitHub pull request: #547
    • oss-fuzz assorted signature parser leaks

    • oss-fuzz 40601: leak detected in pdf_parseobj

      • GitHub pull request: #553
  • Fixed a build failure when using LIBCLAMAV_ONLY mode with tests enabled.

    • GitHub pull request: #714
  • Fixed an issue verifying EXE/DLL authenticode signatures to determine a given
    file can be trusted (skipped).

    • GitHub pull request: #727
  • Fixed a caching bug relating to the Container and Intermediates logical
    signature condition.

    • GitHub pull request: #724
  • Fixed a build issues when build with RAR disabled or when building with an
    external libmspack library rather than the vendored library.

    • GitHub pull request: #672
  • Fixed the capitalization of the -W option for clamonacc in the clamonacc
    manpage. Patch courtesy of GitHub user monkz.

  • macOS: Fixed an issue with memory-map (mmap) system call detection affecting
    versions 0.105 and 0.104. Memory maps may be used in ClamAV to improve
    signature load performance, scan performance, and RAM usage.

    • GitHub pull request: #705
  • Fixed a performance issue with Rust code when the build type is not explicitly
    set to "Release" or "RelWithDebInfo". The Rust default build type is now
    "RelWithDebInfo" just like the C code, instead of Debug.
    This means it is now optimized by default.

    • GitHub pull request: #701
  • Fixed an issue loading Yara rules containing regex strings with an escaped
    forward-slash (\/) followed by a colon (:).

    • GitHub pull request: #696
  • Fixed an issue detecting and scanning ZIP file entries appended to very small
    files. The fix is part of the all-match feature overhaul.

  • Fixed a detection issue with EXE/DLL import-address-table hash signatures that
    specify a wildcard (*) for the size field. The fix is part of the all-match
    feature overhaul.

  • Fix the default bytecode timeout value listed in the manpages and in the
    sample config files. Patches courtesy of Liam Jarvis and Ben Bodenmiller.

  • Fix issue building the libclamav_rust test program when running ctest if
    building with BYTECODE_RUNTIME=llvm and when the FindLLVM.cmake module is
    used to find the LLVM libraries. Patch courtesy of GitHub user teoberi.

    • GitHub pull request: #572

Acknowledgments

Special thanks to the following people for code contributions and bug reports:

  • Ben Bodenmiller
  • Дилян Палаузов
  • Liam Jarvis
  • Matt Jolly
  • monkz
  • teoberi
  • TerminalFi