Bug 1766382
| Summary: | Freshclam and clamscan: ERROR: Verification: Can't allocate memory in FIPS mode | ||
|---|---|---|---|
| Product: | [Fedora] Fedora EPEL | Reporter: | Simon Mijolovic <simon> |
| Component: | clamav | Assignee: | Orion Poplawski <orion> |
| Status: | NEW --- | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
| Severity: | high | Docs Contact: | |
| Priority: | unspecified | ||
| Version: | epel8 | CC: | anon.amish, bennie.joubert, cshirsat, janfrode, jonathan, j, matthew.w.lesko, ondrejj, orion, redhat-bugzilla, rh-bugzilla, simon, steve |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | ||
| Hardware: | x86_64 | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | If docs needed, set a value | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | Type: | Bug | |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
Simon Mijolovic
2019-10-28 21:36:21 UTC
what is FIPS mode ? Actually, I would argue it is running as expected in FIPS mode :). MD5 is not an allowed hash algorithm by FIPS, but since it is what clamav uses to verify the cvd files it fails. This is going to need to be addressed upstream. Please file a bug there: https://bugzilla.clamav.net/ Specifically:
cl_hash_init (alg=0x7ffff7b4e9cb "md5") at crypto.c:1154
1154 {
(gdb)
1158 md = EVP_get_digestbyname(alg);
(gdb)
1159 if (!(md))
(gdb)
1174 return NULL;
So EVP_get_digestbyname("md5") returns NULL.
Orion - agree with the fact that FIPS is doing what it's supposed to do. Thank you for the code snippet. For future proofing, sha256 is recommended. Filed the upstream bug: https://bugzilla.clamav.net/show_bug.cgi?id=12424 Marked security restricted - asked for it to be public. I'm not authorized to access bug #12424. if you are the owner , you may make the bug public IIRC . Not when flagged with security, and for good reason. If someone discloses to security what could potentially could become a zero-day, you don't go blasting that out public. Smart move there, so the security team will remove the private flag. For refence https://build.opensuse.org/package/view_file/home:alveus:main/clamav/clamav-fips.patch?expand=1 --- libclamav/crypto.c.orig +++ libclamav/crypto.c @@ -145,6 +145,9 @@ int cl_initialize_crypto(void) ERR_load_crypto_strings(); #endif + /* avoid fips issues */ + EVP_add_digest(EVP_md5()); + return 0; } This package has changed maintainer in Fedora. Reassigning to the new maintainer of this component. It looks like clamav 1.5.0 fixes this problem (see https://blog.clamav.net/2025/10/clamav-150-released.html). |