A heap-based buffer overflow flaw was found in ClamAV when scanning Windows PE files that were crypted with y0da's Crypter. Scanning a malicious PE file could cause ClamAV to crash or, potentially, execute arbitrary code. Upstream fix: https://github.com/vrtadmin/clamav-devel/commit/fc3794a54d2affe5770c1f876484a871c783e91e References: http://seclists.org/oss-sec/2014/q4/752 https://bugzilla.clamav.net/show_bug.cgi?id=11155 (currently private)
Created clamav tracking bugs for this issue: Affects: fedora-all [bug 1167140] Affects: epel-all [bug 1167141]
Which ClamAV release contains a fix? 0.98.5 already? Or 0.98.6?
Ah, http://seclists.org/oss-sec/2014/q4/752 answers it (0.98.5 contains a fix), sorry for the noise.
clamav-0.98.5-1.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report.
clamav-0.98.5-1.el5 has been pushed to the Fedora EPEL 5 stable repository. If problems still persist, please make note of it in this bug report.
clamav-0.98.5-1.el6 has been pushed to the Fedora EPEL 6 stable repository. If problems still persist, please make note of it in this bug report.
clamav-0.98.5-1.el7 has been pushed to the Fedora EPEL 7 stable repository. If problems still persist, please make note of it in this bug report.
clamav-0.98.5-1.fc21 has been pushed to the Fedora 21 stable repository. If problems still persist, please make note of it in this bug report.