A vulnerability in the Data-Loss-Prevention (DLP) module in Clam AntiVirus (ClamAV) Software versions 0.102.1 and 0.102.0 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to an out-of-bounds read affecting users that have enabled the optional DLP feature. An attacker could exploit this vulnerability by sending a crafted email file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition. Reference: https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs59062
Created clamav tracking bugs for this issue: Affects: epel-all [bug 1801393] Affects: fedora-all [bug 1801392]
This was introduced in 0.102.0 and fixed in 0.102.2. 0.102.0 and 0.102.1 were never released in Fedora.