CVE-2024-20328: Fixed a possible command injection vulnerability in the "VirusEvent" feature of ClamAV's ClamD service. To fix this issue, we disabled the '%f' format string parameter. ClamD administrators may continue to use the `CLAM_VIRUSEVENT_FILENAME` environment variable, instead of '%f'. But you should do so only from within an executable, such as a Python script, and not directly in the clamd.conf "VirusEvent" command. Affected versions: 0.104 (all patch versions) 0.105 (all patch versions) 1.0.0 through 1.0.4 (LTS) 1.1 (all patch versions) 1.2.0 and 1.2.1 References: https://blog.clamav.net/2023/11/clamav-130-122-105-released.html
Created clamav tracking bugs for this issue: Affects: epel-all [bug 2263265] Affects: fedora-all [bug 2263266]