]> git.ipfire.org Git - ipfire-2.x.git/commitdiff
clamav: Update to 0.104.2
authorMatthias Fischer <matthias.fischer@ipfire.org>
Fri, 14 Jan 2022 16:11:07 +0000 (17:11 +0100)
committerPeter Müller <peter.mueller@ipfire.org>
Fri, 14 Jan 2022 16:18:40 +0000 (16:18 +0000)
For details see:
https://blog.clamav.net/2022/01/clamav-01035-and-01042-security-patch.html

"ClamAV 0.104.2 is a critical patch release with the following fixes:

CVE-2022-20698: Fix for invalid pointer read that may cause a crash.
Affects 0.104.1, 0.103.4 and prior when ClamAV is compiled with libjson-c
and the CL_SCAN_GENERAL_COLLECT_METADATA scan option (the clamscan
--gen-json option) is enabled.
..."

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
lfs/clamav

index 69e5d8c0f8c0db1e090cca4f1aeebd45c9b571f1..1fffd99d9ea414e28c5bc34f07e2c1133997a8d9 100644 (file)
@@ -1,7 +1,7 @@
 ###############################################################################
 #                                                                             #
 # IPFire.org - A linux based firewall                                         #
-# Copyright (C) 2007-2021  IPFire Team  <info@ipfire.org>                     #
+# Copyright (C) 2007-2022  IPFire Team  <info@ipfire.org>                     #
 #                                                                             #
 # This program is free software: you can redistribute it and/or modify        #
 # it under the terms of the GNU General Public License as published by        #
@@ -24,7 +24,7 @@
 
 include Config
 
-VER        = 0.104.1
+VER        = 0.104.2
 
 THISAPP    = clamav-$(VER)
 DL_FILE    = $(THISAPP).tar.gz
@@ -32,7 +32,7 @@ DL_FROM    = $(URL_IPFIRE)
 DIR_APP    = $(DIR_SRC)/$(THISAPP)
 TARGET     = $(DIR_INFO)/$(THISAPP)
 PROG       = clamav
-PAK_VER    = 58
+PAK_VER    = 59
 
 DEPS       =
 
@@ -46,7 +46,7 @@ objects = $(DL_FILE)
 
 $(DL_FILE) = $(DL_FROM)/$(DL_FILE)
 
-$(DL_FILE)_MD5 = 49b9bb94d5b2cafc761f8fbe660d3bfa
+$(DL_FILE)_MD5 = ad099675f2c09c07850e36496b06c552
 
 install : $(TARGET)