https://blog.clamav.net/2025/06/clamav-143-and-109-security-patch.html
announces:

Today, we are publishing the 1.4.3 and 1.0.9 security patch versions.

[....]

* CVE-2025-20260: Fixed a possible buffer overflow write bug in the PDF
  file parser that could cause a denial-of-service (DoS) condition or
  enable remote code execution.

  This issue only affects configurations where both:

    The max file-size scan limit is set greater than or equal to 1024MB.
    The max scan-size scan limit is set greater than or equal to 1025MB.

  The code flaw was present prior to version 1.0.0, but a change in
  version 1.0.0 that enables larger allocations based on untrusted data
  made it possible to trigger this bug.

  This issue affects all currently supported versions. It will be fixed in:

    1.4.3
    1.0.9

  Thank you to Greg Walkup at Sandia National Labs for identifying this issue.


* CVE-2025-20234: Fixed a possible buffer overflow read bug in the UDF
  file parser that may write to a temp file and thus disclose
  information, or it may crash and cause a denial-of-service (DoS)
  condition.

  This issue was introduced in version 1.2.0. It will be fixed in 1.4.3.

  Thank you to volticks (@movx64 on Twitter/X), working with
  Trend Micro Zero Day Initiative, for identifying this issue.


* Fixed a possible use-after-free bug in the Xz decompression module
  in the bundled lzma-sdk library.

  This issue was fixed in the lzma-sdk version 18.03. ClamAV bundles a
  copy of the lzma-sdk with some performance changes specific to
  libclamav, plus select bug fixes like this one in lieu of a full
  upgrade to newer lzma-sdk.

  This issue affects all ClamAV versions at least as far back as 0.99.4.
  It will be fixed in:

    1.4.3
    1.0.9

  Thank you to OSS-Fuzz for identifying this issue.



--
        -Alan Coopersmith-                 alan.coopersm...@oracle.com
         Oracle Solaris Engineering - https://blogs.oracle.com/solaris

Reply via email to