Autor Thema: ClamWin/ClamAV .......  (Gelesen 10236 mal)

0 Mitglieder und 1 Gast betrachten dieses Thema.

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
ClamWin Free Antivirus 0.103.2
« Antwort #90 am: 04 Mai, 2021, 12:00 »
Whats new:>>

This release updates ClamAV scannin engine to the supported version and delivers the following imporvements:

    Virus database updates are working again
    ClamAV engine updated to version 0.103.2

http://www.clamav.net

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
ClamWin Free Antivirus 0.103.2.1
« Antwort #91 am: 07 Juni, 2021, 19:00 »
Whats new:>>

    Fixed Virus database updates
    ClamAV engine updated to version 0.103.2r1

http://www.clamav.net

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
ClamAV 0.103.3
« Antwort #92 am: 22 Juni, 2021, 09:00 »
Changelog

    Fixed a scan performance issue when ENGINE_OPTIONS_FORCE_TO_DISK is enabled. This issue did not affect most users, but for those affected, it caused every scanned file to be copied to the temp directory before the scan.
    Fixed ClamDScan crashes when using the --fdpass --multiscan command-line options in combination with the ClamD ExcludePath config file options.
    Fixed an issue where the mirrors.dat file is owned by root when starting as root (or with sudo) and using daemon-mode. File ownership will be set to the DatabaseOwner just before FreshClam switches to run as that user.
    Renamed the mirrors.dat file to freshclam.dat.
    Unfortunately, some users have FreshClam configured to automatically delete mirrors.dat if FreshClam failed. Renaming mirrors.dat to freshclam.dat should make it so those scripts don't delete important FreshClam data.
    We used to recommend deleting mirrors.dat if FreshClam failed to update. This is because mirrors.dat used to keep track of offline mirrors and network interruptions were known to cause FreshClam to think that all mirrors were offline. ClamAV now uses a paid CDN instead of a mirror network, and the new FreshClam DAT file no longer stores that kind of information. The UUID used in ClamAV's HTTP User-Agent is stored in the FreshClam DAT file and we want the UUID to persist between runs, even if there was a failure.
    Disabled the HTTPUserAgent config option if the DatabaseMirror uses clamav.net. This will prevent users from being inadvertently blocked and will ensure that we can keep better metrics on which ClamAV versions are being used.
    This change effectively deprecates the HTTPUserAgent option for most users.
    Moved the detection for Heuristics.PNG.CVE-2010-1205 behind the ClamScan --alert-broken-media option (ClamD AlertBrokenMedia yes) option. This type of PNG issue appears to be common enough to be an annoyance, and the CVE is old enough that no one should be vulnerable at this point.
    Fixed ClamSubmit failures after changes to Cloudflare "__cfduid" cookies.

[close]

http://www.clamav.net

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
ClamAV 0.104.0 RC
« Antwort #93 am: 23 Juli, 2021, 11:00 »
Changelog

    New Requirements:

    As of ClamAV 0.104, CMake is required to build ClamAV.
    We have added comprehensive build instructions for using CMake to the new INSTALL.md file. The online documentation will also be updated to include CMake build instructions.
    The Autotools and the Visual Studio build systems have been removed.

    Major changes:

    The built-in LLVM for the bytecode runtime has been removed.
    The bytecode interpreter is the default runtime for bytecode signatures just as it was in ClamAV 0.103.
    We wished to add support for newer versions of LLVM, but ran out of time. If you're building ClamAV from source and you wish to use LLVM instead of the bytecode interpreter, you will need to supply the development libraries for LLVM version 3.6.2. See INSTALL.md to learn more.
    There are now official ClamAV images on Docker Hub.
    Note: Until ClamAV 0.104.0 is released, these images are limited to "unstable" versions, which are updated daily with the latest changes in the default branch on GitHub.
    You can find the images on Docker Hub under clamav.

    Docker Hub ClamAV tags:

    clamav/clamav:<version>: A release preloaded with signature databases.
    Using this container will save the ClamAV project some bandwidth. Use this if you will keep the image around so that you don't download the entire database set every time you start a new container. Updating with FreshClam from the existing databases set does not use much data.
    clamav/clamav:<version>_base: A release with no signature databases.
    Use this container only if you mount a volume in your container under /var/lib/clamav to persist your signature database databases. This method is the best option because it will reduce data costs for ClamAV and for the Docker registry, but it does require advanced familiarity with Linux and Docker.
    Caution: Using this image without mounting an existing database directory will cause FreshClam to download the entire database set each time you start a new container.
    You can use the unstable version (i.e. clamav/clamav:unstable or clamav/clamav:unstable_base) to try the latest from our development branch.
    Please, be kind when using "free" bandwidth for the virus databases and Docker registry. Try not to download the entire database set or the larger ClamAV database images on a regular basis.
    For more details, see the ClamAV Docker documentation.
    Special thanks to Olliver Schinagl for his excellent work creating ClamAV's new Docker files, image database deployment tooling, and user documentation.
    clamd and freshclam are now available as Windows services. To install and run them, use the --install-service option and net start [name] command.
    Special thanks to Gianluigi Tiesi for his original work on this feature.

    Notable changes:

    We added these features in 0.103.1 but wanted to re-post them here, as patch versions do not generally introduce new options:

    Added a new scan option to alert on broken media (graphics) file formats. This feature mitigates the risk of malformed media files intended to exploit vulnerabilities in other software. Currently, media validation exists for JPEG, TIFF, PNG, and GIF files. To enable this feature, set AlertBrokenMedia yes in clamd.conf, or use the --alert-broken-media option when using clamscan. These options are disabled by default in this patch, but may be enabled in a subsequent release. Application developers may enable this scan option by enabling CL_SCAN_HEURISTIC_BROKEN_MEDIA for the heuristic scan option bit field.
    Added CL_TYPE_TIFF, CL_TYPE_JPEG types to match GIF and PNG typing behavior. BMP and JPEG 2000 files will continue to detect as CL_TYPE_GRAPHICS because ClamAV does not have BMP or JPEG 2000 format-checking capabilities.
    Added progress callbacks to libclamav for:
    database load: cl_engine_set_clcb_sigload_progress()
    engine compile: cl_engine_set_clcb_engine_compile_progress()
    engine free: cl_engine_set_clcb_engine_free_progress()
    These new callbacks enable an application to monitor and estimate load, compile and unload progress. See clamav.h for API details.

    Added progress bars to ClamScan for the signature load and engine compile steps before a scan begins. The startup progress bars won't be enabled if ClamScan isn't running in a terminal (i.e. if stdout is not a TTY), or if any of these options are used:

    --debug
    --quiet
    --infected
    --no-summary

    Other improvements:

    Added the %f format string option to the ClamD VirusEvent feature to insert the file path of the scan target when a virus event occurs. This supplements the VirusEvent %v option that prints the signature (virus) name. The ClamD VirusEvent feature also provides two environment variables, $CLAM_VIRUSEVENT_FILENAME and $CLAM_VIRUSEVENT_VIRUSNAME for a similar effect. This fix comes courtesy of Vasile Papp.
    Improvements to the AutoIt extraction module. Patch courtesy of cw2k.
    Added support for extracting images from Excel *.xls (OLE2) documents.
    Trusted SHA256-based Authenticode hashes can now be loaded in from *.cat files. See our Authenticode documentation for more info about using *.cat files with *.crb rules to trust signed Windows executables.

    Bug fixes:

    Fixed a memory leak affecting logical signatures that use the "byte compare" feature. Patch courtesy of Andrea De Pasquale.
    Fixed bytecode match evaluation for PDF bytecode hooks in PDF file scans.
    Other minor bug fixes.

[close]

http://www.clamav.net

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
ClamAV 0.104.0 RC 2
« Antwort #94 am: 20 August, 2021, 20:00 »
Changelog

    What changed since the first release candidate:

    First and foremost, we are listening to your concerns about the build system change from Autotools to CMake, and about changes coming in a future feature release when we add the Rust programming language toolchain into our build requirements. We can't bring back Autotools, but we hope that the following will help.
    We are introducing a Long Term Support (LTS) program that will begin with the 0.103 feature release. Users will be required to stay up to date with the latest patch versions (e.g., 0.103.3) within the 0.103 feature series, but will have the peace-of-mind that the 0.103 feature release will receive critical patch versions with a stable ABI up until End-of-Life in September 2023. Stay tuned for a separate blog post introducing the full details of our LTS program. We will also add a version-support-matrix to our online documentation in tandem with the LTS blog post for easy reference.

    In addition to the above, we've resolved the following issues identified during the first release candidate:

    Increased the functionality level (FLEVEL) for the 0.104 release to make space for additional 0.103 (LTS) patch versions. See the Version & FLEVEL reference.
    Improvements installation instructions in INSTALL.md and in the online documentation.
    Fixed iconv / libiconv detection in the CMake configuration process when -Werror=return-type is enabled, such as in the openSUSE packaging environment. See PR-233.
    Fixed broken CMake build when RAR support is intentionally disabled and test-support is enabled. See PR-237.
    Fixed broken CMake build on systems that do not provide format string macros for standard integer types. See PR-231.
    Improved long file path support on Windows. (Disclaimer: presently requires user to opt-in with a registry key change). See PR-229.
    Fixed a segfault and socket file descriptor leak in ClamOnAcc. See PR-227.
    Fixed an error reported by ClamD when scanning directories on Windows. See PR-230.
    Fixed issue with Freshclam support for Universal Naming Convention (UNC) paths on Windows. See PR-226.
    Added missing environment variable feature documentation to the manpages. See PR-254.
    Fixed an assortment of issues identified by Coverity static analysis. See PR-221.
    Tuned the Valgrind suppression rules for the public test suite to resolve a false positive that caused intermittent ClamD test failures. See PR-238.
    Fixed the mspack library name to deconflict with system installed mspack packages. See PR-234.
    Fixed a false positive in the ClamD tests, reported by Valgrind when compiling with Clang. See PR-236.

[close]

http://www.clamav.net

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
ClamAV 0.104.0
« Antwort #95 am: 31 Oktober, 2021, 11:00 »
Changelog

    New Requirements

    As of ClamAV 0.104, CMake is required to build ClamAV.
    We have added comprehensive build instructions for using CMake to the new INSTALL.md file. The online documentation will also be updated to include CMake build instructions.
    The Autotools and the Visual Studio build systems have been removed.

    Major changes

    The built-in LLVM for the bytecode runtime has been removed.
    The bytecode interpreter is the default runtime for bytecode signatures just as it was in ClamAV 0.103.
    We hoped to add support for newer versions of LLVM, but ran out of time. If you're building ClamAV from source and you wish to use LLVM instead of the bytecode interpreter, you will need to supply the development libraries for LLVM version 3.6.2. See the "bytecode runtime" section in INSTALL.md to learn more.
    There are now official ClamAV images on Docker Hub.

    Docker Hub ClamAV tags:

    clamav/clamav:<version>: A release preloaded with signature databases.
    Using this container will save the ClamAV project some bandwidth. Use this if you will keep the image around so that you don't download the entire database set every time you start a new container. Updating with FreshClam from the existing databases set does not use much data.
    clamav/clamav:<version>_base: A release with no signature databases.
    Use this container only if you mount a volume in your container under /var/lib/clamav to persist your signature database databases. This method is the best option because it will reduce data costs for ClamAV and for the Docker registry, but it does require advanced familiarity with Linux and Docker.
    Caution: Using this image without mounting an existing database directory will cause FreshClam to download the entire database set each time you start a new container.
    You can use the unstable version (i.e. clamav/clamav:unstable or clamav/clamav:unstable_base) to try the latest from our development branch.
    Please, be kind when using 'free' bandwidth, both for the virus databases but also the Docker registry. Try not to download the entire database set or the larger ClamAV database images on a regular basis.
    For more details, see the ClamAV Docker documentation.
    Special thanks to Olliver Schinagl for his excellent work creating ClamAV's new Docker files, image database deployment tooling, and user documentation.
    clamd and freshclam are now available as Windows services. To install and run them, use the --install-service option and net start [name] command.
    Special thanks to Gianluigi Tiesi for his original work on this feature.

    Notable changes:

    The following was added in 0.103.1 and is repeated here for awareness, as patch versions do not generally introduce new options:

    Added a new scan option to alert on broken media (graphics) file formats. This feature mitigates the risk of malformed media files intended to exploit vulnerabilities in other software. At present, media validation exists for JPEG, TIFF, PNG and GIF files. To enable this feature, set AlertBrokenMedia yes in clamd.conf, or use the --alert-broken-media option when using clamscan. These options are disabled by default in this patch release but may be enabled in a subsequent release. Application developers may enable this scan option by enabling CL_SCAN_HEURISTIC_BROKEN_MEDIA for the heuristic scan option bit field.
    Added CL_TYPE_TIFF, CL_TYPE_JPEG types to match GIF, PNG typing behavior. BMP and JPEG 2000 files will continue to detect as CL_TYPE_GRAPHICS because ClamAV does not yet have BMP or JPEG 2000 format checking capabilities.
    Added progress callbacks to libclamav for:
    database load: cl_engine_set_clcb_sigload_progress()
    engine compile: cl_engine_set_clcb_engine_compile_progress()
    engine free: cl_engine_set_clcb_engine_free_progress()
    These new callbacks enable an application to monitor and estimate load, compile, and unload progress. See clamav.h for API details.

    Added progress bars to ClamScan for the signature load and engine compile steps before a scan begins. The start-up progress bars won't be enabled if ClamScan isn't running in a terminal (i.e. stdout is not a TTY), or if any of these options are used:

    --debug
    --quiet
    --infected
    --no-summary

    Other improvements:

    Added the %f format string option to the ClamD VirusEvent feature to insert the file path of the scan target when a virus-event occurs. This supplements the VirusEvent %v option which prints the signature (virus) name. The ClamD VirusEvent feature also provides two environment variables, $CLAM_VIRUSEVENT_FILENAME and $CLAM_VIRUSEVENT_VIRUSNAME for a similar effect. Patch courtesy of Vasile Papp.
    Improvements to the AutoIt extraction module. Patch courtesy of cw2k.
    Added support for extracting images from Excel *.xls (OLE2) documents.
    Trusted SHA256-based Authenticode hashes can now be loaded in from *.cat files. For more information, visit our Authenticode documentation about using *.cat files with *.crb rules to trust signed Windows executables.

    Bug fixes:

    Fixed a memory leak affecting logical signatures that use the "byte compare" feature. Patch courtesy of Andrea De Pasquale.
    Fixed bytecode match evaluation for PDF bytecode hooks in PDF file scans.
    Other minor bug fixes.

[close]

http://www.clamav.net

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
ClamAV 0.104.1
« Antwort #96 am: 04 November, 2021, 11:00 »
Changelog

    FreshClam:

    Add a 24-hour cool-down for FreshClam clients that have received an HTTP 403 (Forbidden) response from the CDN. This is to reduce the volume of 403-response data served to blocked FreshClam clients that are configured with a tight update-loop.
    Fixed a bug where FreshClam treats an empty CDIFF as an incremental update failure instead of as an intentional request to download the whole CVD.
    ClamDScan: Fix a scan error when broken symlinks are encountered on macOS with "FollowDirectorySymlinks" and "FollowFileSymlinks" options disabled.
    Overhauled the scan recursion / nested archive extraction logic and added new limits on embedded file-type recognition performed during the "raw" scan of each file. This limits embedded file-type misidentification and prevents detecting embedded file content that is found/extracted and scanned at other layers in the scanning process.
    Fix an issue with the FMap module that failed to read from some nested files.
    Fixed an issue where failing to load some rules from a Yara file containing multiple rules may cause a crash.
    Fixed assorted compiler warnings.
    Fixed assorted Coverity static code analysis issues.

    Scan limits:

    Added virus-name suffixes to the alerts that trigger when a scan limit has been exceeded. Rather than simply Heuristics.Limits.Exceeded, you may now see limit-specific virus-names, to include:
    Heuristics.Limits.Exceeded.MaxFileSize
    Heuristics.Limits.Exceeded.MaxScanSize
    Heuristics.Limits.Exceeded.MaxFiles
    Heuristics.Limits.Exceeded.MaxRecursion
    Heuristics.Limits.Exceeded.MaxScanTime

    Renamed the Heuristics.Email.ExceedsMax.* alerts to align with the other limit alerts names. These alerts include:

    Heuristics.Limits.Exceeded.EmailLineFoldcnt
    Heuristics.Limits.Exceeded.EmailHeaderBytes
    Heuristics.Limits.Exceeded.EmailHeaders
    Heuristics.Limits.Exceeded.EmailMIMEPartsPerMessage
    Heuristics.Limits.Exceeded.EmailMIMEArguments
    Fixed an issue where the Email-related scan limits would alert even when the "AlertExceedsMax" (--alert-exceeds-max) scan option is not enabled.
    Fixes an issue in the Zip parser where exceeding the "MaxFiles" limit or the "MaxFileSize" limit would abort the scan but would fail to alert. The Zip scan limit issues were independently identified and reported by Aaron Leliaert and Max Allan.
    Fixed a leak in the Email parser when using the --gen-json scan option.
    Fixed an issue where a failure to record metadata in the Email parser when using the --gen-json scan option could cause the Email parser to abort the scan early and fail to extract and scan additional content.
    Fixed a file name memory leak in the Zip parser.
    Fixed an issue where certain signature patterns may cause a crash or cause unintended matches on some systems when converting characters to uppercase if a UTF-8 unicode single-byte grapheme becomes a multi-byte grapheme. Patch courtesy of Andrea De Pasquale.

    CMake:

    Fix a packaging issue with the Windows *.msi installer so that it will include all of the required files.
    Add support for developer code-signing on macOS during the build.
    Fix an issue finding and linking with the tinfo library on systems where tinfo is separate from ncurses. Patch courtesy of Luca Barbato.
    Tests: Improved the Freshclam incremental update tests to verify correct behavior when a zero-byte CDIFF is downloaded and the CVD served to FreshClam is older than advertised.
    Docker: Remove the freshclam.dat file when building the Docker image with the databases-included so FreshClam agents running in the container will have a unique ID in the HTTP User-Agent.

[close]

http://www.clamav.net

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
ClamAV 0.104.2
« Antwort #97 am: 12 Januar, 2022, 21:00 »
Changelog

ClamAV 0.104.2 is a critical patch release with the following fixes:

- [CVE-2022-20698](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20698):
  Fix for invalid pointer read that may cause a crash.
  Affects 0.104.1, 0.103.4 and prior when ClamAV is compiled with libjson-c and
  the `CL_SCAN_GENERAL_COLLECT_METADATA` scan option (the `clamscan --gen-json`
  option) is enabled.

  Cisco would like to thank Laurent Delosieres of ManoMano for reporting this
  vulnerability.

- Fixed ability to disable the file size limit with libclamav C API, like this:
  ```c
    cl_engine_set_num(engine, CL_ENGINE_MAX_FILESIZE, 0);
  ```
  This issue didn't impact ClamD or ClamScan which also can disable the limit by
  setting it to zero using `MaxFileSize 0` in `clamd.conf` for ClamD, or
  `clamscan --max-filesize=0` for ClamScan.

  Note: Internally, the max file size is still set to 2 GiB. Disabling the limit
  for a scan will fall back on the internal 2 GiB limitation.

- Increased the maximum line length for ClamAV config files from 512 bytes to
  1024 bytes to allow for longer config option strings.
[close]

http://www.clamav.net

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
ClamAV 0.105.0 RC
« Antwort #98 am: 14 März, 2022, 22:00 »
Changelog

ClamAV 0.105.0 includes the following improvements and changes.

New Requirements

    Starting with ClamAV v0.105, the Rust toolchain is required to compile ClamAV.

    You can install the Rust toolchain for your development environment by following the instructions on the rustup website. Some binary package distributions do provide relatively up-to-date packages of the Rust toolchain, but many do not. Using rustup ensures that you have the most up-to-date Rust compiler at the time of installation. Keep your toolchain updated for new features and bug/security fixes by periodically executing:

    rustup update

    Building ClamAV requires, at a minimum, Rust compiler version 1.56, as it relies on features introduced in the Rust 2021 Edition.

    ClamAV's third-party Rust library dependencies are vendored into the release tarball ( clamav-<version>.tar.gz) file that we publish on clamav.net/downloads . But, if you build from a Git clone or from an unofficial tarball taken from GitHub.com, you will need the internet to download the Rust libraries during the build.

Major changes

    Increased the default limits for file-size and scan-size:
        MaxScanSize: 100M -> 400M
        MaxFileSize: 25M -> 100M
        StreamMaxLength: 25M -> 100M
        PCREMaxFileSize: 25M -> 100M
        MaxEmbeddedPE: 10M -> 40M
        MaxHTMLNormalize: 10M -> 40M
        MaxScriptNormalize: 5M -> 20M
        MaxHTMLNoTags: 2M -> 8M

    Added image fuzzy hash subsignatures for logical signatures.

    Image fuzzy hash subsignatures are a new feature for detecting images known to be used in phishing campaigns or otherwise used when distributing malware.

    Image fuzzy hash subsignatures follow this format:

    fuzzy_img#<hash>

    For example:

    logo.png;Engine:150-255,Target:0;0;fuzzy_img#af2ad01ed42993c7
    logo.png-2;Engine:150-255,Target:0;0&1;49484452;fuzzy_img#af2ad01ed42993c7


    This initial implementation does not support matching with a hamming distance. Support for matching with a hamming distance may be added in a future release.

    ClamAV's image fuzzy hash is very close to, but not 100% identical to, the fuzzy hash generated by the Python imagehash package's phash() function. Note that these are only clean-room approximations of the pHash ™? algorithm. ClamAV's image fuzzy hashes are not expected to match the fuzzy hashes generated using other tools. Some images may match, while others do not.

    To generate the image fuzzy hash you can run this command:

    clamscan --gen-json --debug /path/to/file

    The hash will appear in the JSON above the "SCAN SUMMARY" under the object named "ImageFuzzyHash".

    ClamScan & ClamDScan (Windows-only):

        Added a process memory scanning feature from ClamWin's ClamScan.

        This adds three new options to ClamScan and ClamDScan on Windows:

            --memory
            --kill
            --unload


        Special thanks to:
            Gianluigi Tiesi for allowing us to integrate the Windows process memory scanning feature from ClamWin into the ClamAV.
            Grace Kang for integrating the ClamScan feature, and for extending it to work with ClamDScan in addition.

Notable changes

    Updated the LLVM bytecode runtime support so that it can use LLVM versions 8 through 12 and removed support for earlier LLVM versions. Using LLVM JIT for the bytecode runtime may improve scan performance over the built-in bytecode interpreter runtime, which is the default. If you wish to build using LLVM, you must obtain a complete build of the LLVM libraries including the devopment headers and static libraries.

    There are some known issues both compiling and running the test suite with some LLVM installations. We are working to further stabilize LLVM bytecode runtime support, and document specific edge cases. Your feedback is welcome.

    For details about building ClamAV with the LLVM bytecode runtime, see the install reference documentation .

    Added a GenerateMetadataJson option to ClamD. The functionality is equivalent to the clamscan --gen-json option. Scan metadata is useful for file analysis and for debugging scan behavior. If Debug is enabled, ClamD will print out the JSON after each scan. If LeaveTemporaryFiles is enabled, ClamD will drop a metadata.json file in the scan-temp directory. You can customize the scan-temp directory path using the TemporaryDirectoryoption.

    The libclamunrar.so library's SO version now matches that of libclamav.so. The upstream UnRAR library does not have an SO version that we should match. This change is to prevent a possible collision when multiple ClamAV versions are installed.

    CMake: Added support for using an external TomsFastMath library (libtfm).

    To use an external TomsFastMath library, configure the build with the new option -D ENABLE_EXTERNAL_TOMSFASTMATH=ON. The following CMake variables may also be set as needed:

        -D TomsFastMath_INCLUDE_DIR=<path> - The directory containing tfm.h.
        -D TomsFastMath_LIBRARY=<path> - The path to the TomsFastMath library.


    Also updated the vendored TomsFastMath code to version 0.13.1.

Other improvements

    Freshclam:

        Improve ReceiveTimeout behavior so that will abort a download attempt if the download is not making significant progress. Previously this limit was an absolute time limit for the download and could abort prematurely for those on a slower connection. Special thanks to Simon Arlott for this improvement.

    Rewrote the ClamAV database archive incremental-update feature (CDIFF) from scratch in Rust. The new implementation was our first module to be rewritten in Rust. It is significantly faster at applying updates that remove large numbers of signatures from a database, such as when migrating signatures from daily.cvd to main.cvd.

    Freshclam & ClamD:

        Increased the maximum line-length for freshclam.conf and clamd.conf from 512-characters to 1024-characters. This change was by request to accommodate very long DatabaseMirror options when using access tokens in the URI.

    Removed the Heuristics.PNG.CVE-2010-1205 detection. This alert had been placed behind the --alert-broken-media( SCAN_HEURISTIC_BROKEN_MEDIA) option in 0.103.3 and 0.104 because of excessive alerts on slightly malformed but non- malicious files. Now it is completely removed.

    Added support for building ClamDTop using ncursesw if ncurses can not be found. Patch courtesy of Carlos Velasco.

Bug fixes

    ClamOnAcc: Fixed a number of assorted stability issues and added niceties for debugging ClamOnAcc. Patches courtesy of Frank Fegert.

    Fixed an issue causing byte-compare subsignatures to cause an alert when they match even if other conditions of the given logical signatures were not met.

    Fixed an issue causing XLM macro false positives when scanning XLS documents containing images if the --alert-macros( AlertOLE2Macros) option was enabled.

    Fixed an issue preventing multiple matches when scanning in all-match mode.

    Docker:

        Fixed an issue exposing the health check port. Patch courtesy of Sammy Chu.
        Fixed an issue with health check failure false positives during container startup. Patch courtesy of Olliver Schinagl.
        Set the default time zone to Etc/UTC. The --env parameter can be used to customize the time zone by setting TZ environment variable. Patch courtesy of Olliver Schinagl.

    Added support for detecting the curses library dependency even when the associated pkg-config file is not present. This resolves a build issue on some BSD distributions. Patch courtesy of Stuart Henderson.

    Assorted bug fixes and improvements.


[close]

http://www.clamav.net

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
ClamAV 0.105.0 Final
« Antwort #99 am: 04 Mai, 2022, 19:00 »
Changelog


 New Requirements

    Starting with ClamAV v0.105, the Rust toolchain is required to compile ClamAV.

    You can install the Rust toolchain for your development environment by following the instructions on the rustup website. Some binary package distributions do provide relatively up-to-date packages of the Rust toolchain, but many do not. Using rustup ensures that you have the most up-to-date Rust compiler at the time of installation. Keep your toolchain updated for new features and bug/security fixes by periodically executing:

    rustup update

    Building ClamAV requires, at a minimum, Rust compiler version 1.56, as it relies on features introduced in the Rust 2021 Edition.

    ClamAV's third-party Rust library dependencies are vendored into the release tarball (clamav-<version>.tar.gz) file that we publish on clamav.net/downloads. But, if you build from a Git clone or from an unofficial tarball taken from GitHub.com, you will need the internet to download the Rust libraries during the build.

Major changes

    Increased the default limits for file and scan size:
        MaxScanSize: 100M to 400M
        MaxFileSize: 25M to 100M
        StreamMaxLength: 25M to 100M
        PCREMaxFileSize: 25M to 100M
        MaxEmbeddedPE: 10M to 40M
        MaxHTMLNormalize: 10M to 40M
        MaxScriptNormalize: 5M to 20M
        MaxHTMLNoTags: 2M to 8M

    Added image fuzzy hash subsignatures for logical signatures.

    Image fuzzy hash subsignatures are a new feature for detecting images known to be used in phishing campaigns or otherwise used when distributing malware.

    Image fuzzy hash subsignatures follow this format:

    fuzzy_img#<hash>

For example:

logo.png;Engine:150-255,Target:0;0;fuzzy_img#af2ad01ed42993c7
logo.png-2;Engine:150-255,Target:0;0&1;49484452;fuzzy_img#af2ad01ed42993c7

This initial implementation does not support matching with a hamming distance, but it may be added in the future.

ClamAV's image fuzzy hash is very close to, but not identical to, the fuzzy hash generated by the Python imagehash package's phash() function. These are only clean-room approximations of the pHash™? algorithm. ClamAV's image fuzzy hashes are not expected to match the fuzzy hashes generated using other tools.

To generate the image fuzzy hash, run this command:

sigtool --fuzzy-img FILE(S)

Or, you may generate it through clamscan like:

clamscan --gen-json --debug /path/to/file

    The hash will appear in the JSON above the "SCAN SUMMARY" under the object named "ImageFuzzyHash".

    ClamScan and ClamDScan (Windows only):

        Added a process memory scanning feature from ClamWin's ClamScan.

        This adds three new options to ClamScan and ClamDScan on Windows:
            --memory
            --kill
            --unload

        Special thanks to:
            Gianluigi Tiesi for allowing us to integrate the Windows process memory scanning feature from ClamWin into ClamAV.
            Grace Kang for integrating the ClamScan feature, and for extending it to work with ClamDScan in addition.

Notable changes

    Updated the LLVM bytecode runtime support so that it can use LLVM versions 8 through 12 and removed support for earlier LLVM versions. Using LLVM JIT for the bytecode runtime may improve scan performance over the built-in bytecode interpreter runtime, which is the default. If you wish to build using LLVM, you must obtain a complete build of the LLVM libraries including the development headers and static libraries.

    There are some known issues in compiling and running the test suite with some LLVM installations. We are working to further stabilize LLVM bytecode runtime support, and document specific edge cases. Your feedback is welcome.

    For details about building ClamAV with the LLVM bytecode runtime, see the install reference documentation.

    Added a GenerateMetadataJson option to ClamD. The functionality is equivalent to the clamscan --gen-json option. Scan metadata is useful for file analysis and for debugging scan behavior. If Debug is enabled, ClamD will print out the JSON after each scan. If LeaveTemporaryFiles is enabled, ClamD will drop a metadata.json file in the scan-temp directory. You can customize the scan-temp directory path using the TemporaryDirectory option.

    The libclamunrar.so library's SO version now matches that of libclamav.so. The upstream UnRAR library does not have an SO version that we should match. This change is to prevent a possible collision when multiple ClamAV versions are installed.

    CMake: Added support for using an external TomsFastMath library (libtfm).

    To use an external TomsFastMath library, configure the build with the new option -D ENABLE_EXTERNAL_TOMSFASTMATH=ON. The following CMake variables may also be set as needed:
        -D TomsFastMath_INCLUDE_DIR=<path> - The directory containing tfm.h.
        -D TomsFastMath_LIBRARY=<path> - The path to the TomsFastMath library.

    Also updated the vendored TomsFastMath code to version 0.13.1.

Other improvements

    Freshclam:
        Improve ReceiveTimeout behavior so that will abort a download attempt if the download is not making significant progress. Previously this limit was an absolute time limit for the download and could abort prematurely for those on a slower connection. Special thanks to Simon Arlott for this improvement.

    Rewrote the ClamAV database archive incremental-update feature (CDIFF) from scratch in Rust. The new implementation was our first module to be rewritten in Rust. It is significantly faster at applying updates that remove large numbers of signatures from a database, such as when migrating signatures from daily.cvd to main.cvd.

    Freshclam & ClamD:
        Increased the maximum line-length for freshclam.conf and clamd.conf from 512-characters to 1024-characters. This change was by request to accommodate very long DatabaseMirror options when using access tokens in the URI.

    Removed the Heuristics.PNG.CVE-2010-1205 detection. This alert had been placed behind the --alert-broken-media (SCAN_HEURISTIC_BROKEN_MEDIA) option in 0.103.3 and 0.104 because of excessive alerts on slightly malformed but non- malicious files. Now it is completely removed.

    Added support for building ClamDTop using ncursesw if ncurses can not be found. Patch courtesy of Carlos Velasco.

Bug fixes

The CVE's fixes below are also addressed in versions 0.104.3 and 0.103.6.

    CVE-2022-20803: Fixed a possible double-free vulnerability in the OLE2 file parser. Issue affects versions 0.104.0 through 0.104.2. Issue identified by OSS-Fuzz.

    CVE-2022-20770: Fixed a possible infinite loop vulnerability in the CHM file parser. Issue affects versions 0.104.0 through 0.104.2 and LTS version 0.103.5 and prior versions. Thank you to Micha? Dardas for reporting this issue.

    CVE-2022-20796: Fixed a possible NULL-pointer dereference crash in the scan verdict cache check. Issue affects versions 0.103.4, 0.103.5, 0.104.1, and 0.104.2. Thank you to Alexander Patrakov and Antoine Gatineau for reporting this issue.

    CVE-2022-20771: Fixed a possible infinite loop vulnerability in the TIFF file parser. Issue affects versions 0.104.0 through 0.104.2 and LTS version 0.103.5 and prior versions. The issue only occurs if the "--alert-broken-media" ClamScan option is enabled. For ClamD, the affected option is "AlertBrokenMedia yes", and for libclamav it is the "CL_SCAN_HEURISTIC_BROKEN_MEDIA" scan option. Thank you to Micha? Dardas for reporting this issue.

    CVE-2022-20785: Fixed a possible memory leak in the HTML file parser / Javascript normalizer. Issue affects versions 0.104.0 through 0.104.2 and LTS version 0.103.5 and prior versions. Thank you to Micha? Dardas for reporting this issue.

    CVE-2022-20792: Fixed a possible multi-byte heap buffer overflow write vulnerability in the signature database load module. The fix was to update the vendored regex library to the latest version. Issue affects versions 0.104.0 through 0.104.2 and LTS version 0.103.5 and prior versions. Thank you to Micha? Dardas for reporting this issue.

    ClamOnAcc: Fixed a number of assorted stability issues and added niceties for debugging ClamOnAcc. Patches courtesy of Frank Fegert.

    Fixed an issue causing byte-compare subsignatures to cause an alert when they match even if other conditions of the given logical signatures were not met.

    Fixed an issue causing XLM macro false positives when scanning XLS documents containing images if the --alert-macros (AlertOLE2Macros) option was enabled.

    Fixed an issue causing signature alerts for images in XLS files to be lost.

    Fixed an issue preventing multiple matches when scanning in all-match mode.

    Docker:
        Fixed an issue exposing the health check port. Patch courtesy of Sammy Chu.
        Fixed an issue with health check failure false positives during container startup. Patch courtesy of Olliver Schinagl.
        Set the default time zone to Etc/UTC. The --env parameter can be used to customize the time zone by setting TZ environment variable. Patch courtesy of Olliver Schinagl.
        Fixed an issue where ClamD would listen only for IPv4 connections in environments where IPv6 is preferred. ClamD will now listen to all addresses available (IPv4 and IPv6). This is the default behavior of ClamD. Patch courtesy of Andre Breiler.

    Enable support for ncursesw, the wide-character / unicode version of ncurses.

    Added support for detecting the curses library dependency even when the associated pkg-config file is not present. This resolves a build issue on some BSD distributions. Patch courtesy of Stuart Henderson.

    Windows: Fix utf8 filepath issues affecting both scanning and log messages.

    Assorted bug fixes and improvements.

[close]

http://www.clamav.net

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
ClamAV 0.105.1
« Antwort #100 am: 27 Juli, 2022, 11:00 »
Changelog


- Upgrade the vendored UnRAR library to version 6.1.7.
- Fix issue building macOS universal binaries in some configurations.
- Silence error message when the logical signature maximum functionality level
  is lower than the current functionality level.
- Fix scan error when scanning files containing malformed images that cannot be
  loaded to calculate an image fuzzy hash.
- Fix logical signature "Intermediates" feature.
- Relax constraints on slightly malformed zip archives that contain overlapping
  file entries.

[close]

http://www.clamav.net

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
ClamAV 1.0.0 RC
« Antwort #101 am: 26 Oktober, 2022, 21:00 »
Changelog


### Major changes

- Support for decrypting read-only OLE2-based XLS files that are encrypted with
  the default "VelvetSweatshop" password.
  Use of the VelvetSweatshop password will now appear in the metadata JSON.
  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/700

- Overhauled the implementation of the all-match feature. The newer code is more
  reliable and easier to maintain.
  - This project fixed several known issues with signature detection in all-
    match mode:
    - Enabled embedded file-type-recognition-signatures to match when a malware
      signature also matched in a scan of the same layer.
    - Enabled bytecode signatures to run in all-match mode after a match has
      occurred.
    - Fixed an assortment of all-match edge case issues:
  - Added multiple test cases to verify correct all-match behavior.
  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/687

- Added a new callback to the public API for inspecting file content during a
  scan at each layer of archive extraction.
  - The new callback function type is `clcb_file_inspection` defined in
    `clamav.h`.
  - The function `cl_engine_set_clcb_file_inspection()` may be used to enable
    the callback prior to performing a scan.
  - This new callback is to be considered *unstable* for the 1.0 release.
    We may alter this function in a subsequent feature version.
  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/170

- Added a new function to the public API for unpacking CVD signature archives.
  - The new function is `cl_cvdunpack()`. The last parameter for the function
    may be set to verify if a CVD's signature is valid before unpacking the CVD
    content to the destination directory.
  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/690

### Other improvements

- Add checks to limit PDF object extraction recursion.
  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/629

- Increased the limit for memory allocations based on untrusted input and
  altered the warning message when the limit is exceeded so that it is more
  helpful and less dramatic.
  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/723

- Dramatically improved the build time of libclamav-Rust unit tests.
  The unit test build is included in the time limit for the test itself and was
  timing out on slower systems. The ClamAV Rust code modules now share the same
  build directory, which also reduces the amount of disk space used for the
  build.
  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/694

- Windows: The debugging symbol (PDB) files are now installed alongside the DLL
- and LIB library files when built in "RelWithDebInfo" or "Debug" mode.
  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/669

- Relaxed the constraints on the check for overlapping ZIP file entries so as
  not to alert on slightly malformed, but non-malicious, Java (JAR) archives.
  - Talos escalations issues:
  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/561

- Increased the time limit in FreshClam before warning if the DNS entry is
  stale. In combination with changes to update the DNS entry more
  frequently, this should prevent false alarms of failures in the database
  publication system.
  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/597

- Docker: The C library header files are now included in the Docker image.
  Patch courtesy of GitHub user TerminalFi.
  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/693

- Show the BYTECODE_RUNTIME build options when using the `ccmake` GUI for CMake.
  Patch courtesy of ????? ????????.
  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/678

- Added explicit minimum and maximum supported LLVM versions so that the build
  will fail if you try to build with the version that is too old or too new and
  will print a helpful message rather than simply failing to compile because of
  compatibility issues. Patch courtesy of Matt Jolly.
  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/692

### Bug fixes

- Assorted code quality fixes. These are not security issues and will not be
  backported to prior feature versions:
  - Several heap buffer overflows while loading PDB and WDB databases were found
    by OSS-Fuzz and by Micha? Dardas.
    - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/530
    - Follow-up Optimization: https://github.com/Cisco-Talos/clamav/pull/712

  - oss-fuzz 43843: heap buffer overflow read (1) cli_sigopts_handler
    - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/560

  - oss-fuzz 44849: heap buffer overflow read (4) in HTML/js-norm
    - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/503

  - oss-fuzz 43816: heap buffer overflow read (8) in cli_bcomp_freemeta
    - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/583

  - oss-fuzz 43832: heap buffer overflow read (2) in cli_parse_add
    - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/611

  - oss-fuzz 44493: integer overflow in cli_scannulsft
    - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/554

  - CIFuzz leak detected in IDB parser
    - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/547

  - oss-fuzz assorted signature parser leaks
    - GitHub pull requests:
      - https://github.com/Cisco-Talos/clamav/pull/532
      - https://github.com/Cisco-Talos/clamav/pull/533
      - https://github.com/Cisco-Talos/clamav/pull/535

  - oss-fuzz 40601: leak detected in pdf_parseobj
    - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/553

- Fixed a build failure when using LIBCLAMAV_ONLY mode with tests enabled.
  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/714

- Fixed an issue verifying EXE/DLL authenticode signatures to determine a given
  file can be trusted (skipped).
  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/727

- Fixed a caching bug relating to the Container and Intermediates logical
  signature condition.
  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/724

- Fixed a build issues when build with RAR disabled or when building with an
  external libmspack library rather than the vendored library.
  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/672

- Fixed the capitalization of the `-W` option for `clamonacc` in the `clamonacc`
  manpage. Patch courtesy of GitHub user monkz.
  - GitHub pull requests:
    - https://github.com/Cisco-Talos/clamav/pull/709
    - https://github.com/Cisco-Talos/clamav/pull/710

- macOS: Fixed an issue with memory-map (`mmap`) system call detection affecting
  versions 0.105 and 0.104. Memory maps may be used in ClamAV to improve
  signature load performance, scan performance, and RAM usage.
  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/705

- Fixed a performance issue with Rust code when the build type is not explicitly
  set to "Release" or "RelWithDebInfo". The Rust default build type is now
  "RelWithDebInfo" just like the C code, instead of Debug.
  This means it is now optimized by default.
  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/701

- Fixed an issue loading Yara rules containing regex strings with an escaped
  forward-slash (`\/`) followed by a colon (`:`).
  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/696

- Fixed an issue detecting and scanning ZIP file entries appended to very small
  files. The fix is part of the all-match feature overhaul.

- Fixed a detection issue with EXE/DLL import-address-table hash signatures that
  specify a wildcard (`*`) for the size field. The fix is part of the all-match
  feature overhaul.

- Fix the default bytecode timeout value listed in the manpages and in the
  sample config files. Patches courtesy of Liam Jarvis and Ben Bodenmiller.
  - GitHub pull requests:
    - https://github.com/Cisco-Talos/clamav/pull/631
    - https://github.com/Cisco-Talos/clamav/pull/661

- Fix issue building the libclamav_rust test program when running `ctest` if
  building with `BYTECODE_RUNTIME=llvm` and when the `FindLLVM.cmake` module is
  used to find the LLVM libraries. Patch courtesy of GitHub user teoberi.
  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/572

[close]

http://www.clamav.net

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
ClamAV 1.0.0 Final
« Antwort #102 am: 29 November, 2022, 19:00 »
Changelog


    Major changes:

    Support for decrypting read-only OLE2-based XLS files that are encrypted with the default password. Use of the default password will now appear in the metadata JSON.

    Overhauled the implementation of the all-match feature. The newer code is more reliable and easier to maintain:

    This project fixed several known issues with signature detection in all- match mode:

    Enabled embedded file-type recognition signatures to match when a malware signature also matched in a scan of the same layer.
    Enabled bytecode signatures to run in all-match mode after a match has occurred.
    Fixed an assortment of all-match edge case issues.
    Added multiple test cases to verify correct all-match behavior.
    Added a new callback to the public API for inspecting file content during a scan at each layer of archive extraction:
    The new callback function type is clcb_file_inspection defined in clamav.h.
    The function cl_engine_set_clcb_file_inspection() may be used to enable the callback prior to performing a scan.
    This new callback is to be considered unstable for the 1.0 release. We may alter this function in a subsequent feature version.
    Added a new function to the public API for unpacking CVD signature archives:
    The new function is cl_cvdunpack(). The last parameter for the function may be set to verify if a CVD's signature is valid before unpacking the CVD content to the destination directory.
    The option to build with an external TomsFastMath library has been removed. ClamAV requires non-default build options for TomsFastMath to support bigger floating point numbers. Without this change, database and Windows EXE/DLL authenticode certificate validation may fail. The ENABLE_EXTERNAL_TOMSFASTMATH build is now ignored.
    GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/742
    Moved the Dockerfile and supporting scripts from the main ClamAV repository over to a new repository: https://github.com/Cisco-Talos/clamav-docker
    The separate repository will make it easier to update the images and fix issues with images for released ClamAV versions.
    Any users building the ClamAV Docker image rather than pulling them from Docker Hub will have to get the latest Docker files from the new location.
    Increased the SONAME major version for libclamav because of ABI changes between the 0.103 LTS release and the 1.0 LTS release.

    Other improvements:

    Add checks to limit PDF object extraction recursion.
    Increased the limit for memory allocations based on untrusted input and altered the warning message when the limit is exceeded so that it is more helpful and less dramatic.
    Dramatically improved the build time of libclamav-Rust unit tests. The unit test build is included in the time limit for the test itself and was timing out on slower systems. The ClamAV Rust code modules now share the same build directory, which also reduces the amount of disk space used for the build.
    For Windows: The debugging symbol (PDB) files are now installed alongside the DLL and LIB library files when built in "RelWithDebInfo" or "Debug" mode.
    Relaxed the constraints on the check for overlapping ZIP file entries so as not to alert on slightly malformed, but non-malicious, Java (JAR) archives.
    Increased the time limit in FreshClam before warning if the DNS entry is stale. In combination with changes to update the DNS entry more frequently, this should prevent false alarms of failures in the database publication system.
    Docker: The C library header files are now included in the Docker image. Patch courtesy of GitHub user TerminalFi.
    Show the BYTECODE_RUNTIME build options when using the ccmake GUI for CMake. Patch courtesy of ????? ????????.
    Added explicit minimum and maximum supported LLVM versions so that the build will fail if you try to build with a version that is too old or too new and will print a helpful message rather than simply failing to compile because of compatibility issues. Patch courtesy of Matt Jolly.
    Fixed compiler warnings that may turn into errors in Clang 16. Patch courtesy of Michael Orlitzky.
    Allow building with a custom RPATH so that the executables may be moved after build in a development environment to a final installation directory.

    Bug fixes:

    Assorted code quality fixes. These are not security issues and will not be backported to prior feature versions:
    Several heap buffer overflows while loading PDB and WDB databases were found by OSS-Fuzz and by Michal Dardas.
    Follow-up Optimization: https://github.com/Cisco-Talos/clamav/pull/712
    oss-fuzz 43843: heap buffer overflow read (1) cli_sigopts_handler
    oss-fuzz 44849: heap buffer overflow read (4) in HTML/js-norm
    oss-fuzz 43816: heap buffer overflow read (8) in cli_bcomp_freemeta
    oss-fuzz 43832: heap buffer overflow read (2) in cli_parse_add
    oss-fuzz 44493: integer overflow in cli_scannulsft
    CIFuzz leak detected in IDB parser
    oss-fuzz assorted signature parser leaks
    oss-fuzz 40601: leak detected in pdf_parseobj
    Fixed a build failure when using LIBCLAMAV_ONLY mode with tests enabled.
    Fixed an issue verifying EXE/DLL authenticode signatures to determine a given file can be trusted (skipped).
    Fixed a caching bug relating to the Container and Intermediates logical signature condition.
    Fixed a build issue when build with RAR disabled or when building with an external libmspack library rather than the bundled library.
    Fixed the capitalization of the -W option for clamonacc in the clamonacc manpage. Patch courtesy of GitHub user monkz.
    Fixed a performance issue with Rust code when the build type is not explicitly set to "Release" or "RelWithDebInfo". The Rust default build type is now "RelWithDebInfo" just like the C code, instead of Debug. This means it is now optimized by default.
    Fixed an issue loading Yara rules containing regex strings with an escaped forward-slash (/) followed by a colon (:).
    Fixed an issue detecting and scanning ZIP file entries appended to very small files. The fix is part of the all-match feature overhaul.
    Fixed a detection issue with EXE/DLL import-address-table hash signatures that specify a wildcard (*) for the size field. The fix is part of the all-match feature overhaul.
    Fixed the default bytecode timeout value listed in the manpages and in the sample config files. Patches courtesy of Liam Jarvis and Ben Bodenmiller.
    Fixed an issue building the libclamav_rust test program when running ctest if building with BYTECODE_RUNTIME=llvm and when the FindLLVM.cmake module is used to find the LLVM libraries. Patch courtesy of GitHub user teoberi.
    Fixed an issue where scans sent to clamd with the all-match mode enabled caused all subsequent scans to also use all-match mode.
    Fixed bug when starting clamonacc with the --log=FILE option that created randomly named files in the current directory.
    Other assorted bug fixes.

[close]

http://www.clamav.net

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
ClamAV 1.0.1
« Antwort #103 am: 16 Februar, 2023, 20:00 »
Whats new:>>

    ClamAV 1.0.1 is a critical patch release with the following fixes:

    CVE-2023-20032: Fixed a possible remote code execution vulnerability in the HFS+ file parser. The issue affects versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier. Thank you to Simon Scannell for reporting this issue.
    CVE-2023-20052: Fixed a possible remote information leak vulnerability in the DMG file parser. The issue affects versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier. Thank you to Simon Scannell for reporting this issue.
    Fix an allmatch detection issue with the preclass bytecode hook.
    Update the vendored libmspack library to version 0.11alpha.

https://www.clamav.net

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
ClamAV 1.1.0
« Antwort #104 am: 02 Mai, 2023, 19:00 »
Changelog


ClamAV 1.1.0 includes the following improvements and changes:

### Major changes

- Added the ability to extract images embedded in HTML CSS `<style>` blocks.
  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/813

- Updated to Sigtool so that the `--vba` option will extract VBA code from
  Microsoft Office documents the same way that libclamav extracts VBA.
  This resolves several issues where Sigtool could not extract VBA.
  Sigtool will also now display the normalized VBA code instead of the
  pre-normalized VBA code.
  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/852

- Added a new ClamScan and ClamD option: `--fail-if-cvd-older-than=days`.
  Additionally, we introduce `FailIfCvdOlderThan` as a `clamd.conf` synonym for
  `--fail-if-cvd-older-than`. When passed, it causes ClamD to exit on startup
  with a non-zero return code if the virus database is older than the specified
  number of days.
  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/867

- Added a new function `cl_cvdgetage()` to the libclamav API.
  This function will retrieve the age in seconds of the youngest file in a
  database directory, or the age of a single CVD (or CLD) file.
  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/867

- Added a new function `cl_engine_set_clcb_vba()` to the libclamav API.
  Use this function to set a `cb_vba` callback function.
  The cb_vba callback function will be run whenever VBA is extracted from
  office documents. The provided data will be a normalized copy of the
  extracted VBA.
  This callback was added to support Sigtool so that it can use the same VBA
  extraction logic that ClamAV uses to scan documents.
  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/852

## Other improvements

- Removed the vendored TomsFastMath library in favor of using OpenSSL to
  perform "big number"/multiprecision math operations.
  Work courtesy of Sebastian Andrzej Siewior.
  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/840

- Build system: Added CMake option `DO_NOT_SET_RPATH` to avoid setting
  `RPATH` on Unix systems.
  Feature courtesy of Sebastian Andrzej Siewior.
  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/815

- Build system: Enabled version-scripts with CMake to limit symbol exports for
  libclamav, libfreshclam, libclamunrar_iface, and libclamunrar shared
  libraries on Unix systems, excluding macOS.
  Improvement courtesy of Orion Poplawski and Sebastian Andrzej Siewior.
  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/776

- Build system: Enabled users to pass in custom Rust compiler flags using the
  `RUSTFLAGS` CMake variable.
  Feature courtesy of Orion Poplawski.
  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/835

- Removed a hard-coded alert for CVE-2004-0597.
  The CVE is old enough that it is no longer a threat and the detection had
  occasional false-positives.
  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/855

- Set Git attributes to prevent Git from altering line endings for Rust
  vendored libraries. Third-party Rust libraries are bundled in the ClamAV
  release tarball. We do not commit them to our own Git repository, but
  community package maintainers may now store the tarball contents in Git.
  The Rust build system verifies the library manifest, and this change
  ensures that the hashes are correct.
  Improvement courtesy of Nicolas R.
  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/800

- Fixed compile time warnings.
  Improvement courtesy of R?zvan Cojocaru.
  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/795

- Added a minor optimization when matching domain name regex signatures for
  PDB, WDB and CDB type signatures.
  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/837

- Build system: Enabled the ability to select a specific Python version.
  When building, you may use the CMake option `-D PYTHON_FIND_VER=<version>`
  to choose a specific Python version.
  Feature courtesy of Matt Jolly.
  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/787

- Added improvements to the ClamOnAcc process log output so that it is
  easier to diagnose bugs.
  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/822

- Windows: Enabled the MSI installer to upgrade between feature versions more
  easily when ClamAV is installed to a location different from the default
  (i.e., not `C:\Program Files\ClamAV`). This means that the MSI installer can
  find a previous ClamAV 1.0.x installation to upgrade to ClamAV 1.1.0.
  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/872

- Sigtool: Added the ability to change the location of the temp directory
  using the `--tempdir` option and added the ability to retain the temp files
  created by Sigtool using the `--leave-temps` option.
  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/852

- Other minor improvements.

### Bug fixes

- Fixed the broken `ExcludePUA` / `--exclude-pua` feature.
  Fix courtesy of Ged Haywood and Shawn Iverson.
  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/780

- Fixed an issue with integer endianness when parsing Windows executables on
  big-endian systems.
  Fix courtesy of Sebastian Andrzej Siewior.
  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/814

- Fixed a possible stack overflow read when parsing WDB signatures.
  This issue is not a vulnerability.
  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/807

- Fixed a possible index out of bounds when loading CRB signatures.
  This issue is not a vulnerability.
  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/810

- Fixed a possible use after free when reading logical signatures.
  This issue is not a vulnerability.
  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/811

- Fixed a possible heap overflow read when reading PDB signatures.
  This issue is not a vulnerability.
  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/812

- Fixed a possible heap overflow read in javascript normalizer module.
  This issue is not a vulnerability.
  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/868

- Fixed two bugs that would cause Freshclam to fail update when applying a
  CDIFF database patch if that patch adds a file to the database archive
  or removes a file from the database archive.
  This bug also caused Sigtool to fail to create such a patch.
  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/893

- Fixed an assortment of complaints identified by Coverity static analysis.
  - GitHub pull requests:
    - https://github.com/Cisco-Talos/clamav/pull/891
    - https://github.com/Cisco-Talos/clamav/pull/899

- Fixed one of the Freshclam tests that was failing on some Fedora systems
  due to a bug printing debug-level log messages to stdout.
  Fix courtesy of Arjen de Korte.
  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/881

- Correctly remove temporary files generated by the VBA and XLM extraction
  modules so that the files are not leaked in patched versions of ClamAV
  where temporary files are written directly to the temp-directory instead
  of writing to a unique subdirectory.
  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/894

[close]

https://www.clamav.net

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )