On Fri, 2021-04-23 at 08:55 +0200, Sebastian Andrzej Siewior wrote:
> On 2021-04-22 16:58:46 [+0100], Adam D. Barratt wrote:
> > I drafted some text for an SUA; comments / complete rewriting
> > welcome:
> > 
> > =========================================================
> > ClamAV is an AntiVirus toolkit for Unix.
> > 
> > Upstream published version 0.103.2.
> > 
> > This is a bug-fix release.
> > 
> > Changes since 0.102.3 currently in buster include the removal of
> > the
> > "safe browsing" signature database, and fixes for security issues.
> This version also introduced non-blocking database reloads in which
> clamd temporary requires twice as much memory. The behaviour is
> controlled by the ConcurrentDatabaseReload option.

Ah, apologies for not spotting that from your earlier mail. An updated
draft:

===================================================================
ClamAV is an AntiVirus toolkit for Unix.

Upstream published version 0.103.2.

This is a bug-fix release. Changes since 0.102.3 currently in buster
include the removal of the "safe browsing" signature database, and
fixes for security issues.

The new version also introduces the ability for the ClamAV daemon to
reload its databases in a non-blocking manner. This means that scanning
can continue to operate while the new databae is made active, but as a
side effect both the old and new databases must be held in memory at the
same time, causing a temporary increase in memory requirements. If this
increase causes an issue for your environment, the previous non-blocking
behaviour may be restored by setting "ConcurrentDatabaseReload no" in
your clamd.conf.

CVE-2021-1405

    A vulnerability in the email parsing module could allow an
    unauthenticated, remote attacker to cause a denial of service
    condition on an affected device

If you use clamav, we recommend that you install this update.
===================================================================

Regards,

Adam

Reply via email to