Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-20032 (GCVE-0-2023-20032)
Vulnerability from cvelistv5
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Cisco | Cisco Secure Web Appliance |
Version: 11.7.0-406 Version: 11.7.0-418 Version: 11.7.1-049 Version: 11.7.1-006 Version: 11.7.1-020 Version: 11.7.2-011 Version: 11.8.0-414 Version: 11.8.1-023 Version: 11.8.3-018 Version: 11.8.3-021 Version: 12.0.1-268 Version: 12.0.3-007 Version: 12.5.2-007 Version: 12.5.1-011 Version: 12.5.4-005 Version: 12.5.5-004 Version: 14.5.0-498 Version: 14.0.3-014 Version: 14.0.2-012 |
|||||||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T08:57:35.875Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "cisco-sa-clamav-q8DThCy", tags: [ "x_transferred", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-q8DThCy", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Cisco Secure Web Appliance", vendor: "Cisco", versions: [ { status: "affected", version: "11.7.0-406", }, { status: "affected", version: "11.7.0-418", }, { status: "affected", version: "11.7.1-049", }, { status: "affected", version: "11.7.1-006", }, { status: "affected", version: "11.7.1-020", }, { status: "affected", version: "11.7.2-011", }, { status: "affected", version: "11.8.0-414", }, { status: "affected", version: "11.8.1-023", }, { status: "affected", version: "11.8.3-018", }, { status: "affected", version: "11.8.3-021", }, { status: "affected", version: "12.0.1-268", }, { status: "affected", version: "12.0.3-007", }, { status: "affected", version: "12.5.2-007", }, { status: "affected", version: "12.5.1-011", }, { status: "affected", version: "12.5.4-005", }, { status: "affected", version: "12.5.5-004", }, { status: "affected", version: "14.5.0-498", }, { status: "affected", version: "14.0.3-014", }, { status: "affected", version: "14.0.2-012", }, ], }, { product: "Cisco Secure Endpoint", vendor: "Cisco", versions: [ { status: "affected", version: "6.1.9", }, { status: "affected", version: "6.2.5", }, { status: "affected", version: "6.3.7", }, { status: "affected", version: "6.3.3", }, { status: "affected", version: "7.0.5", }, { status: "affected", version: "7.1.1", }, { status: "affected", version: "1.12.1", }, { status: "affected", version: "1.12.2", }, { status: "affected", version: "1.12.3", }, { status: "affected", version: "1.12.7", }, { status: "affected", version: "1.12.4", }, { status: "affected", version: "1.11.0", }, { status: "affected", version: "1.10.2", }, { status: "affected", version: "1.10.0", }, { status: "affected", version: "1.14.0", }, { status: "affected", version: "1.6.0", }, { status: "affected", version: "1.9.0", }, { status: "affected", version: "1.8.1", }, { status: "affected", version: "1.8.0", }, { status: "affected", version: "1.7.0", }, { status: "affected", version: "7.2.13", }, { status: "affected", version: "7.3.5", }, ], }, { product: "Cisco Secure Endpoint Private Cloud Administration Portal", vendor: "Cisco", versions: [ { status: "affected", version: "N/A", }, ], }, ], descriptions: [ { lang: "en", value: "On Feb 15, 2023, the following vulnerability in the ClamAV scanning library was disclosed:\r\n\r \r A vulnerability in the HFS+ partition file parser of ClamAV versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier could allow an unauthenticated, remote attacker to execute arbitrary code.\r\n\r \r This vulnerability is due to a missing buffer size check that may result in a heap buffer overflow write. An attacker could exploit this vulnerability by submitting a crafted HFS+ partition file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to execute arbitrary code with the privileges of the ClamAV scanning process, or else crash the process, resulting in a denial of service (DoS) condition.\r\n\r For a description of this vulnerability, see the ClamAV blog [\"https://blog.clamav.net/\"].", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is aware that a proof-of-concept is available that demonstrates that this vulnerability can be used to cause a buffer overflow and subsequent process termination.\r\n\r\nAdditional technical information is also available that describes this vulnerability in detail.\r\n\r\nThe Cisco PSIRT is not aware of any malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-120", description: "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-01-25T16:57:34.558Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-clamav-q8DThCy", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-q8DThCy", }, ], source: { advisory: "cisco-sa-clamav-q8DThCy", defects: [ "CSCwd74135", "CSCwd74134", "CSCwd74133", "CSCwe18204", "CSCwd74132", ], discovery: "EXTERNAL", }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2023-20032", datePublished: "2023-02-16T15:24:05.173Z", dateReserved: "2022-10-27T18:47:50.315Z", dateUpdated: "2024-08-02T08:57:35.875Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { fkie_nvd: { configurations: "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:linux:*:*\", \"versionEndExcluding\": \"1.20.2\", \"matchCriteriaId\": \"40572314-306A-4594-A279-216B8139B7A0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:macos:*:*\", \"versionEndExcluding\": \"1.21.1\", \"matchCriteriaId\": \"726A787E-E64F-4906-9BAE-4F79EB530F1F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:windows:*:*\", \"versionEndExcluding\": \"7.5.9\", \"matchCriteriaId\": \"C4F63447-CA0E-43FC-8FF1-B4032D21E32A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:windows:*:*\", \"versionStartIncluding\": \"8.0.1.21160\", \"versionEndExcluding\": \"8.1.5\", \"matchCriteriaId\": \"D0FC45E7-C4AB-4AC5-87AB-0ED1508CCFF3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:secure_endpoint_private_cloud:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"3.6.0\", \"matchCriteriaId\": \"07BFC8FC-6CF0-49DA-B4ED-5B7936A4233E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:web_security_appliance:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"12.5.6\", \"matchCriteriaId\": \"2EFF7AB1-33C6-4627-9950-2F2E48BCCC7E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:web_security_appliance:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"14.0.0\", \"versionEndExcluding\": \"14.0.4-005\", \"matchCriteriaId\": \"A8361D69-981F-4F28-86F9-EFF202C9E537\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:web_security_appliance:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"14.5.0\", \"versionEndExcluding\": \"14.5.1-013\", \"matchCriteriaId\": \"CF6E494A-FCA7-4569-847D-2AA3C14C3E79\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:web_security_appliance:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"15.0.0\", \"versionEndExcluding\": \"15.0.0-254\", \"matchCriteriaId\": \"BD8B1F66-9FD3-4970-BDA3-26241B18B4AA\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"0.103.7\", \"matchCriteriaId\": \"BDF08008-9C84-4075-8AB7-233209E4F3C0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"0.104.0\", \"versionEndIncluding\": \"0.105.1\", \"matchCriteriaId\": \"14FA7424-A3E5-4F46-83F8-E9767330F1CE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:clamav:clamav:1.0.0:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"A381BD3C-88E0-41FD-91E6-26BCF78B84CA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:clamav:clamav:1.0.0:rc:*:*:*:*:*:*\", \"matchCriteriaId\": \"88BE0B1C-4515-40EA-ADDD-A04BF50743DA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:clamav:clamav:1.0.0:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB00FEFE-F8A2-482D-A7EE-002DA4E10FF6\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"3.0.0\", \"versionEndExcluding\": \"3.7.35\", \"matchCriteriaId\": \"88CF061E-FFD8-48DE-887F-2119C916E2B4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"3.8.0\", \"versionEndExcluding\": \"3.11.23\", \"matchCriteriaId\": \"F499B698-4EB6-4262-BAF4-9BDE7F114805\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.3.0\", \"versionEndExcluding\": \"4.3.17\", \"matchCriteriaId\": \"40519377-ECDC-41E2-B6A6-7F601AC28ACD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.4.0\", \"versionEndExcluding\": \"4.6.4\", \"matchCriteriaId\": \"77BAC9BA-B215-490F-9202-617B1B4E7C8A\"}]}]}]", descriptions: "[{\"lang\": \"en\", \"value\": \"On Feb 15, 2023, the following vulnerability in the ClamAV scanning library was disclosed:\\r\\n\\r \\r A vulnerability in the HFS+ partition file parser of ClamAV versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier could allow an unauthenticated, remote attacker to execute arbitrary code.\\r\\n\\r \\r This vulnerability is due to a missing buffer size check that may result in a heap buffer overflow write. An attacker could exploit this vulnerability by submitting a crafted HFS+ partition file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to execute arbitrary code with the privileges of the ClamAV scanning process, or else crash the process, resulting in a denial of service (DoS) condition.\\r\\n\\r For a description of this vulnerability, see the ClamAV blog [\\\"https://blog.clamav.net/\\\"].\"}]", id: "CVE-2023-20032", lastModified: "2024-11-21T07:40:23.950", metrics: "{\"cvssMetricV31\": [{\"source\": \"ykramarz@cisco.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 9.8, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.9}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 9.8, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.9}]}", published: "2023-03-01T08:15:11.907", references: "[{\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-q8DThCy\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-q8DThCy\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]", sourceIdentifier: "ykramarz@cisco.com", vulnStatus: "Modified", weaknesses: "[{\"source\": \"ykramarz@cisco.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-120\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-787\"}]}]", }, nvd: "{\"cve\":{\"id\":\"CVE-2023-20032\",\"sourceIdentifier\":\"ykramarz@cisco.com\",\"published\":\"2023-03-01T08:15:11.907\",\"lastModified\":\"2024-11-21T07:40:23.950\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"On Feb 15, 2023, the following vulnerability in the ClamAV scanning library was disclosed:\\r\\n\\r \\r A vulnerability in the HFS+ partition file parser of ClamAV versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier could allow an unauthenticated, remote attacker to execute arbitrary code.\\r\\n\\r \\r This vulnerability is due to a missing buffer size check that may result in a heap buffer overflow write. An attacker could exploit this vulnerability by submitting a crafted HFS+ partition file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to execute arbitrary code with the privileges of the ClamAV scanning process, or else crash the process, resulting in a denial of service (DoS) condition.\\r\\n\\r For a description of this vulnerability, see the ClamAV blog [\\\"https://blog.clamav.net/\\\"].\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-120\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:linux:*:*\",\"versionEndExcluding\":\"1.20.2\",\"matchCriteriaId\":\"40572314-306A-4594-A279-216B8139B7A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:macos:*:*\",\"versionEndExcluding\":\"1.21.1\",\"matchCriteriaId\":\"726A787E-E64F-4906-9BAE-4F79EB530F1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:windows:*:*\",\"versionEndExcluding\":\"7.5.9\",\"matchCriteriaId\":\"C4F63447-CA0E-43FC-8FF1-B4032D21E32A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:windows:*:*\",\"versionStartIncluding\":\"8.0.1.21160\",\"versionEndExcluding\":\"8.1.5\",\"matchCriteriaId\":\"D0FC45E7-C4AB-4AC5-87AB-0ED1508CCFF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:secure_endpoint_private_cloud:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.6.0\",\"matchCriteriaId\":\"07BFC8FC-6CF0-49DA-B4ED-5B7936A4233E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:web_security_appliance:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"12.5.6\",\"matchCriteriaId\":\"2EFF7AB1-33C6-4627-9950-2F2E48BCCC7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:web_security_appliance:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.0.0\",\"versionEndExcluding\":\"14.0.4-005\",\"matchCriteriaId\":\"A8361D69-981F-4F28-86F9-EFF202C9E537\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:web_security_appliance:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.5.0\",\"versionEndExcluding\":\"14.5.1-013\",\"matchCriteriaId\":\"CF6E494A-FCA7-4569-847D-2AA3C14C3E79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:web_security_appliance:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.0.0\",\"versionEndExcluding\":\"15.0.0-254\",\"matchCriteriaId\":\"BD8B1F66-9FD3-4970-BDA3-26241B18B4AA\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"0.103.7\",\"matchCriteriaId\":\"BDF08008-9C84-4075-8AB7-233209E4F3C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"0.104.0\",\"versionEndIncluding\":\"0.105.1\",\"matchCriteriaId\":\"14FA7424-A3E5-4F46-83F8-E9767330F1CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:clamav:clamav:1.0.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"A381BD3C-88E0-41FD-91E6-26BCF78B84CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:clamav:clamav:1.0.0:rc:*:*:*:*:*:*\",\"matchCriteriaId\":\"88BE0B1C-4515-40EA-ADDD-A04BF50743DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:clamav:clamav:1.0.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB00FEFE-F8A2-482D-A7EE-002DA4E10FF6\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.0.0\",\"versionEndExcluding\":\"3.7.35\",\"matchCriteriaId\":\"88CF061E-FFD8-48DE-887F-2119C916E2B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.8.0\",\"versionEndExcluding\":\"3.11.23\",\"matchCriteriaId\":\"F499B698-4EB6-4262-BAF4-9BDE7F114805\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.3.0\",\"versionEndExcluding\":\"4.3.17\",\"matchCriteriaId\":\"40519377-ECDC-41E2-B6A6-7F601AC28ACD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.4.0\",\"versionEndExcluding\":\"4.6.4\",\"matchCriteriaId\":\"77BAC9BA-B215-490F-9202-617B1B4E7C8A\"}]}]}],\"references\":[{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-q8DThCy\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-q8DThCy\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}", }, }
gsd-2023-20032
Vulnerability from gsd
{ GSD: { alias: "CVE-2023-20032", id: "GSD-2023-20032", references: [ "https://alas.aws.amazon.com/cve/html/CVE-2023-20032.html", "https://advisories.mageia.org/CVE-2023-20032.html", "https://www.suse.com/security/cve/CVE-2023-20032.html", "https://ubuntu.com/security/CVE-2023-20032", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2023-20032", ], details: "On Feb 15, 2023, the following vulnerability in the ClamAV scanning library was disclosed:\r\n\r \r A vulnerability in the HFS+ partition file parser of ClamAV versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier could allow an unauthenticated, remote attacker to execute arbitrary code.\r\n\r \r This vulnerability is due to a missing buffer size check that may result in a heap buffer overflow write. An attacker could exploit this vulnerability by submitting a crafted HFS+ partition file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to execute arbitrary code with the privileges of the ClamAV scanning process, or else crash the process, resulting in a denial of service (DoS) condition.\r\n\r For a description of this vulnerability, see the ClamAV blog [\"https://blog.clamav.net/\"].", id: "GSD-2023-20032", modified: "2023-12-13T01:20:28.590497Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2023-20032", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Secure Web Appliance", version: { version_data: [ { version_affected: "=", version_value: "11.7.0-406", }, { version_affected: "=", version_value: "11.7.0-418", }, { version_affected: "=", version_value: "11.7.1-049", }, { version_affected: "=", version_value: "11.7.1-006", }, { version_affected: "=", version_value: "11.7.1-020", }, { version_affected: "=", version_value: "11.7.2-011", }, { version_affected: "=", version_value: "11.8.0-414", }, { version_affected: "=", version_value: "11.8.1-023", }, { version_affected: "=", version_value: "11.8.3-018", }, { version_affected: "=", version_value: "11.8.3-021", }, { version_affected: "=", version_value: "12.0.1-268", }, { version_affected: "=", version_value: "12.0.3-007", }, { version_affected: "=", version_value: "12.5.2-007", }, { version_affected: "=", version_value: "12.5.1-011", }, { version_affected: "=", version_value: "12.5.4-005", }, { version_affected: "=", version_value: "12.5.5-004", }, { version_affected: "=", version_value: "14.5.0-498", }, { version_affected: "=", version_value: "14.0.3-014", }, { version_affected: "=", version_value: "14.0.2-012", }, ], }, }, { product_name: "Cisco Secure Endpoint", version: { version_data: [ { version_affected: "=", version_value: "6.1.9", }, { version_affected: "=", version_value: "6.2.5", }, { version_affected: "=", version_value: "6.3.7", }, { version_affected: "=", version_value: "6.3.3", }, { version_affected: "=", version_value: "7.0.5", }, { version_affected: "=", version_value: "7.1.1", }, { version_affected: "=", version_value: "1.12.1", }, { version_affected: "=", version_value: "1.12.2", }, { version_affected: "=", version_value: "1.12.3", }, { version_affected: "=", version_value: "1.12.7", }, { version_affected: "=", version_value: "1.12.4", }, { version_affected: "=", version_value: "1.11.0", }, { version_affected: "=", version_value: "1.10.2", }, { version_affected: "=", version_value: "1.10.0", }, { version_affected: "=", version_value: "1.14.0", }, { version_affected: "=", version_value: "1.6.0", }, { version_affected: "=", version_value: "1.9.0", }, { version_affected: "=", version_value: "1.8.1", }, { version_affected: "=", version_value: "1.8.0", }, { version_affected: "=", version_value: "1.7.0", }, { version_affected: "=", version_value: "7.2.13", }, { version_affected: "=", version_value: "7.3.5", }, ], }, }, { product_name: "Cisco Secure Endpoint Private Cloud Administration Portal", version: { version_data: [ { version_affected: "=", version_value: "N/A", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "On Feb 15, 2023, the following vulnerability in the ClamAV scanning library was disclosed:\r\n\r \r A vulnerability in the HFS+ partition file parser of ClamAV versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier could allow an unauthenticated, remote attacker to execute arbitrary code.\r\n\r \r This vulnerability is due to a missing buffer size check that may result in a heap buffer overflow write. An attacker could exploit this vulnerability by submitting a crafted HFS+ partition file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to execute arbitrary code with the privileges of the ClamAV scanning process, or else crash the process, resulting in a denial of service (DoS) condition.\r\n\r For a description of this vulnerability, see the ClamAV blog [\"https://blog.clamav.net/\"].", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is aware that a proof-of-concept is available that demonstrates that this vulnerability can be used to cause a buffer overflow and subsequent process termination.\r\n\r\nAdditional technical information is also available that describes this vulnerability in detail.\r\n\r\nThe Cisco PSIRT is not aware of any malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: [ { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, ], }, problemtype: { problemtype_data: [ { description: [ { cweId: "CWE-120", lang: "eng", value: "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", }, ], }, ], }, references: { reference_data: [ { name: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-q8DThCy", refsource: "MISC", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-q8DThCy", }, ], }, source: { advisory: "cisco-sa-clamav-q8DThCy", defects: [ "CSCwd74135", "CSCwd74134", "CSCwd74133", "CSCwe18204", "CSCwd74132", ], discovery: "EXTERNAL", }, }, "nvd.nist.gov": { cve: { configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:linux:*:*", matchCriteriaId: "40572314-306A-4594-A279-216B8139B7A0", versionEndExcluding: "1.20.2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:macos:*:*", matchCriteriaId: "726A787E-E64F-4906-9BAE-4F79EB530F1F", versionEndExcluding: "1.21.1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:windows:*:*", matchCriteriaId: "C4F63447-CA0E-43FC-8FF1-B4032D21E32A", versionEndExcluding: "7.5.9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:windows:*:*", matchCriteriaId: "D0FC45E7-C4AB-4AC5-87AB-0ED1508CCFF3", versionEndExcluding: "8.1.5", versionStartIncluding: "8.0.1.21160", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_endpoint_private_cloud:*:*:*:*:*:*:*:*", matchCriteriaId: "07BFC8FC-6CF0-49DA-B4ED-5B7936A4233E", versionEndExcluding: "3.6.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:web_security_appliance:*:*:*:*:*:*:*:*", matchCriteriaId: "2EFF7AB1-33C6-4627-9950-2F2E48BCCC7E", versionEndExcluding: "12.5.6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:web_security_appliance:*:*:*:*:*:*:*:*", matchCriteriaId: "A8361D69-981F-4F28-86F9-EFF202C9E537", versionEndExcluding: "14.0.4-005", versionStartIncluding: "14.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:web_security_appliance:*:*:*:*:*:*:*:*", matchCriteriaId: "CF6E494A-FCA7-4569-847D-2AA3C14C3E79", versionEndExcluding: "14.5.1-013", versionStartIncluding: "14.5.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:web_security_appliance:*:*:*:*:*:*:*:*", matchCriteriaId: "BD8B1F66-9FD3-4970-BDA3-26241B18B4AA", versionEndExcluding: "15.0.0-254", versionStartIncluding: "15.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*", matchCriteriaId: "BDF08008-9C84-4075-8AB7-233209E4F3C0", versionEndIncluding: "0.103.7", vulnerable: true, }, { criteria: "cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*", matchCriteriaId: "14FA7424-A3E5-4F46-83F8-E9767330F1CE", versionEndIncluding: "0.105.1", versionStartIncluding: "0.104.0", vulnerable: true, }, { criteria: "cpe:2.3:a:clamav:clamav:1.0.0:-:*:*:*:*:*:*", matchCriteriaId: "A381BD3C-88E0-41FD-91E6-26BCF78B84CA", vulnerable: true, }, { criteria: "cpe:2.3:a:clamav:clamav:1.0.0:rc:*:*:*:*:*:*", matchCriteriaId: "88BE0B1C-4515-40EA-ADDD-A04BF50743DA", vulnerable: true, }, { criteria: "cpe:2.3:a:clamav:clamav:1.0.0:rc2:*:*:*:*:*:*", matchCriteriaId: "FB00FEFE-F8A2-482D-A7EE-002DA4E10FF6", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", matchCriteriaId: "88CF061E-FFD8-48DE-887F-2119C916E2B4", versionEndExcluding: "3.7.35", versionStartIncluding: "3.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", matchCriteriaId: "F499B698-4EB6-4262-BAF4-9BDE7F114805", versionEndExcluding: "3.11.23", versionStartIncluding: "3.8.0", vulnerable: true, }, { criteria: "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", matchCriteriaId: "40519377-ECDC-41E2-B6A6-7F601AC28ACD", versionEndExcluding: "4.3.17", versionStartIncluding: "4.3.0", vulnerable: true, }, { criteria: "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", matchCriteriaId: "77BAC9BA-B215-490F-9202-617B1B4E7C8A", versionEndExcluding: "4.6.4", versionStartIncluding: "4.4.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], descriptions: [ { lang: "en", value: "On Feb 15, 2023, the following vulnerability in the ClamAV scanning library was disclosed:\r\n\r \r A vulnerability in the HFS+ partition file parser of ClamAV versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier could allow an unauthenticated, remote attacker to execute arbitrary code.\r\n\r \r This vulnerability is due to a missing buffer size check that may result in a heap buffer overflow write. An attacker could exploit this vulnerability by submitting a crafted HFS+ partition file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to execute arbitrary code with the privileges of the ClamAV scanning process, or else crash the process, resulting in a denial of service (DoS) condition.\r\n\r For a description of this vulnerability, see the ClamAV blog [\"https://blog.clamav.net/\"].", }, ], id: "CVE-2023-20032", lastModified: "2024-01-25T17:15:25.840", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "ykramarz@cisco.com", type: "Secondary", }, ], }, published: "2023-03-01T08:15:11.907", references: [ { source: "ykramarz@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-q8DThCy", }, ], sourceIdentifier: "ykramarz@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-120", }, ], source: "ykramarz@cisco.com", type: "Secondary", }, ], }, }, }, }
suse-su-2023:0453-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "critical", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for clamav", title: "Title of the patch", }, { category: "description", text: "This update for clamav fixes the following issues:\n\n- CVE-2023-20032: Fixed a possible remote code execution vulnerability in the HFS+ file parser (bsc#1208363).\n- CVE-2023-20052: Fixed a possible remote information leak vulnerability in the DMG file parser (bsc#1208365).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2023-453,SUSE-OpenStack-Cloud-9-2023-453,SUSE-OpenStack-Cloud-Crowbar-9-2023-453,SUSE-SLE-SAP-12-SP4-2023-453,SUSE-SLE-SERVER-12-SP2-BCL-2023-453,SUSE-SLE-SERVER-12-SP4-LTSS-2023-453", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_0453-1.json", }, { category: "self", summary: "URL for SUSE-SU-2023:0453-1", url: "https://www.suse.com/support/update/announcement/2023/suse-su-20230453-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2023:0453-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-February/013839.html", }, { category: "self", summary: "SUSE Bug 1208363", url: "https://bugzilla.suse.com/1208363", }, { category: "self", summary: "SUSE Bug 1208365", url: "https://bugzilla.suse.com/1208365", }, { category: "self", summary: "SUSE CVE CVE-2023-20032 page", url: "https://www.suse.com/security/cve/CVE-2023-20032/", }, { category: "self", summary: "SUSE CVE CVE-2023-20052 page", url: "https://www.suse.com/security/cve/CVE-2023-20052/", }, ], title: "Security update for clamav", tracking: { current_release_date: "2023-02-20T11:05:33Z", generator: { date: "2023-02-20T11:05:33Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2023:0453-1", initial_release_date: "2023-02-20T11:05:33Z", revision_history: [ { date: "2023-02-20T11:05:33Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "clamav-0.103.8-33.53.1.aarch64", product: { name: "clamav-0.103.8-33.53.1.aarch64", product_id: "clamav-0.103.8-33.53.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "clamav-0.103.8-33.53.1.i586", product: { name: "clamav-0.103.8-33.53.1.i586", product_id: "clamav-0.103.8-33.53.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "clamav-0.103.8-33.53.1.ppc64le", product: { name: "clamav-0.103.8-33.53.1.ppc64le", product_id: "clamav-0.103.8-33.53.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "clamav-0.103.8-33.53.1.s390", product: { name: "clamav-0.103.8-33.53.1.s390", product_id: "clamav-0.103.8-33.53.1.s390", }, }, ], category: "architecture", name: "s390", }, { branches: [ { category: "product_version", name: "clamav-0.103.8-33.53.1.s390x", product: { name: "clamav-0.103.8-33.53.1.s390x", product_id: "clamav-0.103.8-33.53.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "clamav-0.103.8-33.53.1.x86_64", product: { name: "clamav-0.103.8-33.53.1.x86_64", product_id: "clamav-0.103.8-33.53.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE OpenStack Cloud 9", product: { name: "SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud:9", }, }, }, { category: "product_name", name: "SUSE OpenStack Cloud Crowbar 9", product: { name: "SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud-crowbar:9", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP2-BCL", product: { name: "SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles-bcl:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP4-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-33.53.1.x86_64 as component of SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9:clamav-0.103.8-33.53.1.x86_64", }, product_reference: "clamav-0.103.8-33.53.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 9", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-33.53.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9:clamav-0.103.8-33.53.1.x86_64", }, product_reference: "clamav-0.103.8-33.53.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 9", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-33.53.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:clamav-0.103.8-33.53.1.ppc64le", }, product_reference: "clamav-0.103.8-33.53.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-33.53.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:clamav-0.103.8-33.53.1.x86_64", }, product_reference: "clamav-0.103.8-33.53.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-33.53.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:clamav-0.103.8-33.53.1.x86_64", }, product_reference: "clamav-0.103.8-33.53.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-33.53.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:clamav-0.103.8-33.53.1.aarch64", }, product_reference: "clamav-0.103.8-33.53.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-33.53.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:clamav-0.103.8-33.53.1.ppc64le", }, product_reference: "clamav-0.103.8-33.53.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-33.53.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:clamav-0.103.8-33.53.1.s390x", }, product_reference: "clamav-0.103.8-33.53.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-33.53.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:clamav-0.103.8-33.53.1.x86_64", }, product_reference: "clamav-0.103.8-33.53.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, ], }, vulnerabilities: [ { cve: "CVE-2023-20032", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-20032", }, ], notes: [ { category: "general", text: "On Feb 15, 2023, the following vulnerability in the ClamAV scanning library was disclosed:\r\n\r \r A vulnerability in the HFS+ partition file parser of ClamAV versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier could allow an unauthenticated, remote attacker to execute arbitrary code.\r\n\r \r This vulnerability is due to a missing buffer size check that may result in a heap buffer overflow write. An attacker could exploit this vulnerability by submitting a crafted HFS+ partition file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to execute arbitrary code with the privileges of the ClamAV scanning process, or else crash the process, resulting in a denial of service (DoS) condition.\r\n\r For a description of this vulnerability, see the ClamAV blog [\"https://blog.clamav.net/\"].", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:clamav-0.103.8-33.53.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:clamav-0.103.8-33.53.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:clamav-0.103.8-33.53.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:clamav-0.103.8-33.53.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:clamav-0.103.8-33.53.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:clamav-0.103.8-33.53.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:clamav-0.103.8-33.53.1.x86_64", "SUSE OpenStack Cloud 9:clamav-0.103.8-33.53.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:clamav-0.103.8-33.53.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-20032", url: "https://www.suse.com/security/cve/CVE-2023-20032", }, { category: "external", summary: "SUSE Bug 1208363 for CVE-2023-20032", url: "https://bugzilla.suse.com/1208363", }, { category: "external", summary: "SUSE Bug 1211720 for CVE-2023-20032", url: "https://bugzilla.suse.com/1211720", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:clamav-0.103.8-33.53.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:clamav-0.103.8-33.53.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:clamav-0.103.8-33.53.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:clamav-0.103.8-33.53.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:clamav-0.103.8-33.53.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:clamav-0.103.8-33.53.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:clamav-0.103.8-33.53.1.x86_64", "SUSE OpenStack Cloud 9:clamav-0.103.8-33.53.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:clamav-0.103.8-33.53.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:clamav-0.103.8-33.53.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:clamav-0.103.8-33.53.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:clamav-0.103.8-33.53.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:clamav-0.103.8-33.53.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:clamav-0.103.8-33.53.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:clamav-0.103.8-33.53.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:clamav-0.103.8-33.53.1.x86_64", "SUSE OpenStack Cloud 9:clamav-0.103.8-33.53.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:clamav-0.103.8-33.53.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-02-20T11:05:33Z", details: "critical", }, ], title: "CVE-2023-20032", }, { cve: "CVE-2023-20052", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-20052", }, ], notes: [ { category: "general", text: "On Feb 15, 2023, the following vulnerability in the ClamAV scanning library was disclosed:\r\n\r \r A vulnerability in the DMG file parser of ClamAV versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier could allow an unauthenticated, remote attacker to access sensitive information on an affected device.\r\n\r \r This vulnerability is due to enabling XML entity substitution that may result in XML external entity injection. An attacker could exploit this vulnerability by submitting a crafted DMG file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to leak bytes from any file that may be read by the ClamAV scanning process.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:clamav-0.103.8-33.53.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:clamav-0.103.8-33.53.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:clamav-0.103.8-33.53.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:clamav-0.103.8-33.53.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:clamav-0.103.8-33.53.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:clamav-0.103.8-33.53.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:clamav-0.103.8-33.53.1.x86_64", "SUSE OpenStack Cloud 9:clamav-0.103.8-33.53.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:clamav-0.103.8-33.53.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-20052", url: "https://www.suse.com/security/cve/CVE-2023-20052", }, { category: "external", summary: "SUSE Bug 1208365 for CVE-2023-20052", url: "https://bugzilla.suse.com/1208365", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:clamav-0.103.8-33.53.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:clamav-0.103.8-33.53.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:clamav-0.103.8-33.53.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:clamav-0.103.8-33.53.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:clamav-0.103.8-33.53.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:clamav-0.103.8-33.53.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:clamav-0.103.8-33.53.1.x86_64", "SUSE OpenStack Cloud 9:clamav-0.103.8-33.53.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:clamav-0.103.8-33.53.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:clamav-0.103.8-33.53.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:clamav-0.103.8-33.53.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:clamav-0.103.8-33.53.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:clamav-0.103.8-33.53.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:clamav-0.103.8-33.53.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:clamav-0.103.8-33.53.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:clamav-0.103.8-33.53.1.x86_64", "SUSE OpenStack Cloud 9:clamav-0.103.8-33.53.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:clamav-0.103.8-33.53.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-02-20T11:05:33Z", details: "moderate", }, ], title: "CVE-2023-20052", }, ], }
suse-su-2023:0470-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "critical", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for clamav", title: "Title of the patch", }, { category: "description", text: "This update for clamav fixes the following issues:\n\n- CVE-2023-20032: Fixed a possible remote code execution vulnerability in the HFS+ file parser (bsc#1208363).\n- CVE-2023-20052: Fixed a possible remote information leak vulnerability in the DMG file parser (bsc#1208365).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2023-470,SUSE-SLE-Module-Basesystem-15-SP4-2023-470,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-470,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-470,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-470,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-470,SUSE-SLE-Product-RT-15-SP3-2023-470,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-470,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-470,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-470,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-470,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-470,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-470,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-470,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-470,SUSE-Storage-7-2023-470,SUSE-Storage-7.1-2023-470,openSUSE-SLE-15.4-2023-470", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_0470-1.json", }, { category: "self", summary: "URL for SUSE-SU-2023:0470-1", url: "https://www.suse.com/support/update/announcement/2023/suse-su-20230470-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2023:0470-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-February/013849.html", }, { category: "self", summary: "SUSE Bug 1208363", url: "https://bugzilla.suse.com/1208363", }, { category: "self", summary: "SUSE Bug 1208365", url: "https://bugzilla.suse.com/1208365", }, { category: "self", summary: "SUSE CVE CVE-2023-20032 page", url: "https://www.suse.com/security/cve/CVE-2023-20032/", }, { category: "self", summary: "SUSE CVE CVE-2023-20052 page", url: "https://www.suse.com/security/cve/CVE-2023-20052/", }, ], title: "Security update for clamav", tracking: { current_release_date: "2023-02-21T09:06:01Z", generator: { date: "2023-02-21T09:06:01Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2023:0470-1", initial_release_date: "2023-02-21T09:06:01Z", revision_history: [ { date: "2023-02-21T09:06:01Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "clamav-0.103.8-150000.3.44.1.aarch64", product: { name: "clamav-0.103.8-150000.3.44.1.aarch64", product_id: "clamav-0.103.8-150000.3.44.1.aarch64", }, }, { category: "product_version", name: "clamav-devel-0.103.8-150000.3.44.1.aarch64", product: { name: "clamav-devel-0.103.8-150000.3.44.1.aarch64", product_id: "clamav-devel-0.103.8-150000.3.44.1.aarch64", }, }, { category: "product_version", name: "libclamav9-0.103.8-150000.3.44.1.aarch64", product: { name: "libclamav9-0.103.8-150000.3.44.1.aarch64", product_id: "libclamav9-0.103.8-150000.3.44.1.aarch64", }, }, { category: "product_version", name: "libfreshclam2-0.103.8-150000.3.44.1.aarch64", product: { name: "libfreshclam2-0.103.8-150000.3.44.1.aarch64", product_id: "libfreshclam2-0.103.8-150000.3.44.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "clamav-0.103.8-150000.3.44.1.i586", product: { name: "clamav-0.103.8-150000.3.44.1.i586", product_id: "clamav-0.103.8-150000.3.44.1.i586", }, }, { category: "product_version", name: "clamav-devel-0.103.8-150000.3.44.1.i586", product: { name: "clamav-devel-0.103.8-150000.3.44.1.i586", product_id: "clamav-devel-0.103.8-150000.3.44.1.i586", }, }, { category: "product_version", name: "libclamav9-0.103.8-150000.3.44.1.i586", product: { name: "libclamav9-0.103.8-150000.3.44.1.i586", product_id: "libclamav9-0.103.8-150000.3.44.1.i586", }, }, { category: "product_version", name: "libfreshclam2-0.103.8-150000.3.44.1.i586", product: { name: "libfreshclam2-0.103.8-150000.3.44.1.i586", product_id: "libfreshclam2-0.103.8-150000.3.44.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "clamav-0.103.8-150000.3.44.1.ppc64le", product: { name: "clamav-0.103.8-150000.3.44.1.ppc64le", product_id: "clamav-0.103.8-150000.3.44.1.ppc64le", }, }, { category: "product_version", name: "clamav-devel-0.103.8-150000.3.44.1.ppc64le", product: { name: "clamav-devel-0.103.8-150000.3.44.1.ppc64le", product_id: "clamav-devel-0.103.8-150000.3.44.1.ppc64le", }, }, { category: "product_version", name: "libclamav9-0.103.8-150000.3.44.1.ppc64le", product: { name: "libclamav9-0.103.8-150000.3.44.1.ppc64le", product_id: "libclamav9-0.103.8-150000.3.44.1.ppc64le", }, }, { category: "product_version", name: "libfreshclam2-0.103.8-150000.3.44.1.ppc64le", product: { name: "libfreshclam2-0.103.8-150000.3.44.1.ppc64le", product_id: "libfreshclam2-0.103.8-150000.3.44.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "clamav-0.103.8-150000.3.44.1.s390x", product: { name: "clamav-0.103.8-150000.3.44.1.s390x", product_id: "clamav-0.103.8-150000.3.44.1.s390x", }, }, { category: "product_version", name: "clamav-devel-0.103.8-150000.3.44.1.s390x", product: { name: "clamav-devel-0.103.8-150000.3.44.1.s390x", product_id: "clamav-devel-0.103.8-150000.3.44.1.s390x", }, }, { category: "product_version", name: "libclamav9-0.103.8-150000.3.44.1.s390x", product: { name: "libclamav9-0.103.8-150000.3.44.1.s390x", product_id: "libclamav9-0.103.8-150000.3.44.1.s390x", }, }, { category: "product_version", name: "libfreshclam2-0.103.8-150000.3.44.1.s390x", product: { name: "libfreshclam2-0.103.8-150000.3.44.1.s390x", product_id: "libfreshclam2-0.103.8-150000.3.44.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "clamav-0.103.8-150000.3.44.1.x86_64", product: { name: "clamav-0.103.8-150000.3.44.1.x86_64", product_id: "clamav-0.103.8-150000.3.44.1.x86_64", }, }, { category: "product_version", name: "clamav-devel-0.103.8-150000.3.44.1.x86_64", product: { name: "clamav-devel-0.103.8-150000.3.44.1.x86_64", product_id: "clamav-devel-0.103.8-150000.3.44.1.x86_64", }, }, { category: "product_version", name: "libclamav9-0.103.8-150000.3.44.1.x86_64", product: { name: "libclamav9-0.103.8-150000.3.44.1.x86_64", product_id: "libclamav9-0.103.8-150000.3.44.1.x86_64", }, }, { category: "product_version", name: "libfreshclam2-0.103.8-150000.3.44.1.x86_64", product: { name: "libfreshclam2-0.103.8-150000.3.44.1.x86_64", product_id: "libfreshclam2-0.103.8-150000.3.44.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15 SP4", product: { name: "SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Real Time 15 SP3", product: { name: "SUSE Linux Enterprise Real Time 15 SP3", product_id: "SUSE Linux Enterprise Real Time 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle_rt:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP1-LTSS", product: { name: "SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP2-LTSS", product: { name: "SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP3-LTSS", product: { name: "SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15:sp3", }, }, }, { category: "product_name", name: "SUSE Manager Proxy 4.2", product: { name: "SUSE Manager Proxy 4.2", product_id: "SUSE Manager Proxy 4.2", product_identification_helper: { cpe: "cpe:/o:suse:suse-manager-proxy:4.2", }, }, }, { category: "product_name", name: "SUSE Manager Server 4.2", product: { name: "SUSE Manager Server 4.2", product_id: "SUSE Manager Server 4.2", product_identification_helper: { cpe: "cpe:/o:suse:suse-manager-server:4.2", }, }, }, { category: "product_name", name: "SUSE Enterprise Storage 7", product: { name: "SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7", product_identification_helper: { cpe: "cpe:/o:suse:ses:7", }, }, }, { category: "product_name", name: "SUSE Enterprise Storage 7.1", product: { name: "SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1", product_identification_helper: { cpe: "cpe:/o:suse:ses:7.1", }, }, }, { category: "product_name", name: "openSUSE Leap 15.4", product: { name: "openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-150000.3.44.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:clamav-0.103.8-150000.3.44.1.aarch64", }, product_reference: "clamav-0.103.8-150000.3.44.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-150000.3.44.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:clamav-0.103.8-150000.3.44.1.ppc64le", }, product_reference: "clamav-0.103.8-150000.3.44.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-150000.3.44.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:clamav-0.103.8-150000.3.44.1.s390x", }, product_reference: "clamav-0.103.8-150000.3.44.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-150000.3.44.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:clamav-0.103.8-150000.3.44.1.x86_64", }, product_reference: "clamav-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.8-150000.3.44.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:clamav-devel-0.103.8-150000.3.44.1.aarch64", }, product_reference: "clamav-devel-0.103.8-150000.3.44.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.8-150000.3.44.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:clamav-devel-0.103.8-150000.3.44.1.ppc64le", }, product_reference: "clamav-devel-0.103.8-150000.3.44.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.8-150000.3.44.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:clamav-devel-0.103.8-150000.3.44.1.s390x", }, product_reference: "clamav-devel-0.103.8-150000.3.44.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.8-150000.3.44.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:clamav-devel-0.103.8-150000.3.44.1.x86_64", }, product_reference: "clamav-devel-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.8-150000.3.44.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:libclamav9-0.103.8-150000.3.44.1.aarch64", }, product_reference: "libclamav9-0.103.8-150000.3.44.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.8-150000.3.44.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:libclamav9-0.103.8-150000.3.44.1.ppc64le", }, product_reference: "libclamav9-0.103.8-150000.3.44.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.8-150000.3.44.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:libclamav9-0.103.8-150000.3.44.1.s390x", }, product_reference: "libclamav9-0.103.8-150000.3.44.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.8-150000.3.44.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:libclamav9-0.103.8-150000.3.44.1.x86_64", }, product_reference: "libclamav9-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.8-150000.3.44.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:libfreshclam2-0.103.8-150000.3.44.1.aarch64", }, product_reference: "libfreshclam2-0.103.8-150000.3.44.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.8-150000.3.44.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", }, product_reference: "libfreshclam2-0.103.8-150000.3.44.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.8-150000.3.44.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:libfreshclam2-0.103.8-150000.3.44.1.s390x", }, product_reference: "libfreshclam2-0.103.8-150000.3.44.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.8-150000.3.44.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:libfreshclam2-0.103.8-150000.3.44.1.x86_64", }, product_reference: "libfreshclam2-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-150000.3.44.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:clamav-0.103.8-150000.3.44.1.aarch64", }, product_reference: "clamav-0.103.8-150000.3.44.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-150000.3.44.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:clamav-0.103.8-150000.3.44.1.x86_64", }, product_reference: "clamav-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.8-150000.3.44.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:clamav-devel-0.103.8-150000.3.44.1.aarch64", }, product_reference: "clamav-devel-0.103.8-150000.3.44.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.8-150000.3.44.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:clamav-devel-0.103.8-150000.3.44.1.x86_64", }, product_reference: "clamav-devel-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.8-150000.3.44.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libclamav9-0.103.8-150000.3.44.1.aarch64", }, product_reference: "libclamav9-0.103.8-150000.3.44.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.8-150000.3.44.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libclamav9-0.103.8-150000.3.44.1.x86_64", }, product_reference: "libclamav9-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.8-150000.3.44.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libfreshclam2-0.103.8-150000.3.44.1.aarch64", }, product_reference: "libfreshclam2-0.103.8-150000.3.44.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.8-150000.3.44.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libfreshclam2-0.103.8-150000.3.44.1.x86_64", }, product_reference: "libfreshclam2-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-150000.3.44.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:clamav-0.103.8-150000.3.44.1.aarch64", }, product_reference: "clamav-0.103.8-150000.3.44.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-150000.3.44.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:clamav-0.103.8-150000.3.44.1.x86_64", }, product_reference: "clamav-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.8-150000.3.44.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:clamav-devel-0.103.8-150000.3.44.1.aarch64", }, product_reference: "clamav-devel-0.103.8-150000.3.44.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.8-150000.3.44.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:clamav-devel-0.103.8-150000.3.44.1.x86_64", }, product_reference: "clamav-devel-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.8-150000.3.44.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libclamav9-0.103.8-150000.3.44.1.aarch64", }, product_reference: "libclamav9-0.103.8-150000.3.44.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.8-150000.3.44.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libclamav9-0.103.8-150000.3.44.1.x86_64", }, product_reference: "libclamav9-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.8-150000.3.44.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libfreshclam2-0.103.8-150000.3.44.1.aarch64", }, product_reference: "libfreshclam2-0.103.8-150000.3.44.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.8-150000.3.44.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libfreshclam2-0.103.8-150000.3.44.1.x86_64", }, product_reference: "libfreshclam2-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-150000.3.44.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:clamav-0.103.8-150000.3.44.1.aarch64", }, product_reference: "clamav-0.103.8-150000.3.44.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-150000.3.44.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:clamav-0.103.8-150000.3.44.1.x86_64", }, product_reference: "clamav-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.8-150000.3.44.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:clamav-devel-0.103.8-150000.3.44.1.aarch64", }, product_reference: "clamav-devel-0.103.8-150000.3.44.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.8-150000.3.44.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:clamav-devel-0.103.8-150000.3.44.1.x86_64", }, product_reference: "clamav-devel-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.8-150000.3.44.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:libclamav9-0.103.8-150000.3.44.1.aarch64", }, product_reference: "libclamav9-0.103.8-150000.3.44.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.8-150000.3.44.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:libclamav9-0.103.8-150000.3.44.1.x86_64", }, product_reference: "libclamav9-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.8-150000.3.44.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:libfreshclam2-0.103.8-150000.3.44.1.aarch64", }, product_reference: "libfreshclam2-0.103.8-150000.3.44.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.8-150000.3.44.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:libfreshclam2-0.103.8-150000.3.44.1.x86_64", }, product_reference: "libfreshclam2-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-150000.3.44.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:clamav-0.103.8-150000.3.44.1.aarch64", }, product_reference: "clamav-0.103.8-150000.3.44.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-150000.3.44.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:clamav-0.103.8-150000.3.44.1.x86_64", }, product_reference: "clamav-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.8-150000.3.44.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:clamav-devel-0.103.8-150000.3.44.1.aarch64", }, product_reference: "clamav-devel-0.103.8-150000.3.44.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.8-150000.3.44.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:clamav-devel-0.103.8-150000.3.44.1.x86_64", }, product_reference: "clamav-devel-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.8-150000.3.44.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libclamav9-0.103.8-150000.3.44.1.aarch64", }, product_reference: "libclamav9-0.103.8-150000.3.44.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.8-150000.3.44.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libclamav9-0.103.8-150000.3.44.1.x86_64", }, product_reference: "libclamav9-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.8-150000.3.44.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libfreshclam2-0.103.8-150000.3.44.1.aarch64", }, product_reference: "libfreshclam2-0.103.8-150000.3.44.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.8-150000.3.44.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libfreshclam2-0.103.8-150000.3.44.1.x86_64", }, product_reference: "libfreshclam2-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-150000.3.44.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP3", product_id: "SUSE Linux Enterprise Real Time 15 SP3:clamav-0.103.8-150000.3.44.1.x86_64", }, product_reference: "clamav-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 15 SP3", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.8-150000.3.44.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP3", product_id: "SUSE Linux Enterprise Real Time 15 SP3:clamav-devel-0.103.8-150000.3.44.1.x86_64", }, product_reference: "clamav-devel-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 15 SP3", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.8-150000.3.44.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP3", product_id: "SUSE Linux Enterprise Real Time 15 SP3:libclamav9-0.103.8-150000.3.44.1.x86_64", }, product_reference: "libclamav9-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 15 SP3", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.8-150000.3.44.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP3", product_id: "SUSE Linux Enterprise Real Time 15 SP3:libfreshclam2-0.103.8-150000.3.44.1.x86_64", }, product_reference: "libfreshclam2-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 15 SP3", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-150000.3.44.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:clamav-0.103.8-150000.3.44.1.aarch64", }, product_reference: "clamav-0.103.8-150000.3.44.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-150000.3.44.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:clamav-0.103.8-150000.3.44.1.ppc64le", }, product_reference: "clamav-0.103.8-150000.3.44.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-150000.3.44.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:clamav-0.103.8-150000.3.44.1.s390x", }, product_reference: "clamav-0.103.8-150000.3.44.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-150000.3.44.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:clamav-0.103.8-150000.3.44.1.x86_64", }, product_reference: "clamav-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.8-150000.3.44.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:clamav-devel-0.103.8-150000.3.44.1.aarch64", }, product_reference: "clamav-devel-0.103.8-150000.3.44.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.8-150000.3.44.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:clamav-devel-0.103.8-150000.3.44.1.ppc64le", }, product_reference: "clamav-devel-0.103.8-150000.3.44.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.8-150000.3.44.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:clamav-devel-0.103.8-150000.3.44.1.s390x", }, product_reference: "clamav-devel-0.103.8-150000.3.44.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.8-150000.3.44.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:clamav-devel-0.103.8-150000.3.44.1.x86_64", }, product_reference: "clamav-devel-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.8-150000.3.44.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:libclamav9-0.103.8-150000.3.44.1.aarch64", }, product_reference: "libclamav9-0.103.8-150000.3.44.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.8-150000.3.44.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:libclamav9-0.103.8-150000.3.44.1.ppc64le", }, product_reference: "libclamav9-0.103.8-150000.3.44.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.8-150000.3.44.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:libclamav9-0.103.8-150000.3.44.1.s390x", }, product_reference: "libclamav9-0.103.8-150000.3.44.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.8-150000.3.44.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:libclamav9-0.103.8-150000.3.44.1.x86_64", }, product_reference: "libclamav9-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.8-150000.3.44.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:libfreshclam2-0.103.8-150000.3.44.1.aarch64", }, product_reference: "libfreshclam2-0.103.8-150000.3.44.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.8-150000.3.44.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", }, product_reference: "libfreshclam2-0.103.8-150000.3.44.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.8-150000.3.44.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:libfreshclam2-0.103.8-150000.3.44.1.s390x", }, product_reference: "libfreshclam2-0.103.8-150000.3.44.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.8-150000.3.44.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:libfreshclam2-0.103.8-150000.3.44.1.x86_64", }, product_reference: "libfreshclam2-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-150000.3.44.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:clamav-0.103.8-150000.3.44.1.aarch64", }, product_reference: "clamav-0.103.8-150000.3.44.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-150000.3.44.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:clamav-0.103.8-150000.3.44.1.ppc64le", }, product_reference: "clamav-0.103.8-150000.3.44.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-150000.3.44.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:clamav-0.103.8-150000.3.44.1.s390x", }, product_reference: "clamav-0.103.8-150000.3.44.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-150000.3.44.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:clamav-0.103.8-150000.3.44.1.x86_64", }, product_reference: "clamav-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.8-150000.3.44.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:clamav-devel-0.103.8-150000.3.44.1.aarch64", }, product_reference: "clamav-devel-0.103.8-150000.3.44.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.8-150000.3.44.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:clamav-devel-0.103.8-150000.3.44.1.ppc64le", }, product_reference: "clamav-devel-0.103.8-150000.3.44.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.8-150000.3.44.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:clamav-devel-0.103.8-150000.3.44.1.s390x", }, product_reference: "clamav-devel-0.103.8-150000.3.44.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.8-150000.3.44.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:clamav-devel-0.103.8-150000.3.44.1.x86_64", }, product_reference: "clamav-devel-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.8-150000.3.44.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:libclamav9-0.103.8-150000.3.44.1.aarch64", }, product_reference: "libclamav9-0.103.8-150000.3.44.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.8-150000.3.44.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:libclamav9-0.103.8-150000.3.44.1.ppc64le", }, product_reference: "libclamav9-0.103.8-150000.3.44.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.8-150000.3.44.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:libclamav9-0.103.8-150000.3.44.1.s390x", }, product_reference: "libclamav9-0.103.8-150000.3.44.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.8-150000.3.44.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:libclamav9-0.103.8-150000.3.44.1.x86_64", }, product_reference: "libclamav9-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.8-150000.3.44.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:libfreshclam2-0.103.8-150000.3.44.1.aarch64", }, product_reference: "libfreshclam2-0.103.8-150000.3.44.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.8-150000.3.44.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", }, product_reference: "libfreshclam2-0.103.8-150000.3.44.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.8-150000.3.44.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:libfreshclam2-0.103.8-150000.3.44.1.s390x", }, product_reference: "libfreshclam2-0.103.8-150000.3.44.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.8-150000.3.44.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:libfreshclam2-0.103.8-150000.3.44.1.x86_64", }, product_reference: "libfreshclam2-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-150000.3.44.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:clamav-0.103.8-150000.3.44.1.aarch64", }, product_reference: "clamav-0.103.8-150000.3.44.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-150000.3.44.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:clamav-0.103.8-150000.3.44.1.ppc64le", }, product_reference: "clamav-0.103.8-150000.3.44.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-150000.3.44.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:clamav-0.103.8-150000.3.44.1.s390x", }, product_reference: "clamav-0.103.8-150000.3.44.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-150000.3.44.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:clamav-0.103.8-150000.3.44.1.x86_64", }, product_reference: "clamav-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.8-150000.3.44.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:clamav-devel-0.103.8-150000.3.44.1.aarch64", }, product_reference: "clamav-devel-0.103.8-150000.3.44.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.8-150000.3.44.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:clamav-devel-0.103.8-150000.3.44.1.ppc64le", }, product_reference: "clamav-devel-0.103.8-150000.3.44.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.8-150000.3.44.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:clamav-devel-0.103.8-150000.3.44.1.s390x", }, product_reference: "clamav-devel-0.103.8-150000.3.44.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.8-150000.3.44.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:clamav-devel-0.103.8-150000.3.44.1.x86_64", }, product_reference: "clamav-devel-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.8-150000.3.44.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:libclamav9-0.103.8-150000.3.44.1.aarch64", }, product_reference: "libclamav9-0.103.8-150000.3.44.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.8-150000.3.44.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:libclamav9-0.103.8-150000.3.44.1.ppc64le", }, product_reference: "libclamav9-0.103.8-150000.3.44.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.8-150000.3.44.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:libclamav9-0.103.8-150000.3.44.1.s390x", }, product_reference: "libclamav9-0.103.8-150000.3.44.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.8-150000.3.44.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:libclamav9-0.103.8-150000.3.44.1.x86_64", }, product_reference: "libclamav9-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.8-150000.3.44.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:libfreshclam2-0.103.8-150000.3.44.1.aarch64", }, product_reference: "libfreshclam2-0.103.8-150000.3.44.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.8-150000.3.44.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", }, product_reference: "libfreshclam2-0.103.8-150000.3.44.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.8-150000.3.44.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:libfreshclam2-0.103.8-150000.3.44.1.s390x", }, product_reference: "libfreshclam2-0.103.8-150000.3.44.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.8-150000.3.44.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:libfreshclam2-0.103.8-150000.3.44.1.x86_64", }, product_reference: "libfreshclam2-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-150000.3.44.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:clamav-0.103.8-150000.3.44.1.ppc64le", }, product_reference: "clamav-0.103.8-150000.3.44.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-150000.3.44.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:clamav-0.103.8-150000.3.44.1.x86_64", }, product_reference: "clamav-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.8-150000.3.44.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:clamav-devel-0.103.8-150000.3.44.1.ppc64le", }, product_reference: "clamav-devel-0.103.8-150000.3.44.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.8-150000.3.44.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:clamav-devel-0.103.8-150000.3.44.1.x86_64", }, product_reference: "clamav-devel-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.8-150000.3.44.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libclamav9-0.103.8-150000.3.44.1.ppc64le", }, product_reference: "libclamav9-0.103.8-150000.3.44.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.8-150000.3.44.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libclamav9-0.103.8-150000.3.44.1.x86_64", }, product_reference: "libclamav9-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.8-150000.3.44.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", }, product_reference: "libfreshclam2-0.103.8-150000.3.44.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.8-150000.3.44.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libfreshclam2-0.103.8-150000.3.44.1.x86_64", }, product_reference: "libfreshclam2-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-150000.3.44.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:clamav-0.103.8-150000.3.44.1.ppc64le", }, product_reference: "clamav-0.103.8-150000.3.44.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-150000.3.44.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:clamav-0.103.8-150000.3.44.1.x86_64", }, product_reference: "clamav-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.8-150000.3.44.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:clamav-devel-0.103.8-150000.3.44.1.ppc64le", }, product_reference: "clamav-devel-0.103.8-150000.3.44.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.8-150000.3.44.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:clamav-devel-0.103.8-150000.3.44.1.x86_64", }, product_reference: "clamav-devel-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.8-150000.3.44.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libclamav9-0.103.8-150000.3.44.1.ppc64le", }, product_reference: "libclamav9-0.103.8-150000.3.44.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.8-150000.3.44.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libclamav9-0.103.8-150000.3.44.1.x86_64", }, product_reference: "libclamav9-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.8-150000.3.44.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", }, product_reference: "libfreshclam2-0.103.8-150000.3.44.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.8-150000.3.44.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libfreshclam2-0.103.8-150000.3.44.1.x86_64", }, product_reference: "libfreshclam2-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-150000.3.44.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:clamav-0.103.8-150000.3.44.1.ppc64le", }, product_reference: "clamav-0.103.8-150000.3.44.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-150000.3.44.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:clamav-0.103.8-150000.3.44.1.x86_64", }, product_reference: "clamav-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.8-150000.3.44.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:clamav-devel-0.103.8-150000.3.44.1.ppc64le", }, product_reference: "clamav-devel-0.103.8-150000.3.44.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.8-150000.3.44.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:clamav-devel-0.103.8-150000.3.44.1.x86_64", }, product_reference: "clamav-devel-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.8-150000.3.44.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libclamav9-0.103.8-150000.3.44.1.ppc64le", }, product_reference: "libclamav9-0.103.8-150000.3.44.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.8-150000.3.44.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libclamav9-0.103.8-150000.3.44.1.x86_64", }, product_reference: "libclamav9-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.8-150000.3.44.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", }, product_reference: "libfreshclam2-0.103.8-150000.3.44.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.8-150000.3.44.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libfreshclam2-0.103.8-150000.3.44.1.x86_64", }, product_reference: "libfreshclam2-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-150000.3.44.1.x86_64 as component of SUSE Manager Proxy 4.2", product_id: "SUSE Manager Proxy 4.2:clamav-0.103.8-150000.3.44.1.x86_64", }, product_reference: "clamav-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.2", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.8-150000.3.44.1.x86_64 as component of SUSE Manager Proxy 4.2", product_id: "SUSE Manager Proxy 4.2:clamav-devel-0.103.8-150000.3.44.1.x86_64", }, product_reference: "clamav-devel-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.2", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.8-150000.3.44.1.x86_64 as component of SUSE Manager Proxy 4.2", product_id: "SUSE Manager Proxy 4.2:libclamav9-0.103.8-150000.3.44.1.x86_64", }, product_reference: "libclamav9-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.2", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.8-150000.3.44.1.x86_64 as component of SUSE Manager Proxy 4.2", product_id: "SUSE Manager Proxy 4.2:libfreshclam2-0.103.8-150000.3.44.1.x86_64", }, product_reference: "libfreshclam2-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.2", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-150000.3.44.1.ppc64le as component of SUSE Manager Server 4.2", product_id: "SUSE Manager Server 4.2:clamav-0.103.8-150000.3.44.1.ppc64le", }, product_reference: "clamav-0.103.8-150000.3.44.1.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.2", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-150000.3.44.1.s390x as component of SUSE Manager Server 4.2", product_id: "SUSE Manager Server 4.2:clamav-0.103.8-150000.3.44.1.s390x", }, product_reference: "clamav-0.103.8-150000.3.44.1.s390x", relates_to_product_reference: "SUSE Manager Server 4.2", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-150000.3.44.1.x86_64 as component of SUSE Manager Server 4.2", product_id: "SUSE Manager Server 4.2:clamav-0.103.8-150000.3.44.1.x86_64", }, product_reference: "clamav-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.2", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.8-150000.3.44.1.ppc64le as component of SUSE Manager Server 4.2", product_id: "SUSE Manager Server 4.2:clamav-devel-0.103.8-150000.3.44.1.ppc64le", }, product_reference: "clamav-devel-0.103.8-150000.3.44.1.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.2", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.8-150000.3.44.1.s390x as component of SUSE Manager Server 4.2", product_id: "SUSE Manager Server 4.2:clamav-devel-0.103.8-150000.3.44.1.s390x", }, product_reference: "clamav-devel-0.103.8-150000.3.44.1.s390x", relates_to_product_reference: "SUSE Manager Server 4.2", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.8-150000.3.44.1.x86_64 as component of SUSE Manager Server 4.2", product_id: "SUSE Manager Server 4.2:clamav-devel-0.103.8-150000.3.44.1.x86_64", }, product_reference: "clamav-devel-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.2", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.8-150000.3.44.1.ppc64le as component of SUSE Manager Server 4.2", product_id: "SUSE Manager Server 4.2:libclamav9-0.103.8-150000.3.44.1.ppc64le", }, product_reference: "libclamav9-0.103.8-150000.3.44.1.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.2", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.8-150000.3.44.1.s390x as component of SUSE Manager Server 4.2", product_id: "SUSE Manager Server 4.2:libclamav9-0.103.8-150000.3.44.1.s390x", }, product_reference: "libclamav9-0.103.8-150000.3.44.1.s390x", relates_to_product_reference: "SUSE Manager Server 4.2", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.8-150000.3.44.1.x86_64 as component of SUSE Manager Server 4.2", product_id: "SUSE Manager Server 4.2:libclamav9-0.103.8-150000.3.44.1.x86_64", }, product_reference: "libclamav9-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.2", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.8-150000.3.44.1.ppc64le as component of SUSE Manager Server 4.2", product_id: "SUSE Manager Server 4.2:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", }, product_reference: "libfreshclam2-0.103.8-150000.3.44.1.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.2", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.8-150000.3.44.1.s390x as component of SUSE Manager Server 4.2", product_id: "SUSE Manager Server 4.2:libfreshclam2-0.103.8-150000.3.44.1.s390x", }, product_reference: "libfreshclam2-0.103.8-150000.3.44.1.s390x", relates_to_product_reference: "SUSE Manager Server 4.2", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.8-150000.3.44.1.x86_64 as component of SUSE Manager Server 4.2", product_id: "SUSE Manager Server 4.2:libfreshclam2-0.103.8-150000.3.44.1.x86_64", }, product_reference: "libfreshclam2-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.2", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-150000.3.44.1.aarch64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:clamav-0.103.8-150000.3.44.1.aarch64", }, product_reference: "clamav-0.103.8-150000.3.44.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-150000.3.44.1.x86_64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:clamav-0.103.8-150000.3.44.1.x86_64", }, product_reference: "clamav-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.8-150000.3.44.1.aarch64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:clamav-devel-0.103.8-150000.3.44.1.aarch64", }, product_reference: "clamav-devel-0.103.8-150000.3.44.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.8-150000.3.44.1.x86_64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:clamav-devel-0.103.8-150000.3.44.1.x86_64", }, product_reference: "clamav-devel-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.8-150000.3.44.1.aarch64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:libclamav9-0.103.8-150000.3.44.1.aarch64", }, product_reference: "libclamav9-0.103.8-150000.3.44.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.8-150000.3.44.1.x86_64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:libclamav9-0.103.8-150000.3.44.1.x86_64", }, product_reference: "libclamav9-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.8-150000.3.44.1.aarch64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:libfreshclam2-0.103.8-150000.3.44.1.aarch64", }, product_reference: "libfreshclam2-0.103.8-150000.3.44.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.8-150000.3.44.1.x86_64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:libfreshclam2-0.103.8-150000.3.44.1.x86_64", }, product_reference: "libfreshclam2-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-150000.3.44.1.aarch64 as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:clamav-0.103.8-150000.3.44.1.aarch64", }, product_reference: "clamav-0.103.8-150000.3.44.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-150000.3.44.1.x86_64 as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:clamav-0.103.8-150000.3.44.1.x86_64", }, product_reference: "clamav-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.8-150000.3.44.1.aarch64 as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:clamav-devel-0.103.8-150000.3.44.1.aarch64", }, product_reference: "clamav-devel-0.103.8-150000.3.44.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.8-150000.3.44.1.x86_64 as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:clamav-devel-0.103.8-150000.3.44.1.x86_64", }, product_reference: "clamav-devel-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.8-150000.3.44.1.aarch64 as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:libclamav9-0.103.8-150000.3.44.1.aarch64", }, product_reference: "libclamav9-0.103.8-150000.3.44.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.8-150000.3.44.1.x86_64 as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:libclamav9-0.103.8-150000.3.44.1.x86_64", }, product_reference: "libclamav9-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.8-150000.3.44.1.aarch64 as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:libfreshclam2-0.103.8-150000.3.44.1.aarch64", }, product_reference: "libfreshclam2-0.103.8-150000.3.44.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.8-150000.3.44.1.x86_64 as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:libfreshclam2-0.103.8-150000.3.44.1.x86_64", }, product_reference: "libfreshclam2-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-150000.3.44.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:clamav-0.103.8-150000.3.44.1.aarch64", }, product_reference: "clamav-0.103.8-150000.3.44.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-150000.3.44.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:clamav-0.103.8-150000.3.44.1.ppc64le", }, product_reference: "clamav-0.103.8-150000.3.44.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-150000.3.44.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:clamav-0.103.8-150000.3.44.1.s390x", }, product_reference: "clamav-0.103.8-150000.3.44.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-150000.3.44.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:clamav-0.103.8-150000.3.44.1.x86_64", }, product_reference: "clamav-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.8-150000.3.44.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:clamav-devel-0.103.8-150000.3.44.1.aarch64", }, product_reference: "clamav-devel-0.103.8-150000.3.44.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.8-150000.3.44.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:clamav-devel-0.103.8-150000.3.44.1.ppc64le", }, product_reference: "clamav-devel-0.103.8-150000.3.44.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.8-150000.3.44.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:clamav-devel-0.103.8-150000.3.44.1.s390x", }, product_reference: "clamav-devel-0.103.8-150000.3.44.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.8-150000.3.44.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:clamav-devel-0.103.8-150000.3.44.1.x86_64", }, product_reference: "clamav-devel-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.8-150000.3.44.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:libclamav9-0.103.8-150000.3.44.1.aarch64", }, product_reference: "libclamav9-0.103.8-150000.3.44.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.8-150000.3.44.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:libclamav9-0.103.8-150000.3.44.1.ppc64le", }, product_reference: "libclamav9-0.103.8-150000.3.44.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.8-150000.3.44.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:libclamav9-0.103.8-150000.3.44.1.s390x", }, product_reference: "libclamav9-0.103.8-150000.3.44.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.8-150000.3.44.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:libclamav9-0.103.8-150000.3.44.1.x86_64", }, product_reference: "libclamav9-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.8-150000.3.44.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:libfreshclam2-0.103.8-150000.3.44.1.aarch64", }, product_reference: "libfreshclam2-0.103.8-150000.3.44.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.8-150000.3.44.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", }, product_reference: "libfreshclam2-0.103.8-150000.3.44.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.8-150000.3.44.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:libfreshclam2-0.103.8-150000.3.44.1.s390x", }, product_reference: "libfreshclam2-0.103.8-150000.3.44.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.8-150000.3.44.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:libfreshclam2-0.103.8-150000.3.44.1.x86_64", }, product_reference: "libfreshclam2-0.103.8-150000.3.44.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, ], }, vulnerabilities: [ { cve: "CVE-2023-20032", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-20032", }, ], notes: [ { category: "general", text: "On Feb 15, 2023, the following vulnerability in the ClamAV scanning library was disclosed:\r\n\r \r A vulnerability in the HFS+ partition file parser of ClamAV versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier could allow an unauthenticated, remote attacker to execute arbitrary code.\r\n\r \r This vulnerability is due to a missing buffer size check that may result in a heap buffer overflow write. An attacker could exploit this vulnerability by submitting a crafted HFS+ partition file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to execute arbitrary code with the privileges of the ClamAV scanning process, or else crash the process, resulting in a denial of service (DoS) condition.\r\n\r For a description of this vulnerability, see the ClamAV blog [\"https://blog.clamav.net/\"].", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7.1:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Enterprise Storage 7.1:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Enterprise Storage 7.1:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Enterprise Storage 7.1:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Enterprise Storage 7.1:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Enterprise Storage 7.1:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Enterprise Storage 7.1:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Enterprise Storage 7.1:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Enterprise Storage 7:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Enterprise Storage 7:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Enterprise Storage 7:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Enterprise Storage 7:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Enterprise Storage 7:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Enterprise Storage 7:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Enterprise Storage 7:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Enterprise Storage 7:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:clamav-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:clamav-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:clamav-devel-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:clamav-devel-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libclamav9-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libclamav9-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libfreshclam2-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:clamav-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:clamav-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:clamav-devel-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:clamav-devel-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libclamav9-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libclamav9-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libfreshclam2-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:clamav-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:clamav-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:clamav-devel-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:clamav-devel-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libclamav9-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libclamav9-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libfreshclam2-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:clamav-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:clamav-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:clamav-devel-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:clamav-devel-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libclamav9-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libclamav9-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libfreshclam2-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:clamav-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:clamav-devel-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libclamav9-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:clamav-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:clamav-devel-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libclamav9-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:clamav-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:clamav-devel-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libclamav9-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Manager Proxy 4.2:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Manager Proxy 4.2:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Manager Proxy 4.2:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Manager Proxy 4.2:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Manager Server 4.2:clamav-0.103.8-150000.3.44.1.ppc64le", "SUSE Manager Server 4.2:clamav-0.103.8-150000.3.44.1.s390x", "SUSE Manager Server 4.2:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Manager Server 4.2:clamav-devel-0.103.8-150000.3.44.1.ppc64le", "SUSE Manager Server 4.2:clamav-devel-0.103.8-150000.3.44.1.s390x", "SUSE Manager Server 4.2:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Manager Server 4.2:libclamav9-0.103.8-150000.3.44.1.ppc64le", "SUSE Manager Server 4.2:libclamav9-0.103.8-150000.3.44.1.s390x", "SUSE Manager Server 4.2:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Manager Server 4.2:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", "SUSE Manager Server 4.2:libfreshclam2-0.103.8-150000.3.44.1.s390x", "SUSE Manager Server 4.2:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "openSUSE Leap 15.4:clamav-0.103.8-150000.3.44.1.aarch64", "openSUSE Leap 15.4:clamav-0.103.8-150000.3.44.1.ppc64le", "openSUSE Leap 15.4:clamav-0.103.8-150000.3.44.1.s390x", "openSUSE Leap 15.4:clamav-0.103.8-150000.3.44.1.x86_64", "openSUSE Leap 15.4:clamav-devel-0.103.8-150000.3.44.1.aarch64", "openSUSE Leap 15.4:clamav-devel-0.103.8-150000.3.44.1.ppc64le", "openSUSE Leap 15.4:clamav-devel-0.103.8-150000.3.44.1.s390x", "openSUSE Leap 15.4:clamav-devel-0.103.8-150000.3.44.1.x86_64", "openSUSE Leap 15.4:libclamav9-0.103.8-150000.3.44.1.aarch64", "openSUSE Leap 15.4:libclamav9-0.103.8-150000.3.44.1.ppc64le", "openSUSE Leap 15.4:libclamav9-0.103.8-150000.3.44.1.s390x", "openSUSE Leap 15.4:libclamav9-0.103.8-150000.3.44.1.x86_64", "openSUSE Leap 15.4:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "openSUSE Leap 15.4:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", "openSUSE Leap 15.4:libfreshclam2-0.103.8-150000.3.44.1.s390x", "openSUSE Leap 15.4:libfreshclam2-0.103.8-150000.3.44.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-20032", url: "https://www.suse.com/security/cve/CVE-2023-20032", }, { category: "external", summary: "SUSE Bug 1208363 for CVE-2023-20032", url: "https://bugzilla.suse.com/1208363", }, { category: "external", summary: "SUSE Bug 1211720 for CVE-2023-20032", url: "https://bugzilla.suse.com/1211720", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7.1:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Enterprise Storage 7.1:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Enterprise Storage 7.1:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Enterprise Storage 7.1:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Enterprise Storage 7.1:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Enterprise Storage 7.1:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Enterprise Storage 7.1:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Enterprise Storage 7.1:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Enterprise Storage 7:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Enterprise Storage 7:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Enterprise Storage 7:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Enterprise Storage 7:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Enterprise Storage 7:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Enterprise Storage 7:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Enterprise Storage 7:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Enterprise Storage 7:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:clamav-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:clamav-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:clamav-devel-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:clamav-devel-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libclamav9-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libclamav9-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libfreshclam2-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:clamav-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:clamav-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:clamav-devel-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:clamav-devel-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libclamav9-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libclamav9-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libfreshclam2-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:clamav-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:clamav-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:clamav-devel-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:clamav-devel-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libclamav9-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libclamav9-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libfreshclam2-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:clamav-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:clamav-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:clamav-devel-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:clamav-devel-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libclamav9-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libclamav9-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libfreshclam2-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:clamav-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:clamav-devel-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libclamav9-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:clamav-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:clamav-devel-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libclamav9-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:clamav-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:clamav-devel-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libclamav9-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Manager Proxy 4.2:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Manager Proxy 4.2:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Manager Proxy 4.2:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Manager Proxy 4.2:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Manager Server 4.2:clamav-0.103.8-150000.3.44.1.ppc64le", "SUSE Manager Server 4.2:clamav-0.103.8-150000.3.44.1.s390x", "SUSE Manager Server 4.2:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Manager Server 4.2:clamav-devel-0.103.8-150000.3.44.1.ppc64le", "SUSE Manager Server 4.2:clamav-devel-0.103.8-150000.3.44.1.s390x", "SUSE Manager Server 4.2:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Manager Server 4.2:libclamav9-0.103.8-150000.3.44.1.ppc64le", "SUSE Manager Server 4.2:libclamav9-0.103.8-150000.3.44.1.s390x", "SUSE Manager Server 4.2:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Manager Server 4.2:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", "SUSE Manager Server 4.2:libfreshclam2-0.103.8-150000.3.44.1.s390x", "SUSE Manager Server 4.2:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "openSUSE Leap 15.4:clamav-0.103.8-150000.3.44.1.aarch64", "openSUSE Leap 15.4:clamav-0.103.8-150000.3.44.1.ppc64le", "openSUSE Leap 15.4:clamav-0.103.8-150000.3.44.1.s390x", "openSUSE Leap 15.4:clamav-0.103.8-150000.3.44.1.x86_64", "openSUSE Leap 15.4:clamav-devel-0.103.8-150000.3.44.1.aarch64", "openSUSE Leap 15.4:clamav-devel-0.103.8-150000.3.44.1.ppc64le", "openSUSE Leap 15.4:clamav-devel-0.103.8-150000.3.44.1.s390x", "openSUSE Leap 15.4:clamav-devel-0.103.8-150000.3.44.1.x86_64", "openSUSE Leap 15.4:libclamav9-0.103.8-150000.3.44.1.aarch64", "openSUSE Leap 15.4:libclamav9-0.103.8-150000.3.44.1.ppc64le", "openSUSE Leap 15.4:libclamav9-0.103.8-150000.3.44.1.s390x", "openSUSE Leap 15.4:libclamav9-0.103.8-150000.3.44.1.x86_64", "openSUSE Leap 15.4:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "openSUSE Leap 15.4:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", "openSUSE Leap 15.4:libfreshclam2-0.103.8-150000.3.44.1.s390x", "openSUSE Leap 15.4:libfreshclam2-0.103.8-150000.3.44.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7.1:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Enterprise Storage 7.1:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Enterprise Storage 7.1:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Enterprise Storage 7.1:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Enterprise Storage 7.1:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Enterprise Storage 7.1:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Enterprise Storage 7.1:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Enterprise Storage 7.1:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Enterprise Storage 7:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Enterprise Storage 7:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Enterprise Storage 7:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Enterprise Storage 7:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Enterprise Storage 7:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Enterprise Storage 7:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Enterprise Storage 7:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Enterprise Storage 7:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:clamav-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:clamav-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:clamav-devel-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:clamav-devel-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libclamav9-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libclamav9-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libfreshclam2-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:clamav-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:clamav-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:clamav-devel-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:clamav-devel-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libclamav9-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libclamav9-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libfreshclam2-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:clamav-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:clamav-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:clamav-devel-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:clamav-devel-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libclamav9-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libclamav9-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libfreshclam2-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:clamav-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:clamav-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:clamav-devel-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:clamav-devel-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libclamav9-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libclamav9-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libfreshclam2-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:clamav-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:clamav-devel-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libclamav9-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:clamav-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:clamav-devel-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libclamav9-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:clamav-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:clamav-devel-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libclamav9-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Manager Proxy 4.2:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Manager Proxy 4.2:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Manager Proxy 4.2:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Manager Proxy 4.2:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Manager Server 4.2:clamav-0.103.8-150000.3.44.1.ppc64le", "SUSE Manager Server 4.2:clamav-0.103.8-150000.3.44.1.s390x", "SUSE Manager Server 4.2:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Manager Server 4.2:clamav-devel-0.103.8-150000.3.44.1.ppc64le", "SUSE Manager Server 4.2:clamav-devel-0.103.8-150000.3.44.1.s390x", "SUSE Manager Server 4.2:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Manager Server 4.2:libclamav9-0.103.8-150000.3.44.1.ppc64le", "SUSE Manager Server 4.2:libclamav9-0.103.8-150000.3.44.1.s390x", "SUSE Manager Server 4.2:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Manager Server 4.2:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", "SUSE Manager Server 4.2:libfreshclam2-0.103.8-150000.3.44.1.s390x", "SUSE Manager Server 4.2:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "openSUSE Leap 15.4:clamav-0.103.8-150000.3.44.1.aarch64", "openSUSE Leap 15.4:clamav-0.103.8-150000.3.44.1.ppc64le", "openSUSE Leap 15.4:clamav-0.103.8-150000.3.44.1.s390x", "openSUSE Leap 15.4:clamav-0.103.8-150000.3.44.1.x86_64", "openSUSE Leap 15.4:clamav-devel-0.103.8-150000.3.44.1.aarch64", "openSUSE Leap 15.4:clamav-devel-0.103.8-150000.3.44.1.ppc64le", "openSUSE Leap 15.4:clamav-devel-0.103.8-150000.3.44.1.s390x", "openSUSE Leap 15.4:clamav-devel-0.103.8-150000.3.44.1.x86_64", "openSUSE Leap 15.4:libclamav9-0.103.8-150000.3.44.1.aarch64", "openSUSE Leap 15.4:libclamav9-0.103.8-150000.3.44.1.ppc64le", "openSUSE Leap 15.4:libclamav9-0.103.8-150000.3.44.1.s390x", "openSUSE Leap 15.4:libclamav9-0.103.8-150000.3.44.1.x86_64", "openSUSE Leap 15.4:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "openSUSE Leap 15.4:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", "openSUSE Leap 15.4:libfreshclam2-0.103.8-150000.3.44.1.s390x", "openSUSE Leap 15.4:libfreshclam2-0.103.8-150000.3.44.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-02-21T09:06:01Z", details: "critical", }, ], title: "CVE-2023-20032", }, { cve: "CVE-2023-20052", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-20052", }, ], notes: [ { category: "general", text: "On Feb 15, 2023, the following vulnerability in the ClamAV scanning library was disclosed:\r\n\r \r A vulnerability in the DMG file parser of ClamAV versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier could allow an unauthenticated, remote attacker to access sensitive information on an affected device.\r\n\r \r This vulnerability is due to enabling XML entity substitution that may result in XML external entity injection. An attacker could exploit this vulnerability by submitting a crafted DMG file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to leak bytes from any file that may be read by the ClamAV scanning process.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7.1:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Enterprise Storage 7.1:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Enterprise Storage 7.1:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Enterprise Storage 7.1:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Enterprise Storage 7.1:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Enterprise Storage 7.1:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Enterprise Storage 7.1:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Enterprise Storage 7.1:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Enterprise Storage 7:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Enterprise Storage 7:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Enterprise Storage 7:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Enterprise Storage 7:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Enterprise Storage 7:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Enterprise Storage 7:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Enterprise Storage 7:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Enterprise Storage 7:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:clamav-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:clamav-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:clamav-devel-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:clamav-devel-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libclamav9-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libclamav9-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libfreshclam2-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:clamav-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:clamav-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:clamav-devel-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:clamav-devel-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libclamav9-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libclamav9-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libfreshclam2-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:clamav-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:clamav-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:clamav-devel-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:clamav-devel-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libclamav9-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libclamav9-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libfreshclam2-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:clamav-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:clamav-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:clamav-devel-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:clamav-devel-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libclamav9-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libclamav9-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libfreshclam2-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:clamav-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:clamav-devel-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libclamav9-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:clamav-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:clamav-devel-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libclamav9-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:clamav-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:clamav-devel-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libclamav9-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Manager Proxy 4.2:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Manager Proxy 4.2:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Manager Proxy 4.2:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Manager Proxy 4.2:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Manager Server 4.2:clamav-0.103.8-150000.3.44.1.ppc64le", "SUSE Manager Server 4.2:clamav-0.103.8-150000.3.44.1.s390x", "SUSE Manager Server 4.2:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Manager Server 4.2:clamav-devel-0.103.8-150000.3.44.1.ppc64le", "SUSE Manager Server 4.2:clamav-devel-0.103.8-150000.3.44.1.s390x", "SUSE Manager Server 4.2:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Manager Server 4.2:libclamav9-0.103.8-150000.3.44.1.ppc64le", "SUSE Manager Server 4.2:libclamav9-0.103.8-150000.3.44.1.s390x", "SUSE Manager Server 4.2:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Manager Server 4.2:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", "SUSE Manager Server 4.2:libfreshclam2-0.103.8-150000.3.44.1.s390x", "SUSE Manager Server 4.2:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "openSUSE Leap 15.4:clamav-0.103.8-150000.3.44.1.aarch64", "openSUSE Leap 15.4:clamav-0.103.8-150000.3.44.1.ppc64le", "openSUSE Leap 15.4:clamav-0.103.8-150000.3.44.1.s390x", "openSUSE Leap 15.4:clamav-0.103.8-150000.3.44.1.x86_64", "openSUSE Leap 15.4:clamav-devel-0.103.8-150000.3.44.1.aarch64", "openSUSE Leap 15.4:clamav-devel-0.103.8-150000.3.44.1.ppc64le", "openSUSE Leap 15.4:clamav-devel-0.103.8-150000.3.44.1.s390x", "openSUSE Leap 15.4:clamav-devel-0.103.8-150000.3.44.1.x86_64", "openSUSE Leap 15.4:libclamav9-0.103.8-150000.3.44.1.aarch64", "openSUSE Leap 15.4:libclamav9-0.103.8-150000.3.44.1.ppc64le", "openSUSE Leap 15.4:libclamav9-0.103.8-150000.3.44.1.s390x", "openSUSE Leap 15.4:libclamav9-0.103.8-150000.3.44.1.x86_64", "openSUSE Leap 15.4:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "openSUSE Leap 15.4:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", "openSUSE Leap 15.4:libfreshclam2-0.103.8-150000.3.44.1.s390x", "openSUSE Leap 15.4:libfreshclam2-0.103.8-150000.3.44.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-20052", url: "https://www.suse.com/security/cve/CVE-2023-20052", }, { category: "external", summary: "SUSE Bug 1208365 for CVE-2023-20052", url: "https://bugzilla.suse.com/1208365", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7.1:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Enterprise Storage 7.1:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Enterprise Storage 7.1:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Enterprise Storage 7.1:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Enterprise Storage 7.1:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Enterprise Storage 7.1:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Enterprise Storage 7.1:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Enterprise Storage 7.1:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Enterprise Storage 7:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Enterprise Storage 7:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Enterprise Storage 7:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Enterprise Storage 7:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Enterprise Storage 7:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Enterprise Storage 7:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Enterprise Storage 7:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Enterprise Storage 7:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:clamav-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:clamav-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:clamav-devel-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:clamav-devel-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libclamav9-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libclamav9-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libfreshclam2-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:clamav-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:clamav-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:clamav-devel-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:clamav-devel-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libclamav9-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libclamav9-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libfreshclam2-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:clamav-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:clamav-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:clamav-devel-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:clamav-devel-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libclamav9-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libclamav9-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libfreshclam2-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:clamav-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:clamav-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:clamav-devel-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:clamav-devel-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libclamav9-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libclamav9-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libfreshclam2-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:clamav-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:clamav-devel-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libclamav9-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:clamav-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:clamav-devel-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libclamav9-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:clamav-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:clamav-devel-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libclamav9-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Manager Proxy 4.2:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Manager Proxy 4.2:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Manager Proxy 4.2:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Manager Proxy 4.2:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Manager Server 4.2:clamav-0.103.8-150000.3.44.1.ppc64le", "SUSE Manager Server 4.2:clamav-0.103.8-150000.3.44.1.s390x", "SUSE Manager Server 4.2:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Manager Server 4.2:clamav-devel-0.103.8-150000.3.44.1.ppc64le", "SUSE Manager Server 4.2:clamav-devel-0.103.8-150000.3.44.1.s390x", "SUSE Manager Server 4.2:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Manager Server 4.2:libclamav9-0.103.8-150000.3.44.1.ppc64le", "SUSE Manager Server 4.2:libclamav9-0.103.8-150000.3.44.1.s390x", "SUSE Manager Server 4.2:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Manager Server 4.2:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", "SUSE Manager Server 4.2:libfreshclam2-0.103.8-150000.3.44.1.s390x", "SUSE Manager Server 4.2:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "openSUSE Leap 15.4:clamav-0.103.8-150000.3.44.1.aarch64", "openSUSE Leap 15.4:clamav-0.103.8-150000.3.44.1.ppc64le", "openSUSE Leap 15.4:clamav-0.103.8-150000.3.44.1.s390x", "openSUSE Leap 15.4:clamav-0.103.8-150000.3.44.1.x86_64", "openSUSE Leap 15.4:clamav-devel-0.103.8-150000.3.44.1.aarch64", "openSUSE Leap 15.4:clamav-devel-0.103.8-150000.3.44.1.ppc64le", "openSUSE Leap 15.4:clamav-devel-0.103.8-150000.3.44.1.s390x", "openSUSE Leap 15.4:clamav-devel-0.103.8-150000.3.44.1.x86_64", "openSUSE Leap 15.4:libclamav9-0.103.8-150000.3.44.1.aarch64", "openSUSE Leap 15.4:libclamav9-0.103.8-150000.3.44.1.ppc64le", "openSUSE Leap 15.4:libclamav9-0.103.8-150000.3.44.1.s390x", "openSUSE Leap 15.4:libclamav9-0.103.8-150000.3.44.1.x86_64", "openSUSE Leap 15.4:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "openSUSE Leap 15.4:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", "openSUSE Leap 15.4:libfreshclam2-0.103.8-150000.3.44.1.s390x", "openSUSE Leap 15.4:libfreshclam2-0.103.8-150000.3.44.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Enterprise Storage 7.1:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Enterprise Storage 7.1:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Enterprise Storage 7.1:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Enterprise Storage 7.1:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Enterprise Storage 7.1:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Enterprise Storage 7.1:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Enterprise Storage 7.1:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Enterprise Storage 7.1:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Enterprise Storage 7:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Enterprise Storage 7:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Enterprise Storage 7:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Enterprise Storage 7:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Enterprise Storage 7:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Enterprise Storage 7:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Enterprise Storage 7:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Enterprise Storage 7:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:clamav-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:clamav-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:clamav-devel-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:clamav-devel-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libclamav9-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libclamav9-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libfreshclam2-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:clamav-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:clamav-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:clamav-devel-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:clamav-devel-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libclamav9-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libclamav9-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libfreshclam2-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:clamav-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:clamav-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:clamav-devel-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:clamav-devel-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libclamav9-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libclamav9-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libfreshclam2-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:clamav-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:clamav-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:clamav-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:clamav-devel-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:clamav-devel-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:clamav-devel-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libclamav9-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libclamav9-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libclamav9-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libfreshclam2-0.103.8-150000.3.44.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:clamav-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:clamav-devel-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libclamav9-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:clamav-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:clamav-devel-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libclamav9-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:clamav-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:clamav-devel-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libclamav9-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Manager Proxy 4.2:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Manager Proxy 4.2:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Manager Proxy 4.2:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Manager Proxy 4.2:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "SUSE Manager Server 4.2:clamav-0.103.8-150000.3.44.1.ppc64le", "SUSE Manager Server 4.2:clamav-0.103.8-150000.3.44.1.s390x", "SUSE Manager Server 4.2:clamav-0.103.8-150000.3.44.1.x86_64", "SUSE Manager Server 4.2:clamav-devel-0.103.8-150000.3.44.1.ppc64le", "SUSE Manager Server 4.2:clamav-devel-0.103.8-150000.3.44.1.s390x", "SUSE Manager Server 4.2:clamav-devel-0.103.8-150000.3.44.1.x86_64", "SUSE Manager Server 4.2:libclamav9-0.103.8-150000.3.44.1.ppc64le", "SUSE Manager Server 4.2:libclamav9-0.103.8-150000.3.44.1.s390x", "SUSE Manager Server 4.2:libclamav9-0.103.8-150000.3.44.1.x86_64", "SUSE Manager Server 4.2:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", "SUSE Manager Server 4.2:libfreshclam2-0.103.8-150000.3.44.1.s390x", "SUSE Manager Server 4.2:libfreshclam2-0.103.8-150000.3.44.1.x86_64", "openSUSE Leap 15.4:clamav-0.103.8-150000.3.44.1.aarch64", "openSUSE Leap 15.4:clamav-0.103.8-150000.3.44.1.ppc64le", "openSUSE Leap 15.4:clamav-0.103.8-150000.3.44.1.s390x", "openSUSE Leap 15.4:clamav-0.103.8-150000.3.44.1.x86_64", "openSUSE Leap 15.4:clamav-devel-0.103.8-150000.3.44.1.aarch64", "openSUSE Leap 15.4:clamav-devel-0.103.8-150000.3.44.1.ppc64le", "openSUSE Leap 15.4:clamav-devel-0.103.8-150000.3.44.1.s390x", "openSUSE Leap 15.4:clamav-devel-0.103.8-150000.3.44.1.x86_64", "openSUSE Leap 15.4:libclamav9-0.103.8-150000.3.44.1.aarch64", "openSUSE Leap 15.4:libclamav9-0.103.8-150000.3.44.1.ppc64le", "openSUSE Leap 15.4:libclamav9-0.103.8-150000.3.44.1.s390x", "openSUSE Leap 15.4:libclamav9-0.103.8-150000.3.44.1.x86_64", "openSUSE Leap 15.4:libfreshclam2-0.103.8-150000.3.44.1.aarch64", "openSUSE Leap 15.4:libfreshclam2-0.103.8-150000.3.44.1.ppc64le", "openSUSE Leap 15.4:libfreshclam2-0.103.8-150000.3.44.1.s390x", "openSUSE Leap 15.4:libfreshclam2-0.103.8-150000.3.44.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-02-21T09:06:01Z", details: "moderate", }, ], title: "CVE-2023-20052", }, ], }
suse-su-2023:0471-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "critical", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for clamav", title: "Title of the patch", }, { category: "description", text: "This update for clamav fixes the following issues:\n\n- CVE-2023-20032: Fixed a possible remote code execution vulnerability in the HFS+ file parser (bsc#1208363).\n- CVE-2023-20052: Fixed a possible remote information leak vulnerability in the DMG file parser (bsc#1208365).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2023-471,SUSE-SLE-SERVER-12-SP5-2023-471", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_0471-1.json", }, { category: "self", summary: "URL for SUSE-SU-2023:0471-1", url: "https://www.suse.com/support/update/announcement/2023/suse-su-20230471-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2023:0471-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-February/013848.html", }, { category: "self", summary: "SUSE Bug 1208363", url: "https://bugzilla.suse.com/1208363", }, { category: "self", summary: "SUSE Bug 1208365", url: "https://bugzilla.suse.com/1208365", }, { category: "self", summary: "SUSE CVE CVE-2023-20032 page", url: "https://www.suse.com/security/cve/CVE-2023-20032/", }, { category: "self", summary: "SUSE CVE CVE-2023-20052 page", url: "https://www.suse.com/security/cve/CVE-2023-20052/", }, ], title: "Security update for clamav", tracking: { current_release_date: "2023-02-21T09:07:10Z", generator: { date: "2023-02-21T09:07:10Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2023:0471-1", initial_release_date: "2023-02-21T09:07:10Z", revision_history: [ { date: "2023-02-21T09:07:10Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "clamav-0.103.8-3.24.1.aarch64", product: { name: "clamav-0.103.8-3.24.1.aarch64", product_id: "clamav-0.103.8-3.24.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "clamav-0.103.8-3.24.1.i586", product: { name: "clamav-0.103.8-3.24.1.i586", product_id: "clamav-0.103.8-3.24.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "clamav-0.103.8-3.24.1.ppc64le", product: { name: "clamav-0.103.8-3.24.1.ppc64le", product_id: "clamav-0.103.8-3.24.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "clamav-0.103.8-3.24.1.s390", product: { name: "clamav-0.103.8-3.24.1.s390", product_id: "clamav-0.103.8-3.24.1.s390", }, }, ], category: "architecture", name: "s390", }, { branches: [ { category: "product_version", name: "clamav-0.103.8-3.24.1.s390x", product: { name: "clamav-0.103.8-3.24.1.s390x", product_id: "clamav-0.103.8-3.24.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "clamav-0.103.8-3.24.1.x86_64", product: { name: "clamav-0.103.8-3.24.1.x86_64", product_id: "clamav-0.103.8-3.24.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP5", product: { name: "SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-3.24.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.8-3.24.1.aarch64", }, product_reference: "clamav-0.103.8-3.24.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-3.24.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.8-3.24.1.ppc64le", }, product_reference: "clamav-0.103.8-3.24.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-3.24.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.8-3.24.1.s390x", }, product_reference: "clamav-0.103.8-3.24.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-3.24.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.8-3.24.1.x86_64", }, product_reference: "clamav-0.103.8-3.24.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-3.24.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.8-3.24.1.aarch64", }, product_reference: "clamav-0.103.8-3.24.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-3.24.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.8-3.24.1.ppc64le", }, product_reference: "clamav-0.103.8-3.24.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-3.24.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.8-3.24.1.s390x", }, product_reference: "clamav-0.103.8-3.24.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-3.24.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.8-3.24.1.x86_64", }, product_reference: "clamav-0.103.8-3.24.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, ], }, vulnerabilities: [ { cve: "CVE-2023-20032", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-20032", }, ], notes: [ { category: "general", text: "On Feb 15, 2023, the following vulnerability in the ClamAV scanning library was disclosed:\r\n\r \r A vulnerability in the HFS+ partition file parser of ClamAV versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier could allow an unauthenticated, remote attacker to execute arbitrary code.\r\n\r \r This vulnerability is due to a missing buffer size check that may result in a heap buffer overflow write. An attacker could exploit this vulnerability by submitting a crafted HFS+ partition file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to execute arbitrary code with the privileges of the ClamAV scanning process, or else crash the process, resulting in a denial of service (DoS) condition.\r\n\r For a description of this vulnerability, see the ClamAV blog [\"https://blog.clamav.net/\"].", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.8-3.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.8-3.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.8-3.24.1.s390x", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.8-3.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.8-3.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.8-3.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.8-3.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.8-3.24.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-20032", url: "https://www.suse.com/security/cve/CVE-2023-20032", }, { category: "external", summary: "SUSE Bug 1208363 for CVE-2023-20032", url: "https://bugzilla.suse.com/1208363", }, { category: "external", summary: "SUSE Bug 1211720 for CVE-2023-20032", url: "https://bugzilla.suse.com/1211720", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.8-3.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.8-3.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.8-3.24.1.s390x", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.8-3.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.8-3.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.8-3.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.8-3.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.8-3.24.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.8-3.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.8-3.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.8-3.24.1.s390x", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.8-3.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.8-3.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.8-3.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.8-3.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.8-3.24.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-02-21T09:07:10Z", details: "critical", }, ], title: "CVE-2023-20032", }, { cve: "CVE-2023-20052", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-20052", }, ], notes: [ { category: "general", text: "On Feb 15, 2023, the following vulnerability in the ClamAV scanning library was disclosed:\r\n\r \r A vulnerability in the DMG file parser of ClamAV versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier could allow an unauthenticated, remote attacker to access sensitive information on an affected device.\r\n\r \r This vulnerability is due to enabling XML entity substitution that may result in XML external entity injection. An attacker could exploit this vulnerability by submitting a crafted DMG file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to leak bytes from any file that may be read by the ClamAV scanning process.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.8-3.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.8-3.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.8-3.24.1.s390x", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.8-3.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.8-3.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.8-3.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.8-3.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.8-3.24.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-20052", url: "https://www.suse.com/security/cve/CVE-2023-20052", }, { category: "external", summary: "SUSE Bug 1208365 for CVE-2023-20052", url: "https://bugzilla.suse.com/1208365", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.8-3.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.8-3.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.8-3.24.1.s390x", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.8-3.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.8-3.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.8-3.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.8-3.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.8-3.24.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.8-3.24.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.8-3.24.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.8-3.24.1.s390x", "SUSE Linux Enterprise Server 12 SP5:clamav-0.103.8-3.24.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.8-3.24.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.8-3.24.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.8-3.24.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:clamav-0.103.8-3.24.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-02-21T09:07:10Z", details: "moderate", }, ], title: "CVE-2023-20052", }, ], }
fkie_cve-2023-20032
Vulnerability from fkie_nvd
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:linux:*:*", matchCriteriaId: "40572314-306A-4594-A279-216B8139B7A0", versionEndExcluding: "1.20.2", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:macos:*:*", matchCriteriaId: "726A787E-E64F-4906-9BAE-4F79EB530F1F", versionEndExcluding: "1.21.1", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:windows:*:*", matchCriteriaId: "C4F63447-CA0E-43FC-8FF1-B4032D21E32A", versionEndExcluding: "7.5.9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:windows:*:*", matchCriteriaId: "D0FC45E7-C4AB-4AC5-87AB-0ED1508CCFF3", versionEndExcluding: "8.1.5", versionStartIncluding: "8.0.1.21160", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:secure_endpoint_private_cloud:*:*:*:*:*:*:*:*", matchCriteriaId: "07BFC8FC-6CF0-49DA-B4ED-5B7936A4233E", versionEndExcluding: "3.6.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:web_security_appliance:*:*:*:*:*:*:*:*", matchCriteriaId: "2EFF7AB1-33C6-4627-9950-2F2E48BCCC7E", versionEndExcluding: "12.5.6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:web_security_appliance:*:*:*:*:*:*:*:*", matchCriteriaId: "A8361D69-981F-4F28-86F9-EFF202C9E537", versionEndExcluding: "14.0.4-005", versionStartIncluding: "14.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:web_security_appliance:*:*:*:*:*:*:*:*", matchCriteriaId: "CF6E494A-FCA7-4569-847D-2AA3C14C3E79", versionEndExcluding: "14.5.1-013", versionStartIncluding: "14.5.0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:web_security_appliance:*:*:*:*:*:*:*:*", matchCriteriaId: "BD8B1F66-9FD3-4970-BDA3-26241B18B4AA", versionEndExcluding: "15.0.0-254", versionStartIncluding: "15.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*", matchCriteriaId: "BDF08008-9C84-4075-8AB7-233209E4F3C0", versionEndIncluding: "0.103.7", vulnerable: true, }, { criteria: "cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*", matchCriteriaId: "14FA7424-A3E5-4F46-83F8-E9767330F1CE", versionEndIncluding: "0.105.1", versionStartIncluding: "0.104.0", vulnerable: true, }, { criteria: "cpe:2.3:a:clamav:clamav:1.0.0:-:*:*:*:*:*:*", matchCriteriaId: "A381BD3C-88E0-41FD-91E6-26BCF78B84CA", vulnerable: true, }, { criteria: "cpe:2.3:a:clamav:clamav:1.0.0:rc:*:*:*:*:*:*", matchCriteriaId: "88BE0B1C-4515-40EA-ADDD-A04BF50743DA", vulnerable: true, }, { criteria: "cpe:2.3:a:clamav:clamav:1.0.0:rc2:*:*:*:*:*:*", matchCriteriaId: "FB00FEFE-F8A2-482D-A7EE-002DA4E10FF6", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", matchCriteriaId: "88CF061E-FFD8-48DE-887F-2119C916E2B4", versionEndExcluding: "3.7.35", versionStartIncluding: "3.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", matchCriteriaId: "F499B698-4EB6-4262-BAF4-9BDE7F114805", versionEndExcluding: "3.11.23", versionStartIncluding: "3.8.0", vulnerable: true, }, { criteria: "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", matchCriteriaId: "40519377-ECDC-41E2-B6A6-7F601AC28ACD", versionEndExcluding: "4.3.17", versionStartIncluding: "4.3.0", vulnerable: true, }, { criteria: "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", matchCriteriaId: "77BAC9BA-B215-490F-9202-617B1B4E7C8A", versionEndExcluding: "4.6.4", versionStartIncluding: "4.4.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "On Feb 15, 2023, the following vulnerability in the ClamAV scanning library was disclosed:\r\n\r \r A vulnerability in the HFS+ partition file parser of ClamAV versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier could allow an unauthenticated, remote attacker to execute arbitrary code.\r\n\r \r This vulnerability is due to a missing buffer size check that may result in a heap buffer overflow write. An attacker could exploit this vulnerability by submitting a crafted HFS+ partition file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to execute arbitrary code with the privileges of the ClamAV scanning process, or else crash the process, resulting in a denial of service (DoS) condition.\r\n\r For a description of this vulnerability, see the ClamAV blog [\"https://blog.clamav.net/\"].", }, ], id: "CVE-2023-20032", lastModified: "2024-11-21T07:40:23.950", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-03-01T08:15:11.907", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-q8DThCy", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-q8DThCy", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-120", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
cisco-sa-clamav-q8DThCy
Vulnerability from csaf_cisco
Notes
{ document: { acknowledgments: [ { summary: "Cisco would like to thank Simon Scannell for reporting this vulnerability.", }, ], category: "csaf_security_advisory", csaf_version: "2.0", notes: [ { category: "summary", text: "On Feb 15, 2023, the following vulnerability in the ClamAV scanning library was disclosed:\r\n\r\n\r\nA vulnerability in the HFS+ partition file parser of ClamAV versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier could allow an unauthenticated, remote attacker to execute arbitrary code.\r\n\r\nThis vulnerability is due to a missing buffer size check that may result in a heap buffer overflow write. An attacker could exploit this vulnerability by submitting a crafted HFS+ partition file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to execute arbitrary code with the privileges of the ClamAV scanning process, or else crash the process, resulting in a denial of service (DoS) condition.\r\n\r\nFor a description of this vulnerability, see the ClamAV blog [\"https://blog.clamav.net/2023/02/clamav-01038-01052-and-101-patch.html\"].\r\n\r\nNotes:\r\n\r\nThe Security Impact Rating (SIR) for this vulnerability is Critical only for Windows-based platforms because those platforms run the ClamAV scanning process in a privileged security context. The platforms that are critically impacted include Cisco Secure Endpoint Connector for Windows.\r\nThe SIR for this vulnerability is Medium on other platforms, including Linux and Mac platforms, because those platforms run the ClamAV scanning process in a lower-privileged security context. The affected platforms include Cisco Secure Web Appliance and Secure Endpoint Connector for Linux and Mac.\r\nCisco Secure Endpoint Private Cloud itself is not impacted by this vulnerability. However, the Secure Endpoint Connector software that is distributed from the device is impacted.\r\n\r\n", title: "Summary", }, { category: "general", text: "Cisco investigated its product line to determine which products may be affected by this vulnerability.\r\n\r\nThe Vulnerable Products [\"#vp\"] section includes Cisco bug IDs for each affected product. The bugs are accessible through the Cisco Bug Search Tool [\"https://bst.cloudapps.cisco.com/bugsearch/bug/BUGID\"] and contain additional platform-specific information, including workarounds (if available) and fixed software releases.\r\n\r\nAny product not listed in the Vulnerable Products section of this advisory is to be considered not vulnerable.", title: "Affected Products", }, { category: "general", text: "The following table lists Cisco products that are affected by the vulnerability that is described in this advisory. If a future release date is indicated for software, the date provided represents an estimate based on all information known to Cisco as of the Last Updated date at the top of the advisory. Availability dates are subject to change based on a number of factors, including satisfactory testing results and delivery of other priority features and fixes.\r\n Cisco Product Cisco Bug ID Fixed Release Availability [\"https://tools.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"] Secure Endpoint, formerly Advanced Malware Protection (AMP) for Endpoints, for Linux CSCwd74133 [\"https://bst.cisco.com/bugsearch/bug/CSCwd74133\"] 1.20.21 Secure Endpoint, formerly Advanced Malware Protection (AMP) for Endpoints, for MacOS CSCwd74134 [\"https://bst.cisco.com/bugsearch/bug/CSCwd74134\"] 1.21.11 Secure Endpoint, formerly Advanced Malware Protection (AMP) for Endpoints, for Windows CSCwd74135 [\"https://bst.cisco.com/bugsearch/bug/CSCwd74135\"] 7.5.9 1\r\n8.1.5 Secure Endpoint Private Cloud CSCwe18204 [\"https://bst.cisco.com/bugsearch/bug/CSCwe18204\"] 3.6.0 or later with updated connectors2 Secure Web Appliance, formerly Web Security Appliance CSCwd74132 [\"https://bst.cisco.com/bugsearch/bug/CSCwd74132\"] 12.5.6 (May 2023)\r\n14.0.4-005\r\n14.5.1-013 (Mar 2023)\r\n15.0.0-254 (April 2023)\r\n1. Updated releases of Cisco Secure Endpoint are available through the Cisco Secure Endpoint [\"https://console.amp.cisco.com/\"] portal. Depending on the configured policy, Cisco Secure Endpoint will automatically update.\r\n2. Affected releases of Cisco Secure Endpoint clients for Cisco Secure Endpoint Private Cloud have been updated in the connectors repository. Customers will get these connector updates through normal content update processes.\r\nAttention: Simplifying the Cisco portfolio includes the renaming of security products under one brand: Cisco Secure. For more information, see Meet Cisco Secure [\"https://www.cisco.com/c/en/us/products/security/secure-names.html\"].", title: "Vulnerable Products", }, { category: "general", text: "Only products listed in the Vulnerable Products [\"#vp\"] section of this advisory are known to be affected by this vulnerability.\r\n\r\nCisco has confirmed that this vulnerability does not affect the following Cisco products:\r\n\r\nSecure Email Gateway, formerly Email Security Appliance\r\nSecure Email and Web Manager, formerly Security Management Appliance", title: "Products Confirmed Not Vulnerable", }, { category: "general", text: "There are no workarounds that address this vulnerability.", title: "Workarounds", }, { category: "general", text: "For information about fixed software releases [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], consult the Cisco bugs identified in the Vulnerable Products [\"#vp\"] section of this advisory.\r\n\r\nWhen considering software upgrades [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories [\"https://www.cisco.com/go/psirt\"] page, to determine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.", title: "Fixed Software", }, { category: "general", text: "To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy [\"http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html\"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.", title: "Vulnerability Policy", }, { category: "general", text: "The Cisco Product Security Incident Response Team (PSIRT) is aware that a proof-of-concept is available that demonstrates that this vulnerability can be used to cause a buffer overflow and subsequent process termination.\r\n\r\nAdditional technical information is also available that describes this vulnerability in detail.\r\n\r\nThe Cisco PSIRT is not aware of any malicious use of the vulnerability that is described in this advisory.", title: "Exploitation and Public Announcements", }, { category: "general", text: "Cisco would like to thank Simon Scannell for reporting this vulnerability.", title: "Source", }, { category: "legal_disclaimer", text: "THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.\r\n\r\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.", title: "Legal Disclaimer", }, ], publisher: { category: "vendor", contact_details: "psirt@cisco.com", issuing_authority: "Cisco PSIRT", name: "Cisco", namespace: "https://wwww.cisco.com", }, references: [ { category: "self", summary: "ClamAV HFS+ Partition Scanning Buffer Overflow Vulnerability Affecting Cisco Products: February 2023", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-q8DThCy", }, { category: "external", summary: "Cisco Security Vulnerability Policy", url: "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html", }, { category: "external", summary: "ClamAV blog", url: "https://blog.clamav.net/2023/02/clamav-01038-01052-and-101-patch.html", }, { category: "external", summary: "Cisco Bug Search Tool", url: "https://bst.cloudapps.cisco.com/bugsearch/bug/BUGID", }, { category: "external", summary: "Fixed Release Availability", url: "https://tools.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes", }, { category: "external", summary: "CSCwd74133", url: "https://bst.cisco.com/bugsearch/bug/CSCwd74133", }, { category: "external", summary: "CSCwd74134", url: "https://bst.cisco.com/bugsearch/bug/CSCwd74134", }, { category: "external", summary: "CSCwd74135", url: "https://bst.cisco.com/bugsearch/bug/CSCwd74135", }, { category: "external", summary: "CSCwe18204", url: "https://bst.cisco.com/bugsearch/bug/CSCwe18204", }, { category: "external", summary: "CSCwd74132", url: "https://bst.cisco.com/bugsearch/bug/CSCwd74132", }, { category: "external", summary: "Cisco Secure Endpoint", url: "https://console.amp.cisco.com/", }, { category: "external", summary: "Meet Cisco Secure", url: "https://www.cisco.com/c/en/us/products/security/secure-names.html", }, { category: "external", summary: "fixed software releases", url: "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes", }, { category: "external", summary: "Cisco Security Advisories", url: "https://www.cisco.com/go/psirt", }, { category: "external", summary: "Security Vulnerability Policy", url: "http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html", }, ], title: "ClamAV HFS+ Partition Scanning Buffer Overflow Vulnerability Affecting Cisco Products: February 2023", tracking: { current_release_date: "2023-02-22T14:09:19+00:00", generator: { date: "2024-05-10T23:21:52+00:00", engine: { name: "TVCE", }, }, id: "cisco-sa-clamav-q8DThCy", initial_release_date: "2023-02-15T16:00:00+00:00", revision_history: [ { date: "2023-02-15T15:53:37+00:00", number: "1.0.0", summary: "Initial public release.", }, { date: "2023-02-15T20:14:36+00:00", number: "1.1.0", summary: "Changed date of ClamAV disclosure to February 15.", }, { date: "2023-02-17T19:43:51+00:00", number: "1.2.0", summary: "Added two more fixed releases and availability dates for Secure Web Appliance.", }, { date: "2023-02-21T14:26:24+00:00", number: "1.3.0", summary: "Clarified the vulnerability impacts based on platform. Updated the link to the ClamAV blog.", }, { date: "2023-02-22T14:09:19+00:00", number: "1.4.0", summary: "Updated proof-of-concept information.", }, ], status: "final", version: "1.4.0", }, }, product_tree: { branches: [ { branches: [ { category: "product_family", name: "Cisco Secure Web Appliance", product: { name: "Cisco Secure Web Appliance ", product_id: "CSAFPID-189789", }, }, { category: "product_family", name: "Cisco Secure Endpoint", product: { name: "Cisco Secure Endpoint ", product_id: "CSAFPID-221075", }, }, { category: "product_family", name: "Cisco Secure Endpoint Private Cloud Administration Portal", product: { name: "Cisco Secure Endpoint Private Cloud Administration Portal ", product_id: "CSAFPID-292706", }, }, ], category: "vendor", name: "Cisco", }, ], }, vulnerabilities: [ { cve: "CVE-2023-20032", ids: [ { system_name: "Cisco Bug ID", text: "CSCwd74135", }, { system_name: "Cisco Bug ID", text: "CSCwd74134", }, { system_name: "Cisco Bug ID", text: "CSCwd74133", }, { system_name: "Cisco Bug ID", text: "CSCwe18204", }, { system_name: "Cisco Bug ID", text: "CSCwd74132", }, ], notes: [ { category: "other", text: "Complete.", title: "Affected Product Comprehensiveness", }, ], product_status: { known_affected: [ "CSAFPID-221075", "CSAFPID-292706", "CSAFPID-189789", ], }, release_date: "2023-02-15T16:00:00+00:00", remediations: [ { category: "vendor_fix", details: "Cisco has released software updates that address this vulnerability.", product_ids: [ "CSAFPID-221075", "CSAFPID-292706", "CSAFPID-189789", ], url: "https://software.cisco.com", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-221075", "CSAFPID-292706", "CSAFPID-189789", ], }, ], title: "ClamAV HFS+ Partition Scanning Buffer Overflow Vulnerability", }, ], }
cisco-sa-clamav-q8dthcy
Vulnerability from csaf_cisco
Notes
{ document: { acknowledgments: [ { summary: "Cisco would like to thank Simon Scannell for reporting this vulnerability.", }, ], category: "csaf_security_advisory", csaf_version: "2.0", notes: [ { category: "summary", text: "On Feb 15, 2023, the following vulnerability in the ClamAV scanning library was disclosed:\r\n\r\n\r\nA vulnerability in the HFS+ partition file parser of ClamAV versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier could allow an unauthenticated, remote attacker to execute arbitrary code.\r\n\r\nThis vulnerability is due to a missing buffer size check that may result in a heap buffer overflow write. An attacker could exploit this vulnerability by submitting a crafted HFS+ partition file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to execute arbitrary code with the privileges of the ClamAV scanning process, or else crash the process, resulting in a denial of service (DoS) condition.\r\n\r\nFor a description of this vulnerability, see the ClamAV blog [\"https://blog.clamav.net/2023/02/clamav-01038-01052-and-101-patch.html\"].\r\n\r\nNotes:\r\n\r\nThe Security Impact Rating (SIR) for this vulnerability is Critical only for Windows-based platforms because those platforms run the ClamAV scanning process in a privileged security context. The platforms that are critically impacted include Cisco Secure Endpoint Connector for Windows.\r\nThe SIR for this vulnerability is Medium on other platforms, including Linux and Mac platforms, because those platforms run the ClamAV scanning process in a lower-privileged security context. The affected platforms include Cisco Secure Web Appliance and Secure Endpoint Connector for Linux and Mac.\r\nCisco Secure Endpoint Private Cloud itself is not impacted by this vulnerability. However, the Secure Endpoint Connector software that is distributed from the device is impacted.\r\n\r\n", title: "Summary", }, { category: "general", text: "Cisco investigated its product line to determine which products may be affected by this vulnerability.\r\n\r\nThe Vulnerable Products [\"#vp\"] section includes Cisco bug IDs for each affected product. The bugs are accessible through the Cisco Bug Search Tool [\"https://bst.cloudapps.cisco.com/bugsearch/bug/BUGID\"] and contain additional platform-specific information, including workarounds (if available) and fixed software releases.\r\n\r\nAny product not listed in the Vulnerable Products section of this advisory is to be considered not vulnerable.", title: "Affected Products", }, { category: "general", text: "The following table lists Cisco products that are affected by the vulnerability that is described in this advisory. If a future release date is indicated for software, the date provided represents an estimate based on all information known to Cisco as of the Last Updated date at the top of the advisory. Availability dates are subject to change based on a number of factors, including satisfactory testing results and delivery of other priority features and fixes.\r\n Cisco Product Cisco Bug ID Fixed Release Availability [\"https://tools.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"] Secure Endpoint, formerly Advanced Malware Protection (AMP) for Endpoints, for Linux CSCwd74133 [\"https://bst.cisco.com/bugsearch/bug/CSCwd74133\"] 1.20.21 Secure Endpoint, formerly Advanced Malware Protection (AMP) for Endpoints, for MacOS CSCwd74134 [\"https://bst.cisco.com/bugsearch/bug/CSCwd74134\"] 1.21.11 Secure Endpoint, formerly Advanced Malware Protection (AMP) for Endpoints, for Windows CSCwd74135 [\"https://bst.cisco.com/bugsearch/bug/CSCwd74135\"] 7.5.9 1\r\n8.1.5 Secure Endpoint Private Cloud CSCwe18204 [\"https://bst.cisco.com/bugsearch/bug/CSCwe18204\"] 3.6.0 or later with updated connectors2 Secure Web Appliance, formerly Web Security Appliance CSCwd74132 [\"https://bst.cisco.com/bugsearch/bug/CSCwd74132\"] 12.5.6 (May 2023)\r\n14.0.4-005\r\n14.5.1-013 (Mar 2023)\r\n15.0.0-254 (April 2023)\r\n1. Updated releases of Cisco Secure Endpoint are available through the Cisco Secure Endpoint [\"https://console.amp.cisco.com/\"] portal. Depending on the configured policy, Cisco Secure Endpoint will automatically update.\r\n2. Affected releases of Cisco Secure Endpoint clients for Cisco Secure Endpoint Private Cloud have been updated in the connectors repository. Customers will get these connector updates through normal content update processes.\r\nAttention: Simplifying the Cisco portfolio includes the renaming of security products under one brand: Cisco Secure. For more information, see Meet Cisco Secure [\"https://www.cisco.com/c/en/us/products/security/secure-names.html\"].", title: "Vulnerable Products", }, { category: "general", text: "Only products listed in the Vulnerable Products [\"#vp\"] section of this advisory are known to be affected by this vulnerability.\r\n\r\nCisco has confirmed that this vulnerability does not affect the following Cisco products:\r\n\r\nSecure Email Gateway, formerly Email Security Appliance\r\nSecure Email and Web Manager, formerly Security Management Appliance", title: "Products Confirmed Not Vulnerable", }, { category: "general", text: "There are no workarounds that address this vulnerability.", title: "Workarounds", }, { category: "general", text: "For information about fixed software releases [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], consult the Cisco bugs identified in the Vulnerable Products [\"#vp\"] section of this advisory.\r\n\r\nWhen considering software upgrades [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories [\"https://www.cisco.com/go/psirt\"] page, to determine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.", title: "Fixed Software", }, { category: "general", text: "To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy [\"http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html\"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.", title: "Vulnerability Policy", }, { category: "general", text: "The Cisco Product Security Incident Response Team (PSIRT) is aware that a proof-of-concept is available that demonstrates that this vulnerability can be used to cause a buffer overflow and subsequent process termination.\r\n\r\nAdditional technical information is also available that describes this vulnerability in detail.\r\n\r\nThe Cisco PSIRT is not aware of any malicious use of the vulnerability that is described in this advisory.", title: "Exploitation and Public Announcements", }, { category: "general", text: "Cisco would like to thank Simon Scannell for reporting this vulnerability.", title: "Source", }, { category: "legal_disclaimer", text: "THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.\r\n\r\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.", title: "Legal Disclaimer", }, ], publisher: { category: "vendor", contact_details: "psirt@cisco.com", issuing_authority: "Cisco PSIRT", name: "Cisco", namespace: "https://wwww.cisco.com", }, references: [ { category: "self", summary: "ClamAV HFS+ Partition Scanning Buffer Overflow Vulnerability Affecting Cisco Products: February 2023", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-q8DThCy", }, { category: "external", summary: "Cisco Security Vulnerability Policy", url: "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html", }, { category: "external", summary: "ClamAV blog", url: "https://blog.clamav.net/2023/02/clamav-01038-01052-and-101-patch.html", }, { category: "external", summary: "Cisco Bug Search Tool", url: "https://bst.cloudapps.cisco.com/bugsearch/bug/BUGID", }, { category: "external", summary: "Fixed Release Availability", url: "https://tools.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes", }, { category: "external", summary: "CSCwd74133", url: "https://bst.cisco.com/bugsearch/bug/CSCwd74133", }, { category: "external", summary: "CSCwd74134", url: "https://bst.cisco.com/bugsearch/bug/CSCwd74134", }, { category: "external", summary: "CSCwd74135", url: "https://bst.cisco.com/bugsearch/bug/CSCwd74135", }, { category: "external", summary: "CSCwe18204", url: "https://bst.cisco.com/bugsearch/bug/CSCwe18204", }, { category: "external", summary: "CSCwd74132", url: "https://bst.cisco.com/bugsearch/bug/CSCwd74132", }, { category: "external", summary: "Cisco Secure Endpoint", url: "https://console.amp.cisco.com/", }, { category: "external", summary: "Meet Cisco Secure", url: "https://www.cisco.com/c/en/us/products/security/secure-names.html", }, { category: "external", summary: "fixed software releases", url: "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes", }, { category: "external", summary: "Cisco Security Advisories", url: "https://www.cisco.com/go/psirt", }, { category: "external", summary: "Security Vulnerability Policy", url: "http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html", }, ], title: "ClamAV HFS+ Partition Scanning Buffer Overflow Vulnerability Affecting Cisco Products: February 2023", tracking: { current_release_date: "2023-02-22T14:09:19+00:00", generator: { date: "2024-05-10T23:21:52+00:00", engine: { name: "TVCE", }, }, id: "cisco-sa-clamav-q8DThCy", initial_release_date: "2023-02-15T16:00:00+00:00", revision_history: [ { date: "2023-02-15T15:53:37+00:00", number: "1.0.0", summary: "Initial public release.", }, { date: "2023-02-15T20:14:36+00:00", number: "1.1.0", summary: "Changed date of ClamAV disclosure to February 15.", }, { date: "2023-02-17T19:43:51+00:00", number: "1.2.0", summary: "Added two more fixed releases and availability dates for Secure Web Appliance.", }, { date: "2023-02-21T14:26:24+00:00", number: "1.3.0", summary: "Clarified the vulnerability impacts based on platform. Updated the link to the ClamAV blog.", }, { date: "2023-02-22T14:09:19+00:00", number: "1.4.0", summary: "Updated proof-of-concept information.", }, ], status: "final", version: "1.4.0", }, }, product_tree: { branches: [ { branches: [ { category: "product_family", name: "Cisco Secure Web Appliance", product: { name: "Cisco Secure Web Appliance ", product_id: "CSAFPID-189789", }, }, { category: "product_family", name: "Cisco Secure Endpoint", product: { name: "Cisco Secure Endpoint ", product_id: "CSAFPID-221075", }, }, { category: "product_family", name: "Cisco Secure Endpoint Private Cloud Administration Portal", product: { name: "Cisco Secure Endpoint Private Cloud Administration Portal ", product_id: "CSAFPID-292706", }, }, ], category: "vendor", name: "Cisco", }, ], }, vulnerabilities: [ { cve: "CVE-2023-20032", ids: [ { system_name: "Cisco Bug ID", text: "CSCwd74135", }, { system_name: "Cisco Bug ID", text: "CSCwd74134", }, { system_name: "Cisco Bug ID", text: "CSCwd74133", }, { system_name: "Cisco Bug ID", text: "CSCwe18204", }, { system_name: "Cisco Bug ID", text: "CSCwd74132", }, ], notes: [ { category: "other", text: "Complete.", title: "Affected Product Comprehensiveness", }, ], product_status: { known_affected: [ "CSAFPID-221075", "CSAFPID-292706", "CSAFPID-189789", ], }, release_date: "2023-02-15T16:00:00+00:00", remediations: [ { category: "vendor_fix", details: "Cisco has released software updates that address this vulnerability.", product_ids: [ "CSAFPID-221075", "CSAFPID-292706", "CSAFPID-189789", ], url: "https://software.cisco.com", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-221075", "CSAFPID-292706", "CSAFPID-189789", ], }, ], title: "ClamAV HFS+ Partition Scanning Buffer Overflow Vulnerability", }, ], }
var-202302-1452
Vulnerability from variot
On Feb 15, 2023, the following vulnerability in the ClamAV scanning library was disclosed:
A vulnerability in the HFS+ partition file parser of ClamAV versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier could allow an unauthenticated, remote attacker to execute arbitrary code.
This vulnerability is due to a missing buffer size check that may result in a heap buffer overflow write. An attacker could exploit this vulnerability by submitting a crafted HFS+ partition file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to execute arbitrary code with the privileges of the ClamAV scanning process, or else crash the process, resulting in a denial of service (DoS) condition.
For a description of this vulnerability, see the ClamAV blog ["https://blog.clamav.net/"]. Cisco Systems Cisco Secure Endpoint Products from other vendors have out-of-bounds write vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This advisory is available at the following link:sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-q8DThCy. ========================================================================== Ubuntu Security Notice USN-5887-1 February 27, 2023
clamav vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 ESM
- Ubuntu 14.04 ESM
Summary:
Several security issues were fixed in ClamAV.
Software Description: - clamav: Anti-virus utility for Unix
Details:
Simon Scannell discovered that ClamAV incorrectly handled parsing HFS+ files. (CVE-2023-20032)
Simon Scannell discovered that ClamAV incorrectly handled parsing DMG files. A remote attacker could possibly use this issue to expose sensitive information. (CVE-2023-20052)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 22.10: clamav 0.103.8+dfsg-0ubuntu0.22.10.1
Ubuntu 22.04 LTS: clamav 0.103.8+dfsg-0ubuntu0.22.04.1
Ubuntu 20.04 LTS: clamav 0.103.8+dfsg-0ubuntu0.20.04.1
Ubuntu 18.04 LTS: clamav 0.103.8+dfsg-0ubuntu0.18.04.1
Ubuntu 16.04 ESM: clamav 0.103.8+dfsg-0ubuntu0.16.04.1+esm1
Ubuntu 14.04 ESM: clamav 0.103.8+dfsg-0ubuntu0.14.04.1+esm1
This update uses a new upstream release, which includes additional bug fixes. In general, a standard system update will make all the necessary changes.
References: https://ubuntu.com/security/notices/USN-5887-1 CVE-2023-20032, CVE-2023-20052
Package Information: https://launchpad.net/ubuntu/+source/clamav/0.103.8+dfsg-0ubuntu0.22.10.1 https://launchpad.net/ubuntu/+source/clamav/0.103.8+dfsg-0ubuntu0.22.04.1 https://launchpad.net/ubuntu/+source/clamav/0.103.8+dfsg-0ubuntu0.20.04.1 https://launchpad.net/ubuntu/+source/clamav/0.103.8+dfsg-0ubuntu0.18.04.1
. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202310-01
https://security.gentoo.org/
Severity: Normal Title: ClamAV: Multiple Vulnerabilities Date: October 01, 2023 Bugs: #831083, #842813, #894672 ID: 202310-01
Synopsis
Multiple vulnerabilities have been discovered in ClamAV, the worst of which could result in remote code execution.
Background
ClamAV is a GPL virus scanner.
Affected packages
Package Vulnerable Unaffected
app-antivirus/clamav < 0.103.7 >= 0.103.7
Description
Multiple vulnerabilities have been discovered in ClamAV. Please review the CVE identifiers referenced below for details.
Impact
Please review the referenced CVE identifiers for details.
Workaround
There is no known workaround at this time.
Resolution
All ClamAV users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.103.7"
References
[ 1 ] CVE-2022-20698 https://nvd.nist.gov/vuln/detail/CVE-2022-20698 [ 2 ] CVE-2022-20770 https://nvd.nist.gov/vuln/detail/CVE-2022-20770 [ 3 ] CVE-2022-20771 https://nvd.nist.gov/vuln/detail/CVE-2022-20771 [ 4 ] CVE-2022-20785 https://nvd.nist.gov/vuln/detail/CVE-2022-20785 [ 5 ] CVE-2022-20792 https://nvd.nist.gov/vuln/detail/CVE-2022-20792 [ 6 ] CVE-2022-20796 https://nvd.nist.gov/vuln/detail/CVE-2022-20796 [ 7 ] CVE-2022-20803 https://nvd.nist.gov/vuln/detail/CVE-2022-20803 [ 8 ] CVE-2023-20032 https://nvd.nist.gov/vuln/detail/CVE-2023-20032 [ 9 ] CVE-2023-20052 https://nvd.nist.gov/vuln/detail/CVE-2023-20052
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/202310-01
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2023 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-202302-1452", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "network security", scope: "gte", trust: 1, vendor: "stormshield", version: "4.4.0", }, { model: "network security", scope: "lt", trust: 1, vendor: "stormshield", version: "4.6.4", }, { model: "web security appliance", scope: "lt", trust: 1, vendor: "cisco", version: "14.0.4-005", }, { model: "secure endpoint private cloud", scope: "lt", trust: 1, vendor: "cisco", version: "3.6.0", }, { model: "web security appliance", scope: "gte", trust: 1, vendor: "cisco", version: "15.0.0", }, { model: "web security appliance", scope: "gte", trust: 1, vendor: "cisco", version: "14.0.0", }, { model: "clamav", scope: "gte", trust: 1, vendor: "clamav", version: "0.104.0", }, { model: "network security", scope: "lt", trust: 1, vendor: "stormshield", version: "3.7.35", }, { model: "network security", scope: "gte", trust: 1, vendor: "stormshield", version: "3.0.0", }, { model: "network security", scope: "lt", trust: 1, vendor: "stormshield", version: "3.11.23", }, { model: "web security appliance", scope: "lt", trust: 1, vendor: "cisco", version: "15.0.0-254", }, { model: "secure endpoint", scope: "lt", trust: 1, vendor: "cisco", version: "1.20.2", }, { model: "web security appliance", scope: "lt", trust: 1, vendor: "cisco", version: "14.5.1-013", }, { model: "network security", scope: "gte", trust: 1, vendor: "stormshield", version: "3.8.0", }, { model: "clamav", scope: "eq", trust: 1, vendor: "clamav", version: "1.0.0", }, { model: "network security", scope: "gte", trust: 1, vendor: "stormshield", version: "4.3.0", }, { model: "secure endpoint", scope: "lt", trust: 1, vendor: "cisco", version: "8.1.5", }, { model: "secure endpoint", scope: "lt", trust: 1, vendor: "cisco", version: "7.5.9", }, { model: "secure endpoint", scope: "lt", trust: 1, vendor: "cisco", version: "1.21.1", }, { model: "secure endpoint", scope: "gte", trust: 1, vendor: "cisco", version: "8.0.1.21160", }, { model: "web security appliance", scope: "lt", trust: 1, vendor: "cisco", version: "12.5.6", }, { model: "clamav", scope: "lte", trust: 1, vendor: "clamav", version: "0.105.1", }, { model: "web security appliance", scope: "gte", trust: 1, vendor: "cisco", version: "14.5.0", }, { model: "network security", scope: "lt", trust: 1, vendor: "stormshield", version: "4.3.17", }, { model: "clamav", scope: "lte", trust: 1, vendor: "clamav", version: "0.103.7", }, { model: "cisco web セキュリティ アプライアンス ソフトウェア", scope: null, trust: 0.8, vendor: "シスコシステムズ", version: null, }, { model: "clamav", scope: null, trust: 0.8, vendor: "clamav", version: null, }, { model: "network security", scope: null, trust: 0.8, vendor: "stormshield", version: null, }, { model: "cisco secure endpoint private cloud", scope: null, trust: 0.8, vendor: "シスコシステムズ", version: null, }, { model: "cisco secure endpoint", scope: null, trust: 0.8, vendor: "シスコシステムズ", version: null, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2023-004930", }, { db: "NVD", id: "CVE-2023-20032", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:cisco:web_security_appliance:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "15.0.0-254", versionStartIncluding: "15.0.0", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:web_security_appliance:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "14.5.1-013", versionStartIncluding: "14.5.0", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:web_security_appliance:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "14.0.4-005", versionStartIncluding: "14.0.0", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:web_security_appliance:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "12.5.6", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:secure_endpoint_private_cloud:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "3.6.0", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:windows:*:*", cpe_name: [], versionEndExcluding: "8.1.5", versionStartIncluding: "8.0.1.21160", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:windows:*:*", cpe_name: [], versionEndExcluding: "7.5.9", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:linux:*:*", cpe_name: [], versionEndExcluding: "1.20.2", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:macos:*:*", cpe_name: [], versionEndExcluding: "1.21.1", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:clamav:clamav:1.0.0:rc:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:clamav:clamav:1.0.0:rc2:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:clamav:clamav:1.0.0:-:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "0.103.7", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "0.105.1", versionStartIncluding: "0.104.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "4.6.4", versionStartIncluding: "4.4.0", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "4.3.17", versionStartIncluding: "4.3.0", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "3.11.23", versionStartIncluding: "3.8.0", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "3.7.35", versionStartIncluding: "3.0.0", vulnerable: true, }, ], operator: "OR", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2023-20032", }, ], }, credits: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Ubuntu", sources: [ { db: "PACKETSTORM", id: "171129", }, ], trust: 0.1, }, cve: "CVE-2023-20032", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [], cvssV3: [ { attackComplexity: "LOW", attackVector: "NETWORK", author: "NVD", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", exploitabilityScore: 3.9, impactScore: 5.9, integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", trust: 2, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, { attackComplexity: "Low", attackVector: "Network", author: "NVD", availabilityImpact: "High", baseScore: 9.8, baseSeverity: "Critical", confidentialityImpact: "High", exploitabilityScore: null, id: "CVE-2023-20032", impactScore: null, integrityImpact: "High", privilegesRequired: "None", scope: "Unchanged", trust: 0.8, userInteraction: "None", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, ], severity: [ { author: "NVD", id: "CVE-2023-20032", trust: 1.8, value: "CRITICAL", }, { author: "ykramarz@cisco.com", id: "CVE-2023-20032", trust: 1, value: "CRITICAL", }, { author: "CNNVD", id: "CNNVD-202302-1351", trust: 0.6, value: "CRITICAL", }, ], }, ], sources: [ { db: "JVNDB", id: "JVNDB-2023-004930", }, { db: "CNNVD", id: "CNNVD-202302-1351", }, { db: "NVD", id: "CVE-2023-20032", }, { db: "NVD", id: "CVE-2023-20032", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "On Feb 15, 2023, the following vulnerability in the ClamAV scanning library was disclosed:\r\n\r \r A vulnerability in the HFS+ partition file parser of ClamAV versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier could allow an unauthenticated, remote attacker to execute arbitrary code. \r\n\r \r This vulnerability is due to a missing buffer size check that may result in a heap buffer overflow write. An attacker could exploit this vulnerability by submitting a crafted HFS+ partition file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to execute arbitrary code with the privileges of the ClamAV scanning process, or else crash the process, resulting in a denial of service (DoS) condition. \r\n\r For a description of this vulnerability, see the ClamAV blog [\"https://blog.clamav.net/\"]. Cisco Systems Cisco Secure Endpoint Products from other vendors have out-of-bounds write vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. \nThis advisory is available at the following link:sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-q8DThCy. ==========================================================================\nUbuntu Security Notice USN-5887-1\nFebruary 27, 2023\n\nclamav vulnerabilities\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 22.10\n- Ubuntu 22.04 LTS\n- Ubuntu 20.04 LTS\n- Ubuntu 18.04 LTS\n- Ubuntu 16.04 ESM\n- Ubuntu 14.04 ESM\n\nSummary:\n\nSeveral security issues were fixed in ClamAV. \n\nSoftware Description:\n- clamav: Anti-virus utility for Unix\n\nDetails:\n\nSimon Scannell discovered that ClamAV incorrectly handled parsing\nHFS+ files. (CVE-2023-20032)\n\nSimon Scannell discovered that ClamAV incorrectly handled parsing\nDMG files. A remote attacker could possibly use this issue\nto expose sensitive information. (CVE-2023-20052)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 22.10:\n clamav 0.103.8+dfsg-0ubuntu0.22.10.1\n\nUbuntu 22.04 LTS:\n clamav 0.103.8+dfsg-0ubuntu0.22.04.1\n\nUbuntu 20.04 LTS:\n clamav 0.103.8+dfsg-0ubuntu0.20.04.1\n\nUbuntu 18.04 LTS:\n clamav 0.103.8+dfsg-0ubuntu0.18.04.1\n\nUbuntu 16.04 ESM:\n clamav 0.103.8+dfsg-0ubuntu0.16.04.1+esm1\n\nUbuntu 14.04 ESM:\n clamav 0.103.8+dfsg-0ubuntu0.14.04.1+esm1\n\nThis update uses a new upstream release, which includes additional bug\nfixes. In general, a standard system update will make all the necessary\nchanges. \n\nReferences:\n https://ubuntu.com/security/notices/USN-5887-1\n CVE-2023-20032, CVE-2023-20052\n\nPackage Information:\nhttps://launchpad.net/ubuntu/+source/clamav/0.103.8+dfsg-0ubuntu0.22.10.1\nhttps://launchpad.net/ubuntu/+source/clamav/0.103.8+dfsg-0ubuntu0.22.04.1\nhttps://launchpad.net/ubuntu/+source/clamav/0.103.8+dfsg-0ubuntu0.20.04.1\nhttps://launchpad.net/ubuntu/+source/clamav/0.103.8+dfsg-0ubuntu0.18.04.1\n\n. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 202310-01\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: ClamAV: Multiple Vulnerabilities\n Date: October 01, 2023\n Bugs: #831083, #842813, #894672\n ID: 202310-01\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been discovered in ClamAV, the worst of\nwhich could result in remote code execution. \n\nBackground\n==========\n\nClamAV is a GPL virus scanner. \n\nAffected packages\n=================\n\nPackage Vulnerable Unaffected\n-------------------- ------------ ------------\napp-antivirus/clamav < 0.103.7 >= 0.103.7\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in ClamAV. Please review\nthe CVE identifiers referenced below for details. \n\nImpact\n======\n\nPlease review the referenced CVE identifiers for details. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll ClamAV users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \">=app-antivirus/clamav-0.103.7\"\n\nReferences\n==========\n\n[ 1 ] CVE-2022-20698\n https://nvd.nist.gov/vuln/detail/CVE-2022-20698\n[ 2 ] CVE-2022-20770\n https://nvd.nist.gov/vuln/detail/CVE-2022-20770\n[ 3 ] CVE-2022-20771\n https://nvd.nist.gov/vuln/detail/CVE-2022-20771\n[ 4 ] CVE-2022-20785\n https://nvd.nist.gov/vuln/detail/CVE-2022-20785\n[ 5 ] CVE-2022-20792\n https://nvd.nist.gov/vuln/detail/CVE-2022-20792\n[ 6 ] CVE-2022-20796\n https://nvd.nist.gov/vuln/detail/CVE-2022-20796\n[ 7 ] CVE-2022-20803\n https://nvd.nist.gov/vuln/detail/CVE-2022-20803\n[ 8 ] CVE-2023-20032\n https://nvd.nist.gov/vuln/detail/CVE-2023-20032\n[ 9 ] CVE-2023-20052\n https://nvd.nist.gov/vuln/detail/CVE-2023-20052\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/202310-01\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users' machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2023 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttps://creativecommons.org/licenses/by-sa/2.5\n", sources: [ { db: "NVD", id: "CVE-2023-20032", }, { db: "JVNDB", id: "JVNDB-2023-004930", }, { db: "VULMON", id: "CVE-2023-20032", }, { db: "PACKETSTORM", id: "171129", }, { db: "PACKETSTORM", id: "174873", }, ], trust: 1.89, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2023-20032", trust: 3.5, }, { db: "JVNDB", id: "JVNDB-2023-004930", trust: 0.8, }, { db: "AUSCERT", id: "ESB-2023.0953", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2023.1077", trust: 0.6, }, { db: "CNNVD", id: "CNNVD-202302-1351", trust: 0.6, }, { db: "VULMON", id: "CVE-2023-20032", trust: 0.1, }, { db: "PACKETSTORM", id: "171129", trust: 0.1, }, { db: "PACKETSTORM", id: "174873", trust: 0.1, }, ], sources: [ { db: "VULMON", id: "CVE-2023-20032", }, { db: "JVNDB", id: "JVNDB-2023-004930", }, { db: "PACKETSTORM", id: "171129", }, { db: "PACKETSTORM", id: "174873", }, { db: "CNNVD", id: "CNNVD-202302-1351", }, { db: "NVD", id: "CVE-2023-20032", }, ], }, id: "VAR-202302-1452", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "VARIoT devices database", id: null, }, ], trust: 0.44624132, }, last_update_date: "2024-01-29T19:09:25.031000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "cisco-sa-clamav-q8DThCy", trust: 0.8, url: "https://www.clamav.net/", }, { title: "ClamAV Buffer error vulnerability fix", trust: 0.6, url: "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=228436", }, { title: "Debian CVElist Bug Report Logs: clamav: 2 RCE bugs in ClamAV 0.103 (+ 1.0.0), CVE-2023-20032/CVE-2023-20052", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=72b1e54f904f4b9ca82d85ff39559617", }, { title: "Cisco: ClamAV HFS+ Partition Scanning Buffer Overflow Vulnerability Affecting Cisco Products: February 2023", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-clamav-q8dthcy", }, { title: "", trust: 0.1, url: "https://github.com/marekbeckmann/clamav-installation-script ", }, { title: null, trust: 0.1, url: "https://www.theregister.co.uk/2023/02/17/cisco_clamav_critical_flaw/", }, ], sources: [ { db: "VULMON", id: "CVE-2023-20032", }, { db: "JVNDB", id: "JVNDB-2023-004930", }, { db: "CNNVD", id: "CNNVD-202302-1351", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-787", trust: 1, }, { problemtype: "Out-of-bounds writing (CWE-787) [NVD evaluation ]", trust: 0.8, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2023-004930", }, { db: "NVD", id: "CVE-2023-20032", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 1.7, url: "https://sec.cloudapps.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-clamav-q8dthcy", }, { trust: 1, url: "https://nvd.nist.gov/vuln/detail/cve-2023-20032", }, { trust: 0.9, url: "https://security.gentoo.org/glsa/202310-01", }, { trust: 0.6, url: "https://cxsecurity.com/cveshow/cve-2023-20032/", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2023.0953", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2023.1077", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2023-20052", }, { trust: 0.1, url: "https://github.com/marekbeckmann/clamav-installation-script", }, { trust: 0.1, url: "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031509", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/clamav/0.103.8+dfsg-0ubuntu0.22.10.1", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/clamav/0.103.8+dfsg-0ubuntu0.18.04.1", }, { trust: 0.1, url: "https://ubuntu.com/security/notices/usn-5887-1", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/clamav/0.103.8+dfsg-0ubuntu0.22.04.1", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/clamav/0.103.8+dfsg-0ubuntu0.20.04.1", }, { trust: 0.1, url: "https://security.gentoo.org/", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-20796", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-20792", }, { trust: 0.1, url: "https://bugs.gentoo.org.", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-20785", }, { trust: 0.1, url: "https://creativecommons.org/licenses/by-sa/2.5", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-20803", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-20771", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-20770", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-20698", }, ], sources: [ { db: "VULMON", id: "CVE-2023-20032", }, { db: "JVNDB", id: "JVNDB-2023-004930", }, { db: "PACKETSTORM", id: "171129", }, { db: "PACKETSTORM", id: "174873", }, { db: "CNNVD", id: "CNNVD-202302-1351", }, { db: "NVD", id: "CVE-2023-20032", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "VULMON", id: "CVE-2023-20032", }, { db: "JVNDB", id: "JVNDB-2023-004930", }, { db: "PACKETSTORM", id: "171129", }, { db: "PACKETSTORM", id: "174873", }, { db: "CNNVD", id: "CNNVD-202302-1351", }, { db: "NVD", id: "CVE-2023-20032", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2023-11-06T00:00:00", db: "JVNDB", id: "JVNDB-2023-004930", }, { date: "2023-02-27T14:51:49", db: "PACKETSTORM", id: "171129", }, { date: "2023-10-02T15:09:41", db: "PACKETSTORM", id: "174873", }, { date: "2023-02-16T00:00:00", db: "CNNVD", id: "CNNVD-202302-1351", }, { date: "2023-03-01T08:15:11.907000", db: "NVD", id: "CVE-2023-20032", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2023-11-06T01:15:00", db: "JVNDB", id: "JVNDB-2023-004930", }, { date: "2023-03-13T00:00:00", db: "CNNVD", id: "CNNVD-202302-1351", }, { date: "2024-01-25T17:15:25.840000", db: "NVD", id: "CVE-2023-20032", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "PACKETSTORM", id: "171129", }, { db: "PACKETSTORM", id: "174873", }, { db: "CNNVD", id: "CNNVD-202302-1351", }, ], trust: 0.8, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Cisco Systems Cisco Secure Endpoint Out-of-Bounds Write Vulnerability in Other Vendors' Products", sources: [ { db: "JVNDB", id: "JVNDB-2023-004930", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "buffer error", sources: [ { db: "CNNVD", id: "CNNVD-202302-1351", }, ], trust: 0.6, }, }
opensuse-su-2024:12696-1
Vulnerability from csaf_opensuse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "clamav-0.103.8-1.1 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the clamav-0.103.8-1.1 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-12696", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_12696-1.json", }, { category: "self", summary: "SUSE CVE CVE-2023-20032 page", url: "https://www.suse.com/security/cve/CVE-2023-20032/", }, { category: "self", summary: "SUSE CVE CVE-2023-20052 page", url: "https://www.suse.com/security/cve/CVE-2023-20052/", }, ], title: "clamav-0.103.8-1.1 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:12696-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "clamav-0.103.8-1.1.aarch64", product: { name: "clamav-0.103.8-1.1.aarch64", product_id: "clamav-0.103.8-1.1.aarch64", }, }, { category: "product_version", name: "clamav-devel-0.103.8-1.1.aarch64", product: { name: "clamav-devel-0.103.8-1.1.aarch64", product_id: "clamav-devel-0.103.8-1.1.aarch64", }, }, { category: "product_version", name: "clamav-docs-html-0.103.8-1.1.aarch64", product: { name: "clamav-docs-html-0.103.8-1.1.aarch64", product_id: "clamav-docs-html-0.103.8-1.1.aarch64", }, }, { category: "product_version", name: "clamav-milter-0.103.8-1.1.aarch64", product: { name: "clamav-milter-0.103.8-1.1.aarch64", product_id: "clamav-milter-0.103.8-1.1.aarch64", }, }, { category: "product_version", name: "libclamav9-0.103.8-1.1.aarch64", product: { name: "libclamav9-0.103.8-1.1.aarch64", product_id: "libclamav9-0.103.8-1.1.aarch64", }, }, { category: "product_version", name: "libfreshclam2-0.103.8-1.1.aarch64", product: { name: "libfreshclam2-0.103.8-1.1.aarch64", product_id: "libfreshclam2-0.103.8-1.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "clamav-0.103.8-1.1.ppc64le", product: { name: "clamav-0.103.8-1.1.ppc64le", product_id: "clamav-0.103.8-1.1.ppc64le", }, }, { category: "product_version", name: "clamav-devel-0.103.8-1.1.ppc64le", product: { name: "clamav-devel-0.103.8-1.1.ppc64le", product_id: "clamav-devel-0.103.8-1.1.ppc64le", }, }, { category: "product_version", name: "clamav-docs-html-0.103.8-1.1.ppc64le", product: { name: "clamav-docs-html-0.103.8-1.1.ppc64le", product_id: "clamav-docs-html-0.103.8-1.1.ppc64le", }, }, { category: "product_version", name: "clamav-milter-0.103.8-1.1.ppc64le", product: { name: "clamav-milter-0.103.8-1.1.ppc64le", product_id: "clamav-milter-0.103.8-1.1.ppc64le", }, }, { category: "product_version", name: "libclamav9-0.103.8-1.1.ppc64le", product: { name: "libclamav9-0.103.8-1.1.ppc64le", product_id: "libclamav9-0.103.8-1.1.ppc64le", }, }, { category: "product_version", name: "libfreshclam2-0.103.8-1.1.ppc64le", product: { name: "libfreshclam2-0.103.8-1.1.ppc64le", product_id: "libfreshclam2-0.103.8-1.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "clamav-0.103.8-1.1.s390x", product: { name: "clamav-0.103.8-1.1.s390x", product_id: "clamav-0.103.8-1.1.s390x", }, }, { category: "product_version", name: "clamav-devel-0.103.8-1.1.s390x", product: { name: "clamav-devel-0.103.8-1.1.s390x", product_id: "clamav-devel-0.103.8-1.1.s390x", }, }, { category: "product_version", name: "clamav-docs-html-0.103.8-1.1.s390x", product: { name: "clamav-docs-html-0.103.8-1.1.s390x", product_id: "clamav-docs-html-0.103.8-1.1.s390x", }, }, { category: "product_version", name: "clamav-milter-0.103.8-1.1.s390x", product: { name: "clamav-milter-0.103.8-1.1.s390x", product_id: "clamav-milter-0.103.8-1.1.s390x", }, }, { category: "product_version", name: "libclamav9-0.103.8-1.1.s390x", product: { name: "libclamav9-0.103.8-1.1.s390x", product_id: "libclamav9-0.103.8-1.1.s390x", }, }, { category: "product_version", name: "libfreshclam2-0.103.8-1.1.s390x", product: { name: "libfreshclam2-0.103.8-1.1.s390x", product_id: "libfreshclam2-0.103.8-1.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "clamav-0.103.8-1.1.x86_64", product: { name: "clamav-0.103.8-1.1.x86_64", product_id: "clamav-0.103.8-1.1.x86_64", }, }, { category: "product_version", name: "clamav-devel-0.103.8-1.1.x86_64", product: { name: "clamav-devel-0.103.8-1.1.x86_64", product_id: "clamav-devel-0.103.8-1.1.x86_64", }, }, { category: "product_version", name: "clamav-docs-html-0.103.8-1.1.x86_64", product: { name: "clamav-docs-html-0.103.8-1.1.x86_64", product_id: "clamav-docs-html-0.103.8-1.1.x86_64", }, }, { category: "product_version", name: "clamav-milter-0.103.8-1.1.x86_64", product: { name: "clamav-milter-0.103.8-1.1.x86_64", product_id: "clamav-milter-0.103.8-1.1.x86_64", }, }, { category: "product_version", name: "libclamav9-0.103.8-1.1.x86_64", product: { name: "libclamav9-0.103.8-1.1.x86_64", product_id: "libclamav9-0.103.8-1.1.x86_64", }, }, { category: "product_version", name: "libfreshclam2-0.103.8-1.1.x86_64", product: { name: "libfreshclam2-0.103.8-1.1.x86_64", product_id: "libfreshclam2-0.103.8-1.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:clamav-0.103.8-1.1.aarch64", }, product_reference: "clamav-0.103.8-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:clamav-0.103.8-1.1.ppc64le", }, product_reference: "clamav-0.103.8-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:clamav-0.103.8-1.1.s390x", }, product_reference: "clamav-0.103.8-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.8-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:clamav-0.103.8-1.1.x86_64", }, product_reference: "clamav-0.103.8-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.8-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:clamav-devel-0.103.8-1.1.aarch64", }, product_reference: "clamav-devel-0.103.8-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.8-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:clamav-devel-0.103.8-1.1.ppc64le", }, product_reference: "clamav-devel-0.103.8-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.8-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:clamav-devel-0.103.8-1.1.s390x", }, product_reference: "clamav-devel-0.103.8-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.8-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:clamav-devel-0.103.8-1.1.x86_64", }, product_reference: "clamav-devel-0.103.8-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "clamav-docs-html-0.103.8-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:clamav-docs-html-0.103.8-1.1.aarch64", }, product_reference: "clamav-docs-html-0.103.8-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "clamav-docs-html-0.103.8-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:clamav-docs-html-0.103.8-1.1.ppc64le", }, product_reference: "clamav-docs-html-0.103.8-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "clamav-docs-html-0.103.8-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:clamav-docs-html-0.103.8-1.1.s390x", }, product_reference: "clamav-docs-html-0.103.8-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "clamav-docs-html-0.103.8-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:clamav-docs-html-0.103.8-1.1.x86_64", }, product_reference: "clamav-docs-html-0.103.8-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "clamav-milter-0.103.8-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:clamav-milter-0.103.8-1.1.aarch64", }, product_reference: "clamav-milter-0.103.8-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "clamav-milter-0.103.8-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:clamav-milter-0.103.8-1.1.ppc64le", }, product_reference: "clamav-milter-0.103.8-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "clamav-milter-0.103.8-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:clamav-milter-0.103.8-1.1.s390x", }, product_reference: "clamav-milter-0.103.8-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "clamav-milter-0.103.8-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:clamav-milter-0.103.8-1.1.x86_64", }, product_reference: "clamav-milter-0.103.8-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.8-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libclamav9-0.103.8-1.1.aarch64", }, product_reference: "libclamav9-0.103.8-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.8-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libclamav9-0.103.8-1.1.ppc64le", }, product_reference: "libclamav9-0.103.8-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.8-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libclamav9-0.103.8-1.1.s390x", }, product_reference: "libclamav9-0.103.8-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.8-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libclamav9-0.103.8-1.1.x86_64", }, product_reference: "libclamav9-0.103.8-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.8-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libfreshclam2-0.103.8-1.1.aarch64", }, product_reference: "libfreshclam2-0.103.8-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.8-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libfreshclam2-0.103.8-1.1.ppc64le", }, product_reference: "libfreshclam2-0.103.8-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.8-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libfreshclam2-0.103.8-1.1.s390x", }, product_reference: "libfreshclam2-0.103.8-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.8-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libfreshclam2-0.103.8-1.1.x86_64", }, product_reference: "libfreshclam2-0.103.8-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2023-20032", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-20032", }, ], notes: [ { category: "general", text: "On Feb 15, 2023, the following vulnerability in the ClamAV scanning library was disclosed:\r\n\r \r A vulnerability in the HFS+ partition file parser of ClamAV versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier could allow an unauthenticated, remote attacker to execute arbitrary code.\r\n\r \r This vulnerability is due to a missing buffer size check that may result in a heap buffer overflow write. An attacker could exploit this vulnerability by submitting a crafted HFS+ partition file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to execute arbitrary code with the privileges of the ClamAV scanning process, or else crash the process, resulting in a denial of service (DoS) condition.\r\n\r For a description of this vulnerability, see the ClamAV blog [\"https://blog.clamav.net/\"].", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.8-1.1.aarch64", "openSUSE Tumbleweed:clamav-0.103.8-1.1.ppc64le", "openSUSE Tumbleweed:clamav-0.103.8-1.1.s390x", "openSUSE Tumbleweed:clamav-0.103.8-1.1.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.8-1.1.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.8-1.1.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.8-1.1.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.8-1.1.x86_64", "openSUSE Tumbleweed:clamav-docs-html-0.103.8-1.1.aarch64", "openSUSE Tumbleweed:clamav-docs-html-0.103.8-1.1.ppc64le", "openSUSE Tumbleweed:clamav-docs-html-0.103.8-1.1.s390x", "openSUSE Tumbleweed:clamav-docs-html-0.103.8-1.1.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.8-1.1.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.8-1.1.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.8-1.1.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.8-1.1.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.8-1.1.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.8-1.1.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.8-1.1.s390x", "openSUSE Tumbleweed:libclamav9-0.103.8-1.1.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.8-1.1.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.8-1.1.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.8-1.1.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.8-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-20032", url: "https://www.suse.com/security/cve/CVE-2023-20032", }, { category: "external", summary: "SUSE Bug 1208363 for CVE-2023-20032", url: "https://bugzilla.suse.com/1208363", }, { category: "external", summary: "SUSE Bug 1211720 for CVE-2023-20032", url: "https://bugzilla.suse.com/1211720", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.8-1.1.aarch64", "openSUSE Tumbleweed:clamav-0.103.8-1.1.ppc64le", "openSUSE Tumbleweed:clamav-0.103.8-1.1.s390x", "openSUSE Tumbleweed:clamav-0.103.8-1.1.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.8-1.1.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.8-1.1.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.8-1.1.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.8-1.1.x86_64", "openSUSE Tumbleweed:clamav-docs-html-0.103.8-1.1.aarch64", "openSUSE Tumbleweed:clamav-docs-html-0.103.8-1.1.ppc64le", "openSUSE Tumbleweed:clamav-docs-html-0.103.8-1.1.s390x", "openSUSE Tumbleweed:clamav-docs-html-0.103.8-1.1.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.8-1.1.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.8-1.1.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.8-1.1.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.8-1.1.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.8-1.1.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.8-1.1.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.8-1.1.s390x", "openSUSE Tumbleweed:libclamav9-0.103.8-1.1.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.8-1.1.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.8-1.1.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.8-1.1.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.8-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:clamav-0.103.8-1.1.aarch64", "openSUSE Tumbleweed:clamav-0.103.8-1.1.ppc64le", "openSUSE Tumbleweed:clamav-0.103.8-1.1.s390x", "openSUSE Tumbleweed:clamav-0.103.8-1.1.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.8-1.1.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.8-1.1.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.8-1.1.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.8-1.1.x86_64", "openSUSE Tumbleweed:clamav-docs-html-0.103.8-1.1.aarch64", "openSUSE Tumbleweed:clamav-docs-html-0.103.8-1.1.ppc64le", "openSUSE Tumbleweed:clamav-docs-html-0.103.8-1.1.s390x", "openSUSE Tumbleweed:clamav-docs-html-0.103.8-1.1.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.8-1.1.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.8-1.1.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.8-1.1.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.8-1.1.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.8-1.1.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.8-1.1.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.8-1.1.s390x", "openSUSE Tumbleweed:libclamav9-0.103.8-1.1.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.8-1.1.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.8-1.1.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.8-1.1.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.8-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2023-20032", }, { cve: "CVE-2023-20052", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-20052", }, ], notes: [ { category: "general", text: "On Feb 15, 2023, the following vulnerability in the ClamAV scanning library was disclosed:\r\n\r \r A vulnerability in the DMG file parser of ClamAV versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier could allow an unauthenticated, remote attacker to access sensitive information on an affected device.\r\n\r \r This vulnerability is due to enabling XML entity substitution that may result in XML external entity injection. An attacker could exploit this vulnerability by submitting a crafted DMG file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to leak bytes from any file that may be read by the ClamAV scanning process.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.8-1.1.aarch64", "openSUSE Tumbleweed:clamav-0.103.8-1.1.ppc64le", "openSUSE Tumbleweed:clamav-0.103.8-1.1.s390x", "openSUSE Tumbleweed:clamav-0.103.8-1.1.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.8-1.1.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.8-1.1.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.8-1.1.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.8-1.1.x86_64", "openSUSE Tumbleweed:clamav-docs-html-0.103.8-1.1.aarch64", "openSUSE Tumbleweed:clamav-docs-html-0.103.8-1.1.ppc64le", "openSUSE Tumbleweed:clamav-docs-html-0.103.8-1.1.s390x", "openSUSE Tumbleweed:clamav-docs-html-0.103.8-1.1.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.8-1.1.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.8-1.1.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.8-1.1.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.8-1.1.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.8-1.1.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.8-1.1.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.8-1.1.s390x", "openSUSE Tumbleweed:libclamav9-0.103.8-1.1.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.8-1.1.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.8-1.1.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.8-1.1.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.8-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-20052", url: "https://www.suse.com/security/cve/CVE-2023-20052", }, { category: "external", summary: "SUSE Bug 1208365 for CVE-2023-20052", url: "https://bugzilla.suse.com/1208365", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.8-1.1.aarch64", "openSUSE Tumbleweed:clamav-0.103.8-1.1.ppc64le", "openSUSE Tumbleweed:clamav-0.103.8-1.1.s390x", "openSUSE Tumbleweed:clamav-0.103.8-1.1.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.8-1.1.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.8-1.1.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.8-1.1.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.8-1.1.x86_64", "openSUSE Tumbleweed:clamav-docs-html-0.103.8-1.1.aarch64", "openSUSE Tumbleweed:clamav-docs-html-0.103.8-1.1.ppc64le", "openSUSE Tumbleweed:clamav-docs-html-0.103.8-1.1.s390x", "openSUSE Tumbleweed:clamav-docs-html-0.103.8-1.1.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.8-1.1.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.8-1.1.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.8-1.1.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.8-1.1.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.8-1.1.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.8-1.1.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.8-1.1.s390x", "openSUSE Tumbleweed:libclamav9-0.103.8-1.1.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.8-1.1.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.8-1.1.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.8-1.1.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.8-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:clamav-0.103.8-1.1.aarch64", "openSUSE Tumbleweed:clamav-0.103.8-1.1.ppc64le", "openSUSE Tumbleweed:clamav-0.103.8-1.1.s390x", "openSUSE Tumbleweed:clamav-0.103.8-1.1.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.8-1.1.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.8-1.1.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.8-1.1.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.8-1.1.x86_64", "openSUSE Tumbleweed:clamav-docs-html-0.103.8-1.1.aarch64", "openSUSE Tumbleweed:clamav-docs-html-0.103.8-1.1.ppc64le", "openSUSE Tumbleweed:clamav-docs-html-0.103.8-1.1.s390x", "openSUSE Tumbleweed:clamav-docs-html-0.103.8-1.1.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.8-1.1.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.8-1.1.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.8-1.1.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.8-1.1.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.8-1.1.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.8-1.1.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.8-1.1.s390x", "openSUSE Tumbleweed:libclamav9-0.103.8-1.1.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.8-1.1.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.8-1.1.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.8-1.1.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.8-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2023-20052", }, ], }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.