On April 20, 2022, the following vulnerability in the ClamAV scanning library versions 0.103.5 and earlier and 0.104.2 and earlier was disclosed: A vulnerability in HTML file parser of Clam AntiVirus (ClamAV) versions 0.104.0 through 0.104.2 and LTS version 0.103.5 and prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. For a description of this vulnerability, see the ClamAV blog. This advisory will be updated as additional information becomes available.
The product does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Clamav | Clamav | * | 0.103.5 (excluding) |
Clamav | Clamav | * | 0.103.5 (including) |
Clamav | Clamav | 0.104.0 (including) | 0.104.2 (excluding) |
Clamav | Ubuntu | bionic | * |
Clamav | Ubuntu | devel | * |
Clamav | Ubuntu | esm-infra/xenial | * |
Clamav | Ubuntu | focal | * |
Clamav | Ubuntu | impish | * |
Clamav | Ubuntu | jammy | * |
Clamav | Ubuntu | kinetic | * |
Clamav | Ubuntu | trusty/esm | * |
Clamav | Ubuntu | upstream | * |