Set version to 1.4.3, FLEVEL to 213; Update NEWS.md

This commit is contained in:
Val S. 2025-06-13 12:01:58 -04:00 committed by GitHub
parent fa3493199e
commit d8b053865f
No known key found for this signature in database
GPG key ID: B5690EEEBB952194
5 changed files with 53 additions and 3 deletions

View file

@ -22,7 +22,7 @@ string(TIMESTAMP TODAY "%Y%m%d")
set(VERSION_SUFFIX "") set(VERSION_SUFFIX "")
project( ClamAV project( ClamAV
VERSION "1.4.2" VERSION "1.4.3"
DESCRIPTION "ClamAV open source email, web, and end-point anti-virus toolkit." ) DESCRIPTION "ClamAV open source email, web, and end-point anti-virus toolkit." )
set(CMAKE_MODULE_PATH "${CMAKE_CURRENT_SOURCE_DIR}/cmake" ${CMAKE_MODULE_PATH}) set(CMAKE_MODULE_PATH "${CMAKE_CURRENT_SOURCE_DIR}/cmake" ${CMAKE_MODULE_PATH})

2
Jenkinsfile vendored
View file

@ -10,7 +10,7 @@ properties(
parameters( parameters(
[ [
string(name: 'VERSION', string(name: 'VERSION',
defaultValue: '1.4.2', defaultValue: '1.4.3',
description: 'ClamAV version string'), description: 'ClamAV version string'),
string(name: 'FRAMEWORK_BRANCH', string(name: 'FRAMEWORK_BRANCH',
defaultValue: '1.4', defaultValue: '1.4',

49
NEWS.md
View file

@ -3,6 +3,55 @@
Note: This file refers to the official packages. Things described here may Note: This file refers to the official packages. Things described here may
differ slightly from third-party binary packages. differ slightly from third-party binary packages.
## 1.4.3
ClamAV 1.4.3 is a patch release with the following fixes:
- [CVE-2025-20260](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20260):
Fixed a possible buffer overflow write bug in the PDF file parser that could
cause a denial-of-service (DoS) condition or enable remote code execution.
This issue only affects configurations where both:
1. The max file-size scan limit is set greater than or equal to 1024MB.
2. The max scan-size scan limit is set greater than or equal to 1025MB.
The code flaw was present prior to version 1.0.0, but a change in version
1.0.0 that enables larger allocations based on untrusted data made it
possible to trigger this bug.
This issue affects all currently supported versions. It will be fixed in:
- 1.4.3
- 1.0.9
Thank you to Greg Walkup at Sandia National Labs for identifying this issue.
- [CVE-2025-20234](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20234):
Fixed a possible buffer overflow read bug in the UDF file parser that may
write to a temp file and thus disclose information, or it may crash and
cause a denial-of-service (DoS) condition.
This issue was introduced in version 1.2.0. It will be fixed in 1.4.3.
Thank you to volticks (@movx64 on Twitter/X), working with Trend Micro Zero
Day Initiative, for identifying this issue.
- Fixed a possible use-after-free bug in the Xz decompression module in the
bundled lzma-sdk library.
This issue was fixed in the lzma-sdk version 18.03. ClamAV bundles a copy
of the lzma-sdk with some performance changes specific to libclamav, plus
select bug fixes like this one in lieu of a full upgrade to newer lzma-sdk.
This issue affects all ClamAV versions at least as far back as 0.99.4.
It will be fixed in:
- 1.4.3
- 1.0.9
Thank you to OSS-Fuzz for identifying this issue.
- Windows: Fixed a build install issue when a DLL dependency such as libcrypto
has the exact same name as one provided by the Windows operating system.
## 1.4.2 ## 1.4.2
ClamAV 1.4.2 is a patch release with the following fixes: ClamAV 1.4.2 is a patch release with the following fixes:

View file

@ -195,6 +195,7 @@ enum FunctionalityLevels {
FUNC_LEVEL_1_4 = 210, /**< LibClamAV release 1.4.0 */ FUNC_LEVEL_1_4 = 210, /**< LibClamAV release 1.4.0 */
FUNC_LEVEL_1_4_1 = 211, /**< LibClamAV release 1.4.1 */ FUNC_LEVEL_1_4_1 = 211, /**< LibClamAV release 1.4.1 */
FUNC_LEVEL_1_4_2 = 212, /**< LibClamAV release 1.4.2 */ FUNC_LEVEL_1_4_2 = 212, /**< LibClamAV release 1.4.2 */
FUNC_LEVEL_1_4_3 = 213, /**< LibClamAV release 1.4.3 */
}; };
/** /**

View file

@ -69,7 +69,7 @@
* in re-enabling affected modules. * in re-enabling affected modules.
*/ */
#define CL_FLEVEL 212 #define CL_FLEVEL 213
#define CL_FLEVEL_DCONF CL_FLEVEL #define CL_FLEVEL_DCONF CL_FLEVEL
#define CL_FLEVEL_SIGTOOL CL_FLEVEL #define CL_FLEVEL_SIGTOOL CL_FLEVEL