CVE-2020-37167
Publication date 12 February 2026
Last updated 27 February 2026
Ubuntu priority
Cvss 3 Severity Score
Description
ClamAV ClamBC bytecode interpreter contains a vulnerability in function name processing that allows attackers to manipulate bytecode function names. Attackers can exploit the weak input validation in function name encoding to potentially execute malicious bytecode or cause unexpected behavior in the ClamAV engine.
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| clamav | 25.10 questing |
Not affected
|
| 24.04 LTS noble |
Not affected
|
|
| 22.04 LTS jammy |
Not affected
|
|
| 20.04 LTS focal |
Fixed 0.103.2+dfsg-0ubuntu0.20.04.1
|
|
| 18.04 LTS bionic |
Fixed 0.103.2+dfsg-0ubuntu0.18.04.1
|
|
| 16.04 LTS xenial |
Fixed 0.103.2+dfsg-0ubuntu0.16.04.1
|
|
| 14.04 LTS trusty |
Fixed 0.103.2+dfsg-0ubuntu0.14.04.1+esm1
|
Get expanded security coverage with Ubuntu Pro
Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.
Get Ubuntu Pro 30-day free trialNotes
leosilva
Building ClamAV requires rust compiler >= 1.61 releases as bionic, xenial and trusty are not covered by that version of rustc. ClamAV new versions can't build in these releases anymore.
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score |
|
| Attack vector | Network |
| Attack complexity | Low |
| Privileges required | None |
| User interaction | None |
| Scope | Unchanged |
| Confidentiality | High |
| Integrity impact | High |
| Availability impact | High |
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |