UBUNTU-CVE-2026-20031

Source
https://ubuntu.com/security/CVE-2026-20031
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-20031.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2026-20031
Upstream
  • CVE-2026-20031
Published
2026-03-04T18:16:00Z
Modified
2026-04-16T10:52:26.799402Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

A vulnerability in the HTML Cascading Style Sheets (CSS) module of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper error handling when splitting UTF-8 strings. An attacker could exploit this vulnerability by submitting a crafted HTML file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to terminate the scanning process.

References

Affected packages

Ubuntu:22.04:LTS
clamav

Package

Name
clamav
Purl
pkg:deb/ubuntu/clamav@1.4.3+dfsg-0ubuntu0.22.04.1?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.103.3+dfsg-1
0.103.4+dfsg-1
0.103.4+dfsg-1build1
0.103.5+dfsg-1
0.103.6+dfsg-0ubuntu0.22.04.1
0.103.8+dfsg-0ubuntu0.22.04.1
0.103.9+dfsg-0ubuntu0.22.04.1
0.103.11+dfsg-0ubuntu0.22.04.1
0.103.12+dfsg-0ubuntu0.22.04.1
1.*
1.4.3+dfsg-0ubuntu0.22.04.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "1.4.3+dfsg-0ubuntu0.22.04.1",
            "binary_name": "clamav"
        },
        {
            "binary_version": "1.4.3+dfsg-0ubuntu0.22.04.1",
            "binary_name": "clamav-base"
        },
        {
            "binary_version": "1.4.3+dfsg-0ubuntu0.22.04.1",
            "binary_name": "clamav-daemon"
        },
        {
            "binary_version": "1.4.3+dfsg-0ubuntu0.22.04.1",
            "binary_name": "clamav-docs"
        },
        {
            "binary_version": "1.4.3+dfsg-0ubuntu0.22.04.1",
            "binary_name": "clamav-freshclam"
        },
        {
            "binary_version": "1.4.3+dfsg-0ubuntu0.22.04.1",
            "binary_name": "clamav-milter"
        },
        {
            "binary_version": "1.4.3+dfsg-0ubuntu0.22.04.1",
            "binary_name": "clamav-testfiles"
        },
        {
            "binary_version": "1.4.3+dfsg-0ubuntu0.22.04.1",
            "binary_name": "clamdscan"
        },
        {
            "binary_version": "1.4.3+dfsg-0ubuntu0.22.04.1",
            "binary_name": "libclamav-dev"
        },
        {
            "binary_version": "1.4.3+dfsg-0ubuntu0.22.04.1",
            "binary_name": "libclamav12"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-20031.json"
Ubuntu:24.04:LTS
clamav

Package

Name
clamav
Purl
pkg:deb/ubuntu/clamav@1.4.3+dfsg-0ubuntu0.24.04.1?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.0.2+dfsg-1ubuntu1
1.0.3+dfsg-2ubuntu1
1.0.4+dfsg-0ubuntu1
1.0.5+dfsg-1ubuntu1
1.0.5+dfsg-1.1ubuntu2
1.0.5+dfsg-1.1ubuntu3
1.0.7+dfsg-0ubuntu0.24.04.1
1.0.8+dfsg-0ubuntu0.24.04.1
1.4.3+dfsg-0ubuntu0.24.04.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "1.4.3+dfsg-0ubuntu0.24.04.1",
            "binary_name": "clamav"
        },
        {
            "binary_version": "1.4.3+dfsg-0ubuntu0.24.04.1",
            "binary_name": "clamav-base"
        },
        {
            "binary_version": "1.4.3+dfsg-0ubuntu0.24.04.1",
            "binary_name": "clamav-daemon"
        },
        {
            "binary_version": "1.4.3+dfsg-0ubuntu0.24.04.1",
            "binary_name": "clamav-docs"
        },
        {
            "binary_version": "1.4.3+dfsg-0ubuntu0.24.04.1",
            "binary_name": "clamav-freshclam"
        },
        {
            "binary_version": "1.4.3+dfsg-0ubuntu0.24.04.1",
            "binary_name": "clamav-milter"
        },
        {
            "binary_version": "1.4.3+dfsg-0ubuntu0.24.04.1",
            "binary_name": "clamav-testfiles"
        },
        {
            "binary_version": "1.4.3+dfsg-0ubuntu0.24.04.1",
            "binary_name": "clamdscan"
        },
        {
            "binary_version": "1.4.3+dfsg-0ubuntu0.24.04.1",
            "binary_name": "libclamav-dev"
        },
        {
            "binary_version": "1.4.3+dfsg-0ubuntu0.24.04.1",
            "binary_name": "libclamav12"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-20031.json"
Ubuntu:25.10
clamav

Package

Name
clamav
Purl
pkg:deb/ubuntu/clamav@1.4.3+dfsg-0ubuntu2?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.4.2+dfsg-0ubuntu1
1.4.2+dfsg-0ubuntu2
1.4.2+dfsg-1ubuntu1
1.4.3+dfsg-0ubuntu1
1.4.3+dfsg-0ubuntu2

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "1.4.3+dfsg-0ubuntu2",
            "binary_name": "clamav"
        },
        {
            "binary_version": "1.4.3+dfsg-0ubuntu2",
            "binary_name": "clamav-base"
        },
        {
            "binary_version": "1.4.3+dfsg-0ubuntu2",
            "binary_name": "clamav-daemon"
        },
        {
            "binary_version": "1.4.3+dfsg-0ubuntu2",
            "binary_name": "clamav-docs"
        },
        {
            "binary_version": "1.4.3+dfsg-0ubuntu2",
            "binary_name": "clamav-freshclam"
        },
        {
            "binary_version": "1.4.3+dfsg-0ubuntu2",
            "binary_name": "clamav-milter"
        },
        {
            "binary_version": "1.4.3+dfsg-0ubuntu2",
            "binary_name": "clamav-testfiles"
        },
        {
            "binary_version": "1.4.3+dfsg-0ubuntu2",
            "binary_name": "clamdscan"
        },
        {
            "binary_version": "1.4.3+dfsg-0ubuntu2",
            "binary_name": "libclamav-dev"
        },
        {
            "binary_version": "1.4.3+dfsg-0ubuntu2",
            "binary_name": "libclamav12"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-20031.json"
Ubuntu:Pro:14.04:LTS
clamav

Package

Name
clamav
Purl
pkg:deb/ubuntu/clamav@0.103.9+dfsg-0ubuntu0.14.04.1+esm1?arch=source&distro=esm-infra-legacy/trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.97.8+dfsg-1ubuntu4
0.97.8+dfsg-1ubuntu5
0.98.1+dfsg-1ubuntu4
0.98.1+dfsg-1ubuntu5
0.98.1+dfsg-2ubuntu2
0.98.1+dfsg-4ubuntu1
0.98.1+dfsg-4ubuntu1.1
0.98.5+addedllvm-0ubuntu0.14.04.1
0.98.6+dfsg-0ubuntu0.14.04.1
0.98.7+dfsg-0ubuntu0.14.04.1
0.99.2+addedllvm-0ubuntu0.14.04.1
0.99.2+addedllvm-0ubuntu0.14.04.2
0.99.3+addedllvm-0ubuntu0.14.04.1
0.99.4+addedllvm-0ubuntu0.14.04.1
0.100.1+dfsg-1ubuntu0.14.04.1
0.100.1+dfsg-1ubuntu0.14.04.2
0.100.1+dfsg-1ubuntu0.14.04.3
0.100.1+dfsg-1ubuntu0.14.04.4
0.100.2+dfsg-1ubuntu0.14.04.1
0.100.2+dfsg-1ubuntu0.14.04.2
0.100.3+dfsg-0ubuntu0.14.04.1
0.100.3+dfsg-0ubuntu0.14.04.1+esm1
0.101.4+dfsg-0ubuntu0.14.04.1+esm1
0.102.1+dfsg-0ubuntu0.14.04.1+esm1
0.102.2+dfsg-0ubuntu0.14.04.1+esm1
0.102.3+dfsg-0ubuntu0.14.04.1+esm1
0.102.4+dfsg-0ubuntu0.14.04.1+esm1
0.103.2+dfsg-0ubuntu0.14.04.1+esm1
0.103.2+dfsg-0ubuntu0.14.04.1+esm2
0.103.5+dfsg-0ubuntu0.14.04.1+esm1
0.103.6+dfsg-0ubuntu0.14.04.1+esm1
0.103.8+dfsg-0ubuntu0.14.04.1+esm1
0.103.9+dfsg-0ubuntu0.14.04.1+esm1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "0.103.9+dfsg-0ubuntu0.14.04.1+esm1",
            "binary_name": "clamav"
        },
        {
            "binary_version": "0.103.9+dfsg-0ubuntu0.14.04.1+esm1",
            "binary_name": "clamav-base"
        },
        {
            "binary_version": "0.103.9+dfsg-0ubuntu0.14.04.1+esm1",
            "binary_name": "clamav-daemon"
        },
        {
            "binary_version": "0.103.9+dfsg-0ubuntu0.14.04.1+esm1",
            "binary_name": "clamav-docs"
        },
        {
            "binary_version": "0.103.9+dfsg-0ubuntu0.14.04.1+esm1",
            "binary_name": "clamav-freshclam"
        },
        {
            "binary_version": "0.103.9+dfsg-0ubuntu0.14.04.1+esm1",
            "binary_name": "clamav-milter"
        },
        {
            "binary_version": "0.103.9+dfsg-0ubuntu0.14.04.1+esm1",
            "binary_name": "clamav-testfiles"
        },
        {
            "binary_version": "0.103.9+dfsg-0ubuntu0.14.04.1+esm1",
            "binary_name": "libclamav-dev"
        },
        {
            "binary_version": "0.103.9+dfsg-0ubuntu0.14.04.1+esm1",
            "binary_name": "libclamav9"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-20031.json"
Ubuntu:Pro:16.04:LTS
clamav

Package

Name
clamav
Purl
pkg:deb/ubuntu/clamav@0.103.12+dfsg-0ubuntu0.16.04.1+esm1?arch=source&distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.98.7+dfsg-0ubuntu4
0.98.7+dfsg-0ubuntu5
0.99+dfsg-1ubuntu1
0.99+dfsg-1ubuntu1.1
0.99+dfsg-1ubuntu1.2
0.99.2+dfsg-0ubuntu0.16.04.1
0.99.2+dfsg-0ubuntu0.16.04.2
0.99.2+dfsg-0ubuntu0.16.04.3
0.99.3+addedllvm-0ubuntu0.16.04.1
0.99.4+addedllvm-0ubuntu0.16.04.1
0.100.1+dfsg-1ubuntu0.16.04.1
0.100.1+dfsg-1ubuntu0.16.04.2
0.100.1+dfsg-1ubuntu0.16.04.3
0.100.2+dfsg-1ubuntu0.16.04.1
0.100.3+dfsg-0ubuntu0.16.04.1
0.101.4+dfsg-0ubuntu0.16.04.1
0.102.1+dfsg-0ubuntu0.16.04.2
0.102.2+dfsg-0ubuntu0.16.04.1
0.102.3+dfsg-0ubuntu0.16.04.1
0.102.4+dfsg-0ubuntu0.16.04.1
0.103.2+dfsg-0ubuntu0.16.04.1
0.103.2+dfsg-0ubuntu0.16.04.1+esm1
0.103.5+dfsg-0ubuntu0.16.04.1+esm1
0.103.6+dfsg-0ubuntu0.16.04.1+esm1
0.103.8+dfsg-0ubuntu0.16.04.1+esm1
0.103.9+dfsg-0ubuntu0.16.04.1+esm1
0.103.12+dfsg-0ubuntu0.16.04.1+esm1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "0.103.12+dfsg-0ubuntu0.16.04.1+esm1",
            "binary_name": "clamav"
        },
        {
            "binary_version": "0.103.12+dfsg-0ubuntu0.16.04.1+esm1",
            "binary_name": "clamav-base"
        },
        {
            "binary_version": "0.103.12+dfsg-0ubuntu0.16.04.1+esm1",
            "binary_name": "clamav-daemon"
        },
        {
            "binary_version": "0.103.12+dfsg-0ubuntu0.16.04.1+esm1",
            "binary_name": "clamav-docs"
        },
        {
            "binary_version": "0.103.12+dfsg-0ubuntu0.16.04.1+esm1",
            "binary_name": "clamav-freshclam"
        },
        {
            "binary_version": "0.103.12+dfsg-0ubuntu0.16.04.1+esm1",
            "binary_name": "clamav-milter"
        },
        {
            "binary_version": "0.103.12+dfsg-0ubuntu0.16.04.1+esm1",
            "binary_name": "clamav-testfiles"
        },
        {
            "binary_version": "0.103.12+dfsg-0ubuntu0.16.04.1+esm1",
            "binary_name": "clamdscan"
        },
        {
            "binary_version": "0.103.12+dfsg-0ubuntu0.16.04.1+esm1",
            "binary_name": "libclamav-dev"
        },
        {
            "binary_version": "0.103.12+dfsg-0ubuntu0.16.04.1+esm1",
            "binary_name": "libclamav9"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-20031.json"
Ubuntu:Pro:18.04:LTS
clamav

Package

Name
clamav
Purl
pkg:deb/ubuntu/clamav@0.103.12+dfsg-0ubuntu0.18.04.1+esm1?arch=source&distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.99.2+dfsg-6ubuntu2
0.99.3~beta1+dfsg-2ubuntu1
0.99.3~beta1+dfsg-2ubuntu2
0.99.3+addedllvm-0ubuntu1
0.99.3+addedllvm-0ubuntu2
0.99.4+addedllvm-0ubuntu1
0.100.1+dfsg-1ubuntu0.18.04.1
0.100.1+dfsg-1ubuntu0.18.04.2
0.100.1+dfsg-1ubuntu0.18.04.3
0.100.2+dfsg-1ubuntu0.18.04.1
0.100.3+dfsg-0ubuntu0.18.04.1
0.101.4+dfsg-0ubuntu0.18.04.1
0.102.1+dfsg-0ubuntu0.18.04.2
0.102.2+dfsg-0ubuntu0.18.04.1
0.102.3+dfsg-0ubuntu0.18.04.1
0.102.4+dfsg-0ubuntu0.18.04.1
0.103.2+dfsg-0ubuntu0.18.04.1
0.103.2+dfsg-0ubuntu0.18.04.2
0.103.2+dfsg-0ubuntu0.18.04.3
0.103.5+dfsg-0ubuntu0.18.04.1
0.103.6+dfsg-0ubuntu0.18.04.1
0.103.8+dfsg-0ubuntu0.18.04.1
0.103.9+dfsg-0ubuntu0.18.04.1+esm1
0.103.12+dfsg-0ubuntu0.18.04.1+esm1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "0.103.12+dfsg-0ubuntu0.18.04.1+esm1",
            "binary_name": "clamav"
        },
        {
            "binary_version": "0.103.12+dfsg-0ubuntu0.18.04.1+esm1",
            "binary_name": "clamav-base"
        },
        {
            "binary_version": "0.103.12+dfsg-0ubuntu0.18.04.1+esm1",
            "binary_name": "clamav-daemon"
        },
        {
            "binary_version": "0.103.12+dfsg-0ubuntu0.18.04.1+esm1",
            "binary_name": "clamav-docs"
        },
        {
            "binary_version": "0.103.12+dfsg-0ubuntu0.18.04.1+esm1",
            "binary_name": "clamav-freshclam"
        },
        {
            "binary_version": "0.103.12+dfsg-0ubuntu0.18.04.1+esm1",
            "binary_name": "clamav-milter"
        },
        {
            "binary_version": "0.103.12+dfsg-0ubuntu0.18.04.1+esm1",
            "binary_name": "clamav-testfiles"
        },
        {
            "binary_version": "0.103.12+dfsg-0ubuntu0.18.04.1+esm1",
            "binary_name": "clamdscan"
        },
        {
            "binary_version": "0.103.12+dfsg-0ubuntu0.18.04.1+esm1",
            "binary_name": "libclamav-dev"
        },
        {
            "binary_version": "0.103.12+dfsg-0ubuntu0.18.04.1+esm1",
            "binary_name": "libclamav9"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-20031.json"
Ubuntu:Pro:20.04:LTS
clamav

Package

Name
clamav
Purl
pkg:deb/ubuntu/clamav@1.4.3+dfsg-0ubuntu0.20.04.1+esm1?arch=source&distro=esm-infra/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.101.4+dfsg-1ubuntu1
0.102.1+dfsg-1ubuntu1
0.102.1+dfsg-2ubuntu1
0.102.1+dfsg-2ubuntu2
0.102.2+dfsg-1ubuntu1
0.102.2+dfsg-2ubuntu1
0.102.3+dfsg-0ubuntu0.20.04.1
0.102.4+dfsg-0ubuntu0.20.04.1
0.103.2+dfsg-0ubuntu0.20.04.1
0.103.2+dfsg-0ubuntu0.20.04.2
0.103.5+dfsg-1~20.04.1
0.103.6+dfsg-0ubuntu0.20.04.1
0.103.8+dfsg-0ubuntu0.20.04.1
0.103.9+dfsg-0ubuntu0.20.04.1
0.103.11+dfsg-0ubuntu0.20.04.1
0.103.12+dfsg-0ubuntu0.20.04.1
1.*
1.4.3+dfsg-0ubuntu0.20.04.1+esm1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "1.4.3+dfsg-0ubuntu0.20.04.1+esm1",
            "binary_name": "clamav"
        },
        {
            "binary_version": "1.4.3+dfsg-0ubuntu0.20.04.1+esm1",
            "binary_name": "clamav-base"
        },
        {
            "binary_version": "1.4.3+dfsg-0ubuntu0.20.04.1+esm1",
            "binary_name": "clamav-daemon"
        },
        {
            "binary_version": "1.4.3+dfsg-0ubuntu0.20.04.1+esm1",
            "binary_name": "clamav-docs"
        },
        {
            "binary_version": "1.4.3+dfsg-0ubuntu0.20.04.1+esm1",
            "binary_name": "clamav-freshclam"
        },
        {
            "binary_version": "1.4.3+dfsg-0ubuntu0.20.04.1+esm1",
            "binary_name": "clamav-milter"
        },
        {
            "binary_version": "1.4.3+dfsg-0ubuntu0.20.04.1+esm1",
            "binary_name": "clamav-testfiles"
        },
        {
            "binary_version": "1.4.3+dfsg-0ubuntu0.20.04.1+esm1",
            "binary_name": "clamdscan"
        },
        {
            "binary_version": "1.4.3+dfsg-0ubuntu0.20.04.1+esm1",
            "binary_name": "libclamav-dev"
        },
        {
            "binary_version": "1.4.3+dfsg-0ubuntu0.20.04.1+esm1",
            "binary_name": "libclamav12"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-20031.json"