clamav/clamav-0.100.1.tar.gz.sig
Andreas Stieger 1ca8804a22 Accepting request 622505 from home:EGDFree:branches:security
- Update to version 0.100.1
  * CVE-2017-16932: Vulnerability in libxml2 dependency (affects
    ClamAV on Windows only).
  * CVE-2018-0360: HWP integer overflow, infinite loop
    vulnerability. Reported by Secunia Research at Flexera.
  * CVE-2018-0361: ClamAV PDF object length check, unreasonably
    long time to parse relatively small file. Reported by aCaB.
  * Buffer over-read in unRAR code due to missing max value checks
    in table initialization. Reported by Rui Reis.
  * Libmspack heap buffer over-read in CHM parser. Reported by
    Hanno Böck.
  * Buffer length checks when reading integers from non-NULL
    terminated strings.
  * Buffer length tracking when reading strings from dictionary
    objects.
  * HTTPS support for clamsubmit.
  * Fix for DNS resolution for users on IPv4-only machines where
    IPv6 is not available or is link-local only. Patch provided by
    Guilherme Benkenstein.

OBS-URL: https://build.opensuse.org/request/show/622505
OBS-URL: https://build.opensuse.org/package/show/security/clamav?expand=0&rev=168
2018-07-17 21:41:32 +00:00

17 lines
801 B
Standard ML

-----BEGIN PGP SIGNATURE-----
iQIcBAABAgAGBQJbO66OAAoJEPE/nha8pb+t2SkP/0i9fOLm2FCBs/kRGiGgd4zn
RxLwsW0Wskf0C/5dLhNHP/aeHSqeWZQdasmIgUzxxGhksp/gxwmH66h5y6qjACU2
LnDytMr5DuM0rPAfNtOmnCQcpKVXvRA5utboCP7BWBLsfdfi1tF/Sw/JknDzDu5a
AExBpiclix4EEHa4VkG+pMYpLLYUfxMZgKuq9b3ytWgNbCz0riSugr3hkoL72uRy
xfrN2S0YkHy1Kw/7zohcHJa1qfPXZ/V6S1iSBCSfk3OTeExJhQIDxlLNTkcBr8L0
H9Fo6RnQ2ttYtdphKU1suN4spFxBJD94zkOB+0cLfk6sCeYb4BXrqX6t19N+9Z9+
m2fx2zay12skW/eABFtG82ToWTojCfHhKrRRDZRE8iXh2KUKMUkx7kSjhDRNR9eE
WIpfAom4vdgDwDOgHwziUqr65l8Dr3NFC1LJl8F0uaFGshbjbtMufD88S0TQCvw6
pJAZ8ZiTXqtmT9Uyw9aObffA2ekKWOY4k/6Z7ved76GkXC+e922Z+LpRE8wE05Cz
sqwkzIQMLwwBo3468vB0RFxS14AVyLFVogmYxkhLcZC39yFBZVJF4++efsrlt+vq
+OoJl7JF1NYp8KSGGAIuNY5dyJGtiu709n7ppU6JAY2uhAzEjHYeqM0caDjPDjT2
/LK7EO0s7O30HEld5gDC
=xbrK
-----END PGP SIGNATURE-----