Security update for clamav

SUSE Security Update: Security update for clamav
Announcement ID: SUSE-SU-2018:2230-1
Rating: moderate
References: #1101410 #1101412 #1101654 #1103040
Affected Products:
  • SUSE Linux Enterprise Module for Basesystem 15

  • An update that solves two vulnerabilities and has two fixes is now available.


    This update for clamav to version 0.100.1 fixes the following issues:

    The following security vulnerabilities were addressed:

    - CVE-2018-0360: HWP integer overflow, infinite loop vulnerability
    - CVE-2018-0361: PDF object length check, unreasonably long time to parse
    relatively small file (bsc#1101412)
    - Buffer over-read in unRAR code due to missing max value checks in table
    - Libmspack heap buffer over-read in CHM parser (bsc#1103040)
    - PDF parser bugs

    The following other changes were made:

    - Disable YARA support for licensing reasons (bsc#1101654).
    - Add HTTPS support for clamsubmit
    - Fix for DNS resolution for users on IPv4-only machines where IPv6 is not
    available or is link-local only

    Patch Instructions:

    To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
    Alternatively you can run the command listed for your product:

    • SUSE Linux Enterprise Module for Basesystem 15:
      zypper in -t patch SUSE-SLE-Module-Basesystem-15-2018-1509=1

    Package List:

    • SUSE Linux Enterprise Module for Basesystem 15 (aarch64 ppc64le s390x x86_64):
      • clamav-0.100.1-3.3.1
      • clamav-debuginfo-0.100.1-3.3.1
      • clamav-debugsource-0.100.1-3.3.1
      • clamav-devel-0.100.1-3.3.1
      • libclamav7-0.100.1-3.3.1
      • libclamav7-debuginfo-0.100.1-3.3.1
      • libclammspack0-0.100.1-3.3.1
      • libclammspack0-debuginfo-0.100.1-3.3.1