Security update for clamav

clamav was updated to version 0.98.5 to fix two security issues.

These security issues were fixed:
- Segmentation fault when processing certain files (CVE-2013-6497).
- Heap-based buffer overflow when scanning crypted PE files (CVE-2014-9050).

The following non-security issues were fixed:
- Support for the XDP file format and extracting, decoding, and
scanning PDF files within XDP files.
- Addition of shared library support for LLVM versions 3.1 - 3.5
for the purpose of just-in-time(JIT) compilation of ClamAV
bytecode signatures.
- Enhancements to the clambc command line utility to assist
ClamAV bytecode signature authors by providing introspection
into compiled bytecode programs.
- Resolution of many of the warning messages from ClamAV compilation.
- Improved detection of malicious PE files.
- ClamAV 0.98.5 now works with OpenSSL in FIPS compliant
mode (bnc#904207).
- Fix server socket setup code in clamd (bnc#903489).
- Change updateclamconf to prefer the state of the old config
file even for commented-out options (bnc#903719).

Fixed bugs
bnc#903719
clamav-0.98.3 update reverts customer comment-outs to clamd.conf
bnc#904207
clamav 0.98.3 does not work in FIPS mode
bnc#903489
clamav-0.98.3 does not listen on any interfaces if ipv6 disabled
bnc#906770
VUL-0: CVE-2014-9050: clamav: heap-based buffer overflow when scanning crypted PE files
bnc#906077
VUL-0: CVE-2013-6497: clamav: Segmentation fault when processing certain files
Selected Binaries
openSUSE Build Service is sponsored by