Security update for clamav

This update for clamav to version 0.100.1 fixes the following issues:

The following security vulnerabilities were addressed:

- CVE-2018-0360: HWP integer overflow, infinite loop vulnerability (bsc#1101410)
- CVE-2018-0361: PDF object length check, unreasonably long time to parse relatively small file (bsc#1101412)
- CVE-2018-1000085: Fixed a out-of-bounds heap read in XAR parser (bsc#1082858)
- CVE-2018-14679: Libmspack heap buffer over-read in CHM parser (bsc#1103040)
- Buffer over-read in unRAR code due to missing max value checks in table initialization
- PDF parser bugs

The following other changes were made:

- Disable YARA support for licensing reasons (bsc#1101654).
- Add HTTPS support for clamsubmit
- Fix for DNS resolution for users on IPv4-only machines where IPv6 is not
available or is link-local only

This update was imported from the SUSE:SLE-12:Update update project.

Fixed bugs
bnc#1101654
clamav bundles modified yara with APACHE-2.0 license, incompatible with clamav GPL-2.0
bnc#1101410
VUL-0: CVE-2018-0360: clamav: HWP integer overflow with a resultant infinite loop via a crafted Hangul Word Processor file
bnc#1103040
VUL-1: CVE-2018-14679: clamav: libmspack: An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. There isan off-by-one error in the CHM PMGI/PMGL chunk number validity checks, whichcould lead to denial of service (uninitialized da
bnc#1101412
VUL-0: CVE-2018-0361: clamav: Missing PDF object length check results in an unreasonably long time to parse a relatively small file
bnc#1082858
VUL-0: CVE-2018-1000085: clamav: Out-of-bounds heap read in XAR parser
Selected Binaries
openSUSE Build Service is sponsored by