{"affected":[{"ecosystem_specific":{"binaries":[{"clamav":"0.99.4-33.9.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Desktop 12 SP2","name":"clamav","purl":"pkg:rpm/suse/clamav&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.99.4-33.9.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"clamav":"0.99.4-33.9.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Desktop 12 SP3","name":"clamav","purl":"pkg:rpm/suse/clamav&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.99.4-33.9.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"clamav":"0.99.4-33.9.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for Raspberry Pi 12 SP2","name":"clamav","purl":"pkg:rpm/suse/clamav&distro=SUSE%20Linux%20Enterprise%20Server%20for%20Raspberry%20Pi%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.99.4-33.9.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"clamav":"0.99.4-33.9.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP2","name":"clamav","purl":"pkg:rpm/suse/clamav&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.99.4-33.9.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"clamav":"0.99.4-33.9.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP2","name":"clamav","purl":"pkg:rpm/suse/clamav&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.99.4-33.9.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"clamav":"0.99.4-33.9.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP3","name":"clamav","purl":"pkg:rpm/suse/clamav&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.99.4-33.9.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"clamav":"0.99.4-33.9.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP3","name":"clamav","purl":"pkg:rpm/suse/clamav&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.99.4-33.9.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for clamav fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2012-6706: VMSF_DELTA filter inside the unrar implementation allows an arbitrary memory write (bsc#1045315).\n- CVE-2017-6419: A heap-based buffer overflow that can lead to a denial of service in libmspack via a crafted CHM file (bsc#1052449).\n- CVE-2017-11423: A stack-based buffer over-read that can lead to a denial of service in mspack via a crafted CAB file (bsc#1049423).\n- CVE-2018-1000085: An out-of-bounds heap read vulnerability was found in XAR parser that can lead to a denial of service (bsc#1082858).\n- CVE-2018-0202: Fixed two vulnerabilities in the PDF parsing code (bsc#1083915).\n","id":"SUSE-SU-2018:0809-1","modified":"2018-03-26T08:38:32Z","published":"2018-03-26T08:38:32Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2018/suse-su-20180809-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1045315"},{"type":"REPORT","url":"https://bugzilla.suse.com/1049423"},{"type":"REPORT","url":"https://bugzilla.suse.com/1052449"},{"type":"REPORT","url":"https://bugzilla.suse.com/1082858"},{"type":"REPORT","url":"https://bugzilla.suse.com/1083915"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2012-6706"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-11423"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-6419"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-0202"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-1000085"}],"related":["CVE-2012-6706","CVE-2017-11423","CVE-2017-6419","CVE-2018-0202","CVE-2018-1000085"],"summary":"Security update for clamav","upstream":["CVE-2012-6706","CVE-2017-11423","CVE-2017-6419","CVE-2018-0202","CVE-2018-1000085"]}