libfreshclam4-1.5.2-150600.18.25.1<>,ip9|]LJޓg#79:,@ szhCo/}?>gQ| @?d % < *AGPX \ ` h   $4$$(N8X[9[:[>@(F7GPHXI`XdYx\]^bcdeflu,v4wxy!z\lpvClibfreshclam41.5.2150600.18.25.1ClamAV updater libraryClamAV is an antivirus engine designed for detecting trojans, viruses, malware and other malicious threats.ih04-armsrv2SUSE Linux Enterprise 15SUSE LLC GPL-2.0-onlyhttps://www.suse.com/System/Librarieshttps://www.clamav.netlinuxaarch64iSio9dc34cc621e564771c44bd8aaaa1dc1e8facf897ab589061a9421f431c958a72libfreshclam.so.4.0.0rootrootrootrootclamav-1.5.2-150600.18.25.1.src.rpmlibfreshclam.so.4()(64bit)libfreshclam.so.4(FRESHCLAM_PRIVATE)(64bit)libfreshclam.so.4(FRESHCLAM_PUBLIC)(64bit)libfreshclam4libfreshclam4(aarch-64)@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@    /sbin/ldconfig/sbin/ldconfigld-linux-aarch64.so.1()(64bit)ld-linux-aarch64.so.1(GLIBC_2.17)(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)libc.so.6(GLIBC_2.18)(64bit)libc.so.6(GLIBC_2.25)(64bit)libc.so.6(GLIBC_2.27)(64bit)libc.so.6(GLIBC_2.28)(64bit)libc.so.6(GLIBC_2.29)(64bit)libc.so.6(GLIBC_2.32)(64bit)libc.so.6(GLIBC_2.33)(64bit)libc.so.6(GLIBC_2.34)(64bit)libc.so.6(GLIBC_2.38)(64bit)libclamav.so.12()(64bit)libclamav.so.12(CLAMAV_PRIVATE)(64bit)libclamav.so.12(CLAMAV_PUBLIC)(64bit)libcrypto.so.3()(64bit)libcrypto.so.3(OPENSSL_3.0.0)(64bit)libcurl.so.4()(64bit)libgcc_s.so.1()(64bit)libgcc_s.so.1(GCC_3.0)(64bit)libgcc_s.so.1(GCC_3.3)(64bit)libgcc_s.so.1(GCC_4.2.0)(64bit)libm.so.6()(64bit)libm.so.6(GLIBC_2.17)(64bit)libm.so.6(GLIBC_2.27)(64bit)libm.so.6(GLIBC_2.29)(64bit)libssl.so.3()(64bit)libssl.so.3(OPENSSL_3.0.0)(64bit)libz.so.1()(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.3iip@i@ii)i T@ik@i h@h;@hR@hb|@hSh6gI@g@g/@gg gb@f4fKf@f&Q@e8@e}@e9@d]@dܺ@c@b@bs@bUiaay`\`@`pA`m`7@`"y@`_#___[@_A@^^@^:@^]f@]*]@]]o@]Ik\e\E@[[`O@[Xf@[M@[DZ@Z@Z$Z@Zk@ZOYY@Ym@Y, @Ww@WW@Wu Wk@Wc@V'@V}/V`.V^@U@UG_@T[@Tr@T7T6Tl@T_W@max@suse.commax@suse.commax@suse.commax@suse.commax@suse.commax@suse.combwiedemann@suse.commax@suse.commax@suse.commax@suse.commax@suse.commax@suse.comsuse+build@de-korte.orgmax@suse.commax@suse.commax@suse.commax@suse.commax@suse.commax@suse.comandreas.stieger@gmx.demax@suse.comsuse+build@de-korte.orgbwiedemann@suse.commax@suse.commax@suse.comdimstar@opensuse.orgsuse+build@de-korte.orgmax@suse.comsuse+build@de-korte.orgsuse+build@de-korte.orgecsos@opensuse.orgsuse+build@de-korte.orgmeissner@suse.comsuse+build@de-korte.orgsuse+build@de-korte.orgmeissner@suse.comsuse+build@de-korte.orgmax@suse.comsuse+build@de-korte.orgsuse+build@de-korte.orgsuse+build@de-korte.orgsuse+build@de-korte.orgdimstar@opensuse.orgmax@suse.comsuse+build@de-korte.orgsuse+build@de-korte.orgsuse+build@de-korte.orgmpluskal@suse.comsuse+build@de-korte.orgsuse+build@de-korte.orgdimstar@opensuse.orgsuse+build@de-korte.orgsuse+build@de-korte.orgmax@suse.comandreas.stieger@gmx.demax@suse.comegdfree@opensuse.orgmax@suse.commax@suse.commax@suse.commpluskal@suse.comsecurity@suse.comegdfree@opensuse.orgmax@suse.commax@suse.commax@suse.comvarkoly@suse.comvcizek@suse.commeissner@suse.comjengelh@inai.defvogt@suse.comro@suse.deastieger@suse.comfweiss@suse.commax@suse.comjengelh@inai.defweiss@suse.comfweiss@suse.commartin.liska@suse.comecsos@opensuse.orgmeissner@suse.commax@suse.comp.drouand@gmail.commpluskal@suse.commax@suse.commax@suse.commax@suse.commax@suse.commeissner@suse.commax@suse.comledest@gmail.com- Disable build for 32 bit ix86 because of testsuite failures with rust >= 1.87 that upstream is not planning to fix. - Run the test suite on all SUSE releases.- New version 1.5.2: * bsc#1259207, CVE-2026-20031: Fixed an error handling bug in the HTML file parser that may crash the program and cause a denial-of-service (DoS) condition. This issue was introduced in version 1.1.0. * Fixed a possible infinite loop when scanning some JPEG files by upgrading affected ClamAV dependency, a Rust image library. * The CVD verification process will now ignore certificate files in the CVD certs directory when the user lacks read permissions. * Freshclam: Fix CLD verification bug with PrivateMirror option. * Upgraded the Rust bytes dependency to a newer version to resolve RUSTSEC-2026-0007 advisory. * Fixed a possible crash caused by invalid pointer alignment on some platforms. * Minimal required Rust version is now 1.87.- bsc#1258072: Require main and library packages to be of the same version and release. Given that all the core functionality is in the libraries it makes little sense to update the main package alone.- jsc-PED-14819: Support transactional updates.- Fix testsuite error on SLE-15-SP6 by falling back to rust1.86.- Provide a better fix for boo#1249404 by disabling debug mode.- Build with older rust 1.87 for reproducible builds (boo#1249404)- Add clamav-workaround.patch to work around symbol removals in version 1.5.0 and 1.5.1.- New version: 1.5.1: * Fixed a significant performance issue when scanning some PE files. * Fixed an issue recording file entries from a ZIP archive central directory which resulted in "Heuristics.Limits.Exceeded.MaxFiles" alerts when using the ClamScan --alert-exceeds-max command line option or ClamD AlertExceedsMax config file option. * Improved performance when scanning TNEF email attachments. * Fixed an issue with recording metadata for OOXML office documents. * Fixed an issue with signature matches for VBA in OLE2 office documents. * Loosened overly restrictive rules for embedded file identification and increased the limit for finding PE files embedded in other PE files. * Fixed an issue with extracting some RAR archives embedded in other files. * Fixed an issue with calculating fuzzy hashes affecting some images by updating the version for several Rust library dependencies.- Add json-c-json-c-0.18-20240915.tar.gz and link it statically into libclamav on SLE-12, because version 0.12 is too old.- New version 1.5.0: * Added checks to determine if an OLE2-based Microsoft Office document is encrypted. * Added the ability to record URIs found in HTML if the generate-JSON-metadata feature is enabled. * Added the ability to record URIs found in PDFs if the generate-JSON-metadata feature is enabled. * Added regex support for the clamd.conf OnAccessExcludePath config option. * Added CVD signing/verification with external .sign files. * Freshclam, ClamD, ClamScan, and Sigtool: Added an option to enable FIPS-like limits disabling MD5 and SHA1 from being used for verifying digital signatures or for being used to trust a file when checking for false positives (bsc#1221954). * ClamD: Added an option to disable select administrative commands including SHUTDOWN, RELOAD, STATS and VERSION. * libclamav: Added extended hashing functions with a "flags" parameter that allows the caller to choose if they want to bypass FIPS hash algorithm limits. * See the release announcement for the full list of changes: https://blog.clamav.net/2025/10/clamav-150-released.html - Obsoleted patches: * clamav-freshclam_test.patch * clamav-disable-administrative-commands.patch * clamav-fips.patch - Use macros for library versions - Remove service symlinks: rcclamd, rcfreshclam, rcclamav-milter, and clamonacc. - Use rust 1.86 for SLE-12 and SLE-15-SP2.- bsc#1240363, clamav-disable-administrative-commands.patch: clamd: Add an option to toggle SHUTDOWN, RELOAD, STATS and VERSION.- New version 1.4.3: ClamAV 1.4.3 is a patch release with the following fixes: * CVE-2025-20260, bsc#1245054: Fixed a possible buffer overflow write bug in the PDF file parser that could cause a denial-of-service (DoS) condition or enable remote code execution. This issue only affects configurations where both: - The max file-size scan limit is set greater than or equal to 1024MB. - The max scan-size scan limit is set greater than or equal to 1025MB. The code flaw was present prior to version 1.0.0, but a change in version 1.0.0 that enables larger allocations based on untrusted data made it possible to trigger this bug. This issue affects all currently supported versions. * CVE-2025-20234, bsc#1245055: Fixed a possible buffer overflow read bug in the UDF file parser that may write to a temp file and thus disclose information, or it may crash and cause a denial-of-service (DoS) condition. This issue was introduced in version 1.2.0. * Fixed a possible use-after-free bug in the Xz decompression module in the bundled lzma-sdk library. This issue was fixed in the lzma-sdk version 18.03. ClamAV bundles a copy of the lzma-sdk with some performance changes specific to libclamav, plus select bug fixes like this one in lieu of a full upgrade to newer lzma-sdk. This issue affects all ClamAV versions at least as far back as 0.99.4. * Windows: Fixed a build install issue when a DLL dependency such as libcrypto has the exact same name as one provided by the Windows operating system. - Renew clamav.keyring- bsc#1243565: Add clamav-freshclam_test.patch to fix a race condition between the mockup servers started by different test cases in freshclam_test.py.- bsc#1239957: Build with PIE. - Eliminate some UTF-8 NBSP characters from the changes file.- bsc#1236949: Fix location of license files.- Drop the version dependency on libcurl. Building against versions older than 7.45 does not fail anymore, but disables support for fdpassing in clamonacc. This only affects SLE-12 up to SP3.- New version 1.4.2: * CVE-2025-20128, bsc#1236307: Fixed a possible buffer overflow read bug in the OLE2 file parser that could cause a denial-of-service (DoS) condition.- bsc#1232242: Start clamonacc with --fdpass to avoid errors due to clamd not being able to access user files.- fix factory submission (clam.tcl, clamscan.log)- New version 1.4.1: * [CVE-2024-20506, bsc#1230162]: Changed the logging module to disable following symlinks on Linux and Unix systems so as to prevent an attacker with existing access to the 'clamd' or 'freshclam' services from using a symlink to corrupt system files. * [CVE-2024-20505, bsc#1230161]: Fixed a possible out-of-bounds read bug in the PDF file parser that could cause a denial-of-service (DoS) condition. * https://blog.clamav.net/2024/09/clamav-141-132-107-and-010312-security.html - New version 1.4.0: * Added support for extracting ALZ archives. * Added support for extracting LHA/LZH archives. * Added the ability to disable image fuzzy hashing, if needed. For context, image fuzzy hashing is a detection mechanism useful for identifying malware by matching images included with the malware or phishing email/document. * https://blog.clamav.net/2024/08/clamav-140-feature-release-and-clamav.html- New version 1.3.2: * CVE-2024-20506: Changed the logging module to disable following symlinks on Linux and Unix systems so as to prevent an attacker with existing access to the 'clamd' or 'freshclam' services from using a symlink to corrupt system files. * CVE-2024-20505: Fixed a possible out-of-bounds read bug in the PDF file parser that could cause a denial-of-service condition. * Removed unused Python modules from freshclam tests including deprecated 'cgi' module that is expected to cause test failures in Python 3.13. * Fix unit test caused by expiring signing certificate. * Fixed a build issue on Windows with newer versions of Rust. Also upgraded GitHub Actions imports to fix CI failures. * Fixed an unaligned pointer dereference issue on select architectures. * Fixes to Jenkins CI pipeline. - Remove upstreamed 1305.patch- Add upstream 1305.patch to fix tests (boo#1102840, https://github.com/Cisco-Talos/clamav/issues/1300)- New Version: 1.3.1: * CVE-2024-20380: Fixed a possible crash in the HTML file parser that could cause a denial-of-service (DoS) condition. * Updated select Rust dependencies to the latest versions. * Fixed a bug causing some text to be truncated when converting from UTF-16. * Fixed assorted complaints identified by Coverity static analysis. * Fixed a bug causing CVDs downloaded by the DatabaseCustomURL Freshclam config option to be pruned and then re-downloaded with every update. * Added the new 'valhalla' database name to the list of optional databases in preparation for future work.- New version: 1.3.0: * Added support for extracting and scanning attachments found in Microsoft OneNote section files. OneNote parsing will be enabled by default, but may be optionally disabled. * Added file type recognition for compiled Python (`.pyc`) files. * Improved support for decrypting PDFs with empty passwords. * Fixed a warning when scanning some HTML files. * ClamOnAcc: Fixed an infinite loop when a watched directory does not exist. * ClamOnAcc: Fixed an infinite loop when a file has been deleted before a scan. - New version: 1.2.0: * Added support for extracting Universal Disk Format (UDF) partitions. * Added an option to customize the size of ClamAV's clean file cache. * Raised the MaxScanSize limit so the total amount of data scanned when scanning a file or archive may exceed 4 gigabytes. * Added ability for Freshclam to use a client certificate PEM file and a private key PEM file for authentication to a private mirror. * Fix an issue extracting files from ISO9660 partitions where the files are listed in the plain ISO tree and there also exists an empty Joliet tree. * PID and socket are now located under /run/clamav/clamd.pid and /run/clamav/clamd.sock . * bsc#1211594: Fixed an issue where ClamAV does not abort the signature load process after partially loading an invalid signature. - New version 1.1.0: * https://blog.clamav.net/2023/05/clamav-110-released.html * Added the ability to extract images embedded in HTML CSS