Subject: CVS commit: pkgsrc/security/clamav
From: Takahiro Kambe
Date: 2019-12-03 13:55:16
Message id: 20191203125516.F1B40FA97@cvs.NetBSD.org

Log Message:
security/clamav: update to 0.102.1

Update clamav to 0.102.1.

## 0.102.1

ClamAV 0.102.1 is a security patch release to address the following issues.

- Fix for the following vulnerability affecting 0.102.0 and 0.101.4 and prior:
  - [CVE-2019-15961](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15961)
    A Denial-of-Service (DoS) vulnerability may occur when scanning a specially
    crafted email file as a result of excessively long scan times. The issue is
    resolved by implementing several maximums in parsing MIME messages and by
    optimizing use of memory allocation.

- Build system fixes to build clamav-milter, to correctly link with libxml2 when
  detected, and to correctly detect fanotify for on-access scanning feature
  support.

- Signature load time is significantly reduced by changing to a more efficient
  algorithm for loading signature patterns and allocating the AC trie.
  Patch courtesy of Alberto Wu.

- Introduced a new configure option to statically link libjson-c with libclamav.
  Static linking with libjson is highly recommended to prevent crashes in
  applications that use libclamav alongside another JSON parsing library.

- Null-dereference fix in email parser when using the `--gen-json` metadata
  option.

- Fixes for Authenticode parsing and certificate signature (.crb database) bugs.

Special thanks to the following for code contributions and bug reports:

- Alberto Wu
- Joran Dirk Greef
- Reio Remma

Files:
RevisionActionfile
1.59modifypkgsrc/security/clamav/Makefile
1.13modifypkgsrc/security/clamav/Makefile.common
1.31modifypkgsrc/security/clamav/distinfo
1.7modifypkgsrc/security/clamav/patches/patch-configure