Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
clamav-0.103.3-1.4 on GA media

Notes

Title of the patch
clamav-0.103.3-1.4 on GA media
Description of the patch
These are all security issues fixed in the clamav-0.103.3-1.4 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10685
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).



{
   document: {
      aggregate_severity: {
         namespace: "https://www.suse.com/support/security/rating/",
         text: "moderate",
      },
      category: "csaf_security_advisory",
      csaf_version: "2.0",
      distribution: {
         text: "Copyright 2024 SUSE LLC. All rights reserved.",
         tlp: {
            label: "WHITE",
            url: "https://www.first.org/tlp/",
         },
      },
      lang: "en",
      notes: [
         {
            category: "summary",
            text: "clamav-0.103.3-1.4 on GA media",
            title: "Title of the patch",
         },
         {
            category: "description",
            text: "These are all security issues fixed in the clamav-0.103.3-1.4 package on the GA media of openSUSE Tumbleweed.",
            title: "Description of the patch",
         },
         {
            category: "details",
            text: "openSUSE-Tumbleweed-2024-10685",
            title: "Patchnames",
         },
         {
            category: "legal_disclaimer",
            text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
            title: "Terms of use",
         },
      ],
      publisher: {
         category: "vendor",
         contact_details: "https://www.suse.com/support/security/contact/",
         name: "SUSE Product Security Team",
         namespace: "https://www.suse.com/",
      },
      references: [
         {
            category: "external",
            summary: "SUSE ratings",
            url: "https://www.suse.com/support/security/rating/",
         },
         {
            category: "self",
            summary: "URL of this CSAF notice",
            url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10685-1.json",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2005-3239 page",
            url: "https://www.suse.com/security/cve/CVE-2005-3239/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2005-3303 page",
            url: "https://www.suse.com/security/cve/CVE-2005-3303/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2006-1614 page",
            url: "https://www.suse.com/security/cve/CVE-2006-1614/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2006-1989 page",
            url: "https://www.suse.com/security/cve/CVE-2006-1989/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2006-4182 page",
            url: "https://www.suse.com/security/cve/CVE-2006-4182/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2006-5874 page",
            url: "https://www.suse.com/security/cve/CVE-2006-5874/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2007-0897 page",
            url: "https://www.suse.com/security/cve/CVE-2007-0897/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2007-0898 page",
            url: "https://www.suse.com/security/cve/CVE-2007-0898/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2007-1745 page",
            url: "https://www.suse.com/security/cve/CVE-2007-1745/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2007-1997 page",
            url: "https://www.suse.com/security/cve/CVE-2007-1997/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2007-6335 page",
            url: "https://www.suse.com/security/cve/CVE-2007-6335/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2007-6336 page",
            url: "https://www.suse.com/security/cve/CVE-2007-6336/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2007-6337 page",
            url: "https://www.suse.com/security/cve/CVE-2007-6337/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2007-6595 page",
            url: "https://www.suse.com/security/cve/CVE-2007-6595/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2007-6596 page",
            url: "https://www.suse.com/security/cve/CVE-2007-6596/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2008-0318 page",
            url: "https://www.suse.com/security/cve/CVE-2008-0318/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2008-0728 page",
            url: "https://www.suse.com/security/cve/CVE-2008-0728/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2008-1100 page",
            url: "https://www.suse.com/security/cve/CVE-2008-1100/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2008-2713 page",
            url: "https://www.suse.com/security/cve/CVE-2008-2713/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2010-1205 page",
            url: "https://www.suse.com/security/cve/CVE-2010-1205/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2012-6706 page",
            url: "https://www.suse.com/security/cve/CVE-2012-6706/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2017-11423 page",
            url: "https://www.suse.com/security/cve/CVE-2017-11423/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2017-12374 page",
            url: "https://www.suse.com/security/cve/CVE-2017-12374/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2017-12375 page",
            url: "https://www.suse.com/security/cve/CVE-2017-12375/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2017-12376 page",
            url: "https://www.suse.com/security/cve/CVE-2017-12376/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2017-12377 page",
            url: "https://www.suse.com/security/cve/CVE-2017-12377/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2017-12378 page",
            url: "https://www.suse.com/security/cve/CVE-2017-12378/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2017-12379 page",
            url: "https://www.suse.com/security/cve/CVE-2017-12379/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2017-12380 page",
            url: "https://www.suse.com/security/cve/CVE-2017-12380/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2017-6418 page",
            url: "https://www.suse.com/security/cve/CVE-2017-6418/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2017-6419 page",
            url: "https://www.suse.com/security/cve/CVE-2017-6419/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2017-6420 page",
            url: "https://www.suse.com/security/cve/CVE-2017-6420/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-0202 page",
            url: "https://www.suse.com/security/cve/CVE-2018-0202/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-0360 page",
            url: "https://www.suse.com/security/cve/CVE-2018-0360/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-0361 page",
            url: "https://www.suse.com/security/cve/CVE-2018-0361/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-1000085 page",
            url: "https://www.suse.com/security/cve/CVE-2018-1000085/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-14680 page",
            url: "https://www.suse.com/security/cve/CVE-2018-14680/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-15378 page",
            url: "https://www.suse.com/security/cve/CVE-2018-15378/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-12625 page",
            url: "https://www.suse.com/security/cve/CVE-2019-12625/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-12900 page",
            url: "https://www.suse.com/security/cve/CVE-2019-12900/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-15961 page",
            url: "https://www.suse.com/security/cve/CVE-2019-15961/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-1785 page",
            url: "https://www.suse.com/security/cve/CVE-2019-1785/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-1786 page",
            url: "https://www.suse.com/security/cve/CVE-2019-1786/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-1787 page",
            url: "https://www.suse.com/security/cve/CVE-2019-1787/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-1788 page",
            url: "https://www.suse.com/security/cve/CVE-2019-1788/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-1789 page",
            url: "https://www.suse.com/security/cve/CVE-2019-1789/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-1798 page",
            url: "https://www.suse.com/security/cve/CVE-2019-1798/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2020-3123 page",
            url: "https://www.suse.com/security/cve/CVE-2020-3123/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2020-3327 page",
            url: "https://www.suse.com/security/cve/CVE-2020-3327/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2020-3341 page",
            url: "https://www.suse.com/security/cve/CVE-2020-3341/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2020-3350 page",
            url: "https://www.suse.com/security/cve/CVE-2020-3350/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2020-3481 page",
            url: "https://www.suse.com/security/cve/CVE-2020-3481/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2021-1252 page",
            url: "https://www.suse.com/security/cve/CVE-2021-1252/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2021-1404 page",
            url: "https://www.suse.com/security/cve/CVE-2021-1404/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2021-1405 page",
            url: "https://www.suse.com/security/cve/CVE-2021-1405/",
         },
      ],
      title: "clamav-0.103.3-1.4 on GA media",
      tracking: {
         current_release_date: "2024-06-15T00:00:00Z",
         generator: {
            date: "2024-06-15T00:00:00Z",
            engine: {
               name: "cve-database.git:bin/generate-csaf.pl",
               version: "1",
            },
         },
         id: "openSUSE-SU-2024:10685-1",
         initial_release_date: "2024-06-15T00:00:00Z",
         revision_history: [
            {
               date: "2024-06-15T00:00:00Z",
               number: "1",
               summary: "Current version",
            },
         ],
         status: "final",
         version: "1",
      },
   },
   product_tree: {
      branches: [
         {
            branches: [
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "clamav-0.103.3-1.4.aarch64",
                        product: {
                           name: "clamav-0.103.3-1.4.aarch64",
                           product_id: "clamav-0.103.3-1.4.aarch64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "clamav-devel-0.103.3-1.4.aarch64",
                        product: {
                           name: "clamav-devel-0.103.3-1.4.aarch64",
                           product_id: "clamav-devel-0.103.3-1.4.aarch64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "clamav-milter-0.103.3-1.4.aarch64",
                        product: {
                           name: "clamav-milter-0.103.3-1.4.aarch64",
                           product_id: "clamav-milter-0.103.3-1.4.aarch64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "libclamav9-0.103.3-1.4.aarch64",
                        product: {
                           name: "libclamav9-0.103.3-1.4.aarch64",
                           product_id: "libclamav9-0.103.3-1.4.aarch64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "libfreshclam2-0.103.3-1.4.aarch64",
                        product: {
                           name: "libfreshclam2-0.103.3-1.4.aarch64",
                           product_id: "libfreshclam2-0.103.3-1.4.aarch64",
                        },
                     },
                  ],
                  category: "architecture",
                  name: "aarch64",
               },
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "clamav-0.103.3-1.4.ppc64le",
                        product: {
                           name: "clamav-0.103.3-1.4.ppc64le",
                           product_id: "clamav-0.103.3-1.4.ppc64le",
                        },
                     },
                     {
                        category: "product_version",
                        name: "clamav-devel-0.103.3-1.4.ppc64le",
                        product: {
                           name: "clamav-devel-0.103.3-1.4.ppc64le",
                           product_id: "clamav-devel-0.103.3-1.4.ppc64le",
                        },
                     },
                     {
                        category: "product_version",
                        name: "clamav-milter-0.103.3-1.4.ppc64le",
                        product: {
                           name: "clamav-milter-0.103.3-1.4.ppc64le",
                           product_id: "clamav-milter-0.103.3-1.4.ppc64le",
                        },
                     },
                     {
                        category: "product_version",
                        name: "libclamav9-0.103.3-1.4.ppc64le",
                        product: {
                           name: "libclamav9-0.103.3-1.4.ppc64le",
                           product_id: "libclamav9-0.103.3-1.4.ppc64le",
                        },
                     },
                     {
                        category: "product_version",
                        name: "libfreshclam2-0.103.3-1.4.ppc64le",
                        product: {
                           name: "libfreshclam2-0.103.3-1.4.ppc64le",
                           product_id: "libfreshclam2-0.103.3-1.4.ppc64le",
                        },
                     },
                  ],
                  category: "architecture",
                  name: "ppc64le",
               },
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "clamav-0.103.3-1.4.s390x",
                        product: {
                           name: "clamav-0.103.3-1.4.s390x",
                           product_id: "clamav-0.103.3-1.4.s390x",
                        },
                     },
                     {
                        category: "product_version",
                        name: "clamav-devel-0.103.3-1.4.s390x",
                        product: {
                           name: "clamav-devel-0.103.3-1.4.s390x",
                           product_id: "clamav-devel-0.103.3-1.4.s390x",
                        },
                     },
                     {
                        category: "product_version",
                        name: "clamav-milter-0.103.3-1.4.s390x",
                        product: {
                           name: "clamav-milter-0.103.3-1.4.s390x",
                           product_id: "clamav-milter-0.103.3-1.4.s390x",
                        },
                     },
                     {
                        category: "product_version",
                        name: "libclamav9-0.103.3-1.4.s390x",
                        product: {
                           name: "libclamav9-0.103.3-1.4.s390x",
                           product_id: "libclamav9-0.103.3-1.4.s390x",
                        },
                     },
                     {
                        category: "product_version",
                        name: "libfreshclam2-0.103.3-1.4.s390x",
                        product: {
                           name: "libfreshclam2-0.103.3-1.4.s390x",
                           product_id: "libfreshclam2-0.103.3-1.4.s390x",
                        },
                     },
                  ],
                  category: "architecture",
                  name: "s390x",
               },
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "clamav-0.103.3-1.4.x86_64",
                        product: {
                           name: "clamav-0.103.3-1.4.x86_64",
                           product_id: "clamav-0.103.3-1.4.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "clamav-devel-0.103.3-1.4.x86_64",
                        product: {
                           name: "clamav-devel-0.103.3-1.4.x86_64",
                           product_id: "clamav-devel-0.103.3-1.4.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "clamav-milter-0.103.3-1.4.x86_64",
                        product: {
                           name: "clamav-milter-0.103.3-1.4.x86_64",
                           product_id: "clamav-milter-0.103.3-1.4.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "libclamav9-0.103.3-1.4.x86_64",
                        product: {
                           name: "libclamav9-0.103.3-1.4.x86_64",
                           product_id: "libclamav9-0.103.3-1.4.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "libfreshclam2-0.103.3-1.4.x86_64",
                        product: {
                           name: "libfreshclam2-0.103.3-1.4.x86_64",
                           product_id: "libfreshclam2-0.103.3-1.4.x86_64",
                        },
                     },
                  ],
                  category: "architecture",
                  name: "x86_64",
               },
               {
                  branches: [
                     {
                        category: "product_name",
                        name: "openSUSE Tumbleweed",
                        product: {
                           name: "openSUSE Tumbleweed",
                           product_id: "openSUSE Tumbleweed",
                           product_identification_helper: {
                              cpe: "cpe:/o:opensuse:tumbleweed",
                           },
                        },
                     },
                  ],
                  category: "product_family",
                  name: "SUSE Linux Enterprise",
               },
            ],
            category: "vendor",
            name: "SUSE",
         },
      ],
      relationships: [
         {
            category: "default_component_of",
            full_product_name: {
               name: "clamav-0.103.3-1.4.aarch64 as component of openSUSE Tumbleweed",
               product_id: "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
            },
            product_reference: "clamav-0.103.3-1.4.aarch64",
            relates_to_product_reference: "openSUSE Tumbleweed",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "clamav-0.103.3-1.4.ppc64le as component of openSUSE Tumbleweed",
               product_id: "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
            },
            product_reference: "clamav-0.103.3-1.4.ppc64le",
            relates_to_product_reference: "openSUSE Tumbleweed",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "clamav-0.103.3-1.4.s390x as component of openSUSE Tumbleweed",
               product_id: "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
            },
            product_reference: "clamav-0.103.3-1.4.s390x",
            relates_to_product_reference: "openSUSE Tumbleweed",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "clamav-0.103.3-1.4.x86_64 as component of openSUSE Tumbleweed",
               product_id: "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
            },
            product_reference: "clamav-0.103.3-1.4.x86_64",
            relates_to_product_reference: "openSUSE Tumbleweed",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "clamav-devel-0.103.3-1.4.aarch64 as component of openSUSE Tumbleweed",
               product_id: "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
            },
            product_reference: "clamav-devel-0.103.3-1.4.aarch64",
            relates_to_product_reference: "openSUSE Tumbleweed",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "clamav-devel-0.103.3-1.4.ppc64le as component of openSUSE Tumbleweed",
               product_id: "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
            },
            product_reference: "clamav-devel-0.103.3-1.4.ppc64le",
            relates_to_product_reference: "openSUSE Tumbleweed",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "clamav-devel-0.103.3-1.4.s390x as component of openSUSE Tumbleweed",
               product_id: "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
            },
            product_reference: "clamav-devel-0.103.3-1.4.s390x",
            relates_to_product_reference: "openSUSE Tumbleweed",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "clamav-devel-0.103.3-1.4.x86_64 as component of openSUSE Tumbleweed",
               product_id: "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
            },
            product_reference: "clamav-devel-0.103.3-1.4.x86_64",
            relates_to_product_reference: "openSUSE Tumbleweed",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "clamav-milter-0.103.3-1.4.aarch64 as component of openSUSE Tumbleweed",
               product_id: "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
            },
            product_reference: "clamav-milter-0.103.3-1.4.aarch64",
            relates_to_product_reference: "openSUSE Tumbleweed",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "clamav-milter-0.103.3-1.4.ppc64le as component of openSUSE Tumbleweed",
               product_id: "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
            },
            product_reference: "clamav-milter-0.103.3-1.4.ppc64le",
            relates_to_product_reference: "openSUSE Tumbleweed",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "clamav-milter-0.103.3-1.4.s390x as component of openSUSE Tumbleweed",
               product_id: "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
            },
            product_reference: "clamav-milter-0.103.3-1.4.s390x",
            relates_to_product_reference: "openSUSE Tumbleweed",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "clamav-milter-0.103.3-1.4.x86_64 as component of openSUSE Tumbleweed",
               product_id: "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
            },
            product_reference: "clamav-milter-0.103.3-1.4.x86_64",
            relates_to_product_reference: "openSUSE Tumbleweed",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "libclamav9-0.103.3-1.4.aarch64 as component of openSUSE Tumbleweed",
               product_id: "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
            },
            product_reference: "libclamav9-0.103.3-1.4.aarch64",
            relates_to_product_reference: "openSUSE Tumbleweed",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "libclamav9-0.103.3-1.4.ppc64le as component of openSUSE Tumbleweed",
               product_id: "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
            },
            product_reference: "libclamav9-0.103.3-1.4.ppc64le",
            relates_to_product_reference: "openSUSE Tumbleweed",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "libclamav9-0.103.3-1.4.s390x as component of openSUSE Tumbleweed",
               product_id: "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
            },
            product_reference: "libclamav9-0.103.3-1.4.s390x",
            relates_to_product_reference: "openSUSE Tumbleweed",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "libclamav9-0.103.3-1.4.x86_64 as component of openSUSE Tumbleweed",
               product_id: "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
            },
            product_reference: "libclamav9-0.103.3-1.4.x86_64",
            relates_to_product_reference: "openSUSE Tumbleweed",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "libfreshclam2-0.103.3-1.4.aarch64 as component of openSUSE Tumbleweed",
               product_id: "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
            },
            product_reference: "libfreshclam2-0.103.3-1.4.aarch64",
            relates_to_product_reference: "openSUSE Tumbleweed",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "libfreshclam2-0.103.3-1.4.ppc64le as component of openSUSE Tumbleweed",
               product_id: "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
            },
            product_reference: "libfreshclam2-0.103.3-1.4.ppc64le",
            relates_to_product_reference: "openSUSE Tumbleweed",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "libfreshclam2-0.103.3-1.4.s390x as component of openSUSE Tumbleweed",
               product_id: "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
            },
            product_reference: "libfreshclam2-0.103.3-1.4.s390x",
            relates_to_product_reference: "openSUSE Tumbleweed",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "libfreshclam2-0.103.3-1.4.x86_64 as component of openSUSE Tumbleweed",
               product_id: "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
            },
            product_reference: "libfreshclam2-0.103.3-1.4.x86_64",
            relates_to_product_reference: "openSUSE Tumbleweed",
         },
      ],
   },
   vulnerabilities: [
      {
         cve: "CVE-2005-3239",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2005-3239",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The OLE2 unpacker in clamd in Clam AntiVirus (ClamAV) 0.87-1 allows remote attackers to cause a denial of service (segmentation fault) via a DOC file with an invalid property tree, which triggers an infinite recursion in the ole2_walk_property_tree function.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2005-3239",
               url: "https://www.suse.com/security/cve/CVE-2005-3239",
            },
            {
               category: "external",
               summary: "SUSE Bug 132305 for CVE-2005-3239",
               url: "https://bugzilla.suse.com/132305",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2005-3239",
      },
      {
         cve: "CVE-2005-3303",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2005-3303",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The FSG unpacker (fsg.c) in Clam AntiVirus (ClamAV) 0.80 through 0.87 allows remote attackers to cause \"memory corruption\" and execute arbitrary code via a crafted FSG 1.33 file.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2005-3303",
               url: "https://www.suse.com/security/cve/CVE-2005-3303",
            },
            {
               category: "external",
               summary: "SUSE Bug 132305 for CVE-2005-3303",
               url: "https://bugzilla.suse.com/132305",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2005-3303",
      },
      {
         cve: "CVE-2006-1614",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2006-1614",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Integer overflow in the cli_scanpe function in the PE header parser (libclamav/pe.c) in Clam AntiVirus (ClamAV) before 0.88.1, when ArchiveMaxFileSize is disabled, allows remote attackers to cause a denial of service and possibly execute arbitrary code.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2006-1614",
               url: "https://www.suse.com/security/cve/CVE-2006-1614",
            },
            {
               category: "external",
               summary: "SUSE Bug 164039 for CVE-2006-1614",
               url: "https://bugzilla.suse.com/164039",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2006-1614",
      },
      {
         cve: "CVE-2006-1989",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2006-1989",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Buffer overflow in the get_database function in the HTTP client in Freshclam in ClamAV 0.80 to 0.88.1 might allow remote web servers to execute arbitrary code via long HTTP headers.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2006-1989",
               url: "https://www.suse.com/security/cve/CVE-2006-1989",
            },
            {
               category: "external",
               summary: "SUSE Bug 171496 for CVE-2006-1989",
               url: "https://bugzilla.suse.com/171496",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2006-1989",
      },
      {
         cve: "CVE-2006-4182",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2006-4182",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Integer overflow in ClamAV 0.88.1 and 0.88.4, and other versions before 0.88.5, allows remote attackers to cause a denial of service (scanning service crash) and execute arbitrary code via a crafted Portable Executable (PE) file that leads to a heap-based buffer overflow when less memory is allocated than expected.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2006-4182",
               url: "https://www.suse.com/security/cve/CVE-2006-4182",
            },
            {
               category: "external",
               summary: "SUSE Bug 212898 for CVE-2006-4182",
               url: "https://bugzilla.suse.com/212898",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2006-4182",
      },
      {
         cve: "CVE-2006-5874",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2006-5874",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Clam AntiVirus (ClamAV) 0.88 and earlier allows remote attackers to cause a denial of service (crash) via a malformed base64-encoded MIME attachment that triggers a null pointer dereference.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2006-5874",
               url: "https://www.suse.com/security/cve/CVE-2006-5874",
            },
            {
               category: "external",
               summary: "SUSE Bug 227827 for CVE-2006-5874",
               url: "https://bugzilla.suse.com/227827",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2006-5874",
      },
      {
         cve: "CVE-2007-0897",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2007-0897",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Clam AntiVirus ClamAV before 0.90 does not close open file descriptors under certain conditions, which allows remote attackers to cause a denial of service (file descriptor consumption and failed scans) via CAB archives with a cabinet header record length of zero, which causes a function to return without closing a file descriptor.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2007-0897",
               url: "https://www.suse.com/security/cve/CVE-2007-0897",
            },
            {
               category: "external",
               summary: "SUSE Bug 246214 for CVE-2007-0897",
               url: "https://bugzilla.suse.com/246214",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2007-0897",
      },
      {
         cve: "CVE-2007-0898",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2007-0898",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Directory traversal vulnerability in clamd in Clam AntiVirus ClamAV before 0.90 allows remote attackers to overwrite arbitrary files via a .. (dot dot) in the id MIME header parameter in a multi-part message.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2007-0898",
               url: "https://www.suse.com/security/cve/CVE-2007-0898",
            },
            {
               category: "external",
               summary: "SUSE Bug 246214 for CVE-2007-0898",
               url: "https://bugzilla.suse.com/246214",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2007-0898",
      },
      {
         cve: "CVE-2007-1745",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2007-1745",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The chm_decompress_stream function in libclamav/chmunpack.c in Clam AntiVirus (ClamAV) before 0.90.2 leaks file descriptors, which has unknown impact and attack vectors involving a crafted CHM file, a different vulnerability than CVE-2007-0897.  NOTE: some of these details are obtained from third party information.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2007-1745",
               url: "https://www.suse.com/security/cve/CVE-2007-1745",
            },
            {
               category: "external",
               summary: "SUSE Bug 264189 for CVE-2007-1745",
               url: "https://bugzilla.suse.com/264189",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2007-1745",
      },
      {
         cve: "CVE-2007-1997",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2007-1997",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Integer signedness error in the (1) cab_unstore and (2) cab_extract functions in libclamav/cab.c in Clam AntiVirus (ClamAV) before 0.90.2 allow remote attackers to execute arbitrary code via a crafted CHM file that contains a negative integer, which passes a signed comparison and leads to a stack-based buffer overflow.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2007-1997",
               url: "https://www.suse.com/security/cve/CVE-2007-1997",
            },
            {
               category: "external",
               summary: "SUSE Bug 264189 for CVE-2007-1997",
               url: "https://bugzilla.suse.com/264189",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2007-1997",
      },
      {
         cve: "CVE-2007-6335",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2007-6335",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Integer overflow in libclamav in ClamAV before 0.92 allows remote attackers to execute arbitrary code via a crafted MEW packed PE file, which triggers a heap-based buffer overflow.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2007-6335",
               url: "https://www.suse.com/security/cve/CVE-2007-6335",
            },
            {
               category: "external",
               summary: "SUSE Bug 343277 for CVE-2007-6335",
               url: "https://bugzilla.suse.com/343277",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2007-6335",
      },
      {
         cve: "CVE-2007-6336",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2007-6336",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Off-by-one error in ClamAV before 0.92 allows remote attackers to execute arbitrary code via a crafted MS-ZIP compressed CAB file.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2007-6336",
               url: "https://www.suse.com/security/cve/CVE-2007-6336",
            },
            {
               category: "external",
               summary: "SUSE Bug 343277 for CVE-2007-6336",
               url: "https://bugzilla.suse.com/343277",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2007-6336",
      },
      {
         cve: "CVE-2007-6337",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2007-6337",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Unspecified vulnerability in the bzip2 decompression algorithm in nsis/bzlib_private.h in ClamAV before 0.92 has unknown impact and remote attack vectors.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2007-6337",
               url: "https://www.suse.com/security/cve/CVE-2007-6337",
            },
            {
               category: "external",
               summary: "SUSE Bug 343277 for CVE-2007-6337",
               url: "https://bugzilla.suse.com/343277",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "critical",
            },
         ],
         title: "CVE-2007-6337",
      },
      {
         cve: "CVE-2007-6595",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2007-6595",
            },
         ],
         notes: [
            {
               category: "general",
               text: "ClamAV 0.92 allows local users to overwrite arbitrary files via a symlink attack on (1) temporary files used by the cli_gentempfd function in libclamav/others.c or on (2) .ascii files used by sigtool, when utf16-decode is enabled.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2007-6595",
               url: "https://www.suse.com/security/cve/CVE-2007-6595",
            },
            {
               category: "external",
               summary: "SUSE Bug 350987 for CVE-2007-6595",
               url: "https://bugzilla.suse.com/350987",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "low",
            },
         ],
         title: "CVE-2007-6595",
      },
      {
         cve: "CVE-2007-6596",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2007-6596",
            },
         ],
         notes: [
            {
               category: "general",
               text: "ClamAV 0.92 does not recognize Base64 UUEncoded archives, which allows remote attackers to bypass the scanner via a Base64-UUEncoded file.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2007-6596",
               url: "https://www.suse.com/security/cve/CVE-2007-6596",
            },
            {
               category: "external",
               summary: "SUSE Bug 350987 for CVE-2007-6596",
               url: "https://bugzilla.suse.com/350987",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2007-6596",
      },
      {
         cve: "CVE-2008-0318",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2008-0318",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Integer overflow in the cli_scanpe function in libclamav in ClamAV before 0.92.1, as used in clamd, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted Petite packed PE file, which triggers a heap-based buffer overflow.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2008-0318",
               url: "https://www.suse.com/security/cve/CVE-2008-0318",
            },
            {
               category: "external",
               summary: "SUSE Bug 361374 for CVE-2008-0318",
               url: "https://bugzilla.suse.com/361374",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "critical",
            },
         ],
         title: "CVE-2008-0318",
      },
      {
         cve: "CVE-2008-0728",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2008-0728",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The unmew11 function in libclamav/mew.c in libclamav in ClamAV before 0.92.1 has unknown impact and attack vectors that trigger \"heap corruption.\"",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2008-0728",
               url: "https://www.suse.com/security/cve/CVE-2008-0728",
            },
            {
               category: "external",
               summary: "SUSE Bug 361403 for CVE-2008-0728",
               url: "https://bugzilla.suse.com/361403",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "critical",
            },
         ],
         title: "CVE-2008-0728",
      },
      {
         cve: "CVE-2008-1100",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2008-1100",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Buffer overflow in the cli_scanpe function in libclamav (libclamav/pe.c) for ClamAV 0.92 and 0.92.1 allows remote attackers to execute arbitrary code via a crafted Upack PE file.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2008-1100",
               url: "https://www.suse.com/security/cve/CVE-2008-1100",
            },
            {
               category: "external",
               summary: "SUSE Bug 368963 for CVE-2008-1100",
               url: "https://bugzilla.suse.com/368963",
            },
            {
               category: "external",
               summary: "SUSE Bug 379695 for CVE-2008-1100",
               url: "https://bugzilla.suse.com/379695",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "critical",
            },
         ],
         title: "CVE-2008-1100",
      },
      {
         cve: "CVE-2008-2713",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2008-2713",
            },
         ],
         notes: [
            {
               category: "general",
               text: "libclamav/petite.c in ClamAV before 0.93.1 allows remote attackers to cause a denial of service via a crafted Petite file that triggers an out-of-bounds read.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2008-2713",
               url: "https://www.suse.com/security/cve/CVE-2008-2713",
            },
            {
               category: "external",
               summary: "SUSE Bug 399302 for CVE-2008-2713",
               url: "https://bugzilla.suse.com/399302",
            },
            {
               category: "external",
               summary: "SUSE Bug 406994 for CVE-2008-2713",
               url: "https://bugzilla.suse.com/406994",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2008-2713",
      },
      {
         cve: "CVE-2010-1205",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2010-1205",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Buffer overflow in pngpread.c in libpng before 1.2.44 and 1.4.x before 1.4.3, as used in progressive applications, might allow remote attackers to execute arbitrary code via a PNG image that triggers an additional data row.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2010-1205",
               url: "https://www.suse.com/security/cve/CVE-2010-1205",
            },
            {
               category: "external",
               summary: "SUSE Bug 1188284 for CVE-2010-1205",
               url: "https://bugzilla.suse.com/1188284",
            },
            {
               category: "external",
               summary: "SUSE Bug 617866 for CVE-2010-1205",
               url: "https://bugzilla.suse.com/617866",
            },
            {
               category: "external",
               summary: "SUSE Bug 622506 for CVE-2010-1205",
               url: "https://bugzilla.suse.com/622506",
            },
            {
               category: "external",
               summary: "SUSE Bug 639941 for CVE-2010-1205",
               url: "https://bugzilla.suse.com/639941",
            },
            {
               category: "external",
               summary: "SUSE Bug 854395 for CVE-2010-1205",
               url: "https://bugzilla.suse.com/854395",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 9.8,
                  baseSeverity: "CRITICAL",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "critical",
            },
         ],
         title: "CVE-2010-1205",
      },
      {
         cve: "CVE-2012-6706",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2012-6706",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A VMSF_DELTA memory corruption was discovered in unrar before 5.5.5, as used in Sophos Anti-Virus Threat Detection Engine before 3.37.2 and other products, that can lead to arbitrary code execution. An integer overflow can be caused in DataSize+CurChannel. The result is a negative value of the \"DestPos\" variable, which allows the attacker to write out of bounds when setting Mem[DestPos].",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2012-6706",
               url: "https://www.suse.com/security/cve/CVE-2012-6706",
            },
            {
               category: "external",
               summary: "SUSE Bug 1045315 for CVE-2012-6706",
               url: "https://bugzilla.suse.com/1045315",
            },
            {
               category: "external",
               summary: "SUSE Bug 1045490 for CVE-2012-6706",
               url: "https://bugzilla.suse.com/1045490",
            },
            {
               category: "external",
               summary: "SUSE Bug 1053919 for CVE-2012-6706",
               url: "https://bugzilla.suse.com/1053919",
            },
            {
               category: "external",
               summary: "SUSE Bug 1083915 for CVE-2012-6706",
               url: "https://bugzilla.suse.com/1083915",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "critical",
            },
         ],
         title: "CVE-2012-6706",
      },
      {
         cve: "CVE-2017-11423",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2017-11423",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The cabd_read_string function in mspack/cabd.c in libmspack 0.5alpha, as used in ClamAV 0.99.2 and other products, allows remote attackers to cause a denial of service (stack-based buffer over-read and application crash) via a crafted CAB file.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2017-11423",
               url: "https://www.suse.com/security/cve/CVE-2017-11423",
            },
            {
               category: "external",
               summary: "SUSE Bug 1049423 for CVE-2017-11423",
               url: "https://bugzilla.suse.com/1049423",
            },
            {
               category: "external",
               summary: "SUSE Bug 1083915 for CVE-2017-11423",
               url: "https://bugzilla.suse.com/1083915",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2017-11423",
      },
      {
         cve: "CVE-2017-12374",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2017-12374",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of input validation checking mechanisms during certain mail parsing operations (mbox.c operations on bounce messages). If successfully exploited, the ClamAV software could allow a variable pointing to the mail body which could cause a used after being free (use-after-free) instance which may lead to a disruption of services on an affected device to include a denial of service condition.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2017-12374",
               url: "https://www.suse.com/security/cve/CVE-2017-12374",
            },
            {
               category: "external",
               summary: "SUSE Bug 1077732 for CVE-2017-12374",
               url: "https://bugzilla.suse.com/1077732",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2017-12374",
      },
      {
         cve: "CVE-2017-12375",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2017-12375",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of input validation checking mechanisms during certain mail parsing functions (the rfc2047 function in mbox.c). An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted email to the affected device. This action could cause a buffer overflow condition when ClamAV scans the malicious email, allowing the attacker to potentially cause a DoS condition on an affected device.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2017-12375",
               url: "https://www.suse.com/security/cve/CVE-2017-12375",
            },
            {
               category: "external",
               summary: "SUSE Bug 1077732 for CVE-2017-12375",
               url: "https://bugzilla.suse.com/1077732",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.3,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2017-12375",
      },
      {
         cve: "CVE-2017-12376",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2017-12376",
            },
         ],
         notes: [
            {
               category: "general",
               text: "ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or potentially execute arbitrary code on an affected device. The vulnerability is due to improper input validation checking mechanisms when handling Portable Document Format (.pdf) files sent to an affected device. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted .pdf file to an affected device. This action could cause a handle_pdfname (in pdf.c) buffer overflow when ClamAV scans the malicious file, allowing the attacker to cause a DoS condition or potentially execute arbitrary code.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2017-12376",
               url: "https://www.suse.com/security/cve/CVE-2017-12376",
            },
            {
               category: "external",
               summary: "SUSE Bug 1077732 for CVE-2017-12376",
               url: "https://bugzilla.suse.com/1077732",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 9.8,
                  baseSeverity: "CRITICAL",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2017-12376",
      },
      {
         cve: "CVE-2017-12377",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2017-12377",
            },
         ],
         notes: [
            {
               category: "general",
               text: "ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or potentially execute arbitrary code on an affected device. The vulnerability is due to improper input validation checking mechanisms in mew packet files sent to an affected device. A successful exploit could cause a heap-based buffer over-read condition in mew.c when ClamAV scans the malicious file, allowing the attacker to cause a DoS condition or potentially execute arbitrary code on the affected device.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2017-12377",
               url: "https://www.suse.com/security/cve/CVE-2017-12377",
            },
            {
               category: "external",
               summary: "SUSE Bug 1077732 for CVE-2017-12377",
               url: "https://bugzilla.suse.com/1077732",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.3,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2017-12377",
      },
      {
         cve: "CVE-2017-12378",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2017-12378",
            },
         ],
         notes: [
            {
               category: "general",
               text: "ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation checking mechanisms of .tar (Tape Archive) files sent to an affected device. A successful exploit could cause a checksum buffer over-read condition when ClamAV scans the malicious .tar file, potentially allowing the attacker to cause a DoS condition on the affected device.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2017-12378",
               url: "https://www.suse.com/security/cve/CVE-2017-12378",
            },
            {
               category: "external",
               summary: "SUSE Bug 1077732 for CVE-2017-12378",
               url: "https://bugzilla.suse.com/1077732",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.3,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2017-12378",
      },
      {
         cve: "CVE-2017-12379",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2017-12379",
            },
         ],
         notes: [
            {
               category: "general",
               text: "ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or potentially execute arbitrary code on an affected device. The vulnerability is due to improper input validation checking mechanisms in the message parsing function on an affected system. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted email to the affected device. This action could cause a messageAddArgument (in message.c) buffer overflow condition when ClamAV scans the malicious email, allowing the attacker to potentially cause a DoS condition or execute arbitrary code on an affected device.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2017-12379",
               url: "https://www.suse.com/security/cve/CVE-2017-12379",
            },
            {
               category: "external",
               summary: "SUSE Bug 1077732 for CVE-2017-12379",
               url: "https://bugzilla.suse.com/1077732",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.3,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2017-12379",
      },
      {
         cve: "CVE-2017-12380",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2017-12380",
            },
         ],
         notes: [
            {
               category: "general",
               text: "ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation checking mechanisms in mbox.c during certain mail parsing functions of the ClamAV software. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted email to the affected device. An exploit could trigger a NULL pointer dereference condition when ClamAV scans the malicious email, which may result in a DoS condition.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2017-12380",
               url: "https://www.suse.com/security/cve/CVE-2017-12380",
            },
            {
               category: "external",
               summary: "SUSE Bug 1077732 for CVE-2017-12380",
               url: "https://bugzilla.suse.com/1077732",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2017-12380",
      },
      {
         cve: "CVE-2017-6418",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2017-6418",
            },
         ],
         notes: [
            {
               category: "general",
               text: "libclamav/message.c in ClamAV 0.99.2 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted e-mail message.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2017-6418",
               url: "https://www.suse.com/security/cve/CVE-2017-6418",
            },
            {
               category: "external",
               summary: "SUSE Bug 1052466 for CVE-2017-6418",
               url: "https://bugzilla.suse.com/1052466",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.3,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2017-6418",
      },
      {
         cve: "CVE-2017-6419",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2017-6419",
            },
         ],
         notes: [
            {
               category: "general",
               text: "mspack/lzxd.c in libmspack 0.5alpha, as used in ClamAV 0.99.2, allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted CHM file.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2017-6419",
               url: "https://www.suse.com/security/cve/CVE-2017-6419",
            },
            {
               category: "external",
               summary: "SUSE Bug 1052449 for CVE-2017-6419",
               url: "https://bugzilla.suse.com/1052449",
            },
            {
               category: "external",
               summary: "SUSE Bug 1083915 for CVE-2017-6419",
               url: "https://bugzilla.suse.com/1083915",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.1,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2017-6419",
      },
      {
         cve: "CVE-2017-6420",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2017-6420",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The wwunpack function in libclamav/wwunpack.c in ClamAV 0.99.2 allows remote attackers to cause a denial of service (use-after-free) via a crafted PE file with WWPack compression.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2017-6420",
               url: "https://www.suse.com/security/cve/CVE-2017-6420",
            },
            {
               category: "external",
               summary: "SUSE Bug 1052448 for CVE-2017-6420",
               url: "https://bugzilla.suse.com/1052448",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2017-6420",
      },
      {
         cve: "CVE-2018-0202",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-0202",
            },
         ],
         notes: [
            {
               category: "general",
               text: "clamscan in ClamAV before 0.99.4 contains a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation checking mechanisms when handling Portable Document Format (.pdf) files sent to an affected device. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted .pdf file to an affected device. This action could cause an out-of-bounds read when ClamAV scans the malicious file, allowing the attacker to cause a DoS condition. This concerns pdf_parse_array and pdf_parse_string in libclamav/pdfng.c. Cisco Bug IDs: CSCvh91380, CSCvh91400.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-0202",
               url: "https://www.suse.com/security/cve/CVE-2018-0202",
            },
            {
               category: "external",
               summary: "SUSE Bug 1083915 for CVE-2018-0202",
               url: "https://bugzilla.suse.com/1083915",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.6,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2018-0202",
      },
      {
         cve: "CVE-2018-0360",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-0360",
            },
         ],
         notes: [
            {
               category: "general",
               text: "ClamAV before 0.100.1 has an HWP integer overflow with a resultant infinite loop via a crafted Hangul Word Processor file. This is in parsehwp3_paragraph() in libclamav/hwp.c.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-0360",
               url: "https://www.suse.com/security/cve/CVE-2018-0360",
            },
            {
               category: "external",
               summary: "SUSE Bug 1101410 for CVE-2018-0360",
               url: "https://bugzilla.suse.com/1101410",
            },
            {
               category: "external",
               summary: "SUSE Bug 1103091 for CVE-2018-0360",
               url: "https://bugzilla.suse.com/1103091",
            },
            {
               category: "external",
               summary: "SUSE Bug 1103092 for CVE-2018-0360",
               url: "https://bugzilla.suse.com/1103092",
            },
            {
               category: "external",
               summary: "SUSE Bug 1103099 for CVE-2018-0360",
               url: "https://bugzilla.suse.com/1103099",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2018-0360",
      },
      {
         cve: "CVE-2018-0361",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-0361",
            },
         ],
         notes: [
            {
               category: "general",
               text: "ClamAV before 0.100.1 lacks a PDF object length check, resulting in an unreasonably long time to parse a relatively small file.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-0361",
               url: "https://www.suse.com/security/cve/CVE-2018-0361",
            },
            {
               category: "external",
               summary: "SUSE Bug 1101410 for CVE-2018-0361",
               url: "https://bugzilla.suse.com/1101410",
            },
            {
               category: "external",
               summary: "SUSE Bug 1101412 for CVE-2018-0361",
               url: "https://bugzilla.suse.com/1101412",
            },
            {
               category: "external",
               summary: "SUSE Bug 1103091 for CVE-2018-0361",
               url: "https://bugzilla.suse.com/1103091",
            },
            {
               category: "external",
               summary: "SUSE Bug 1103092 for CVE-2018-0361",
               url: "https://bugzilla.suse.com/1103092",
            },
            {
               category: "external",
               summary: "SUSE Bug 1103099 for CVE-2018-0361",
               url: "https://bugzilla.suse.com/1103099",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.3,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2018-0361",
      },
      {
         cve: "CVE-2018-1000085",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-1000085",
            },
         ],
         notes: [
            {
               category: "general",
               text: "ClamAV version version 0.99.3 contains a Out of bounds heap memory read vulnerability in XAR parser, function xar_hash_check() that can result in Leaking of memory, may help in developing exploit chains.. This attack appear to be exploitable via The victim must scan a crafted XAR file. This vulnerability appears to have been fixed in after commit d96a6b8bcc7439fa7e3876207aa0a8e79c8451b6.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-1000085",
               url: "https://www.suse.com/security/cve/CVE-2018-1000085",
            },
            {
               category: "external",
               summary: "SUSE Bug 1082858 for CVE-2018-1000085",
               url: "https://bugzilla.suse.com/1082858",
            },
            {
               category: "external",
               summary: "SUSE Bug 1083915 for CVE-2018-1000085",
               url: "https://bugzilla.suse.com/1083915",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2018-1000085",
      },
      {
         cve: "CVE-2018-14680",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-14680",
            },
         ],
         notes: [
            {
               category: "general",
               text: "An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. It does not reject blank CHM filenames.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-14680",
               url: "https://www.suse.com/security/cve/CVE-2018-14680",
            },
            {
               category: "external",
               summary: "SUSE Bug 1102922 for CVE-2018-14680",
               url: "https://bugzilla.suse.com/1102922",
            },
            {
               category: "external",
               summary: "SUSE Bug 1103032 for CVE-2018-14680",
               url: "https://bugzilla.suse.com/1103032",
            },
            {
               category: "external",
               summary: "SUSE Bug 1103040 for CVE-2018-14680",
               url: "https://bugzilla.suse.com/1103040",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4.4,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2018-14680",
      },
      {
         cve: "CVE-2018-15378",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-15378",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A vulnerability in ClamAV versions prior to 0.100.2 could allow an attacker to cause a denial of service (DoS) condition. The vulnerability is due to an error related to the MEW unpacker within the \"unmew11()\" function (libclamav/mew.c), which can be exploited to trigger an invalid read memory access via a specially crafted EXE file.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-15378",
               url: "https://www.suse.com/security/cve/CVE-2018-15378",
            },
            {
               category: "external",
               summary: "SUSE Bug 1110723 for CVE-2018-15378",
               url: "https://bugzilla.suse.com/1110723",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2018-15378",
      },
      {
         cve: "CVE-2019-12625",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-12625",
            },
         ],
         notes: [
            {
               category: "general",
               text: "ClamAV versions prior to 0.101.3 are susceptible to a zip bomb vulnerability where an unauthenticated attacker can cause a denial of service condition by sending crafted messages to an affected system.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-12625",
               url: "https://www.suse.com/security/cve/CVE-2019-12625",
            },
            {
               category: "external",
               summary: "SUSE Bug 1144504 for CVE-2019-12625",
               url: "https://bugzilla.suse.com/1144504",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2019-12625",
      },
      {
         cve: "CVE-2019-12900",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-12900",
            },
         ],
         notes: [
            {
               category: "general",
               text: "BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-12900",
               url: "https://www.suse.com/security/cve/CVE-2019-12900",
            },
            {
               category: "external",
               summary: "SUSE Bug 1139083 for CVE-2019-12900",
               url: "https://bugzilla.suse.com/1139083",
            },
            {
               category: "external",
               summary: "SUSE Bug 1141513 for CVE-2019-12900",
               url: "https://bugzilla.suse.com/1141513",
            },
            {
               category: "external",
               summary: "SUSE Bug 1149458 for CVE-2019-12900",
               url: "https://bugzilla.suse.com/1149458",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.4,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2019-12900",
      },
      {
         cve: "CVE-2019-15961",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-15961",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A vulnerability in the email parsing module Clam AntiVirus (ClamAV) Software versions 0.102.0, 0.101.4 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to inefficient MIME parsing routines that result in extremely long scan times of specially formatted email files. An attacker could exploit this vulnerability by sending a crafted email file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to scan the crafted email file indefinitely, resulting in a denial of service condition.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-15961",
               url: "https://www.suse.com/security/cve/CVE-2019-15961",
            },
            {
               category: "external",
               summary: "SUSE Bug 1157763 for CVE-2019-15961",
               url: "https://bugzilla.suse.com/1157763",
            },
            {
               category: "external",
               summary: "SUSE Bug 1180082 for CVE-2019-15961",
               url: "https://bugzilla.suse.com/1180082",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2019-15961",
      },
      {
         cve: "CVE-2019-1785",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-1785",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A vulnerability in the RAR file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and 0.101.0 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper error-handling mechanisms when processing nested RAR files sent to an affected device. An attacker could exploit this vulnerability by sending a crafted RAR file to an affected device. An exploit could allow the attacker to view or create arbitrary files on the targeted system.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-1785",
               url: "https://www.suse.com/security/cve/CVE-2019-1785",
            },
            {
               category: "external",
               summary: "SUSE Bug 1130721 for CVE-2019-1785",
               url: "https://bugzilla.suse.com/1130721",
            },
            {
               category: "external",
               summary: "SUSE Bug 1137508 for CVE-2019-1785",
               url: "https://bugzilla.suse.com/1137508",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "low",
            },
         ],
         title: "CVE-2019-1785",
      },
      {
         cve: "CVE-2019-1786",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-1786",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A vulnerability in the Portable Document Format (PDF) scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and 0.101.0 could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of proper data handling mechanisms within the device buffer while indexing remaining file data on an affected device. An attacker could exploit this vulnerability by sending crafted PDF files to an affected device. A successful exploit could allow the attacker to cause an out-of-bounds read condition, resulting in a crash that could result in a denial of service condition on an affected device.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-1786",
               url: "https://www.suse.com/security/cve/CVE-2019-1786",
            },
            {
               category: "external",
               summary: "SUSE Bug 1130721 for CVE-2019-1786",
               url: "https://bugzilla.suse.com/1130721",
            },
            {
               category: "external",
               summary: "SUSE Bug 1137510 for CVE-2019-1786",
               url: "https://bugzilla.suse.com/1137510",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.3,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2019-1786",
      },
      {
         cve: "CVE-2019-1787",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-1787",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A vulnerability in the Portable Document Format (PDF) scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of proper data handling mechanisms within the device buffer while indexing remaining file data on an affected device. An attacker could exploit this vulnerability by sending crafted PDF files to an affected device. A successful exploit could allow the attacker to cause a heap buffer out-of-bounds read condition, resulting in a crash that could result in a denial of service condition on an affected device.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-1787",
               url: "https://www.suse.com/security/cve/CVE-2019-1787",
            },
            {
               category: "external",
               summary: "SUSE Bug 1130721 for CVE-2019-1787",
               url: "https://bugzilla.suse.com/1130721",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.3,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2019-1787",
      },
      {
         cve: "CVE-2019-1788",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-1788",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A vulnerability in the Object Linking & Embedding (OLE2) file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper input and validation checking mechanisms for OLE2 files sent an affected device. An attacker could exploit this vulnerability by sending malformed OLE2 files to the device running an affected version ClamAV Software. An exploit could allow the attacker to cause an out-of-bounds write condition, resulting in a crash that could result in a denial of service condition on an affected device.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-1788",
               url: "https://www.suse.com/security/cve/CVE-2019-1788",
            },
            {
               category: "external",
               summary: "SUSE Bug 1130721 for CVE-2019-1788",
               url: "https://bugzilla.suse.com/1130721",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.2,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2019-1788",
      },
      {
         cve: "CVE-2019-1789",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-1789",
            },
         ],
         notes: [
            {
               category: "general",
               text: "ClamAV versions prior to 0.101.2 are susceptible to a denial of service (DoS) vulnerability. An out-of-bounds heap read condition may occur when scanning PE files. An example is Windows EXE and DLL files that have been packed using Aspack as a result of inadequate bound-checking.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-1789",
               url: "https://www.suse.com/security/cve/CVE-2019-1789",
            },
            {
               category: "external",
               summary: "SUSE Bug 1130721 for CVE-2019-1789",
               url: "https://bugzilla.suse.com/1130721",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.3,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2019-1789",
      },
      {
         cve: "CVE-2019-1798",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-1798",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A vulnerability in the Portable Executable (PE) file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper input and validation checking mechanisms for PE files sent an affected device. An attacker could exploit this vulnerability by sending malformed PE files to the device running an affected version ClamAV Software. An exploit could allow the attacker to cause an out-of-bounds read condition, resulting in a crash that could result in a denial of service condition on an affected device.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-1798",
               url: "https://www.suse.com/security/cve/CVE-2019-1798",
            },
            {
               category: "external",
               summary: "SUSE Bug 1130721 for CVE-2019-1798",
               url: "https://bugzilla.suse.com/1130721",
            },
            {
               category: "external",
               summary: "SUSE Bug 1137513 for CVE-2019-1798",
               url: "https://bugzilla.suse.com/1137513",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2019-1798",
      },
      {
         cve: "CVE-2020-3123",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2020-3123",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A vulnerability in the Data-Loss-Prevention (DLP) module in Clam AntiVirus (ClamAV) Software versions 0.102.1 and 0.102.0 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to an out-of-bounds read affecting users that have enabled the optional DLP feature. An attacker could exploit this vulnerability by sending a crafted email file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2020-3123",
               url: "https://www.suse.com/security/cve/CVE-2020-3123",
            },
            {
               category: "external",
               summary: "SUSE Bug 1162921 for CVE-2020-3123",
               url: "https://bugzilla.suse.com/1162921",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2020-3123",
      },
      {
         cve: "CVE-2020-3327",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2020-3327",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A vulnerability in the ARJ archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.102.2 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a heap buffer overflow read. An attacker could exploit this vulnerability by sending a crafted ARJ file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2020-3327",
               url: "https://www.suse.com/security/cve/CVE-2020-3327",
            },
            {
               category: "external",
               summary: "SUSE Bug 1171980 for CVE-2020-3327",
               url: "https://bugzilla.suse.com/1171980",
            },
            {
               category: "external",
               summary: "SUSE Bug 1174250 for CVE-2020-3327",
               url: "https://bugzilla.suse.com/1174250",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2020-3327",
      },
      {
         cve: "CVE-2020-3341",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2020-3341",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A vulnerability in the PDF archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.101 - 0.102.2 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a stack buffer overflow read. An attacker could exploit this vulnerability by sending a crafted PDF file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2020-3341",
               url: "https://www.suse.com/security/cve/CVE-2020-3341",
            },
            {
               category: "external",
               summary: "SUSE Bug 1171981 for CVE-2020-3341",
               url: "https://bugzilla.suse.com/1171981",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.4,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2020-3341",
      },
      {
         cve: "CVE-2020-3350",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2020-3350",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A vulnerability in the endpoint software of Cisco AMP for Endpoints and Clam AntiVirus could allow an authenticated, local attacker to cause the running software to delete arbitrary files on the system. The vulnerability is due to a race condition that could occur when scanning malicious files. An attacker with local shell access could exploit this vulnerability by executing a script that could trigger the race condition. A successful exploit could allow the attacker to delete arbitrary files on the system that the attacker would not normally have privileges to delete, producing system instability or causing the endpoint software to stop working.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2020-3350",
               url: "https://www.suse.com/security/cve/CVE-2020-3350",
            },
            {
               category: "external",
               summary: "SUSE Bug 1174250 for CVE-2020-3350",
               url: "https://bugzilla.suse.com/1174250",
            },
            {
               category: "external",
               summary: "SUSE Bug 1174255 for CVE-2020-3350",
               url: "https://bugzilla.suse.com/1174255",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 6.3,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2020-3350",
      },
      {
         cve: "CVE-2020-3481",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2020-3481",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A vulnerability in the EGG archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.102.0 - 0.102.3 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a null pointer dereference. An attacker could exploit this vulnerability by sending a crafted EGG file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2020-3481",
               url: "https://www.suse.com/security/cve/CVE-2020-3481",
            },
            {
               category: "external",
               summary: "SUSE Bug 1174250 for CVE-2020-3481",
               url: "https://bugzilla.suse.com/1174250",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2020-3481",
      },
      {
         cve: "CVE-2021-1252",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2021-1252",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A vulnerability in the Excel XLM macro parsing module in Clam AntiVirus (ClamAV) Software versions 0.103.0 and 0.103.1 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper error handling that may result in an infinite loop. An attacker could exploit this vulnerability by sending a crafted Excel file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process hang, resulting in a denial of service condition.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2021-1252",
               url: "https://www.suse.com/security/cve/CVE-2021-1252",
            },
            {
               category: "external",
               summary: "SUSE Bug 1184532 for CVE-2021-1252",
               url: "https://bugzilla.suse.com/1184532",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2021-1252",
      },
      {
         cve: "CVE-2021-1404",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2021-1404",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A vulnerability in the PDF parsing module in Clam AntiVirus (ClamAV) Software versions 0.103.0 and 0.103.1 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper buffer size tracking that may result in a heap buffer over-read. An attacker could exploit this vulnerability by sending a crafted PDF file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to crash, resulting in a denial of service condition.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2021-1404",
               url: "https://www.suse.com/security/cve/CVE-2021-1404",
            },
            {
               category: "external",
               summary: "SUSE Bug 1184533 for CVE-2021-1404",
               url: "https://bugzilla.suse.com/1184533",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2021-1404",
      },
      {
         cve: "CVE-2021-1405",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2021-1405",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A vulnerability in the email parsing module in Clam AntiVirus (ClamAV) Software version 0.103.1 and all prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper variable initialization that may result in an NULL pointer read. An attacker could exploit this vulnerability by sending a crafted email to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
               "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2021-1405",
               url: "https://www.suse.com/security/cve/CVE-2021-1405",
            },
            {
               category: "external",
               summary: "SUSE Bug 1184534 for CVE-2021-1405",
               url: "https://bugzilla.suse.com/1184534",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x",
                  "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2021-1405",
      },
   ],
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.