Every product is different as to whether or not they provide security patches for older versions or how far back they patch.
For ClamAV, our development team is very small and we have a lot on our plates so we typically only provide security patches for the current feature release. Right now, our current feature release is 0.101, published Dec 2018. 0.101 introduced some library API changes that made it harder to adopt than usual. For this reason, we made the decision to backport the security fixes found in 0.101.2 and released these for 0.100 users in the 0.100.3 patch release. Next week, if all goes to plan, we will publish the 0.101.3 security patch and the 0.102-beta. We have *no plans* to publish any more security patches for 0.100. If you depend on your Linux distro to provide ClamAV, please help them create & test the 0.101.3 package so it gets into distribution faster. Otherwise, we encourage you to build & install ClamAV from source. In the future, we'd love to provide Linux users with the option to install ClamAV from Snapcraft, but unfortunately we still have some more release engineering improvements to do before that will be a reality. On the topic of "newer is always better": The next feature release (0.102) will require libcurl version 7.45 or newer in order to compile/use the new on-access scanning client (`clamonacc`) because 7.45+ provides a required feature. In testing we've found that in most cases only the latest Linux distro major versions provide a new enough libcurl version. For context, the libcurl version we require was released on 7 Oct 2015, nearly 4 years ago and libcurl has seen some 50-odd CVE fixes since then*. I'm under the impression that in most cases, package maintainers cherry-pick the security fixes to older versions for their distributions though I'm not tuned in enough to know if that's true for every Linux distribution or every package. In any case, 4 years is a long time to go without an update in the software world - so we're not feeling too bad about this new requirement. Users who build ClamAV from source on older Linux distributions may have to build libcurl from source first -- which is a relatively straightforward process. *Libcurl security fix reference: https://curl.haxx.se/docs/security.html. -Micah Micah Snyder ClamAV Development Talos Cisco Systems, Inc. On 8/4/19, 3:13 PM, "clamav-users on behalf of Joel Esler (jesler) via clamav-users" <clamav-users-boun...@lists.clamav.net on behalf of clamav-users@lists.clamav.net> wrote: That’s a pretty broad statement. As a security minded person, I’d think you’d want software that was the most patched against any possible vulnerabilities. Sent from my iPhone > On Aug 4, 2019, at 10:15, Matus UHLAR - fantomas <uh...@fantomas.sk> wrote: > > There is no point of havine newest version of any software available. _______________________________________________ clamav-users mailing list clamav-users@lists.clamav.net https://lists.clamav.net/mailman/listinfo/clamav-users Help us build a comprehensive ClamAV guide: https://github.com/vrtadmin/clamav-faq http://www.clamav.net/contact.html#ml