Well, that can take a little figuring out since the package is
maintained by SUSE. A package can receive "backports" to fix
vulnerabilities (and new features) so they don't have to update to a
new version and re-certify everything still works and won't break
other packages.

SUSE does publish info with their updates:
https://www.suse.com/support/update/announcement/2019/suse-su-20190897-1/

*Usually* package maintainers are pretty quick to publish updates for
security vulnerabilities.

> Running on SUSE sles 12 sp2 servers.
>
> rpm -qa | grep clamav
> clamav-0.100.3-33.21.1.x86_64
>
> This is what i call the engine.  The actual version af clamav proccess
> active on my server.
>
> I just want to know how to figure out  if this build has known
> vulnerabillities.
>
> Like "can it be forced to crash by inserting infection patterns" or "can
> it be forced to loop in a scan cycle, so scan newer completes".
>
> And If there is known issues. How to fix or mittigate.

_______________________________________________

clamav-users mailing list
clamav-users@lists.clamav.net
https://lists.clamav.net/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to