From ${URL} : The cabd_read_string function in mspack/cabd.c in libmspack 0.5alpha, as used in ClamAV 0.99.2 and other products, allows remote attackers to cause a denial of service (stack-based buffer over-read and application crash) via a crafted CAB file. Reference: https://github.com/hackerlib/hackerlib-vul/tree/master/clamav-vul Upstream bug: https://bugzilla.clamav.net/show_bug.cgi?id=11873 @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
This vulnerability (CVE-2017-11423) exists in libclamav/libmspack-0.5alpha/mspack/cabd.c in Clamav's upstream git development repo (https://github.com/vrtadmin/clamav-devel). However, the libclamav/libmspack-0.5alpha directory does not exist in ClamAV 0.99.2 (released April 2016), it was added later. Therefore, this vulnerability does not appear to apply to 0.99.2. However, Clamav 0.99.2 does include 2 files libclamav/mspack.c and libclamav/mspack.h which "includes code from libmspack adapted for libclamav" as stated at the top of the files. I don't know if the vulnerability exists in these adaptions.
While this is fixed in clamav-0.99.4, package should be converted to use "--with-system-libmspack" to use dev-libs/libmspack.
I just checked .. but I cannot see anything related to using system libmspack in 0.99.4
For the moment, we are going with clamav-0.99.4 which is still bundling (now fixed) libraries. The unbundling will be tracked in bug 649394.
*** Bug 649328 has been marked as a duplicate of this bug. ***
https://blog.clamav.net/2018/04/clamav-01000-has-been-released.html ;) has --with-system-libmspack
This issue was resolved and addressed in GLSA 201804-16 at https://security.gentoo.org/glsa/201804-16 by GLSA coordinator Aaron Bauman (b-man).