From ${URL} : The wwunpack function in libclamav/wwunpack.c in ClamAV 0.99.2 allows remote attackers to cause a denial of service (use-after-free) via a crafted PE file with WWPack compression. Upstream patch: https://github.com/vrtadmin/clamav-devel/commit/dfc00cd3301a42b571454b51a6102eecf58407bc @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
The fix (https://github.com/Cisco-Talos/clamav-devel/commit/4fe1d1852600113d7a97f8b50908bad05c5aae91#diff-f3c3a9e99ea39b9116c12365b5826cf0) is in clamav-0.99.4 (code was changed later via https://github.com/Cisco-Talos/clamav-devel/commit/e0904c51f5480e213c150fd1d24d6c27c0f64ede#diff-f3c3a9e99ea39b9116c12365b5826cf0).
This issue was resolved and addressed in GLSA 201804-16 at https://security.gentoo.org/glsa/201804-16 by GLSA coordinator Aaron Bauman (b-man).