<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">clamav-1.4.3-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2025:15211-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-07-03T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-07-03T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-07-03T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">clamav-1.4.3-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the clamav-1.4.3-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2025-15211</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-20234/</URL>
      <Description>SUSE CVE CVE-2025-20234 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-20260/</URL>
      <Description>SUSE CVE CVE-2025-20260 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="clamav-1.4.3-1.1">
      <FullProductName ProductID="clamav-1.4.3-1.1">clamav-1.4.3-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="clamav-devel-1.4.3-1.1">
      <FullProductName ProductID="clamav-devel-1.4.3-1.1">clamav-devel-1.4.3-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="clamav-docs-html-1.4.3-1.1">
      <FullProductName ProductID="clamav-docs-html-1.4.3-1.1">clamav-docs-html-1.4.3-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="clamav-milter-1.4.3-1.1">
      <FullProductName ProductID="clamav-milter-1.4.3-1.1">clamav-milter-1.4.3-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libclamav12-1.4.3-1.1">
      <FullProductName ProductID="libclamav12-1.4.3-1.1">libclamav12-1.4.3-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libclammspack0-1.4.3-1.1">
      <FullProductName ProductID="libclammspack0-1.4.3-1.1">libclammspack0-1.4.3-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libfreshclam3-1.4.3-1.1">
      <FullProductName ProductID="libfreshclam3-1.4.3-1.1">libfreshclam3-1.4.3-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="clamav-1.4.3-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:clamav-1.4.3-1.1">clamav-1.4.3-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="clamav-devel-1.4.3-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:clamav-devel-1.4.3-1.1">clamav-devel-1.4.3-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="clamav-docs-html-1.4.3-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:clamav-docs-html-1.4.3-1.1">clamav-docs-html-1.4.3-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="clamav-milter-1.4.3-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:clamav-milter-1.4.3-1.1">clamav-milter-1.4.3-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libclamav12-1.4.3-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libclamav12-1.4.3-1.1">libclamav12-1.4.3-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libclammspack0-1.4.3-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libclammspack0-1.4.3-1.1">libclammspack0-1.4.3-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libfreshclam3-1.4.3-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libfreshclam3-1.4.3-1.1">libfreshclam3-1.4.3-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability in Universal Disk Format (UDF) processing of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.

This vulnerability is due to a memory overread during UDF file scanning. An attacker could exploit this vulnerability by submitting a crafted file containing UDF content to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to terminate the ClamAV scanning process, resulting in a DoS condition on the affected software.
For a description of this vulnerability, see the .</Note>
    </Notes>
    <CVE>CVE-2025-20234</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-1.4.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-1.4.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-docs-html-1.4.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-1.4.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav12-1.4.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libclammspack0-1.4.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam3-1.4.3-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-20234.html</URL>
        <Description>CVE-2025-20234</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1245055</URL>
        <Description>SUSE Bug 1245055</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability in the PDF scanning processes of ClamAV could allow an unauthenticated, remote attacker to cause a buffer overflow condition, cause a denial of service (DoS) condition, or execute arbitrary code on an affected device.

This vulnerability exists because memory buffers are allocated incorrectly when PDF files are processed. An attacker could exploit this vulnerability by submitting a crafted PDF file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to trigger a buffer overflow, likely resulting in the termination of the ClamAV scanning process and a DoS condition on the affected software. Although unproven, there is also a possibility that an attacker could leverage the buffer overflow to execute arbitrary code with the privileges of the ClamAV process.</Note>
    </Notes>
    <CVE>CVE-2025-20260</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:clamav-1.4.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-devel-1.4.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-docs-html-1.4.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:clamav-milter-1.4.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libclamav12-1.4.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libclammspack0-1.4.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreshclam3-1.4.3-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-20260.html</URL>
        <Description>CVE-2025-20260</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1245054</URL>
        <Description>SUSE Bug 1245054</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
