Browse code

Merge pull request #1553 from val-ms/CLAM-2809-1.5.0-rc-and-news

News for the 1.5.0-rc, Set the -rc version suffix, Add prod CVD signing public cert

Val S. authored on 2025/08/20 05:32:33
Showing 5 changed files
... ...
@@ -19,7 +19,7 @@ cmake_policy(SET CMP0087 NEW) # support generator expressions in install(CODE) a
19 19
 #  For release candidate:     set(VERSION_SUFFIX "-rc")
20 20
 #  For release:               set(VERSION_SUFFIX "")
21 21
 string(TIMESTAMP TODAY "%Y%m%d")
22
-set(VERSION_SUFFIX "-beta")
22
+set(VERSION_SUFFIX "-rc")
23 23
 
24 24
 project( ClamAV
25 25
          VERSION "1.5.0"
... ...
@@ -11,51 +11,73 @@ ClamAV 1.5.0 includes the following improvements and changes:
11 11
 
12 12
 - Added checks to determine if an OLE2-based Microsoft Office document is
13 13
   encrypted.
14
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1295)
15 14
 
16
-- Added the ability to record URLs found in HTML if the generate-JSON-metadata
15
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1295)
16
+
17
+- Added the ability to record URIs found in HTML if the generate-JSON-metadata
18
+  feature is enabled.
19
+  Also adds an option to disable this in case you want the JSON metadata
20
+  feature but do not want to record HTML URIs.
21
+  The ClamScan command-line option is `--json-store-html-uris=no`.
22
+  The `clamd.conf` config option is `JsonStoreHTMLURIs no`.
23
+  The libclamav general scan option is `CL_SCAN_GENERAL_STORE_HTML_URIS`
24
+
25
+  [GitHub pull request #1](https://github.com/Cisco-Talos/clamav/pull/1281)
26
+
27
+  [GitHub pull request #2](https://github.com/Cisco-Talos/clamav/pull/1482)
28
+
29
+  [GitHub pull request #3](https://github.com/Cisco-Talos/clamav/pull/1514)
30
+
31
+- Added the ability to record URIs found in PDFs if the generate-JSON-metadata
17 32
   feature is enabled.
18 33
   Also adds an option to disable this in case you want the JSON metadata
19
-  feature but don't want to record HTML URLs.
20
-  The ClamScan command-line option is `--json-store-html-urls=no`.
21
-  The `clamd.conf` config option is `JsonStoreHTMLUrls no`.
22
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1281)
34
+  feature but do not want to record PDF URIs.
35
+  The ClamScan command-line option is `--json-store-pdf-uris=no`.
36
+  The `clamd.conf` config option is `JsonStorePDFURIs no`.
37
+  The libclamav general scan option is `CL_SCAN_GENERAL_STORE_PDF_URIS`
38
+
39
+  [GitHub pull request #1](https://github.com/Cisco-Talos/clamav/pull/1482)
40
+
41
+  [GitHub pull request #2](https://github.com/Cisco-Talos/clamav/pull/1514)
23 42
 
24 43
 - Added regex support for the `clamd.conf` `OnAccessExcludePath` config option.
25 44
   This change courtesy of GitHub user b1tg.
26
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1314)
27 45
 
28
-- Added FIPS-compliant CVD signing/verification with external `.sign` files.
46
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1314)
47
+
48
+- Added CVD signing/verification with external `.sign` files.
29 49
 
30 50
   Freshclam will now attempt to download external signature files to accompany
31 51
   existing `.cvd` databases and `.cdiff` patch files. Sigtool now has commands
32 52
   to sign and verify using the external signatures.
33 53
 
34 54
   ClamAV now installs a 'certs' directory in the app config directory
35
-  (e.g. `<prefix>/etc/certs`). The install path is configurable.
36
-  The CMake option to configure the CVD certs directory is:
55
+  (e.g., `<prefix>/etc/certs`). The install path is configurable.
56
+  The CMake option to configure the CVD certs directory is
37 57
   `-D CVD_CERTS_DIRECTORY=PATH`
38 58
 
39 59
   New options to set an alternative CVD certs directory:
40
-  - The command-line option for Freshclam, ClamD, ClamScan, and Sigtool is:
60
+  - The command-line option for Freshclam, ClamD, ClamScan, and Sigtool is
41 61
     `--cvdcertsdir PATH`
42
-  - The environment variable for Freshclam, ClamD, ClamScan, and Sigtool is:
62
+  - The environment variable for Freshclam, ClamD, ClamScan, and Sigtool is
43 63
     `CVD_CERTS_DIR`
44
-  - The config option for Freshclam and ClamD is:
64
+  - The config option for Freshclam and ClamD is
45 65
     `CVDCertsDirectory PATH`
46 66
 
47 67
   Added two new APIs to the public clamav.h header:
48
-    ```c
49
-    extern cl_error_t cl_cvdverify_ex(const char *file,
50
-                                      const char *certs_directory,
51
-                                      uint32_t dboptions);
52
-
53
-    extern cl_error_t cl_cvdunpack_ex(const char *file,
54
-                                      const char *dir,
55
-                                      const char *certs_directory,
56
-                                      uint32_t dboptions);
57
-    ```
58
-    The original `cl_cvdverify` and `cl_cvdunpack` are deprecated.
68
+  ```c
69
+  cl_error_t cl_cvdverify_ex(
70
+      const char *file,
71
+      const char *certs_directory,
72
+      uint32_t dboptions);
73
+
74
+  cl_error_t cl_cvdunpack_ex(
75
+      const char *file,
76
+      const char *dir,
77
+      const char *certs_directory,
78
+      uint32_t dboptions);
79
+  ```
80
+  The original `cl_cvdverify` and `cl_cvdunpack` are deprecated.
59 81
 
60 82
   Added a `cl_engine_field` enum option `CL_ENGINE_CVDCERTSDIR`.
61 83
   You may set this option with `cl_engine_set_str` and get it with
... ...
@@ -64,76 +86,582 @@ ClamAV 1.5.0 includes the following improvements and changes:
64 64
   Thank you to Mark Carey at SAP for inspiring work on this feature with an
65 65
   initial proof of concept for external-signature FIPS compliant CVD signing.
66 66
 
67
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1417)
67
+  [GitHub pull request #1](https://github.com/Cisco-Talos/clamav/pull/1417)
68
+
69
+  [GitHub pull request #2](https://github.com/Cisco-Talos/clamav/pull/1478)
70
+
71
+  [GitHub pull request #3](https://github.com/Cisco-Talos/clamav/pull/1489)
72
+
73
+  [GitHub pull request #4](https://github.com/Cisco-Talos/clamav/pull/1491)
74
+
75
+- Freshclam, ClamD, ClamScan, and Sigtool: Added an option to enable FIPS-like
76
+  limits disabling MD5 and SHA1 from being used for verifying digital signatures
77
+  or for being used to trust a file when checking for false positives (FPs).
78
+
79
+  For `freshclam.conf` and `clamd.conf` set this config option:
80
+  ```
81
+  FIPSCryptoHashLimits yes
82
+  ```
83
+
84
+  For `clamscan` and `sigtool` use this command-line option:
85
+  ```
86
+  --fips-limits
87
+  ```
88
+
89
+  For libclamav: Enable FIPS-limits for a ClamAV engine like this:
90
+  ```C
91
+  cl_engine_set_num(engine, CL_ENGINE_FIPS_LIMITS, 1);
92
+  ```
93
+
94
+  ClamAV will also attempt to detect if FIPS-mode is enabled. If so, it will
95
+  automatically enable the FIPS-limits feature.
96
+
97
+  This change mitigates safety concerns over the use of MD5 and SHA1 algorithms
98
+  to trust files and is required to enable ClamAV to operate legitimately in
99
+  FIPS-mode enabled environments.
100
+
101
+  Note: ClamAV may still calculate MD5 or SHA1 hashes as needed for detection
102
+  purposes or for informational purposes in FIPS-enabled environments and when
103
+  the FIPS-limits option is enabled.
104
+
105
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1532)
106
+
107
+- Upgraded the clean-file scan cache to use SHA2-256 (prior versions use MD5).
108
+  The clean-file cache algorithm is not configurable.
109
+
110
+  This change resolves safety concerns over the use of MD5 to trust files and
111
+  is required to enable ClamAV to operate legitimately in FIPS-mode enabled
112
+  environments.
113
+
114
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1532)
115
+
116
+- ClamD: Added an option to disable select administrative commands including
117
+  `SHUTDOWN`, `RELOAD`, `STATS` and `VERSION`.
118
+
119
+  The new `clamd.conf` options are:
120
+  ```
121
+  EnableShutdownCommand yes
122
+  EnableReloadCommand yes
123
+  EnableStatsCommand yes
124
+  EnableVersionCommand yes
125
+  ```
126
+  This change courtesy of GitHub user ChaoticByte.
127
+
128
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1502)
129
+
130
+- libclamav: Added extended hashing functions with a "flags" parameter that
131
+  allows the caller to choose if they want to bypass FIPS hash algorithm limits:
132
+  ```c
133
+  cl_error_t cl_hash_data_ex(
134
+      const char *alg,
135
+      const uint8_t *data,
136
+      size_t data_len,
137
+      uint8_t **hash,
138
+      size_t *hash_len,
139
+      uint32_t flags);
140
+
141
+  cl_error_t cl_hash_init_ex(
142
+      const char *alg,
143
+      uint32_t flags,
144
+      cl_hash_ctx_t **ctx_out);
145
+
146
+  cl_error_t cl_update_hash_ex(
147
+      cl_hash_ctx_t *ctx,
148
+      const uint8_t *data,
149
+      size_t length);
150
+
151
+  cl_error_t cl_finish_hash_ex(
152
+      cl_hash_ctx_t *ctx,
153
+      uint8_t **hash,
154
+      size_t *hash_len,
155
+      uint32_t flags);
156
+
157
+  void cl_hash_destroy(void *ctx);
158
+
159
+  cl_error_t cl_hash_file_fd_ex(
160
+      const char *alg,
161
+      int fd,
162
+      size_t offset,
163
+      size_t length,
164
+      uint8_t **hash,
165
+      size_t *hash_len,
166
+      uint32_t flags);
167
+  ```
168
+
169
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1532)
170
+
171
+- ClamScan: Improved the precision of the bytes-scanned and bytes-read counters.
172
+  The ClamScan scan summary will now report exact counts in "GiB", "MiB", "KiB",
173
+  or "B" as appropriate. Previously, it always reported "MB".
174
+
175
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1532)
176
+
177
+- ClamScan: Add hash & file-type in/out CLI options:
178
+  - `--hash-hint`: The file hash so that libclamav does not need to calculate
179
+    it. The type of hash must match the `--hash-alg`.
180
+  - `--log-hash`: Print the file hash after each file scanned. The type of hash
181
+    printed will match the `--hash-alg`.
182
+  - `--hash-alg`: The hashing algorithm used for either `--hash-hint` or
183
+    `--log-hash`. Supported algorithms are "md5", "sha1", "sha2-256".
184
+    If not specified, the default is "sha2-256".
185
+  - `--file-type-hint`: The file type hint so that libclamav can optimize
186
+    scanning (e.g., "pe", "elf", "zip", etc.). You may also use ClamAV type names
187
+    such as "CL_TYPE_PE". ClamAV will ignore the hint if it is not familiar with
188
+    the specified type.
189
+    See also: https://docs.clamav.net/appendix/FileTypes.html#file-types
190
+  - `--log-file-type`: Print the file type after each file scanned.
191
+
192
+  We will not be adding this for ClamDScan, as we do not have a mechanism in the
193
+  ClamD socket API to receive scan options or a way for ClamD to include scan
194
+  metadata in the response.
195
+
196
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1532)
197
+
198
+- libclamav: Added new scan functions that provide additional functionality:
199
+  ```c
200
+  cl_error_t cl_scanfile_ex(
201
+      const char *filename,
202
+      cl_verdict_t *verdict_out,
203
+      const char **last_alert_out,
204
+      uint64_t *scanned_out,
205
+      const struct cl_engine *engine,
206
+      struct cl_scan_options *scanoptions,
207
+      void *context,
208
+      const char *hash_hint,
209
+      char **hash_out,
210
+      const char *hash_alg,
211
+      const char *file_type_hint,
212
+      char **file_type_out);
213
+
214
+  cl_error_t cl_scandesc_ex(
215
+      int desc,
216
+      const char *filename,
217
+      cl_verdict_t *verdict_out,
218
+      const char **last_alert_out,
219
+      uint64_t *scanned_out,
220
+      const struct cl_engine *engine,
221
+      struct cl_scan_options *scanoptions,
222
+      void *context,
223
+      const char *hash_hint,
224
+      char **hash_out,
225
+      const char *hash_alg,
226
+      const char *file_type_hint,
227
+      char **file_type_out);
228
+
229
+  cl_error_t cl_scanmap_ex(
230
+      cl_fmap_t *map,
231
+      const char *filename,
232
+      cl_verdict_t *verdict_out,
233
+      const char **last_alert_out,
234
+      uint64_t *scanned_out,
235
+      const struct cl_engine *engine,
236
+      struct cl_scan_options *scanoptions,
237
+      void *context,
238
+      const char *hash_hint,
239
+      char **hash_out,
240
+      const char *hash_alg,
241
+      const char *file_type_hint,
242
+      char **file_type_out);
243
+  ```
244
+
245
+  The older `cl_scan*()` functions are now deprecated and may be removed in a
246
+  future release. See `clamav.h` for more details.
247
+
248
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1532)
249
+
250
+- libclamav: Added a new engine option to toggle temp directory recursion.
251
+
252
+  Temp directory recursion is the idea that each object scanned in ClamAV's
253
+  recursive extract/scan process will get a new temp subdirectory, mimicking
254
+  the nesting structure of the file.
255
+
256
+  Temp directory recursion was introduced in ClamAV 0.103 and is enabled
257
+  whenever `--leave-temps` / `LeaveTemporaryFiles` is enabled.
258
+
259
+  In ClamAV 1.5, an application linking to libclamav can separately enable temp
260
+  directory recursion if they wish.
261
+  For ClamScan and ClamD, it will remain tied to `--leave-temps` /
262
+  `LeaveTemporaryFiles` options.
263
+
264
+  The new temp directory recursion option can be enabled with:
265
+  ```c
266
+  cl_engine_set_num(engine, CL_ENGINE_TMPDIR_RECURSION, 1);
267
+  ```
268
+
269
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1532)
270
+
271
+- libclamav: Added a class of scan callback functions that can be added with the
272
+  following API function:
273
+  ```c
274
+  void cl_engine_set_scan_callback(struct cl_engine *engine, clcb_scan callback, cl_scan_callback_t location);
275
+  ```
276
+
277
+  The scan callback location may be configured using the following five values:
278
+  - `CL_SCAN_CALLBACK_PRE_HASH`: Occurs just after basic file-type detection and
279
+    before any hashes have been calculated either for the cache or the gen-json
280
+    metadata.
281
+  - `CL_SCAN_CALLBACK_PRE_SCAN`: Occurs before parser modules run and before
282
+    pattern matching.
283
+  - `CL_SCAN_CALLBACK_POST_SCAN`: Occurs after pattern matching and after
284
+    running parser modules. A.k.a. the scan is complete for this layer.
285
+  - `CL_SCAN_CALLBACK_ALERT`: Occurs each time an alert (detection) would be
286
+    triggered during a scan.
287
+  - `CL_SCAN_CALLBACK_FILE_TYPE`: Occurs each time the file type determination
288
+    is refined. This may happen more than once per layer.
289
+
290
+  Each callback may alter scan behavior using the following return codes:
291
+
292
+  - `CL_BREAK`: Scan aborted by callback. The rest of the scan is skipped.
293
+    This does not mark the file as clean or infected, it just skips the rest of
294
+    the scan.
295
+
296
+  - `CL_SUCCESS` / `CL_CLEAN`: File scan will continue.
297
+
298
+    For `CL_SCAN_CALLBACK_ALERT`: This means you want to ignore this specific
299
+    alert and keep scanning.
300
+
301
+    This is different than `CL_VERIFIED` because it does not affect prior or
302
+    future alerts. Return `CL_VERIFIED` instead if you want to remove prior
303
+    alerts for this layer and skip the rest of the scan for this layer.
304
+
305
+  - `CL_VIRUS`: This means you do not trust the file. A new alert will be added.
306
+
307
+    For `CL_SCAN_CALLBACK_ALERT`: This means you agree with the alert and no
308
+    extra alert is needed.
309
+
310
+  - `CL_VERIFIED`: Layer explicitly trusted by the callback and previous alerts
311
+    removed for THIS layer. You might want to do this if you trust the hash or
312
+    verified a digital signature. The rest of the scan will be skipped for THIS
313
+    layer. For contained files, this does NOT mean that the parent or adjacent
314
+    layers are trusted.
315
+
316
+  Each callback is given a pointer to the current scan layer from which they can
317
+  get previous layers, can get the layer's fmap, and then various attributes of
318
+  the layer and of the fmap. To make this possible, there are new APIs to
319
+  query scan-layer details and fmap details:
320
+  ```c
321
+    cl_error_t cl_fmap_set_name(cl_fmap_t *map, const char *name);
322
+    cl_error_t cl_fmap_get_name(cl_fmap_t *map, const char **name_out);
323
+    cl_error_t cl_fmap_set_path(cl_fmap_t *map, const char *path);
324
+    cl_error_t cl_fmap_get_path(cl_fmap_t *map, const char **path_out, size_t *offset_out, size_t *len_out);
325
+    cl_error_t cl_fmap_get_fd(const cl_fmap_t *map, int *fd_out, size_t *offset_out, size_t *len_out);
326
+    cl_error_t cl_fmap_get_size(const cl_fmap_t *map, size_t *size_out);
327
+    cl_error_t cl_fmap_set_hash(const cl_fmap_t *map, const char *hash_alg, char hash);
328
+    cl_error_t cl_fmap_have_hash(const cl_fmap_t *map, const char *hash_alg, bool *have_hash_out);
329
+    cl_error_t cl_fmap_will_need_hash_later(const cl_fmap_t *map, const char *hash_alg);
330
+    cl_error_t cl_fmap_get_hash(const cl_fmap_t *map, const char *hash_alg, char **hash_out);
331
+    cl_error_t cl_fmap_get_data(const cl_fmap_t *map, size_t offset, size_t len, const uint8_t **data_out, size_t *data_len_out);
332
+    cl_error_t cl_scan_layer_get_fmap(cl_scan_layer_t *layer, cl_fmap_t **fmap_out);
333
+    cl_error_t cl_scan_layer_get_parent_layer(cl_scan_layer_t *layer, cl_scan_layer_t **parent_layer_out);
334
+    cl_error_t cl_scan_layer_get_type(cl_scan_layer_t *layer, const char **type_out);
335
+    cl_error_t cl_scan_layer_get_recursion_level(cl_scan_layer_t *layer, uint32_t *recursion_level_out);
336
+    cl_error_t cl_scan_layer_get_object_id(cl_scan_layer_t *layer, uint64_t *object_id_out);
337
+    cl_error_t cl_scan_layer_get_last_alert(cl_scan_layer_t *layer, const char **alert_name_out);
338
+    cl_error_t cl_scan_layer_get_attributes(cl_scan_layer_t *layer, uint32_t *attributes_out);
339
+  ```
340
+
341
+  This deprecates, but does not immediately remove, the existing scan callbacks:
342
+  ```c
343
+    void cl_engine_set_clcb_pre_cache(struct cl_engine *engine, clcb_pre_cache callback);
344
+    void cl_engine_set_clcb_file_inspection(struct cl_engine *engine, clcb_file_inspection callback);
345
+    void cl_engine_set_clcb_pre_scan(struct cl_engine *engine, clcb_pre_scan callback);
346
+    void cl_engine_set_clcb_post_scan(struct cl_engine *engine, clcb_post_scan callback);
347
+    void cl_engine_set_clcb_virus_found(struct cl_engine *engine, clcb_virus_found callback);
348
+    void cl_engine_set_clcb_hash(struct cl_engine *engine, clcb_hash callback);
349
+  ```
350
+
351
+  There is an interactive test program to demonstrate the new callbacks.
352
+  See: `examples/ex_scan_callbacks.c`
353
+
354
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1532)
355
+
356
+- Signature names that start with "Weak." will no longer alert.
357
+  Instead, they will be tracked internally and can be found in scan metadata
358
+  JSON. This is a step towards enabling alerting signatures to depend on prior
359
+  Weak indicator matches in the current layer or in child layers.
360
+
361
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1532)
362
+
363
+- For the "Generate Metadata JSON" feature:
364
+
365
+  - The "Viruses" array of alert names has been replaced by two new arrays that
366
+    include additional details beyond just signature name:
367
+    - "Indicators" records three types of indicators:
368
+      - **Strong** indicators are for traditional alerting signature matches and
369
+        will halt the scan, except in all-match mode.
370
+      - **Potentially Unwanted** indicators will only cause an alert at the end of
371
+        the scan unless a Strong indicator is found. They are treated the same
372
+        as Strong indicators in all-match mode.
373
+      - **Weak** indicators do not alert and will be leveraged in a future version
374
+        as a condition for logical signature matches.
375
+    - "Alerts" records only alerting indicators. Events that trust a file, such
376
+      as false positive signatures, will remove affected indicators, and mark
377
+      them as "Ignored" in the "Indicators" array.
378
+
379
+  - Add new option to calculate and record additional hash types when the
380
+    "generate metadata JSON" feature is enabled:
381
+    - libclamav option: `CL_SCAN_GENERAL_STORE_EXTRA_HASHES`
382
+    - ClamScan option: `--json-store-extra-hashes` (default off)
383
+    - `clamd.conf` option: `JsonStoreExtraHashes` (default 'no')
384
+
385
+  - The file hash is now stored as "sha2-256" instead of "FileMD5". If you
386
+    enable the "extra hashes" option, then it will also record "md5" and "sha1".
387
+
388
+  - Each object scanned now has a unique "Object ID".
389
+
390
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1532)
391
+
392
+- Sigtool: Renamed the sigtool option `--sha256` to `--sha2-256`.
393
+  The original option is still functional but is deprecated.
394
+
395
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1532)
68 396
 
69 397
 ### Other improvements
70 398
 
71 399
 - Set a limit on the max-recursion config option. Users will no longer be
72 400
   able to set max-recursion higher than 100.
73
-  This change prevents errors on start up or possible crashes if encountering
401
+  This change prevents errors on start up or crashes if encountering
74 402
   a file with that many layers of recursion.
75
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1264)
403
+
404
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1264)
76 405
 
77 406
 - Build system: CMake improvements to support compiling for the AIX platform.
78 407
   This change is courtesy of GitHub user KamathForAIX.
79
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1387)
408
+
409
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1387)
80 410
 
81 411
 - Improve support for extracting malformed zip archives.
82 412
   This change is courtesy of Frederick Sell.
83
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1460)
413
+
414
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1460)
84 415
 
85 416
 - Windows: Code quality improvement for the ClamScan and ClamDScan `--move`
86 417
   and `--remove` options.
87 418
   This change is courtesy of Maxim Suhanov.
88
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1470)
89 419
 
90
-- Added file type recognition for some kinds of AI model files.
420
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1470)
91 421
 
92
-  The file type appears as a string parameter for these callback functions:
93
-  - `clcb_pre_cache`
94
-  - `clcb_pre_scan`
95
-  - `clcb_file_inspection`
422
+- Added file type recognition for an initial set of AI model file types.
423
+
424
+  The file type is accessible to applications using libclamav via the scan
425
+  callback functions and as an optional output parameter to the scan functions:
426
+  `cl_scanfile_ex()`, `cl_scanmap_ex()`, and `cl_scandesc_ex()`.
427
+
428
+  When scanning these files, type will now show "CL_TYPE_AI_MODEL" instead of
429
+  "CL_TYPE_BINARY_DATA".
430
+
431
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1476)
432
+
433
+- Added support for inline comments in ClamAV configuration files.
434
+  This change is courtesy of GitHub user userwiths.
435
+
436
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1308)
437
+
438
+- Disabled the MyDoom hardcoded/heuristic detection because of false positives.
439
+
440
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1495)
441
+
442
+- Sigtool: Added support for creating `.cdiff` and `.script` patch files for
443
+  CVDs that have underscores in the CVD name.
444
+  Also improved support for relative paths with the `--diff` command.
445
+
446
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1541)
447
+
448
+- Windows: Improved support for file names with UTF-8 characters not found in
449
+  the ANSI or OEM code pages when printing scan results or showing activity in
450
+  the ClamDTOP monitoring utility.
451
+  Fixed a bug with opening files with such names with the Sigtool utility.
452
+
453
+  [GitHub pull request #1](https://github.com/Cisco-Talos/clamav/pull/1461)
454
+
455
+  [GitHub pull request #2](https://github.com/Cisco-Talos/clamav/pull/1537)
456
+
457
+- Improved the code quality of the ZIP module. Added inline documentation.
458
+
459
+  [GitHub pull request #1](https://github.com/Cisco-Talos/clamav/pull/1548)
460
+
461
+  [GitHub pull request #2](https://github.com/Cisco-Talos/clamav/pull/1552)
462
+
463
+- Always run scan callbacks for embedded files. Embedded files are found within
464
+  other files through signature matches instead of by parsing. They will now
465
+  be processed the same way and then they can trigger application callbacks
466
+  (e.g., "pre-scan", "post-scan", etc.).
96 467
 
97
-  When scanning these files, the `type` parameter will now show
98
-  "CL_TYPE_AI_MODEL" instead of "CL_TYPE_BINARY_DATA".
99
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1476)
468
+  This change will impact scans with both the "leave-temps" feature and the
469
+  "force-to-disk" feature enabled, resulting in additional temporary files.
470
+
471
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1532)
472
+
473
+- Added DevContainer templates to the ClamAV Git repository in order to make it
474
+  easier to set up AlmaLinux or Debian development environments.
475
+
476
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1462)
100 477
 
101 478
 ### Bug fixes
102 479
 
103
-- Technical debt: Reduced email multipart message parser complexity.
104
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1347)
480
+- Reduced email multipart message parser complexity.
481
+
482
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1347)
105 483
 
106 484
 - Fixed possible undefined behavior in inflate64 module.
107 485
   The inflate64 module is a modified version of the zlib library, taken from
108 486
   version 1.2.3 with some customization and with some cherry-picked fixes.
109 487
   This adds one additional fix from zlib 1.2.9.
110 488
   Thank you to TITAN Team for reporting this issue.
111
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1469)
489
+
490
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1469)
112 491
 
113 492
 - Fixed a bug in ClamD that broke reporting of memory usage on Linux.
114 493
   The STATS command can be used to monitor ClamD directly or through ClamDTOP.
115
-  The memory stats feature does not work on all platforms (e.g. Windows).
116
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1465)
494
+  The memory stats feature does not work on all platforms (e.g., Windows).
495
+
496
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1465)
117 497
 
118
-- Windows: Fix a build issue when the same library dependency is found in
498
+- Windows: Fixed a build issue when the same library dependency is found in
119 499
   two different locations.
120
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1453)
121 500
 
122
-- Fix an infinite loop when scanning some email files in debug-mode.
123
-  This fix is courtesy of Yoann Lecuyer
124
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1445)
501
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1453)
502
+
503
+- Fixed an infinite loop when scanning some email files in debug-mode.
504
+  This fix is courtesy of Yoann Lecuyer.
505
+
506
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1445)
507
+
508
+- Fixed a stack buffer overflow bug in the phishing signature load process.
509
+  This fix is courtesy of GitHub user Shivam7-1.
510
+
511
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1486)
512
+
513
+- Fixed a race condition in the Freshclam feature tests.
514
+  This fix is courtesy of GitHub user rma-x.
515
+
516
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1513)
517
+
518
+- Windows: Fixed a 5-byte heap buffer overread in the Windows unit tests.
519
+  This fix is courtesy of GitHub user Sophie0x2E.
520
+
521
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1542)
522
+
523
+- Fix double-extraction of OOXML-based office documents.
524
+
525
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1532)
526
+
527
+- ClamBC: Fixed crashes on startup.
528
+
529
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1532)
125 530
 
126 531
 ### Acknowledgments
127 532
 
128 533
 Special thanks to the following people for code contributions and bug reports:
129 534
 - b1tg
535
+- ChaoticByte
130 536
 - Frederick Sell
131 537
 - KamathForAIX
132 538
 - Mark Carey at SAP
133 539
 - Maxim Suhanov
540
+- rma-x
541
+- Shivam7-1
542
+- Sophie0x2E
134 543
 - TITAN Team
544
+- userwiths
135 545
 - Yoann Lecuyer
136 546
 
547
+## 1.4.3
548
+
549
+ClamAV 1.4.3 is a patch release with the following fixes:
550
+
551
+- [CVE-2025-20260](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20260):
552
+  Fixed a possible buffer overflow write bug in the PDF file parser that could
553
+  cause a denial-of-service (DoS) condition or enable remote code execution.
554
+
555
+  This issue only affects configurations where both:
556
+  1. The max file-size scan limit is set greater than or equal to 1024MB.
557
+  2. The max scan-size scan limit is set greater than or equal to 1025MB.
558
+
559
+  The code flaw was present prior to version 1.0.0, but a change in version
560
+  1.0.0 that enables larger allocations based on untrusted data made it
561
+  possible to trigger this bug.
562
+
563
+  This issue affects all currently supported versions. It will be fixed in:
564
+  - 1.4.3
565
+  - 1.0.9
566
+
567
+  Thank you to Greg Walkup at Sandia National Labs for identifying this issue.
568
+
569
+- [CVE-2025-20234](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20234):
570
+  Fixed a possible buffer overflow read bug in the UDF file parser that may
571
+  write to a temp file and thus disclose information, or it may crash and
572
+  cause a denial-of-service (DoS) condition.
573
+
574
+  This issue was introduced in version 1.2.0. It will be fixed in 1.4.3.
575
+
576
+  Thank you to volticks (@movx64 on Twitter/X), working with Trend Micro Zero
577
+  Day Initiative, for identifying this issue.
578
+
579
+- Fixed a possible use-after-free bug in the Xz decompression module in the
580
+  bundled lzma-sdk library.
581
+
582
+  This issue was fixed in the lzma-sdk version 18.03. ClamAV bundles a copy
583
+  of the lzma-sdk with some performance changes specific to libclamav, plus
584
+  select bug fixes like this one in lieu of a full upgrade to newer lzma-sdk.
585
+
586
+  This issue affects all ClamAV versions at least as far back as 0.99.4.
587
+  It will be fixed in:
588
+  - 1.4.3
589
+  - 1.0.9
590
+
591
+  Thank you to OSS-Fuzz for identifying this issue.
592
+
593
+- Windows: Fixed a build install issue when a DLL dependency such as libcrypto
594
+  has the exact same name as one provided by the Windows operating system.
595
+
596
+## 1.4.2
597
+
598
+ClamAV 1.4.2 is a patch release with the following fixes:
599
+
600
+- [CVE-2025-20128](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20128):
601
+  Fixed a possible buffer overflow read bug in the OLE2 file parser that could
602
+  cause a denial-of-service (DoS) condition.
603
+
604
+  This issue was introduced in version 1.0.0 and affects all currently
605
+  supported versions. It will be fixed in:
606
+  - 1.4.2
607
+  - 1.0.8
608
+
609
+  Thank you to OSS-Fuzz for identifying this issue.
610
+
611
+## 1.4.1
612
+
613
+ClamAV 1.4.1 is a critical patch release with the following fixes:
614
+
615
+- [CVE-2024-20506](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20506):
616
+  Changed the logging module to disable following symlinks on Linux and Unix
617
+  systems so as to prevent an attacker with existing access to the 'clamd' or
618
+  'freshclam' services from using a symlink to corrupt system files.
619
+
620
+  This issue affects all currently supported versions. It will be fixed in:
621
+  - 1.4.1
622
+  - 1.3.2
623
+  - 1.0.7
624
+  - 0.103.12
625
+
626
+  Thank you to Detlef for identifying this issue.
627
+
628
+- [CVE-2024-20505](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20505):
629
+  Fixed a possible out-of-bounds read bug in the PDF file parser that could
630
+  cause a denial-of-service (DoS) condition.
631
+
632
+  This issue affects all currently supported versions. It will be fixed in:
633
+  - 1.4.1
634
+  - 1.3.2
635
+  - 1.0.7
636
+  - 0.103.12
637
+
638
+  Thank you to OSS-Fuzz for identifying this issue.
639
+
640
+- Removed unused Python modules from freshclam tests including deprecated
641
+  'cgi' module that is expected to cause test failures in Python 3.13.
642
+
137 643
 ## 1.4.0
138 644
 
139 645
 ClamAV 1.4.0 includes the following improvements and changes:
... ...
@@ -146,13 +674,15 @@ ClamAV 1.4.0 includes the following improvements and changes:
146 146
   option to enable or disable ALZ archive support.
147 147
   > _Tip_: DCONF (Dynamic CONFiguration) is a feature that allows for some
148 148
   > configuration changes to be made via ClamAV `.cfg` "signatures".
149
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1183)
149
+
150
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1183)
150 151
 
151 152
 - Added support for extracting LHA/LZH archives.
152 153
   The new ClamAV file type for LHA/LZH archives is `CL_TYPE_LHA_LZH`.
153 154
   Added a [DCONF](https://docs.clamav.net/manual/Signatures/DynamicConfig.html)
154 155
   option to enable or disable LHA/LZH archive support.
155
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1192)
156
+
157
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1192)
156 158
 
157 159
 - Added the ability to disable image fuzzy hashing, if needed. For context,
158 160
   image fuzzy hashing is a detection mechanism useful for identifying malware
... ...
@@ -178,7 +708,8 @@ ClamAV 1.4.0 includes the following improvements and changes:
178 178
 
179 179
   Added a [DCONF](https://docs.clamav.net/manual/Signatures/DynamicConfig.html)
180 180
   option to enable or disable image fuzzy hashing support.
181
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1186)
181
+
182
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1186)
182 183
 
183 184
 ### Other improvements
184 185
 
... ...
@@ -186,83 +717,100 @@ ClamAV 1.4.0 includes the following improvements and changes:
186 186
   [Windows](https://github.com/Cisco-Talos/clamav/blob/main/INSTALL-cross-windows-arm64.md)
187 187
   and
188 188
   [Linux](https://github.com/Cisco-Talos/clamav/blob/main/INSTALL-cross-linux-arm64.md).
189
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1116)
189
+
190
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1116)
190 191
 
191 192
 - Improved the Freshclam warning messages when being blocked or rate limited
192 193
   so as to include the Cloudflare Ray ID, which helps with issue triage.
193
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1195)
194
+
195
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1195)
194 196
 
195 197
 - Removed unnecessary memory allocation checks when the size to be allocated
196 198
   is fixed or comes from a trusted source.
197 199
   We also renamed internal memory allocation functions and macros, so it is
198 200
   more obvious what each function does.
199
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1137)
201
+
202
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1137)
200 203
 
201 204
 - Improved the Freshclam documentation to make it clear that the `--datadir`
202 205
   option must be an absolute path to a directory that already exists, is
203 206
   writable by Freshclam, and is readable by ClamScan and ClamD.
204
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1199)
207
+
208
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1199)
205 209
 
206 210
 - Added an optimization to avoid calculating the file hash if the clean file
207 211
   cache has been disabled. The file hash may still be calculated as needed to
208 212
   perform hash-based signature matching if any hash-based signatures exist that
209 213
   target a file of the same size, or if any hash-based signatures exist that
210 214
   target "any" file size.
211
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1167)
215
+
216
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1167)
212 217
 
213 218
 - Added an improvement to the SystemD service file for ClamOnAcc so that the
214 219
   service will shut down faster on some systems.
215
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1164)
220
+
221
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1164)
216 222
 
217 223
 - Added a CMake build dependency on the version map files so that the build
218 224
   will re-run if changes are made to the version map files.
219 225
   Work courtesy of Sebastian Andrzej Siewior.
220
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1294)
226
+
227
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1294)
221 228
 
222 229
 - Added an improvement to the CMake build so that the RUSTFLAGS settings
223 230
   are inherited from the environment.
224 231
   Work courtesy of liushuyu.
225
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1301)
232
+
233
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1301)
226 234
 
227 235
 ### Bug fixes
228 236
 
229 237
 - Silenced confusing warning message when scanning some HTML files.
230
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1252)
238
+
239
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1252)
231 240
 
232 241
 - Fixed minor compiler warnings.
233
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1197)
242
+
243
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1197)
234 244
 
235 245
 - Since the build system changed from Autotools to CMake, ClamAV no longer
236 246
   supports building with configurations where bzip2, libxml2, libz, libjson-c,
237 247
   or libpcre2 are not available. Libpcre is no longer supported in favor of
238 248
   libpcre2. In this release, we removed all the dead code associated with those
239 249
   unsupported build configurations.
240
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1217)
250
+
251
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1217)
241 252
 
242 253
 - Fixed assorted typos. Patch courtesy of RainRat.
243
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1228)
254
+
255
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1228)
244 256
 
245 257
 - Added missing documentation for the ClamScan `--force-to-disk` option.
246
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1186)
258
+
259
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1186)
247 260
 
248 261
 - Fixed an issue where ClamAV unit tests would prefer an older
249 262
   libclamunrar_iface library from the install path, if present, rather than
250 263
   the recently compiled library in the build path.
251
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1258)
264
+
265
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1258)
252 266
 
253 267
 - Fixed a build issue on Windows with newer versions of Rust.
254 268
   Also upgraded GitHub Actions imports to fix CI failures.
255 269
   Fixes courtesy of liushuyu.
256
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1307)
270
+
271
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1307)
257 272
 
258 273
 - Fixed an unaligned pointer dereference issue on select architectures.
259 274
   Fix courtesy of Sebastian Andrzej Siewior.
260
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1293)
275
+
276
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1293)
261 277
 
262 278
 - Fixed a bug that prevented loading plaintext (non-CVD) signature files
263 279
   when using the `--fail-if-cvd-older-than=DAYS` / `FailIfCvdOlderThan` option.
264 280
   Fix courtesy of Bark.
265
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1309)
281
+
282
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1309)
266 283
 
267 284
 ### Acknowledgments
268 285
 
... ...
@@ -272,6 +820,57 @@ Special thanks to the following people for code contributions and bug reports:
272 272
 - Sebastian Andrzej Siewior
273 273
 - RainRat
274 274
 
275
+## 1.3.2
276
+
277
+ClamAV 1.3.2 is a patch release with the following fixes:
278
+
279
+- [CVE-2024-20506](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20506):
280
+  Changed the logging module to disable following symlinks on Linux and Unix
281
+  systems so as to prevent an attacker with existing access to the 'clamd' or
282
+  'freshclam' services from using a symlink to corrupt system files.
283
+
284
+  This issue affects all currently supported versions. It will be fixed in:
285
+  - 1.4.1
286
+  - 1.3.2
287
+  - 1.0.7
288
+  - 0.103.12
289
+
290
+  Thank you to Detlef for identifying this issue.
291
+
292
+- [CVE-2024-20505](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20505):
293
+  Fixed a possible out-of-bounds read bug in the PDF file parser that could
294
+  cause a denial-of-service (DoS) condition.
295
+
296
+  This issue affects all currently supported versions. It will be fixed in:
297
+  - 1.4.1
298
+  - 1.3.2
299
+  - 1.0.7
300
+  - 0.103.12
301
+
302
+  Thank you to OSS-Fuzz for identifying this issue.
303
+
304
+- Removed unused Python modules from freshclam tests including deprecated
305
+  'cgi' module that is expected to cause test failures in Python 3.13.
306
+
307
+- Fix unit test caused by expiring signing certificate.
308
+
309
+  Backport of [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1305)
310
+
311
+- Fixed a build issue on Windows with newer versions of Rust.
312
+  Also upgraded GitHub Actions imports to fix CI failures.
313
+  Fixes courtesy of liushuyu.
314
+
315
+  Backport of [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1307)
316
+
317
+- Fixed an unaligned pointer dereference issue on select architectures.
318
+  Fix courtesy of Sebastian Andrzej Siewior.
319
+
320
+  Backport of [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1293)
321
+
322
+- Fixes to Jenkins CI pipeline.
323
+
324
+For details, see [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1330)
325
+
275 326
 ## 1.3.1
276 327
 
277 328
 ClamAV 1.3.1 is a critical patch release with the following fixes:
... ...
@@ -283,31 +882,38 @@ ClamAV 1.3.1 is a critical patch release with the following fixes:
283 283
   This issue affects version 1.3.0 only and does not affect prior versions.
284 284
 
285 285
   Thank you to Błażej Pawłowski for identifying this issue.
286
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1242)
286
+
287
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1242)
287 288
 
288 289
 - Updated select Rust dependencies to the latest versions.
289 290
   This resolved Cargo audit complaints and included PNG parser bug fixes.
290
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1227)
291
+
292
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1227)
291 293
 
292 294
 - Fixed a bug causing some text to be truncated when converting from UTF-16.
293
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1230)
295
+
296
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1230)
294 297
 
295 298
 - Fixed assorted complaints identified by Coverity static analysis.
296
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1235)
299
+
300
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1235)
297 301
 
298 302
 - Fixed a bug causing CVDs downloaded by the `DatabaseCustomURL` Freshclam
299 303
   config option to be pruned and then re-downloaded with every update.
300
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1238)
304
+
305
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1238)
301 306
 
302 307
 - Added the new 'valhalla' database name to the list of optional databases in
303 308
   preparation for future work.
304
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1238)
309
+
310
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1238)
305 311
 
306 312
 - Added symbols to the `libclamav.map` file to enable additional build
307 313
   configurations.
308 314
 
309 315
   Patch courtesy of Neil Wilson.
310
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1244)
316
+
317
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1244)
311 318
 
312 319
 ## 1.3.0
313 320
 
... ...
@@ -323,19 +929,22 @@ ClamAV 1.3.0 includes the following improvements and changes:
323 323
   b. The `clamd.conf` config option: `ScanOneNote no`,
324 324
   c. The libclamav scan option `options.parse &= ~CL_SCAN_PARSE_ONENOTE;`,
325 325
   d. A signature change to the `daily.cfg` dynamic configuration (DCONF).
326
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1048)
326
+
327
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1048)
327 328
 
328 329
 ### Other improvements
329 330
 
330 331
 - Fixed issue when building ClamAV on the Haiku (BeOS-like) operating system.
331 332
   Patch courtesy of Luca D'Amico
332
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1061)
333
+
334
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1061)
333 335
 
334 336
 - ClamD: When starting, ClamD will now check if the directory specified by
335 337
   `TemporaryDirectory` in `clamd.conf` exists. If it doesn't, ClamD
336 338
   will print an error message and will exit with exit code 1.
337 339
   Patch courtesy of Andrew Kiggins.
338
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1037)
340
+
341
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1037)
339 342
 
340 343
 - CMake: If configured to build static libraries, CMake will now also
341 344
   install the libclamav_rust, libclammspack, libclamunrar_iface, and
... ...
@@ -347,7 +956,8 @@ ClamAV 1.3.0 includes the following improvements and changes:
347 347
   build some other program that uses the libclamav static library.
348 348
 
349 349
   Patch courtesy of driverxdw.
350
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1100)
350
+
351
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1100)
351 352
 
352 353
 - Added file type recognition for compiled Python (`.pyc`) files.
353 354
   The file type appears as a string parameter for these callback functions:
... ...
@@ -356,41 +966,50 @@ ClamAV 1.3.0 includes the following improvements and changes:
356 356
   - `clcb_file_inspection`
357 357
   When scanning a `.pyc` file, the `type` parameter will now show
358 358
   "CL_TYPE_PYTHON_COMPILED" instead of "CL_TYPE_BINARY_DATA".
359
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1111)
359
+
360
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1111)
360 361
 
361 362
 - Improved support for decrypting PDF's with empty passwords.
362
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1141)
363
+
364
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1141)
363 365
 
364 366
 - Assorted minor improvements and typo fixes.
365 367
 
366 368
 ### Bug fixes
367 369
 
368 370
 - Fixed a warning when scanning some HTML files.
369
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1084)
371
+
372
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1084)
370 373
 
371 374
 - Fixed an issue decrypting some PDF's with an empty password.
372
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1079)
375
+
376
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1079)
373 377
 
374 378
 - ClamOnAcc: Fixed an infinite loop when a watched directory does not exist.
375
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1047)
379
+
380
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1047)
376 381
 
377 382
 - ClamOnAcc: Fixed an infinite loop when a file has been deleted before a scan.
378 383
   Patch courtesy of gsuehiro.
379
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1150)
384
+
385
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1150)
380 386
 
381 387
 - Fixed a possible crash when processing VBA files on HP-UX/IA 64bit.
382 388
   Patch courtesy of Albert Chin-A-Young.
383
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/526)
389
+
390
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/526)
384 391
 
385 392
 - ClamConf: Fixed an issue printing `MaxScanSize` introduced with the change
386 393
   to allow a MaxScanSize greater than 4 GiB.
387 394
   Fix courtesy of teoberi.
388
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1121)
395
+
396
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1121)
389 397
 
390 398
 - Fixed an issue building a ClamAV RPM in some configurations.
391 399
   The issue was caused by faulty CMake logic that intended to create an
392 400
   empty database directory during the install.
393
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1144)
401
+
402
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1144)
394 403
 
395 404
 ### Acknowledgments
396 405
 
... ...
@@ -409,25 +1028,31 @@ ClamAV 1.2.3 is a critical patch release with the following fixes:
409 409
 
410 410
 - Updated select Rust dependencies to the latest versions.
411 411
   This resolved Cargo audit complaints and included PNG parser bug fixes.
412
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1226)
412
+
413
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1226)
413 414
 
414 415
 - Fixed a bug causing some text to be truncated when converting from UTF-16.
415
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1231)
416
+
417
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1231)
416 418
 
417 419
 - Fixed assorted complaints identified by Coverity static analysis.
418
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1236)
420
+
421
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1236)
419 422
 
420 423
 - Fixed a bug causing CVDs downloaded by the `DatabaseCustomURL` Freshclam
421 424
   config option to be pruned and then re-downloaded with every update.
422
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1239)
425
+
426
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1239)
423 427
 
424 428
 - Added the new 'valhalla' database name to the list of optional databases in
425 429
   preparation for future work.
426
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1239)
430
+
431
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1239)
427 432
 
428 433
 - Silenced a warning "Unexpected early end-of-file" that occured when
429 434
   scanning some PNG files.
430
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1215)
435
+
436
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1215)
431 437
 
432 438
 ## 1.2.2
433 439
 
... ...
@@ -468,18 +1093,22 @@ ClamAV 1.2.2 is a critical patch release with the following fix:
468 468
 ClamAV 1.2.1 is a patch release with the following fixes:
469 469
 
470 470
 - Eliminate security warning about unused "atty" dependency.
471
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/1033
471
+
472
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1033)
472 473
 
473 474
 - Upgrade the bundled UnRAR library (libclamunrar) to version 6.2.12.
474
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/1056
475
+
476
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1056)
475 477
 
476 478
 - Build system: Fix link error with Clang/LLVM/LLD version 17.
477 479
   Patch courtesy of Yasuhiro Kimura.
478
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/1060
480
+
481
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1060)
479 482
 
480 483
 - Fixed the alert-exceeds-max feature for files greater than 2 GiB and less
481 484
   than max file size.
482
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/1039
485
+
486
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1039)
483 487
 
484 488
 Special thanks to the following people for code contributions and bug reports:
485 489
 - Yasuhiro Kimura
... ...
@@ -494,7 +1123,8 @@ ClamAV 1.2.0 includes the following improvements and changes:
494 494
 
495 495
   Specifically, this version adds support for the Beginning Extended Area
496 496
   Descriptor (BEA01) type of UDF files.
497
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/941
497
+
498
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/941)
498 499
 
499 500
 - Added an option to customize the size of ClamAV's clean file cache.
500 501
 
... ...
@@ -507,7 +1137,8 @@ ClamAV 1.2.0 includes the following improvements and changes:
507 507
   `CacheSize` in `clamd.conf`.
508 508
 
509 509
   Patch courtesy of Craig Andrews.
510
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/882
510
+
511
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/882)
511 512
 
512 513
 - Introduced a SystemD timer for running Freshclam updates, without sending
513 514
   Freshclam into the background. This takes the "burden of timing the updates"
... ...
@@ -525,7 +1156,8 @@ ClamAV 1.2.0 includes the following improvements and changes:
525 525
   sudo systemctl edit clamav-freshclam-once.timer
526 526
   ```
527 527
   Patch courtesy of Nils Werner.
528
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/962
528
+
529
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/962)
529 530
 
530 531
 - Raised the MaxScanSize limit so the total amount of data scanned when
531 532
   scanning a file or archive may exceed 4 gigabytes.
... ...
@@ -542,7 +1174,8 @@ ClamAV 1.2.0 includes the following improvements and changes:
542 542
   the scan limits.
543 543
 
544 544
   Patch courtesy of matthias-fratz-bsz.
545
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/945
545
+
546
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/945)
546 547
 
547 548
 - Added ability for Freshclam to use a client certificate PEM file and a
548 549
   private key PEM file for authentication to a private mirror by setting the
... ...
@@ -555,20 +1188,23 @@ ClamAV 1.2.0 includes the following improvements and changes:
555 555
     PEM file, if it is password protected.
556 556
 
557 557
   Patch courtesy of jedrzej.
558
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/955
558
+
559
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/955)
559 560
 
560 561
 ## Other improvements
561 562
 
562 563
 - Fix an issue extracting files from ISO9660 partitions where the files are
563 564
   listed in the plain ISO tree and there also exists an empty Joliet tree.
564
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/938
565
+
566
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/938)
565 567
 
566 568
 - CMake build system improvement to support compiling with OpenSSL 3.x on
567 569
   macOS with the Xcode toolchain.
568 570
 
569 571
   The official ClamAV installers and packages are now built with OpenSSL 3.1.1
570 572
   or newer.
571
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/970
573
+
574
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/970)
572 575
 
573 576
 - The suggested path for the `clamd.pid` and `clamd.sock` file in the sample
574 577
   configs have been updated to reflect the recommended locations for these files
... ...
@@ -579,49 +1215,60 @@ ClamAV 1.2.0 includes the following improvements and changes:
579 579
   For consistency, it now specifies `clamd.sock` instead of `clamd.socket`.
580 580
 
581 581
   Patch courtesy of computersalat.
582
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/931
582
+
583
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/931)
583 584
 
584 585
 ### Bug fixes
585 586
 
586 587
 - Fixed an issue where ClamAV does not abort the signature load process after
587 588
   partially loading an invalid signature. The bug would later cause a crash when
588 589
   scanning certain files.
589
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/934
590
+
591
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/934)
590 592
 
591 593
 - Fixed a possible buffer over-read bug when unpacking PE files.
592
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/927
594
+
595
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/927)
593 596
 
594 597
 - Removed a warning message showing the HTTP response codes during the
595 598
   Freshclam database update process.
596
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/935
599
+
600
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/935)
597 601
 
598 602
 - Added missing command line options to the ClamD and ClamAV-Milter `--help`
599 603
   message and manpages.
600
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/936
604
+
605
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/936)
601 606
 
602 607
 - ClamOnAcc: Fixed error message when using `--wait` without `--ping` option.
603 608
   Patch courtesy of Răzvan Cojocaru.
604
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/984
609
+
610
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/984)
605 611
 
606 612
 - Fixed an assortment of code quality issues identified by Coverity:
607
-  - GitHub pull requests:
608
-    - https://github.com/Cisco-Talos/clamav/pull/989
609
-    - https://github.com/Cisco-Talos/clamav/pull/998
613
+
614
+  [GitHub pull request #1](https://github.com/Cisco-Talos/clamav/pull/989)
615
+
616
+  [GitHub pull request #2](https://github.com/Cisco-Talos/clamav/pull/998)
610 617
 
611 618
 - Windows: Fixed a build issue with the CMake-Rust integration regarding
612 619
   detecting native static libraries that caused builds to fail with Rust
613 620
   version 1.70 and newer.
614
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/992
621
+
622
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/992)
615 623
 
616 624
 - Fixed a bounds check issue in the PDF parser that may result in a 1-byte
617 625
   buffer over read but does not cause a crash.
618
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/988
626
+
627
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/988)
619 628
 
620 629
 - Upgraded the bundled UnRAR library (libclamunrar) to version 6.2.10.
621
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/1008
630
+
631
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1008)
622 632
 
623 633
 - Fixed a compatibility issue with libjson-c version 0.17.
624
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/1002
634
+
635
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1002)
625 636
 
626 637
 ### Acknowledgments
627 638
 
... ...
@@ -638,20 +1285,25 @@ Special thanks to the following people for code contributions and bug reports:
638 638
 ClamAV 1.1.3 is a patch release with the following fixes:
639 639
 
640 640
 - Eliminate security warning about unused "atty" dependency.
641
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/1034
641
+
642
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1034)
642 643
 
643 644
 - Upgrade the bundled UnRAR library (libclamunrar) to version 6.2.12.
644
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/1055
645
+
646
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1055)
645 647
 
646 648
 - Windows: libjson-c 0.17 compatibility fix. with ssize_t type definition.
647
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/1063
649
+
650
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1063)
648 651
 
649 652
 - Build system: Fix link error with Clang/LLVM/LLD version 17.
650 653
   Patch courtesy of Yasuhiro Kimura.
651
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/1059
654
+
655
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1059)
652 656
 
653 657
 - Fix alert-exceeds-max feature for files > 2GB and < max-filesize.
654
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/1040
658
+
659
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1040)
655 660
 
656 661
 Special thanks to the following people for code contributions and bug reports:
657 662
 - Yasuhiro Kimura
... ...
@@ -661,7 +1313,8 @@ Special thanks to the following people for code contributions and bug reports:
661 661
 ClamAV 1.1.2 is a critical patch release with the following fixes:
662 662
 
663 663
 - Upgrade the bundled UnRAR library (libclamunrar) to version 6.2.10.
664
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/1011
664
+
665
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1011)
665 666
 
666 667
 ## 1.1.1
667 668
 
... ...
@@ -675,21 +1328,25 @@ ClamAV 1.1.1 is a critical patch release with the following fixes:
675 675
 
676 676
 - Fixed a build issue when using the Rust nightly toolchain, which was
677 677
   affecting the oss-fuzz build environment used for regression tests.
678
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/997
678
+
679
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/997)
679 680
 
680 681
 - Fixed a build issue on Windows when using Rust version 1.70 or newer.
681
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/994
682
+
683
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/994)
682 684
 
683 685
 - CMake build system improvement to support compiling with OpenSSL 3.x on
684 686
   macOS with the Xcode toolchain.
685 687
 
686 688
   The official ClamAV installers and packages are now built with OpenSSL 3.1.1
687 689
   or newer.
688
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/972
690
+
691
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/972)
689 692
 
690 693
 - Removed a warning message showing the HTTP response codes during the
691 694
   Freshclam database update process.
692
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/939
695
+
696
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/939)
693 697
 
694 698
 Special thanks to the following people for code contributions and bug reports:
695 699
 - Steve Smith
... ...
@@ -701,26 +1358,30 @@ ClamAV 1.1.0 includes the following improvements and changes:
701 701
 ### Major changes
702 702
 
703 703
 - Added the ability to extract images embedded in HTML CSS `<style>` blocks.
704
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/813
704
+
705
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/813)
705 706
 
706 707
 - Updated to Sigtool so that the `--vba` option will extract VBA code from
707 708
   Microsoft Office documents the same way that libclamav extracts VBA.
708 709
   This resolves several issues where Sigtool could not extract VBA.
709 710
   Sigtool will also now display the normalized VBA code instead of the
710 711
   pre-normalized VBA code.
711
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/852
712
+
713
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/852)
712 714
 
713 715
 - Added a new ClamScan and ClamD option: `--fail-if-cvd-older-than=days`.
714 716
   Additionally, we introduce `FailIfCvdOlderThan` as a `clamd.conf` synonym for
715 717
   `--fail-if-cvd-older-than`. When passed, it causes ClamD to exit on startup
716 718
   with a non-zero return code if the virus database is older than the specified
717 719
   number of days.
718
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/867
720
+
721
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/867)
719 722
 
720 723
 - Added a new function `cl_cvdgetage()` to the libclamav API.
721 724
   This function will retrieve the age in seconds of the youngest file in a
722 725
   database directory, or the age of a single CVD (or CLD) file.
723
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/867
726
+
727
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/867)
724 728
 
725 729
 - Added a new function `cl_engine_set_clcb_vba()` to the libclamav API.
726 730
   Use this function to set a `cb_vba` callback function.
... ...
@@ -729,35 +1390,41 @@ ClamAV 1.1.0 includes the following improvements and changes:
729 729
   extracted VBA.
730 730
   This callback was added to support Sigtool so that it can use the same VBA
731 731
   extraction logic that ClamAV uses to scan documents.
732
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/852
732
+
733
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/852)
733 734
 
734 735
 ## Other improvements
735 736
 
736 737
 - Removed the vendored TomsFastMath library in favor of using OpenSSL to
737 738
   perform "big number"/multiprecision math operations.
738 739
   Work courtesy of Sebastian Andrzej Siewior.
739
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/840
740
+
741
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/840)
740 742
 
741 743
 - Build system: Added CMake option `DO_NOT_SET_RPATH` to avoid setting
742 744
   `RPATH` on Unix systems.
743 745
   Feature courtesy of Sebastian Andrzej Siewior.
744
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/815
746
+
747
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/815)
745 748
 
746 749
 - Build system: Enabled version-scripts with CMake to limit symbol exports for
747 750
   libclamav, libfreshclam, libclamunrar_iface, and libclamunrar shared
748 751
   libraries on Unix systems, excluding macOS.
749 752
   Improvement courtesy of Orion Poplawski and Sebastian Andrzej Siewior.
750
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/776
753
+
754
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/776)
751 755
 
752 756
 - Build system: Enabled users to pass in custom Rust compiler flags using the
753 757
   `RUSTFLAGS` CMake variable.
754 758
   Feature courtesy of Orion Poplawski.
755
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/835
759
+
760
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/835)
756 761
 
757 762
 - Removed a hard-coded alert for CVE-2004-0597.
758 763
   The CVE is old enough that it is no longer a threat and the detection had
759 764
   occasional false-positives.
760
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/855
765
+
766
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/855)
761 767
 
762 768
 - Set Git attributes to prevent Git from altering line endings for Rust
763 769
   vendored libraries. Third-party Rust libraries are bundled in the ClamAV
... ...
@@ -766,36 +1433,43 @@ ClamAV 1.1.0 includes the following improvements and changes:
766 766
   The Rust build system verifies the library manifest, and this change
767 767
   ensures that the hashes are correct.
768 768
   Improvement courtesy of Nicolas R.
769
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/800
769
+
770
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/800)
770 771
 
771 772
 - Fixed compile time warnings.
772 773
   Improvement courtesy of Răzvan Cojocaru.
773
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/795
774
+
775
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/795)
774 776
 
775 777
 - Added a minor optimization when matching domain name regex signatures for
776 778
   PDB, WDB and CDB type signatures.
777
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/837
779
+
780
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/837)
778 781
 
779 782
 - Build system: Enabled the ability to select a specific Python version.
780 783
   When building, you may use the CMake option `-D PYTHON_FIND_VER=<version>`
781 784
   to choose a specific Python version.
782 785
   Feature courtesy of Matt Jolly.
783
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/787
786
+
787
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/787)
784 788
 
785 789
 - Added improvements to the ClamOnAcc process log output so that it is
786 790
   easier to diagnose bugs.
787
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/822
791
+
792
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/822)
788 793
 
789 794
 - Windows: Enabled the MSI installer to upgrade between feature versions more
790 795
   easily when ClamAV is installed to a location different from the default
791 796
   (i.e., not `C:\Program Files\ClamAV`). This means that the MSI installer can
792 797
   find a previous ClamAV 1.0.x installation to upgrade to ClamAV 1.1.0.
793
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/872
798
+
799
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/872)
794 800
 
795 801
 - Sigtool: Added the ability to change the location of the temp directory
796 802
   using the `--tempdir` option and added the ability to retain the temp files
797 803
   created by Sigtool using the `--leave-temps` option.
798
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/852
804
+
805
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/852)
799 806
 
800 807
 - Other minor improvements.
801 808
 
... ...
@@ -803,54 +1477,65 @@ ClamAV 1.1.0 includes the following improvements and changes:
803 803
 
804 804
 - Fixed the broken `ExcludePUA` / `--exclude-pua` feature.
805 805
   Fix courtesy of Ged Haywood and Shawn Iverson.
806
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/780
806
+
807
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/780)
807 808
 
808 809
 - Fixed an issue with integer endianness when parsing Windows executables on
809 810
   big-endian systems.
810 811
   Fix courtesy of Sebastian Andrzej Siewior.
811
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/814
812
+
813
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/814)
812 814
 
813 815
 - Fixed a possible stack overflow read when parsing WDB signatures.
814 816
   This issue is not a vulnerability.
815
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/807
817
+
818
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/807)
816 819
 
817 820
 - Fixed a possible index out of bounds when loading CRB signatures.
818 821
   This issue is not a vulnerability.
819
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/810
822
+
823
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/810)
820 824
 
821 825
 - Fixed a possible use after free when reading logical signatures.
822 826
   This issue is not a vulnerability.
823
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/811
827
+
828
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/811)
824 829
 
825 830
 - Fixed a possible heap overflow read when reading PDB signatures.
826 831
   This issue is not a vulnerability.
827
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/812
832
+
833
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/812)
828 834
 
829 835
 - Fixed a possible heap overflow read in javascript normalizer module.
830 836
   This issue is not a vulnerability.
831
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/868
837
+
838
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/868)
832 839
 
833 840
 - Fixed two bugs that would cause Freshclam to fail update when applying a
834 841
   CDIFF database patch if that patch adds a file to the database archive
835 842
   or removes a file from the database archive.
836 843
   This bug also caused Sigtool to fail to create such a patch.
837
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/893
844
+
845
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/893)
838 846
 
839 847
 - Fixed an assortment of complaints identified by Coverity static analysis.
840
-  - GitHub pull requests:
841
-    - https://github.com/Cisco-Talos/clamav/pull/891
842
-    - https://github.com/Cisco-Talos/clamav/pull/899
848
+
849
+  [GitHub pull request #1](https://github.com/Cisco-Talos/clamav/pull/891)
850
+
851
+  [GitHub pull request #2](https://github.com/Cisco-Talos/clamav/pull/899)
843 852
 
844 853
 - Fixed one of the Freshclam tests that was failing on some Fedora systems
845 854
   due to a bug printing debug-level log messages to stdout.
846 855
   Fix courtesy of Arjen de Korte.
847
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/881
856
+
857
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/881)
848 858
 
849 859
 - Correctly remove temporary files generated by the VBA and XLM extraction
850 860
   modules so that the files are not leaked in patched versions of ClamAV
851 861
   where temporary files are written directly to the temp-directory instead
852 862
   of writing to a unique subdirectory.
853
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/894
863
+
864
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/894)
854 865
 
855 866
 ### Acknowledgments
856 867
 
... ...
@@ -867,31 +1552,144 @@ Special thanks to the following people for code contributions and bug reports:
867 867
 - Sebastian Andrzej Siewior
868 868
 - The OSS-Fuzz project
869 869
 
870
+## 1.0.9
871
+
872
+ClamAV 1.0.9 is a patch release with the following fixes:
873
+
874
+- [CVE-2025-20260](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20260):
875
+  Fixed a possible buffer overflow write bug in the PDF file parser that could
876
+  cause a denial-of-service (DoS) condition or enable remote code execution.
877
+
878
+  This issue only affects configurations where both:
879
+  1. The max file-size scan limit is set greater than or equal to 1024MB.
880
+  2. The max scan-size scan limit is set greater than or equal to 1025MB.
881
+
882
+  The code flaw was present prior to version 1.0.0, but a change in version
883
+  1.0.0 that enables larger allocations based on untrusted data made it
884
+  possible to trigger this bug.
885
+
886
+  This issue affects all currently supported versions. It will be fixed in:
887
+  - 1.4.3
888
+  - 1.0.9
889
+
890
+  Thank you to Greg Walkup at Sandia National Labs for identifying this issue.
891
+
892
+- Fixed a possible use-after-free bug in the Xz decompression module in the
893
+  bundled lzma-sdk library.
894
+
895
+  This issue was fixed in the lzma-sdk version 18.03. ClamAV bundles a copy
896
+  of the lzma-sdk with some performance changes specific to libclamav, plus
897
+  select bug fixes like this one in lieu of a full upgrade to newer lzma-sdk.
898
+
899
+  This issue affects all ClamAV versions at least as far back as 0.99.4.
900
+  It will be fixed in:
901
+  - 1.4.3
902
+  - 1.0.9
903
+
904
+  Thank you to OSS-Fuzz for identifying this issue.
905
+
906
+- Windows: Fixed a build install issue when a DLL dependency such as libcrypto
907
+  has the exact same name as one provided by the Windows operating system.
908
+
909
+## 1.0.8
910
+
911
+ClamAV 1.0.8 is a patch release with the following fixes:
912
+
913
+- [CVE-2025-20128](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20128):
914
+  Fixed a possible buffer overflow read bug in the OLE2 file parser that could
915
+  cause a denial-of-service (DoS) condition.
916
+
917
+  This issue was introduced in version 1.0.0 and affects all currently
918
+  supported versions. It will be fixed in:
919
+  - 1.4.2
920
+  - 1.0.8
921
+
922
+  Thank you to OSS-Fuzz for identifying this issue.
923
+
924
+- ClamOnAcc: Fixed an infinite loop when a watched directory does not exist.
925
+  This is a backport of a fix from ClamAV 1.3.0.
926
+
927
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1426)
928
+
929
+## 1.0.7
930
+
931
+ClamAV 1.0.7 is a patch release with the following fixes:
932
+
933
+- [CVE-2024-20506](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20506):
934
+  Changed the logging module to disable following symlinks on Linux and Unix
935
+  systems so as to prevent an attacker with existing access to the 'clamd' or
936
+  'freshclam' services from using a symlink to corrupt system files.
937
+
938
+  This issue affects all currently supported versions. It will be fixed in:
939
+  - 1.4.1
940
+  - 1.3.2
941
+  - 1.0.7
942
+  - 0.103.12
943
+
944
+  Thank you to Detlef for identifying this issue.
945
+
946
+- [CVE-2024-20505](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20505):
947
+  Fixed a possible out-of-bounds read bug in the PDF file parser that could
948
+  cause a denial-of-service (DoS) condition.
949
+
950
+  This issue affects all currently supported versions. It will be fixed in:
951
+  - 1.4.1
952
+  - 1.3.2
953
+  - 1.0.7
954
+  - 0.103.12
955
+
956
+  Thank you to OSS-Fuzz for identifying this issue.
957
+
958
+- Removed unused Python modules from freshclam tests including deprecated
959
+  'cgi' module that is expected to cause test failures in Python 3.13.
960
+
961
+- Fix unit test caused by expiring signing certificate.
962
+  - Backport of [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1305)
963
+
964
+- Fixed a build issue on Windows with newer versions of Rust.
965
+  Also upgraded GitHub Actions imports to fix CI failures.
966
+  Fixes courtesy of liushuyu.
967
+  - Backport of [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1307)
968
+
969
+- Fixed an unaligned pointer dereference issue on select architectures.
970
+  Fix courtesy of Sebastian Andrzej Siewior.
971
+  - Backport of [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1293)
972
+
973
+- Fixes to Jenkins CI pipeline.
974
+
975
+For details, see [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1331)
976
+
870 977
 ## 1.0.6
871 978
 
872 979
 ClamAV 1.0.6 is a critical patch release with the following fixes:
873 980
 
874 981
 - Updated select Rust dependencies to the latest versions.
875 982
   This resolved Cargo audit complaints and included PNG parser bug fixes.
876
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1225)
983
+
984
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1225)
877 985
 
878 986
 - Fixed a bug causing some text to be truncated when converting from UTF-16.
879
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1232)
987
+
988
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1232)
880 989
 
881 990
 - Fixed assorted complaints identified by Coverity static analysis.
882
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1237)
991
+
992
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1237)
883 993
 
884 994
 - Fixed a bug causing CVDs downloaded by the `DatabaseCustomURL` Freshclam
885 995
   config option to be pruned and then re-downloaded with every update.
886
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1240)
996
+
997
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1240)
887 998
 
888 999
 - Added the new 'valhalla' database name to the list of optional databases in
889 1000
   preparation for future work.
890
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1240)
1001
+
1002
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1240)
891 1003
 
892 1004
 - Silenced a warning "Unexpected early end-of-file" that occured when
893 1005
   scanning some PNG files.
894
-  - [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1216)
1006
+
1007
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1216)
895 1008
 
896 1009
 ## 1.0.5
897 1010
 
... ...
@@ -932,23 +1730,29 @@ ClamAV 1.0.5 is a critical patch release with the following fixes:
932 932
 ClamAV 1.0.4 is a patch release with the following fixes:
933 933
 
934 934
 - Eliminate security warning about unused "atty" dependency.
935
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/1035
935
+
936
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1035)
936 937
 
937 938
 - Upgrade the bundled UnRAR library (libclamunrar) to version 6.2.12.
938
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/1054
939
+
940
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1054)
939 941
 
940 942
 - Windows: libjson-c 0.17 compatibility fix. with ssize_t type definition.
941
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/1064
943
+
944
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1064)
942 945
 
943 946
 - Freshclam: Removed a verbose warning printed for each Freshclam HTTP request.
944
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/1042
947
+
948
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1042)
945 949
 
946 950
 - Build system: Fix link error with Clang/LLVM/LLD version 17.
947 951
   Patch courtesy of Yasuhiro Kimura.
948
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/1058
952
+
953
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1058)
949 954
 
950 955
 - Fix alert-exceeds-max feature for files > 2GB and < max-filesize.
951
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/1041
956
+
957
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1041)
952 958
 
953 959
 Special thanks to the following people for code contributions and bug reports:
954 960
 - Yasuhiro Kimura
... ...
@@ -958,7 +1762,8 @@ Special thanks to the following people for code contributions and bug reports:
958 958
 ClamAV 1.0.3 is a critical patch release with the following fixes:
959 959
 
960 960
 - Upgrade the bundled UnRAR library (libclamunrar) to version 6.2.10.
961
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/1010
961
+
962
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1010)
962 963
 
963 964
 ## 1.0.2
964 965
 
... ...
@@ -977,28 +1782,33 @@ ClamAV 1.0.2 is a critical patch release with the following fixes:
977 977
 
978 978
 - Fixed a build issue when using the Rust nightly toolchain, which was
979 979
   affecting the oss-fuzz build environment used for regression tests.
980
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/996
980
+
981
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/996)
981 982
 
982 983
 - Fixed a build issue on Windows when using Rust version 1.70 or newer.
983
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/993
984
+
985
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/993)
984 986
 
985 987
 - CMake build system improvement to support compiling with OpenSSL 3.x on
986 988
   macOS with the Xcode toolchain.
987 989
 
988 990
   The official ClamAV installers and packages are now built with OpenSSL 3.1.1
989 991
   or newer.
990
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/973
992
+
993
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/973)
991 994
 
992 995
 - Fixed an issue where ClamAV does not abort the signature load process after
993 996
   partially loading an invalid signature.
994 997
   The bug would later cause a crash when scanning certain files.
995
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/952
998
+
999
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/952)
996 1000
 
997 1001
 - Fixed an issue so that ClamAV correctly removes temporary files generated
998 1002
   by the VBA and XLM extraction modules so that the files are not leaked in
999 1003
   patched versions of ClamAV where temporary files are written directly to the
1000 1004
   temp-directory instead of writing to a unique subdirectory.
1001
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/900
1005
+
1006
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/900)
1002 1007
 
1003 1008
 - Set Git attributes to prevent Git from altering line endings for bundled Rust
1004 1009
   libraries. Third-party Rust libraries are bundled in the ClamAV release
... ...
@@ -1007,13 +1817,15 @@ ClamAV 1.0.2 is a critical patch release with the following fixes:
1007 1007
   The Rust build system verifies the library manifest, and this change
1008 1008
   ensures that the hashes are correct.
1009 1009
   Improvement courtesy of Nicolas R.
1010
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/856
1010
+
1011
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/856)
1011 1012
 
1012 1013
 - Fixed two bugs that would cause Freshclam to fail update when applying a
1013 1014
   CDIFF database patch if that patch adds a file to the database archive
1014 1015
   or removes a file from the database archive.
1015 1016
   This bug also caused Sigtool to fail to create such a patch.
1016
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/901
1017
+
1018
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/901)
1017 1019
 
1018 1020
 Special thanks to the following people for code contributions and bug reports:
1019 1021
 - Nicolas R.
... ...
@@ -1036,10 +1848,12 @@ ClamAV 1.0.1 is a critical patch release with the following fixes:
1036 1036
   Thank you to Simon Scannell for reporting this issue.
1037 1037
 
1038 1038
 - Fix allmatch detection issue with the preclass bytecode hook.
1039
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/825
1039
+
1040
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/825)
1040 1041
 
1041 1042
 - Update vendored libmspack library to version 0.11alpha.
1042
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/828
1043
+
1044
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/828)
1043 1045
 
1044 1046
 Special thanks to the following people for code contributions and bug reports:
1045 1047
 - Simon Scannell
... ...
@@ -1053,7 +1867,8 @@ ClamAV 1.0.0 includes the following improvements and changes.
1053 1053
 - Support for decrypting read-only OLE2-based XLS files that are encrypted with
1054 1054
   the default password.
1055 1055
   Use of the default password will now appear in the metadata JSON.
1056
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/700
1056
+
1057
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/700)
1057 1058
 
1058 1059
 - Overhauled the implementation of the all-match feature. The newer code is more
1059 1060
   reliable and easier to maintain.
... ...
@@ -1065,7 +1880,8 @@ ClamAV 1.0.0 includes the following improvements and changes.
1065 1065
       occurred.
1066 1066
     - Fixed an assortment of all-match edge case issues.
1067 1067
   - Added multiple test cases to verify correct all-match behavior.
1068
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/687
1068
+
1069
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/687)
1069 1070
 
1070 1071
 - Added a new callback to the public API for inspecting file content during a
1071 1072
   scan at each layer of archive extraction.
... ...
@@ -1075,20 +1891,23 @@ ClamAV 1.0.0 includes the following improvements and changes.
1075 1075
     the callback prior to performing a scan.
1076 1076
   - This new callback is to be considered *unstable* for the 1.0 release.
1077 1077
     We may alter this function in a subsequent feature version.
1078
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/170
1078
+
1079
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/170)
1079 1080
 
1080 1081
 - Added a new function to the public API for unpacking CVD signature archives.
1081 1082
   - The new function is `cl_cvdunpack()`. The last parameter for the function
1082 1083
     may be set to verify if a CVD's signature is valid before unpacking the CVD
1083 1084
     content to the destination directory.
1084
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/690
1085
+
1086
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/690)
1085 1087
 
1086 1088
 - The option to build with an external TomsFastMath library has been removed.
1087 1089
   ClamAV requires non-default build options for TomsFastMath to support bigger
1088 1090
   floating point numbers. Without this change, database and Windows EXE/DLL
1089 1091
   authenticode certificate validation may fail.
1090 1092
   The `ENABLE_EXTERNAL_TOMSFASTMATH` build is now ignored.
1091
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/742
1093
+
1094
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/742)
1092 1095
 
1093 1096
 - Moved the Dockerfile and supporting scripts from the main ClamAV repository
1094 1097
   over to a new repository: https://github.com/Cisco-Talos/clamav-docker
... ...
@@ -1099,71 +1918,85 @@ ClamAV 1.0.0 includes the following improvements and changes.
1099 1099
   Any users building the ClamAV Docker image rather than pulling them from
1100 1100
   Docker Hub will have to get the latest Docker files from the new location.
1101 1101
 
1102
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/764
1102
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/764)
1103 1103
 
1104 1104
 - Increased the SONAME major version for libclamav because of ABI changes
1105 1105
   between the 0.103 LTS release and the 1.0 LTS release.
1106
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/778
1106
+
1107
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/778)
1107 1108
 
1108 1109
 ### Other improvements
1109 1110
 
1110 1111
 - Add checks to limit PDF object extraction recursion.
1111
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/629
1112
+
1113
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/629)
1112 1114
 
1113 1115
 - Increased the limit for memory allocations based on untrusted input and
1114 1116
   altered the warning message when the limit is exceeded so that it is more
1115 1117
   helpful and less dramatic.
1116
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/723
1118
+
1119
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/723)
1117 1120
 
1118 1121
 - Dramatically improved the build time of libclamav-Rust unit tests.
1119 1122
   The unit test build is included in the time limit for the test itself and was
1120 1123
   timing out on slower systems. The ClamAV Rust code modules now share the same
1121 1124
   build directory, which also reduces the amount of disk space used for the
1122 1125
   build.
1123
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/694
1126
+
1127
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/694)
1124 1128
 
1125 1129
 - For Windows: The debugging symbol (PDB) files are now installed alongside the
1126 1130
   DLL and LIB library files when built in "RelWithDebInfo" or "Debug" mode.
1127
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/669
1131
+
1132
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/669)
1128 1133
 
1129 1134
 - Relaxed the constraints on the check for overlapping ZIP file entries so as
1130 1135
   not to alert on slightly malformed, but non-malicious, Java (JAR) archives.
1131
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/561
1136
+
1137
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/561)
1132 1138
 
1133 1139
 - Increased the time limit in FreshClam before warning if the DNS entry is
1134 1140
   stale. In combination with changes to update the DNS entry more
1135 1141
   frequently, this should prevent false alarms of failures in the database
1136 1142
   publication system.
1137
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/597
1143
+
1144
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/597)
1138 1145
 
1139 1146
 - Docker: The C library header files are now included in the Docker image.
1140 1147
   Patch courtesy of GitHub user TerminalFi.
1141
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/693
1148
+
1149
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/693)
1142 1150
 
1143 1151
 - Show the BYTECODE_RUNTIME build options when using the `ccmake` GUI for CMake.
1144 1152
   Patch courtesy of Дилян Палаузов.
1145
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/678
1153
+
1154
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/678)
1146 1155
 
1147 1156
 - Added explicit minimum and maximum supported LLVM versions so that the build
1148 1157
   will fail if you try to build with a version that is too old or too new and
1149 1158
   will print a helpful message rather than simply failing to compile because of
1150 1159
   compatibility issues. Patch courtesy of Matt Jolly.
1151
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/692
1160
+
1161
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/692)
1152 1162
 
1153 1163
 - Moved the ClamAV Docker files for building containers to a new Git repository.
1154
-  The Docker files are now in https://github.com/Cisco-Talos/clamav-docker.
1164
+  The Docker files are now in: https://github.com/Cisco-Talos/clamav-docker
1165
+
1155 1166
   This change enables us to fix issues with the images and with the supporting
1156 1167
   scripts used to publish and update the images without committing changes
1157 1168
   directly to files in the ClamAV release branches.
1158
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/764
1169
+
1170
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/764)
1159 1171
 
1160 1172
 - Fixed compiler warnings that may turn into errors in Clang 16.
1161 1173
   Patch courtesy of Michael Orlitzky.
1162
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/767
1174
+
1175
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/767)
1163 1176
 
1164 1177
 - Allow building with a custom RPATH so that the executables may be moved after
1165 1178
   build in a development environment to a final installation directory.
1166
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/768
1179
+
1180
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/768)
1167 1181
 
1168 1182
 ### Bug fixes
1169 1183
 
... ...
@@ -1171,71 +2004,90 @@ ClamAV 1.0.0 includes the following improvements and changes.
1171 1171
   backported to prior feature versions:
1172 1172
   - Several heap buffer overflows while loading PDB and WDB databases were found
1173 1173
     by OSS-Fuzz and by Michał Dardas.
1174
-    - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/530
1175
-    - Follow-up Optimization: https://github.com/Cisco-Talos/clamav/pull/712
1174
+
1175
+    [GitHub pull request #1](https://github.com/Cisco-Talos/clamav/pull/530)
1176
+
1177
+    [GitHub pull request #2](https://github.com/Cisco-Talos/clamav/pull/712)
1176 1178
 
1177 1179
   - oss-fuzz 43843: heap buffer overflow read (1) cli_sigopts_handler
1178
-    - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/560
1180
+
1181
+    [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/560)
1179 1182
 
1180 1183
   - oss-fuzz 44849: heap buffer overflow read (4) in HTML/js-norm
1181
-    - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/503
1184
+
1185
+    [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/503)
1182 1186
 
1183 1187
   - oss-fuzz 43816: heap buffer overflow read (8) in cli_bcomp_freemeta
1184
-    - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/583
1188
+
1189
+    [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/583)
1185 1190
 
1186 1191
   - oss-fuzz 43832: heap buffer overflow read (2) in cli_parse_add
1187
-    - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/611
1192
+
1193
+    [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/611)
1188 1194
 
1189 1195
   - oss-fuzz 44493: integer overflow in cli_scannulsft
1190
-    - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/554
1196
+
1197
+    [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/554)
1191 1198
 
1192 1199
   - CIFuzz leak detected in IDB parser
1193
-    - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/547
1200
+
1201
+    [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/547)
1194 1202
 
1195 1203
   - oss-fuzz assorted signature parser leaks
1196
-    - GitHub pull requests:
1197
-      - https://github.com/Cisco-Talos/clamav/pull/532
1198
-      - https://github.com/Cisco-Talos/clamav/pull/533
1199
-      - https://github.com/Cisco-Talos/clamav/pull/535
1204
+
1205
+    [GitHub pull request #1](https://github.com/Cisco-Talos/clamav/pull/532)
1206
+
1207
+    [GitHub pull request #2](https://github.com/Cisco-Talos/clamav/pull/533)
1208
+
1209
+    [GitHub pull request #3](https://github.com/Cisco-Talos/clamav/pull/535)
1200 1210
 
1201 1211
   - oss-fuzz 40601: leak detected in pdf_parseobj
1202
-    - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/553
1212
+
1213
+    [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/553)
1203 1214
 
1204 1215
 - Fixed a build failure when using LIBCLAMAV_ONLY mode with tests enabled.
1205
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/714
1216
+
1217
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/714)
1206 1218
 
1207 1219
 - Fixed an issue verifying EXE/DLL authenticode signatures to determine a given
1208 1220
   file can be trusted (skipped).
1209
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/727
1221
+
1222
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/727)
1210 1223
 
1211 1224
 - Fixed a caching bug relating to the Container and Intermediates logical
1212 1225
   signature condition.
1213
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/724
1226
+
1227
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/724)
1214 1228
 
1215 1229
 - Fixed a build issue when build with RAR disabled or when building with an
1216 1230
   external libmspack library rather than the bundled library.
1217
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/672
1231
+
1232
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/672)
1218 1233
 
1219 1234
 - Fixed the capitalization of the `-W` option for `clamonacc` in the `clamonacc`
1220 1235
   manpage. Patch courtesy of GitHub user monkz.
1221
-  - GitHub pull requests:
1222
-    - https://github.com/Cisco-Talos/clamav/pull/709
1223
-    - https://github.com/Cisco-Talos/clamav/pull/710
1236
+
1237
+  [GitHub pull request #1](https://github.com/Cisco-Talos/clamav/pull/709)
1238
+
1239
+  [GitHub pull request #2](https://github.com/Cisco-Talos/clamav/pull/710)
1224 1240
 
1225 1241
 - macOS: Fixed an issue with memory-map (`mmap`) system call detection affecting
1226 1242
   versions 0.105 and 0.104. Memory maps may be used in ClamAV to improve
1227 1243
   signature load performance and scan performance, as well as RAM usage.
1228
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/705
1244
+
1245
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/705)
1229 1246
 
1230 1247
 - Fixed a performance issue with Rust code when the build type is not explicitly
1231 1248
   set to "Release" or "RelWithDebInfo". The Rust default build type is now
1232 1249
   "RelWithDebInfo" just like the C code, instead of Debug.
1233 1250
   This means it is now optimized by default.
1234
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/701
1251
+
1252
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/701)
1235 1253
 
1236 1254
 - Fixed an issue loading Yara rules containing regex strings with an escaped
1237 1255
   forward-slash (`\/`) followed by a colon (`:`).
1238
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/696
1256
+
1257
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/696)
1239 1258
 
1240 1259
 - Fixed an issue detecting and scanning ZIP file entries appended to very small
1241 1260
   files. The fix is part of the all-match feature overhaul.
... ...
@@ -1246,22 +2098,26 @@ ClamAV 1.0.0 includes the following improvements and changes.
1246 1246
 
1247 1247
 - Fixed the default bytecode timeout value listed in the manpages and in the
1248 1248
   sample config files. Patches courtesy of Liam Jarvis and Ben Bodenmiller.
1249
-  - GitHub pull requests:
1250
-    - https://github.com/Cisco-Talos/clamav/pull/631
1251
-    - https://github.com/Cisco-Talos/clamav/pull/661
1249
+
1250
+  [GitHub pull request #1](https://github.com/Cisco-Talos/clamav/pull/631)
1251
+
1252
+  [GitHub pull request #2](https://github.com/Cisco-Talos/clamav/pull/661)
1252 1253
 
1253 1254
 - Fixed an issue building the libclamav_rust test program when running `ctest`
1254 1255
   if building with `BYTECODE_RUNTIME=llvm` and when the `FindLLVM.cmake` module
1255 1256
   is used to find the LLVM libraries. Patch courtesy of GitHub user teoberi.
1256
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/572
1257
+
1258
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/572)
1257 1259
 
1258 1260
 - Fixed an issue where scans sent to `clamd` with the all-match mode enabled
1259 1261
   caused all subsequent scans to also use all-match mode.
1260
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/741
1262
+
1263
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/741)
1261 1264
 
1262 1265
 - Fixed bug when starting `clamonacc` with the `--log=FILE` option that created
1263 1266
   randomly named files in the current directory.
1264
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/751
1267
+
1268
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/751)
1265 1269
 
1266 1270
 - Other assorted bug fixes.
1267 1271
 
... ...
@@ -1296,17 +2152,21 @@ ClamAV 0.105.2 is a critical patch release with the following fixes:
1296 1296
 
1297 1297
 - Fixed an issue loading Yara rules containing regex strings with an escaped
1298 1298
   forward-slash (`\/`) followed by a colon (`:`).
1299
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/695
1299
+
1300
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/695)
1300 1301
 
1301 1302
 - Moved the ClamAV Docker files for building containers to a new Git repository.
1302
-  The Docker files are now in https://github.com/Cisco-Talos/clamav-docker.
1303
+  The Docker files are now in: https://github.com/Cisco-Talos/clamav-docker
1304
+
1303 1305
   This change enables us to fix issues with the images and with the supporting
1304 1306
   scripts used to publish and update the images without committing changes
1305 1307
   directly to files in the ClamAV release branches.
1306
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/765
1308
+
1309
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/765)
1307 1310
 
1308 1311
 - Update vendored libmspack library to version 0.11alpha.
1309
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/829
1312
+
1313
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/829)
1310 1314
 
1311 1315
 Special thanks to the following people for code contributions and bug reports:
1312 1316
 - Simon Scannell
... ...
@@ -1970,20 +2830,24 @@ The ClamAV team thanks the following individuals for their code submissions:
1970 1970
 ClamAV 0.103.11 is a patch release with the following fixes:
1971 1971
 
1972 1972
 - Upgrade the bundled UnRAR library (libclamunrar) to version 6.2.12.
1973
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/1053
1973
+
1974
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1053)
1974 1975
 
1975 1976
 - Windows: libjson-c 0.17 compatibility fix. with ssize_t type definition.
1976
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/1065
1977
+
1978
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1065)
1977 1979
 
1978 1980
 - Windows: Update build system to use OpenSSL 3 and PThreads-Win32 v3.
1979
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/1057
1981
+
1982
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1057)
1980 1983
 
1981 1984
 ## 0.103.10
1982 1985
 
1983 1986
 ClamAV 0.103.10 is a critical patch release with the following fixes:
1984 1987
 
1985 1988
 - Upgrade the bundled UnRAR library (libclamunrar) to version 6.2.10.
1986
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/1009
1989
+
1990
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1009)
1987 1991
 
1988 1992
 ## 0.103.9
1989 1993
 
... ...
@@ -1997,7 +2861,8 @@ ClamAV 0.103.9 is a critical patch release with the following fixes:
1997 1997
 
1998 1998
 - Fixed compiler warnings that may turn into errors in Clang 16.
1999 1999
   Patch courtesy of Michael Orlitzky.
2000
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/747
2000
+
2001
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/747)
2001 2002
 
2002 2003
 Special thanks to the following people for code contributions and bug reports:
2003 2004
 - Michael Orlitzky
... ...
@@ -2020,7 +2885,8 @@ ClamAV 0.103.8 is a critical patch release with the following fixes:
2020 2020
   Thank you to Simon Scannell for reporting this issue.
2021 2021
 
2022 2022
 - Update vendored libmspack library to version 0.11alpha.
2023
-  - GitHub pull request: https://github.com/Cisco-Talos/clamav/pull/830
2023
+
2024
+  [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/830)
2024 2025
 
2025 2026
 Special thanks to the following people for code contributions and bug reports:
2026 2027
 - Simon Scannell
... ...
@@ -7,7 +7,7 @@
7 7
 install(DIRECTORY DESTINATION ${CVD_CERTS_DIRECTORY} COMPONENT programs)
8 8
 install(
9 9
     FILES
10
-        ${CMAKE_CURRENT_SOURCE_DIR}/clamav-beta.crt
10
+        ${CMAKE_CURRENT_SOURCE_DIR}/clamav.crt
11 11
     DESTINATION
12 12
         ${CVD_CERTS_DIRECTORY}
13 13
     COMPONENT programs)
14 14
deleted file mode 100644
... ...
@@ -1,31 +0,0 @@
1
-MIIFWTCCA0ECFFGI/XH5m4TXcLToRREsv2+iSkhyMA0GCSqGSIb3DQEBCwUAMGkx
2
-CzAJBgNVBAYTAlVTMQswCQYDVQQIDAJNRDEPMA0GA1UEBwwGTGF1cmVsMQ4wDAYD
3
-VQQKDAVDaXNjbzEOMAwGA1UECwwFVGFsb3MxHDAaBgNVBAMME0NsYW1BViBCRVRB
4
-IFJvb3QgQ0EwHhcNMjUwMzI2MjEzMTU2WhcNMjcwMzI2MjEzMTU2WjBpMQswCQYD
5
-VQQGEwJVUzELMAkGA1UECAwCTUQxDzANBgNVBAcMBkxhdXJlbDEOMAwGA1UECgwF
6
-Q2lzY28xDjAMBgNVBAsMBVRhbG9zMRwwGgYDVQQDDBNDbGFtQVYgQkVUQSBSb290
7
-IENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA8/tWT27KPBSFb7ER
8
-c9jqJEhGXA0NNa/RBT5cumFsTm0253BXAJmIZa9EJTCyPuetGjQNKtOQ66VheL2D
9
-2oyB3M7UIs1GP1epFu32eLDNzxPio6VV/Oge8Q7DVOsXtymS9jLNGmCAJ2gj+WuG
10
-etV7laHuSFG02uwhef3yvfuvI4odRwEhSXiUt3J52siTnsetc9VLw6C4tAdtigBA
11
-1oNx0pubPxAIXYNQeUeAZ8IyaUY+xtW/ekte8wFf4vbXXif1Fc4qA/tG0yGSIT2y
12
-0SNrB1Wl0XTWQ63BStqY/Gqyyvr7BcZcPIcUIbIpmHFeYdp7WKfggQaOs3F5Fjvz
13
-D17ZVRNkKCz0c3sLAQAOcB4gDHdbhNCQwY/w51ZkwYj1WdVeOsVLCq+itDD0lSiT
14
-zrrchQbP3dytQTIiTX3V413QVPv7Tc6sZZELA3CiOTgrPj5TGWPVmhzCXOnllGZB
15
-2gloHz8kxU1Uh/XzT8Qgi3CSZK0kweunIRYLmHGhdPcGeELK1SdJt7InFWzoUPLS
16
-+sWJ+7/hqz5qeNJjTQTOZ+QYxvVlSU+fpUr2ovN4lVwzlr9jBZMb+vIlP7nhNpx3
17
-8JL+ARc9E8k1vnxMA5YN1cDvkebi236vazXnoNunGhk4oHuBGXPvLzM1IGFbh3qC
18
-bV9q343HnKa8PjouGY32+7gW1QUCAwEAATANBgkqhkiG9w0BAQsFAAOCAgEAxw7M
19
-RwgCrnebt9yEUmzE+/Z1UHl+MZsLUiyoraQXgx/gtJeD34H+MMIivxt/j260aser
20
-/nPF0WQ7up6WuQ6tEdU0KPH18g4cCL8H8p/SFYSw0u02NB1d69NUvhR7TLwS1yKQ
21
-AdiQH5Vw7y18rZKGoMiEvKPDnfkTwQY9EAdAcFxjwlWroB437MFmXe7wz3uQdB+i
22
-A5g6lKtkvYcUQddIKfCsNVzRN2q4BjQq2EdwUSC+Z12baaTAx+BUSppvvhD7t9Fa
23
-CNDAJkaVGFvo8CnuOkNCgDMnXLMP95HhwTzRLJIEfGu8uDKRe0yJfBnNAZyHiUdf
24
-qNhtkjfdnNT2ZzHaRuAbc+6bm8NAzPH9dkdg5RxTvdAEZfRzMythLso47PX94mlt
25
-7SjZnIvArJt4TjoQ5K6JnX9CmEJeXBuVbNfiCnu11MitrfVV8BWpBh4gIP5x4kM4
26
-qyFle7x2jDaC9Nc14QpOsNcmFI0i8itXwqKTaqnX4r05w0IIHu6RbgzXyJLSGMi0
27
-Bd/OoRMlH6aAxOD3W8PR18TkR7wt5++qMEC+hvpTIBfqDzM6q/l1Gv1/xzKtDiFL
28
-9ZmIM79osXAOPMn/dNAh4hVURBl2n7/69FSRzQbVIBGt2YYlWV9HVfOXquuYJ3py
29
-pOQCrNNrFjEMFifHqO2ktkn7c8Tsw4dFVnIhKFU=
30 1
new file mode 100755
... ...
@@ -0,0 +1,32 @@
0
+-----BEGIN CERTIFICATE-----
1
+MIIFhTCCA22gAwIBAgIJBJPyuFHF1b7RMA0GCSqGSIb3DQEBDQUAMF8xDjAMBgNV
2
+BAsTBUFyYm9yMQ4wDAYDVQQKEwVDaXNjbzE9MDsGA1UEAxM0Q2lzY28gU29mdHdh
3
+cmUgSWRlbnRpdHkgUm9vdCBDQSBSU0EgNDA5NiBTSEE1MTIgMjA5OTAgFw0yNDAx
4
+MjQxODQ1MjVaGA8yMDk5MDEyNDE4NDUyNVowXzEOMAwGA1UECxMFQXJib3IxDjAM
5
+BgNVBAoTBUNpc2NvMT0wOwYDVQQDEzRDaXNjbyBTb2Z0d2FyZSBJZGVudGl0eSBS
6
+b290IENBIFJTQSA0MDk2IFNIQTUxMiAyMDk5MIICIjANBgkqhkiG9w0BAQEFAAOC
7
+Ag8AMIICCgKCAgEA14hoPbzqZxPr8Wqpq2H+tOib+DkQP80mUP6zAw3uu+eNygd+
8
+jOBCenO6B7sp1sqCRT8QBQWQxNHVeVfMQN1vjMrqEMNh/eflVtOGy32UbkuQrVzj
9
+2H+G1PtjeMQKa26LD8XPDUIOpj9rzPdjKFFfz13tm21gNIiVSTI34T5BS5BNEQj1
10
+b+VQg+0kbANCOOTiTh+H/gxhpXRv8F3VNUrrPxA7a3WF5jhZZoPBns1LuBDW0fQ0
11
+av6q/uEWtfxMdSNsAxYWVhO90Nx4khOISA1Fs1h1klGsee5XZkLKdUWedZQzbUz1
12
+f7VPRxX+ddcK0Js2VPvxemMf2WaTbkrEi62y/cOaxqDs2xDTWEXrgOYYEfQ+RoeY
13
+pbzBCaErqZvCeOgrnXFSHSyyd9+dTOxJuypBH+AWKtmkQMQQ7RQJSkGvrP9NgRxD
14
+MXb1U4kpVn7kEEhv6telV9E8R635Zm4h/H9FQyc2LrLOuL5UPewMMWt8HqPbs2Xc
15
+n1kTLvpEDciDJDRvu4XuBsjgQMA0rlt5BHAmZdGO5Dq4+ARWAYrzN9+M0dK+0phT
16
+T9OOHItIL6wXcIiYLZBJlHfiemCByIcBBEYaRwdt3VP9tTl0F370StI2t1RMDPgt
17
+xHcsYqN09QG/tWzwr/yNckFhVs/+UGQWslv2/W6eiKge5REUFuxT6i7V6oUCAwEA
18
+AaNCMEAwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYE
19
+FLd8Wz4X/JJ6Oi/+znsT0DTPuju8MA0GCSqGSIb3DQEBDQUAA4ICAQCZEut7iqp8
20
+39u7CHD8zMrvOMmUKtJ7G1MrhkJfdyek8g7ArG74bgcxM3ptwDusdFgKh/mmCj/m
21
+FU6TNjsufZ9hAyOE16ZtGflkOrRlihPQThDdGCxQjRsLVQa9S0IDkM1v1ZqvIMEc
22
+PJOj3rhvkIJVjpHc0AZQP/TnaT/7dKD1wFOSNYwzdvE2HKVNA8XbeS9TNpHqYPvE
23
+2gX6vQ7Pdn9DIF6YOmOuBobmaD1G7WbDz5Kvz5e3FdkzR+K3sGW4Qsr3OLt25dQS
24
+H+x7X06fihUxhEgRJJp2cPKABSKVR2hoyzKNEbzgtV25gH7lr+EHA6CQYltkVpyM
25
+4v1+PdX1EGY0+rAO+NsRwa6ndFteofJLh9PbvxHp0jGWnT1KF4lhmEyyka9JKbqT
26
+yiyGzDsw/YA9NxiAsp/Ex8aYXX1/SeM/kb6dp7tytsHewwflns1jfGqRVyrXQ41x
27
+CmmSioBvtZiry8BJTa8xIUWEsBL1pTl2RZrPDAw/qD10K2XJfh5HYFSkIppoIO+9
28
+0wN8TYcXbyY+JnU/g32AvkmA3o8lotK6nbwuf7MAFdtPHMA4F8mPM3jADc1uGu9O
29
+YweaA1c+P5KEOyr325cgsT04x4oeyvP3c3XMLpDpSgbzhfc9WyLYCf3R3jHlst1A
30
+KaDwBk2xoE3knxihYjbcRfjaaYdUkWY4mg==
31
+-----END CERTIFICATE-----