Back to clamav PTS page

Accepted clamav 0.103.6+dfsg-1 (source) into unstable



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Thu, 12 May 2022 18:55:59 +0200
Source: clamav
Architecture: source
Version: 0.103.6+dfsg-1
Distribution: unstable
Urgency: medium
Maintainer: ClamAV Team <pkg-clamav-devel@lists.alioth.debian.org>
Changed-By: Sebastian Andrzej Siewior <sebastian@breakpoint.cc>
Changes:
 clamav (0.103.6+dfsg-1) unstable; urgency=medium
 .
   * Import 0.103.6
     - CVE-2022-20770 (Possible infinite loop vulnerability in the CHM file
       parser).
     - CVE-2022-20796 (Possible NULL-pointer dereference crash in the scan
       verdict cache check).
     - CVE-2022-20771 (Possible infinite loop vulnerability in the TIFF file
       parser).
     - CVE-2022-20785 (Possible memory leak in the HTML file parser/
       Javascript normalizer).
     - CVE-2022-20792 (Possible multi-byte heap buffer overflow write
       vulnerability in the signature database load module.
     - Update symbol file.
Checksums-Sha1:
 814f3d6909cc8c9bf2f441f74d989bf7cca39ba3 2951 clamav_0.103.6+dfsg-1.dsc
 6212705bf2cb168a55f76ae4cab31fa40909aed8 7135300 clamav_0.103.6+dfsg.orig.tar.xz
 7423823f1e8af6716ee69a33b4f1fcdc7710bbfa 220264 clamav_0.103.6+dfsg-1.debian.tar.xz
Checksums-Sha256:
 a307fd28dd57bdcfb12bdfdb26ee225e83c506338b1367e18b1d6dc0e3d99853 2951 clamav_0.103.6+dfsg-1.dsc
 b1c740636772259addbca9901a27bb92213970eaba820db472b3cfe328b5a0b2 7135300 clamav_0.103.6+dfsg.orig.tar.xz
 1a70071fc93d04f42e69c3d9f7cdae1fffb19c20eeeae864e595f45469eee9c1 220264 clamav_0.103.6+dfsg-1.debian.tar.xz
Files:
 48dbcdac9c6cf0b42eeeab4b1383879d 2951 utils optional clamav_0.103.6+dfsg-1.dsc
 ef852aa3917ceb5647361da21c8830a3 7135300 utils optional clamav_0.103.6+dfsg.orig.tar.xz
 4d1f528c717714c7de5265f3b95cb314 220264 utils optional clamav_0.103.6+dfsg-1.debian.tar.xz

-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEEZCVGlf/wqkRmzBnme5boFiqM9dEFAmJ9Q4cACgkQe5boFiqM
9dH1ew//XfmDOLGycom90zAH5nFNYFHzh3gB8npjaIG0JPWBUh8NOcycvIvQiPCq
jbXo7/Qs0o4liopN68rPSvCcoyWhVR4zNNIFNJ06LhxDeP+B7YUp7MuiyFHhUuiF
01UrA9Onqnsi3kc2Fo+58dZtfHZnDgiT7orbv2GWDshDKE6zYBqzrMFoPkNnBFEJ
vxFjQq9FHXiCtT57aL5TPmRUcVUJ07MpZrV8wzi2RlUxq7nnEZcG6sjK9laLlgfO
zdrF3a0VJsgRWVAnLLuChxSZndSOH8c+QsHT+xFbGwcLRgSCDvxu8/Qqe10P4tpq
5qv/aIY/JRJxrpjGyFUvs2C7hD9s250f2PZysnImDois5+wI7ILubSO45USBYQzu
csoc6cVB1mWdaWEWjMKU8lJwWFb7CpuxIz4qZOGnBWP4kKNyZ7tT/0KuZHiTL6mm
QIl1qMznRK4ZllwxN5BioH7eoZ8PkV0YSgAiomKWzLE1qJowTFZN/ZpNGtjCA1Oq
oURiTLZneN47AZAIEEbj+mLJSLGz82V0VoC5hu3oRa6RiCh3KxC2MIiPo/Ut1Uj0
y3z8BC3blm8JhBy66NLW+fsxbDtMQoq6lkyMVzfAAO1moju1QOj6GqdySFn4NVqr
eiUpatLjcIma/0zUjX3KRWgNpNRy6O+fLRXDGg4AE2AHk5DwqYg=
=ebeL
-----END PGP SIGNATURE-----