-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Package : clamav Version : 0.99.2+dfsg-0+deb7u5 CVE ID : CVE-2017-6419 CVE-2017-11423
CVE-2017-6419 CVE-2017-11423 Two vulnerabilities have been fixed that can be used for denial of service or maybe unspecified impact via drafted files (heap-based buffer overflow and stack-based buffer over-read causing application crash) For Debian 7 "Wheezy", these problems have been fixed in version 0.99.2+dfsg-0+deb7u5. We recommend that you upgrade your clamav packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iQJ8BAEBCgBmBQJaggmvXxSAAAAAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQ2MjAxRkJGRkRCQkRFMDc4MjJFQUJCOTY5 NkZDQUMwRDM4N0I1ODQ3AAoJEJb8rA04e1hHdAEQAJ9T+RX7lqnpf9j7bPFkz2nK cZWr77Vl9UKM7dAN/dMKV1LVNQgJNHD64cV3yic825VYtmCLEWWBbeBDHQyLYLX4 Rk+YisxEJtphfoCZsGl+vJxQ/smLp9V6FQ3wMAZThR0mvNsQiBgXk4yROzXy26oE zWdwFwWWwG66EIMdgcaOA5M0VFJKJBmQ88vIg+grrA76vhh+OuI8SoZeCyFZRysB PMsrRKdIwEqjCRGl20KL82/+CIripEaSBSVjoT9/b+f1m0zuYetLYCELJMHNSCnX xsdxdoyk0pURYi1FkF2JJR1DkKYOFAPbuuIyk90lmlop0GqUrMgZgs3HO48Ss8VV PWtS6FxX44GtKkYKvkS2pk9/xC9iVJC4KxuPkMF5XmocX8335fHRbRx6l7/mCzOx 8zmTsSYfReZg216IiQiaRuCGR6lvqC5G6yt6vG/0F01LVaTpLcJEZMyu88XQ/Adn DVgHZTl2cD6z+3ggye6RaYwkImZgZmHxcj79GWmQl4TV/LolAyXGfxqabZplJmf4 vzLtLTSYB3fsz5oZuz6pS1YG0dDTMfO01s6oxy5cTG4oZivP5pK1NXLgC5xQa6NM 7so/hcj/S3jlxCa8qRnOyBIVZPXiTUgY+Kl0TsJ3zKKcznGqYt6FyxSK7MVt4aU6 4urjBw1xXjpUrM/CGYzQ =ZFBy -----END PGP SIGNATURE-----