Package: clamav Version: 0.86.1-1 Severity: important -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
iDefense discovered several vulnerabilities in ClamAV (< 0.86) allowing attackers to cause a Denial of Service condition. http://www.idefense.com/application/poi/display?id=275&type=vulnerabilities http://www.idefense.com/application/poi/display?id=276&type=vulnerabilities Regards, Daniel - -- System Information: Debian Release: testing/unstable APT prefers unstable APT policy: (850, 'unstable'), (700, 'testing'), (500, 'oldstable'), (500, 'stable'), (110, 'experimental') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.8.15050330 Locale: LANG=de_DE, LC_CTYPE=de_DE (charmap=ISO-8859-1) Versions of packages clamav depends on: ii clamav-freshclam [clamav-da 0.86.1-1 downloads clamav virus databases f ii libbz2-1.0 1.0.2-7 high-quality block-sorting file co ii libc6 2.3.2.ds1-22 GNU C Library: Shared libraries an ii libclamav1 0.86.1-1 virus scanner library ii libcurl3 7.14.0-2 Multi-protocol file transfer libra ii libgmp3 4.1.4-6 Multiprecision arithmetic library ii libidn11 0.5.13-1.0 GNU libidn library, implementation ii libssl0.9.7 0.9.7g-1 SSL shared libraries ii zlib1g 1:1.2.2-4 compression library - runtime Versions of packages clamav recommends: ii arj 3.10.21-4 archiver for .arj files ii unzoo 4.4-4 zoo archive extractor - -- no debconf information -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.1 (GNU/Linux) iD8DBQFCxD7Kdg0kG0+YFBERAgvLAJ9HoAIVHTqA93al4/dDYe94ST81jwCePfJp cygQhFBsjxWUpGd1O1Fzoak= =PpCZ -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]