Debian Package Tracker
Register | Log in
Subscribe

clamav

anti-virus utility for Unix - command-line interface

Choose email to subscribe with

general
  • source: clamav (main)
  • version: 1.4.2+dfsg-1
  • maintainer: ClamAV Team (archive) (DMD)
  • uploaders: Scott Kitterman [DMD] – Sebastian Andrzej Siewior [DMD] – Andreas Cadhalpun [DMD] – Michael Tautschnig [DMD] – Michael Meskes [DMD]
  • arch: all any
  • std-ver: 4.7.0
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 0.103.6+dfsg-0+deb10u1
  • o-o-sec: 0.103.9+dfsg-0+deb10u1
  • o-o-upd: 0.103.6+dfsg-0+deb10u1
  • oldstable: 0.103.10+dfsg-0+deb11u1
  • old-sec: 1.0.7+dfsg-1~deb11u2
  • old-upd: 0.103.10+dfsg-0+deb11u1
  • stable: 1.0.7+dfsg-1~deb12u1
  • testing: 1.4.2+dfsg-1
  • unstable: 1.4.2+dfsg-1
versioned links
  • 0.103.6+dfsg-0+deb10u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.103.9+dfsg-0+deb10u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.103.10+dfsg-0+deb11u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.0.7+dfsg-1~deb11u2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.0.7+dfsg-1~deb12u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.4.2+dfsg-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • clamav (13 bugs: 0, 10, 3, 0)
  • clamav-base
  • clamav-daemon (22 bugs: 0, 18, 4, 0)
  • clamav-doc
  • clamav-docs
  • clamav-freshclam (17 bugs: 0, 14, 3, 0)
  • clamav-milter (5 bugs: 0, 1, 4, 0)
  • clamav-testfiles
  • clamdscan (1 bugs: 0, 1, 0, 0)
  • libclamav-dev
  • libclamav12
action needed
The VCS repository is not up to date, push the missing commits. high
vcswatch reports that the current version of the package is not in its VCS.
Either you need to push your commits and/or your tags, or the information about the package's VCS are out of date. A common cause of the latter issue when using the Git VCS is not specifying the correct branch when the packaging is not in the default one (remote HEAD branch), which is usually "master" but can be modified in salsa.debian.org in the project's general settings with the "Default Branch" field). Alternatively the Vcs-Git field in debian/control can contain a "-b <branch-name>" suffix to indicate what branch is used for the Debian packaging.
Created: 2025-02-07 Last update: 2025-06-19 18:02
A new upstream version is available: 1.4.3 high
A new upstream version 1.4.3 is available, you should consider packaging it.
Created: 2025-06-19 Last update: 2025-06-19 17:30
2 security issues in trixie high

There are 2 open security issues in trixie.

2 important issues:
  • CVE-2025-20234: A vulnerability in Universal Disk Format (UDF) processing of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to a memory overread during UDF file scanning. An attacker could exploit this vulnerability by submitting a crafted file containing UDF content to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to terminate the ClamAV scanning process, resulting in a DoS condition on the affected software. For a description of this vulnerability, see the .
  • CVE-2025-20260: A vulnerability in the PDF scanning processes of ClamAV could allow an unauthenticated, remote attacker to cause a buffer overflow condition, cause a denial of service (DoS) condition, or execute arbitrary code on an affected device. This vulnerability exists because memory buffers are allocated incorrectly when PDF files are processed. An attacker could exploit this vulnerability by submitting a crafted PDF file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to trigger a buffer overflow, likely resulting in the termination of the ClamAV scanning process and a DoS condition on the affected software. Although unproven, there is also a possibility that an attacker could leverage the buffer overflow to execute arbitrary code with the privileges of the ClamAV process.
Created: 2025-06-18 Last update: 2025-06-19 05:00
2 security issues in sid high

There are 2 open security issues in sid.

2 important issues:
  • CVE-2025-20234: A vulnerability in Universal Disk Format (UDF) processing of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to a memory overread during UDF file scanning. An attacker could exploit this vulnerability by submitting a crafted file containing UDF content to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to terminate the ClamAV scanning process, resulting in a DoS condition on the affected software. For a description of this vulnerability, see the .
  • CVE-2025-20260: A vulnerability in the PDF scanning processes of ClamAV could allow an unauthenticated, remote attacker to cause a buffer overflow condition, cause a denial of service (DoS) condition, or execute arbitrary code on an affected device. This vulnerability exists because memory buffers are allocated incorrectly when PDF files are processed. An attacker could exploit this vulnerability by submitting a crafted PDF file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to trigger a buffer overflow, likely resulting in the termination of the ClamAV scanning process and a DoS condition on the affected software. Although unproven, there is also a possibility that an attacker could leverage the buffer overflow to execute arbitrary code with the privileges of the ClamAV process.
Created: 2025-06-18 Last update: 2025-06-19 05:00
3 security issues in bullseye high

There are 3 open security issues in bullseye.

2 important issues:
  • CVE-2025-20234: A vulnerability in Universal Disk Format (UDF) processing of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to a memory overread during UDF file scanning. An attacker could exploit this vulnerability by submitting a crafted file containing UDF content to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to terminate the ClamAV scanning process, resulting in a DoS condition on the affected software. For a description of this vulnerability, see the .
  • CVE-2025-20260: A vulnerability in the PDF scanning processes of ClamAV could allow an unauthenticated, remote attacker to cause a buffer overflow condition, cause a denial of service (DoS) condition, or execute arbitrary code on an affected device. This vulnerability exists because memory buffers are allocated incorrectly when PDF files are processed. An attacker could exploit this vulnerability by submitting a crafted PDF file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to trigger a buffer overflow, likely resulting in the termination of the ClamAV scanning process and a DoS condition on the affected software. Although unproven, there is also a possibility that an attacker could leverage the buffer overflow to execute arbitrary code with the privileges of the ClamAV process.
1 issue postponed or untriaged:
  • CVE-2025-20128: (postponed; to be fixed through a stable update) A vulnerability in the Object Linking and Embedding 2 (OLE2) decryption routine of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to an integer underflow in a bounds check that allows for a heap buffer overflow read. An attacker could exploit this vulnerability by submitting a crafted file containing OLE2 content to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to terminate the ClamAV scanning process, resulting in a DoS condition on the affected software. For a description of this vulnerability, see the . Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
Created: 2025-06-18 Last update: 2025-06-19 05:00
lintian reports 1 error and 23 warnings high
Lintian reports 1 error and 23 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2024-10-03 Last update: 2025-04-11 03:30
8 bugs tagged patch in the BTS normal
The BTS contains patches fixing 8 bugs, consider including or untagging them.
Created: 2025-01-06 Last update: 2025-06-19 18:00
Depends on packages which need a new maintainer normal
The packages that clamav depends on which need a new maintainer are:
  • sendmail (#740070)
    • Depends: libmilter1.0.1
    • Build-Depends: libmilter-dev
Created: 2019-11-22 Last update: 2025-06-19 16:01
Does not build reproducibly during testing normal
A package building reproducibly enables third parties to verify that the source matches the distributed binaries. It has been identified that this source package produced different results, failed to build or had other issues in a test environment. Please read about how to improve the situation!
Created: 2025-02-12 Last update: 2025-06-19 13:32
2 low-priority security issues in bookworm low

There are 2 open security issues in bookworm.

2 issues left for the package maintainer to handle:
  • CVE-2025-20128: (needs triaging) A vulnerability in the Object Linking and Embedding 2 (OLE2) decryption routine of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to an integer underflow in a bounds check that allows for a heap buffer overflow read. An attacker could exploit this vulnerability by submitting a crafted file containing OLE2 content to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to terminate the ClamAV scanning process, resulting in a DoS condition on the affected software. For a description of this vulnerability, see the . Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
  • CVE-2025-20260: (needs triaging) A vulnerability in the PDF scanning processes of ClamAV could allow an unauthenticated, remote attacker to cause a buffer overflow condition, cause a denial of service (DoS) condition, or execute arbitrary code on an affected device. This vulnerability exists because memory buffers are allocated incorrectly when PDF files are processed. An attacker could exploit this vulnerability by submitting a crafted PDF file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to trigger a buffer overflow, likely resulting in the termination of the ClamAV scanning process and a DoS condition on the affected software. Although unproven, there is also a possibility that an attacker could leverage the buffer overflow to execute arbitrary code with the privileges of the ClamAV process.

You can find information about how to handle these issues in the security team's documentation.

Created: 2025-01-22 Last update: 2025-06-19 05:00
debian/patches: 1 patch to forward upstream low

Among the 1 debian patch available in version 1.4.2+dfsg-1 of the package, we noticed the following issues:

  • 1 patch where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2025-02-07 07:00
Issues found with some translations low

Automatic checks made by the Debian l10n team found some issues with the translations contained in this package. You should check the l10n status report for more information.

Issues can be things such as missing translations, problematic translated strings, outdated PO files, unknown languages, etc.

Created: 2024-06-06 Last update: 2024-06-06 10:03
Build log checks report 2 warnings low
Build log checks report 2 warnings
Created: 2024-03-11 Last update: 2024-03-11 02:02
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.2 instead of 4.7.0).
Created: 2025-02-21 Last update: 2025-02-27 13:24
testing migrations
  • This package will soon be part of the auto-libxml2 transition. You might want to ensure that your package is ready for it. You can probably find supplementary information in the debian-release archives or in the corresponding release.debian.org bug.
news
[rss feed]
  • [2025-02-10] clamav 1.4.2+dfsg-1 MIGRATED to testing (Debian testing watch)
  • [2025-02-06] Accepted clamav 1.4.2+dfsg-1 (source) into unstable (Sebastian Andrzej Siewior)
  • [2024-12-06] Accepted clamav 1.0.7+dfsg-1~deb11u2 (source) into oldstable-security (Lucas Kanashiro)
  • [2024-12-05] Accepted clamav 1.0.7+dfsg-1~deb11u1 (source all amd64) into oldstable-security (Debian FTP Masters) (signed by: Lucas Kanashiro)
  • [2024-10-11] Accepted clamav 1.0.7+dfsg-1~deb12u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Sebastian Andrzej Siewior)
  • [2024-10-05] clamav 1.4.1+dfsg-1 MIGRATED to testing (Debian testing watch)
  • [2024-10-03] Accepted clamav 1.4.1+dfsg-1 (source) into unstable (Sebastian Andrzej Siewior)
  • [2024-08-30] clamav 1.3.1+dfsg-5 MIGRATED to testing (Debian testing watch)
  • [2024-08-27] Accepted clamav 1.3.1+dfsg-5 (source) into unstable (Sebastian Andrzej Siewior)
  • [2024-07-01] clamav 1.3.1+dfsg-4 MIGRATED to testing (Debian testing watch)
  • [2024-06-28] Accepted clamav 1.3.1+dfsg-4 (source) into unstable (Sebastian Andrzej Siewior)
  • [2024-06-07] clamav 1.3.1+dfsg-3 MIGRATED to testing (Debian testing watch)
  • [2024-06-04] Accepted clamav 1.3.1+dfsg-3 (source) into unstable (Sebastian Andrzej Siewior)
  • [2024-05-30] Accepted clamav 1.3.1+dfsg-2 (source all amd64) into experimental (Debian FTP Masters) (signed by: Sebastian Andrzej Siewior)
  • [2024-05-07] clamav 1.0.6+dfsg-1 MIGRATED to testing (Debian testing watch)
  • [2024-05-05] Accepted clamav 1.3.1+dfsg-1 (source) into experimental (Sebastian Andrzej Siewior)
  • [2024-05-04] Accepted clamav 1.0.6+dfsg-1 (source) into unstable (Sebastian Andrzej Siewior)
  • [2024-05-02] clamav 1.0.5+dfsg-1.1 MIGRATED to testing (Debian testing watch)
  • [2024-05-02] clamav 1.0.5+dfsg-1.1 MIGRATED to testing (Debian testing watch)
  • [2024-03-08] Accepted clamav 1.0.5+dfsg-1~deb12u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Sebastian Andrzej Siewior)
  • [2024-02-28] Accepted clamav 1.0.5+dfsg-1.1 (source) into unstable (Steve Langasek)
  • [2024-02-13] clamav 1.0.5+dfsg-1 MIGRATED to testing (Debian testing watch)
  • [2024-02-08] Accepted clamav 1.0.5+dfsg-1 (source) into unstable (Sebastian Andrzej Siewior)
  • [2024-02-04] Accepted clamav 1.2.1+dfsg-3 (source all amd64) into experimental (Debian FTP Masters) (signed by: Sebastian Andrzej Siewior)
  • [2024-01-22] clamav 1.0.4+dfsg-1 MIGRATED to testing (Debian testing watch)
  • [2024-01-20] Accepted clamav 1.0.4+dfsg-1 (source) into unstable (Sebastian Andrzej Siewior)
  • [2023-11-07] Accepted clamav 1.2.1+dfsg-2 (source) into experimental (Sebastian Andrzej Siewior)
  • [2023-11-06] Accepted clamav 1.2.1+dfsg-1 (source all amd64) into experimental (Debian FTP Masters) (signed by: Sebastian Andrzej Siewior)
  • [2023-09-11] clamav 1.0.3+dfsg-2 MIGRATED to testing (Debian testing watch)
  • [2023-09-10] Accepted clamav 0.103.10+dfsg-0+deb11u1 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Sebastian Andrzej Siewior)
  • 1
  • 2
bugs [bug history graph]
  • all: 63
  • RC: 0
  • I&N: 49
  • M&W: 14
  • F&P: 0
  • patch: 8
links
  • homepage
  • lintian (1, 23)
  • buildd: logs, checks, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • l10n (89, -)
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1.4.2+dfsg-1ubuntu1
  • 45 bugs
  • patches for 1.4.2+dfsg-1ubuntu1

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing