The offending signature has been pulled as of daily: 21070, published on
Nov 18.

- Alain

On Thu, Nov 19, 2015 at 2:57 AM, Al Varnell <alvarn...@mac.com> wrote:

> I certainly agree with that.
>
> As I said in the original thread on this issue, I rarely come to the list
> with FP issues unless they appear to be impacting many users and commercial
> or system files.  I make sure they are being submitted to VT and ClamAV and
> call it a day.
>
> When the first few alerts on cache files came in, I simply told users to
> delete them, but when those with alerts to Adobe and other 3rd party apps
> arrived, I elected to join the conversation, already in progress here.
>
> -Al-
>
> On Wed, Nov 18, 2015 at 11:39 PM, Dennis Peterson wrote:
> >
> > Well sure, and no doubt they will - I'm just reminding people they have
> a pre-emptive path, too. I get the feeling sometimes people are
> over-confident in what the limited Clamav staff can accomplish in terms of
> short turn-around.
> >
> > dp
> >
> > On 11/18/15 11:36 PM, Al Varnell wrote:
> >> That’s what we did for ClamXav users, but given that it’s a
> cross-platform vulnerability, ClamAV needs to re-write or remove it, as
> well.
> >>
> >> -Al-
> >>
> >> On Wed, Nov 18, 2015 at 11:34 PM, Dennis Peterson wrote:
> >>> Write a local whitelist record?
> >>>
> >>> dp
> >>>
> >>> On 11/18/15 11:32 PM, Al Varnell wrote:
> >>>> I just submitted my FP to them 48 hours ago and have not received
> confirmation on it’s acceptance yet.  Not terribly unusual, but given that
> it impacts Adobe apps, I did expect to have some feedback by now.
> >>>>
> >>>> -Al-
> >>>>
> >>>> On Wed, Nov 18, 2015 at 10:07 PM, Gene Heskett wrote:
> >>>>> /home/gene/.cache/chromium/Default/Cache/f_000445:
> >>>>> Swf.Exploit.CVE_2015_5548 FOUND
> >>>>> /home/gene/.cache/chromium/Default/Cache/f_000031:
> >>>>> Swf.Exploit.CVE_2015_5548 FOUND
> >>>>> /home/gene/.cache/chromium/Default/Cache/f_000200:
> >>>>> Swf.Exploit.CVE_2015_5548 FOUND
> >>>>> /home/gene/.cache/chromium/Default/Cache/f_0001fb:
> >>>>> Swf.Exploit.CVE_2015_5548 FOUND
> >>>>> /home/gene/.cache/chromium/Default/Cache/f_000202:
> >>>>> Swf.Exploit.CVE_2015_5548 FOUND
> >>>>>
> >>>>> A sudo freshclam says everything is up to date.
> >>>>> gene@coyote:~$ sudo freshclam
> >>>>> [sudo] password for gene:
> >>>>> ClamAV update process started at Thu Nov 19 01:01:56 2015
> >>>>> main.cvd is up to date (version: 55, sigs: 2424225, f-level: 60,
> builder:
> >>>>> neo)
> >>>>> daily.cld is up to date (version: 21069, sigs: 1691987, f-level: 63,
> >>>>> builder: neo)
> >>>>> bytecode.cld is up to date (version: 270, sigs: 46, f-level: 63,
> builder:
> >>>>> shurley)
> >>>>>
> >>>>> Should this not be fixed by now, or is it real?  Since its in the
> browser
> >>>>> cache, I am just nuking them.
> >>>>>
> >>>>> Debian  wheezy here, up to date as of about 2 hours ago.
> >>>>>
> >>>>> Cheers, Gene Heskett
> >>>>>
> >>>>>
> >>>>> _______________________________________________
> >>>>> Help us build a comprehensive ClamAV guide:
> >>>>> https://github.com/vrtadmin/clamav-faq
> >>>>>
> >>>>> http://www.clamav.net/contact.html#ml
> >>> _______________________________________________
> >>> Help us build a comprehensive ClamAV guide:
> >>> https://github.com/vrtadmin/clamav-faq
> >>>
> >>> http://www.clamav.net/contact.html#ml
> >> -Al-
> >>
> >>
> >> _______________________________________________
> >> Help us build a comprehensive ClamAV guide:
> >> https://github.com/vrtadmin/clamav-faq
> >>
> >> http://www.clamav.net/contact.html#ml
> >
> > _______________________________________________
> > Help us build a comprehensive ClamAV guide:
> > https://github.com/vrtadmin/clamav-faq
> >
> > http://www.clamav.net/contact.html#ml
>
> -Al-
> --
> Al Varnell
> Mountain View, CA
>
>
>
>
>
> _______________________________________________
> Help us build a comprehensive ClamAV guide:
> https://github.com/vrtadmin/clamav-faq
>
> http://www.clamav.net/contact.html#ml
>
_______________________________________________
Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to