Stephen Gran <[EMAIL PROTECTED]> writes: > Yes, but you'll need to do a fair amount of work :)
So far, this is easier for me than getting permission to share the file... > Then, run gdb /usr/bin/clamscan (gdb) set args temp/badmail (gdb) break ole2_extract.c:802 No source file named ole2_extract.c. Make breakpoint pending on future shared library load? (y or [n]) y Breakpoint 1 (ole2_extract.c:802) pending. (gdb) run Starting program: /usr/bin/clamscan temp/badmail [Thread debugging using libthread_db enabled] [New Thread 16384 (LWP 18302)] Breakpoint 2 at 0x4004d435: file ole2_extract.c, line 802. Pending breakpoint "ole2_extract.c:802" resolved LibClamAV Error: WARNING: not scanned; untested big block size - please report temp/badmail: OK ----------- SCAN SUMMARY ----------- Known viruses: 32886 Engine version: 0.84rc1 Scanned directories: 0 Scanned files: 1 Infected files: 0 Data scanned: 0.25 MB Time: 1.575 sec (0 m 1 s) Program exited normally. (gdb) bt full No stack. > And send the results. That will get us farther. If possible, leave the > unstripped debs laying around somewhere, as I may ask you to repeat this > work, but breaking and backtracing at different points. Sorry to have > to push the work onto you, but I don't see any other way right now. No problem... Michael Below -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

