[clamav-users] False positive?

2024-06-24 Thread Orion Poplawski via clamav-users
*INFECTED*: Virus Win.Malware.Agent3100026061/CRDF-1: https://assets.thdstatic.com/core/thd-new-relic/v2.1.2/thdNewRelic.lite.umd.js virus total: https://www.virustotal.com/gui/url-analysis/u-a780cb161d405c977403ec663761cd209081e5163763e1ee41567ceaac502e6d-1719247959 shows clean Any other

Re: [clamav-users] ClamAV 1.0.X for EPEL 7 & 8

2024-04-29 Thread Orion Poplawski via clamav-users
On 4/29/24 03:14, Marc wrote: > >> >> With the help of John Sullivan and Sérgio M. Basto we have gotten the >> Fedora ClamAV 1.0.X package in shape to be built for EPEL 7 and 8. We >> have a COPR available now with builds of 1.0.6 ready for testing here: >> > > Hi Orion, I wrote Sergio a few mon

Re: [clamav-users] ClamAV 1.0.X for EPEL 7 & 8

2024-04-29 Thread Orion Poplawski via clamav-users
ers On Behalf Of Orion > Poplawski via clamav-users > Sent: 27 April 2024 01:06 > To: ClamAV users ML > Cc: Orion Poplawski > Subject: [clamav-users] ClamAV 1.0.X for EPEL 7 & 8 > > With the help of John Sullivan and Sérgio M. Basto we have gotten the > Fedora Cla

[clamav-users] ClamAV 1.0.X for EPEL 7 & 8

2024-04-26 Thread Orion Poplawski via clamav-users
With the help of John Sullivan and Sérgio M. Basto we have gotten the Fedora ClamAV 1.0.X package in shape to be built for EPEL 7 and 8. We have a COPR available now with builds of 1.0.6 ready for testing here: https://copr.fedorainfracloud.org/coprs/g/clamav/clamav-1.0/ We will likely push t

Re: [clamav-users] linux distribution including clamav-1.0.1

2023-03-07 Thread Orion Poplawski via clamav-users
On 3/7/23 10:48, kumar bava via clamav-users wrote: Hi, please help me with the below question, thank you We have been using clamav-0.103.6 and would like to upgrade to the new LTS release(1.0.x). However, I can not find clamav-1.0.1 in EPEL distribution. Our systems are based on rhel7. So f

Re: [clamav-users] ClamAV & Fedora 37 - Long Initialization Time at Boot

2023-02-18 Thread Orion Poplawski via clamav-users
On 2/14/23 14:15, Tim Carr via clamav-users wrote: Hello, all. Running a recently-upgraded Fedora 37 server image, and I’ve noticed that the clamd@scan.service is taking about a minute to get running after a reboot. My boot times before were less than a minute, but now that service is really st

[clamav-users] Future support of clamav in EPEL7 and EPEL8

2023-02-18 Thread Orion Poplawski via clamav-users
I'm one of the maintainers of the clamav package in Fedora and Fedora EPEL. I believe that the EPEL packages are currently one of the primary sources for users of clamav on RHEL based distributions. We were recently asked about the future of support for clamav in EL7 in particular[1] since ht

Re: [clamav-users] Testing for Big Endian Architectures

2023-01-07 Thread Orion Poplawski via clamav-users
On 1/6/23 14:29, Scott Kitterman via clamav-users wrote: On Thursday, January 5, 2023 8:51:27 AM EST Scott Kitterman via clamav-users wrote: We finally have Clamav 1.0.0 in Debian Unstable. Unfortunately, unit tests fail on all big endian archs (shown in the PowerPC build log [1] - it's the sam

[clamav-users] clamscan on truncated file reports infection

2022-12-01 Thread Orion Poplawski via clamav-users
Our filtering proxy is hitting on the following URL: https://ardownload2.adobe.com/pub/adobe/reader/win/AcrobatDC/2200320263/AcroRdrDCUpd2200320263_MUI.msp *INFECTED* * *DENIED* Virus or bad content detected. Win.Ransomware.Razy-9978545-0 The strange thing is, if I run clamscan on the full fil

Re: [clamav-users] ClamAV on RHEL9 with FIPS enabled

2022-10-26 Thread Orion Poplawski via clamav-users
On 10/24/22 11:03, Hoevenaar, Jeffrey (GE Aerospace, US) via clamav-users wrote: Hello, It would appear ClamAV will not run on RHEL9 with FIPS enabled. Has anyone else seen this issue? Known issue: https://github.com/Cisco-Talos/clamav/issues/564 which it seems you have already found. -- Or

[clamav-users] How often can I run cvdupdate?

2022-05-25 Thread Orion Poplawski via clamav-users
We're starting to run clamav on more local hosts and were starting to see rate limiting messages. So I've setup a local private mirror with cvdupdate in each of our offices. However now I'm starting to see warnings like: Received signal: wake up ClamAV update process started at Wed May 25 07

[clamav-users] DNS server out of date

2022-05-25 Thread Orion Poplawski via clamav-users
# dig +short @ns1e.clamav.net. current.cvd.clamav.net. txt "0.103.6:62:26552:1653485340:1:90:49192:333" No response from: # dig +short @ns2a.clamav.net. current.cvd.clamav.net. txt Out of date: # dig +short @ns4a.clamav.net. current.cvd.clamav.net. txt "0.103.6:62:26546:1652981340:1:90:49192:333

Re: [clamav-users] Cannot ignore BC.Gif.Exploit.Agent-1425366.Agent

2021-07-21 Thread Orion Poplawski via clamav-users
> > I scanned the tar balls at gnome.org and didn't find anything though, but > maybe you got it from somewhere else. > > Sincerely, > > Eric Tykwinski > TrueNet, Inc. > P: 610-429-8300 > > -----Original Message----- > From: clamav-users On Behalf Of

[clamav-users] Cannot ignore BC.Gif.Exploit.Agent-1425366.Agent

2021-07-21 Thread Orion Poplawski via clamav-users
clamav is reporting BC.Gif.Exploit.Agent-1425366.Agent for a gif inside of the gdk-pixbuf2 tarball. I've tried adding it do our local whitelist.ign2 file, but that doesn't appear to take effect. Any way to ignore this definition? Thanks, Orion -- Orion Poplawski IT Systems Manager