*INFECTED*:
Virus Win.Malware.Agent3100026061/CRDF-1:
https://assets.thdstatic.com/core/thd-new-relic/v2.1.2/thdNewRelic.lite.umd.js
virus total:
https://www.virustotal.com/gui/url-analysis/u-a780cb161d405c977403ec663761cd209081e5163763e1ee41567ceaac502e6d-1719247959
shows clean
Any other
On 4/29/24 03:14, Marc wrote:
>
>>
>> With the help of John Sullivan and Sérgio M. Basto we have gotten the
>> Fedora ClamAV 1.0.X package in shape to be built for EPEL 7 and 8. We
>> have a COPR available now with builds of 1.0.6 ready for testing here:
>>
>
> Hi Orion, I wrote Sergio a few mon
ers On Behalf Of Orion
> Poplawski via clamav-users
> Sent: 27 April 2024 01:06
> To: ClamAV users ML
> Cc: Orion Poplawski
> Subject: [clamav-users] ClamAV 1.0.X for EPEL 7 & 8
>
> With the help of John Sullivan and Sérgio M. Basto we have gotten the
> Fedora Cla
With the help of John Sullivan and Sérgio M. Basto we have gotten the
Fedora ClamAV 1.0.X package in shape to be built for EPEL 7 and 8. We
have a COPR available now with builds of 1.0.6 ready for testing here:
https://copr.fedorainfracloud.org/coprs/g/clamav/clamav-1.0/
We will likely push t
On 3/7/23 10:48, kumar bava via clamav-users wrote:
Hi, please help me with the below question, thank you
We have been using clamav-0.103.6 and would like to upgrade to the new
LTS release(1.0.x).
However, I can not find clamav-1.0.1 in EPEL distribution. Our systems
are based on rhel7.
So f
On 2/14/23 14:15, Tim Carr via clamav-users wrote:
Hello, all. Running a recently-upgraded Fedora 37 server image, and I’ve
noticed that the clamd@scan.service is taking about a minute to get
running after a reboot. My boot times before were less than a minute,
but now that service is really st
I'm one of the maintainers of the clamav package in Fedora and Fedora
EPEL. I believe that the EPEL packages are currently one of the primary
sources for users of clamav on RHEL based distributions.
We were recently asked about the future of support for clamav in EL7 in
particular[1] since ht
On 1/6/23 14:29, Scott Kitterman via clamav-users wrote:
On Thursday, January 5, 2023 8:51:27 AM EST Scott Kitterman via clamav-users
wrote:
We finally have Clamav 1.0.0 in Debian Unstable.
Unfortunately, unit tests fail on all big endian archs (shown in the PowerPC
build log [1] - it's the sam
Our filtering proxy is hitting on the following URL:
https://ardownload2.adobe.com/pub/adobe/reader/win/AcrobatDC/2200320263/AcroRdrDCUpd2200320263_MUI.msp
*INFECTED* * *DENIED* Virus or bad content detected.
Win.Ransomware.Razy-9978545-0
The strange thing is, if I run clamscan on the full fil
On 10/24/22 11:03, Hoevenaar, Jeffrey (GE Aerospace, US) via
clamav-users wrote:
Hello,
It would appear ClamAV will not run on RHEL9 with FIPS enabled.
Has anyone else seen this issue?
Known issue: https://github.com/Cisco-Talos/clamav/issues/564
which it seems you have already found.
--
Or
We're starting to run clamav on more local hosts and were starting to
see rate limiting messages. So I've setup a local private mirror with
cvdupdate in each of our offices. However now I'm starting to see
warnings like:
Received signal: wake up
ClamAV update process started at Wed May 25 07
# dig +short @ns1e.clamav.net. current.cvd.clamav.net. txt
"0.103.6:62:26552:1653485340:1:90:49192:333"
No response from:
# dig +short @ns2a.clamav.net. current.cvd.clamav.net. txt
Out of date:
# dig +short @ns4a.clamav.net. current.cvd.clamav.net. txt
"0.103.6:62:26546:1652981340:1:90:49192:333
>
> I scanned the tar balls at gnome.org and didn't find anything though, but
> maybe you got it from somewhere else.
>
> Sincerely,
>
> Eric Tykwinski
> TrueNet, Inc.
> P: 610-429-8300
>
> -----Original Message-----
> From: clamav-users On Behalf Of
clamav is reporting BC.Gif.Exploit.Agent-1425366.Agent for a gif inside of the
gdk-pixbuf2 tarball. I've tried adding it do our local whitelist.ign2 file,
but that doesn't appear to take effect. Any way to ignore this definition?
Thanks,
Orion
--
Orion Poplawski
IT Systems Manager
14 matches
Mail list logo