Unfortunately, the ExcludeUID option in 0.99.2 is broken due to an
oversight in how clam's optparser handles numbered lists which include 0.
You can follow along with the resolution of that issue here:
https://bugzilla.clamav.net/show_bug.cgi?id=11978

An important takeaway for you in that thread, as a RHEL 7 user, is that
your SELinux targeted policy will prevent clamd from stating /proc/PID
entirely--breaking the ExcludeUID functionality even farther. A second
takeaway might be the patches you can apply to rebuild clam locally with
the new fixes which might help solve the issue you're seeing.

Hope this helps you a bit. Sorry things weren't quite right the first go
round--that's my bad.

- Mickey

On Wed, Dec 13, 2017 at 2:37 AM, Juan Asensio Sánchez <oke...@gmail.com>
wrote:

> Hi, I am trying to configure clamd (running as user root) with ScanOnAccess
> enabled and "OnAccessExcludeUID 0". Basically, our web app allows the user
> to upload files using a WS (the web server runs as user xxxx, not root),
> and then a batch job processes the file. I have also enabled
> OnAccessPrevention, so in case of an upload with an infected file, the
> batch job can't access (but root user could do it, as per
> OnAccessExcludeUID). I have also created a script configured in VirusEvent
> so we are alerted when a virus is detected. The problem is that, as the
> file remains, the batch job is always trying to process the file, throwing
> errors. I have tried to move the file to a quarantine folder using the
> VirusEvent script, but the server completely freezes; after the tests, I
> have read in some webs that we shouldn't move or delete the infected file
> inside that script.
>
> So, what could be a solution? How can I move the file to a quarantine
> folder using this configuration? Is there a better/alternative solution?
>
> # uname -a
> Linux xxxxxxx 3.10.0-693.11.1.el7.x86_64 #1 SMP Fri Oct 27 05:39:05 EDT
> 2017 x86_64 x86_64 x86_64 GNU/Linux
>
> # cat /etc/redhat-release
> Red Hat Enterprise Linux Server release 7.4 (Maipo)
>
> # rpm -qa | grep clam
> clamav-filesystem-0.99.2-8.el7.noarch
> clamav-server-systemd-0.99.2-8.el7.noarch
> clamav-update-0.99.2-8.el7.x86_64
> clamav-data-0.99.2-8.el7.noarch
> clamav-server-0.99.2-8.el7.x86_64
> clamav-scanner-0.99.2-8.el7.noarch
> clamav-0.99.2-8.el7.x86_64
> clamav-lib-0.99.2-8.el7.x86_64
> clamav-scanner-systemd-0.99.2-8.el7.noarch
>
> Thanks.
> _______________________________________________
> clamav-users mailing list
> clamav-users@lists.clamav.net
> http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users
>
>
> Help us build a comprehensive ClamAV guide:
> https://github.com/vrtadmin/clamav-faq
>
> http://www.clamav.net/contact.html#ml
>
_______________________________________________
clamav-users mailing list
clamav-users@lists.clamav.net
http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to