I am using ClamAV 0.103.6 on Buster, but I have always built it from source 
(since way before Cisco and even SourceFire), hence I'm a bit obsolete.

I did this -- and still do it -- because ClamAV has always been a bit 
experimental. Thus I install each version under "/opt/clamav.d/version" so I 
can easily revert if there is a problem. (And I have similarly disabled the 
systemd linkage for more control).



On Mon, 20 Feb 2023 14:11:10 +0200
Brent Clark via clamav-users <clamav-users@lists.clamav.net> wrote:

> Good day Guys
> 
> Anyone on Debian Buster and Bullseye?
> 
> How serious is this?
> Does anyone have any suggestions. Cause there is no packages available.
> 
> If anyone can share their thoughts / experiences.
> 
> Regards
> Brent
> 
> On 2023/02/18 21:13, unison.subject_0t--- via clamav-users wrote:
> > Vulnerabilities*
> >
> > —
> > Sent from my iPhone
> >  
> >> On Feb 18, 2023, at 13:54, Joel Esler <joel.es...@me.com> wrote:
> >>
> >> 100.3 hasn’t been supported in years.  There’s lots of our abilities that 
> >> affect the version.
> >>  
> >>> On Feb 18, 2023, at 13:36, George.G via clamav-users 
> >>> <clamav-users@lists.clamav.net> wrote:
> >>>
> >>> 
> >>> Hello,
> >>>
> >>> I would like to ask whether these two new vulnerabilities affect the 
> >>> version 0.100.3.
> >>>
> >>> Thank you
_______________________________________________

Manage your clamav-users mailing list subscription / unsubscribe:
https://lists.clamav.net/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/Cisco-Talos/clamav-documentation

https://docs.clamav.net/#mailing-lists-and-chat

Reply via email to