I am using ClamAV 0.103.6 on Buster, but I have always built it from source (since way before Cisco and even SourceFire), hence I'm a bit obsolete.
I did this -- and still do it -- because ClamAV has always been a bit experimental. Thus I install each version under "/opt/clamav.d/version" so I can easily revert if there is a problem. (And I have similarly disabled the systemd linkage for more control). On Mon, 20 Feb 2023 14:11:10 +0200 Brent Clark via clamav-users <clamav-users@lists.clamav.net> wrote: > Good day Guys > > Anyone on Debian Buster and Bullseye? > > How serious is this? > Does anyone have any suggestions. Cause there is no packages available. > > If anyone can share their thoughts / experiences. > > Regards > Brent > > On 2023/02/18 21:13, unison.subject_0t--- via clamav-users wrote: > > Vulnerabilities* > > > > — > > Sent from my iPhone > > > >> On Feb 18, 2023, at 13:54, Joel Esler <joel.es...@me.com> wrote: > >> > >> 100.3 hasn’t been supported in years. There’s lots of our abilities that > >> affect the version. > >> > >>> On Feb 18, 2023, at 13:36, George.G via clamav-users > >>> <clamav-users@lists.clamav.net> wrote: > >>> > >>> > >>> Hello, > >>> > >>> I would like to ask whether these two new vulnerabilities affect the > >>> version 0.100.3. > >>> > >>> Thank you _______________________________________________ Manage your clamav-users mailing list subscription / unsubscribe: https://lists.clamav.net/mailman/listinfo/clamav-users Help us build a comprehensive ClamAV guide: https://github.com/Cisco-Talos/clamav-documentation https://docs.clamav.net/#mailing-lists-and-chat