for trie
Best Regards,
Claudio Cuqui
On 5/16/23 07:02, Matthias Rieber wrote:
Hello List,
since the update to version 26908 we observe a high amount of segfaults.
As far as I can tell this happens in
0x7fdfd44c377d
We use version 0.103.8+dfsg-0+deb11u1 on debian bullseye.
Has anyone seen
by the
0a character at the end). After removing the 0a from my signatures they
magically started to work.
Best regards, and, again, thank you for your time and help.
Claudio Cuqui
On 05/23/2014 04:06 PM, Steve Basford wrote:
On Fri, May 23, 2014 4:25 pm, Claudio Cuqui wrote:
Hello there !
I
?
Regards,
Claudio Cuqui
PS: I tested with clamscan -d my.ndb scanning a full message (headers
included) in a file.
___
Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq
http://www.clamav.net/support/ml
,
Claudio Cuqui
On 04/24/2011 09:30 AM, Steven Chamberlain wrote:
On -10/01/37 20:59, Johannes Schulz wrote:
sigtool -fPUA.PDF.OpenActionObject|sigtool --decode-sigs says:
VIRUS NAME: PUA.PDF.OpenActionObject
TARGET TYPE: ANY FILE
OFFSET: 0
DECODED SIGNATURE:
%PDF-{WILDCARD_ANY_STRING}obj
: Phishing scan result: Blacklisted
LibClamAV debug: found Possibly Unwanted:
Safebrowsing.Suspected-malware_safebrowsing.clamav.net
*LibClamAV debug: blobDestroy
Regards !
Claudio Cuqui
___
Help us build a comprehensive ClamAV guide: visit http