[clamav-users] URGENT: Clamd is wedged on multiple installations

Reindl Harald h.reindl at thelounge.net
Fri Jan 26 12:29:38 UTC 2018

Am 26.01.2018 um 13:17 schrieb maxal:
> nobody of clamav/cisco reading this list? as the impact is heavy and
> probably worldwide - anyone with personal contacts or any other channel
> to reach someone there? contact info on clamav.net is only referring to
> mailing lists and not very useful

the better question is has the whole fucking IT branche lost it's brain 
because nobody seems to have tests for anything, spit out random junk 
and watch for the fallout, be it Cisco or Intel with microcode updates 
where you than get such things:

DISCLAIMER: This update supersedes microcode provided  by Red Hat with 
the CVE-2017-5715 (?Spectre?)
DISCLAIMER: CPU branch injection vulnerability mitigation. 
(Historically, Red Hat has provided updated
DISCLAIMER: microcode, developed by our microprocessor partners, as a 
customer convenience.) Further
DISCLAIMER: testing has uncovered problems with the microcode provided 
along with the ?Spectre? mitigation
DISCLAIMER: that could lead to system instabilities. As a result, Red 
Hat is providing an microcode update
DISCLAIMER: that reverts to the last known good microcode version dated 
before 03 January 2018.
DISCLAIMER: Red Hat strongly recommends that customers contact their 
hardware provider for the latest microcode updates.
DISCLAIMER: IMPORTANT: Customers using Intel Skylake-, Broadwell-, and 
Haswell-based platforms must obtain and
DISCLAIMER: install updated microcode from their hardware vendor 
immediately. The "Spectre" mitigation requires
DISCLAIMER: both an updated kernel from Red Hat and updated microcode 
from your hardware vendor.

More information about the clamav-users mailing list