Go to:
Gentoo Home
Documentation
Forums
Lists
Bugs
Planet
Store
Wiki
Get Gentoo!
Gentoo's Bugzilla – Attachment 436248 Details for
Bug 551426
=app-antivirus/clamav-0.98.7 - freshclam: ERROR: During database load : freshclam: llvm/lib/Target/PowerPC/PPCCodeEmitter.cpp:156: unsigned int {anonymous}::PPCCodeEmitter::getMachineOpValue(...): Assertion `MovePCtoLROffset && "MovePCtoLR not seen yet?"'
Home
|
New
–
[Ex]
|
Browse
|
Search
|
Privacy Policy
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
`freshclam --verbose --debug` output
freshclam-551426.log (text/plain), 24.51 KB, created by
Jeroen Roovers (RETIRED)
on 2016-06-03 04:52:34 UTC
(
hide
)
Description:
`freshclam --verbose --debug` output
Filename:
MIME Type:
Creator:
Jeroen Roovers (RETIRED)
Created:
2016-06-03 04:52:34 UTC
Size:
24.51 KB
patch
obsolete
>Current working dir is /var/lib/clamav >Max retries == 3 >ClamAV update process started at Fri Jun 3 06:51:42 2016 >Using IPv6 aware code >Querying current.cvd.clamav.net >TTL: 381 >Software version from DNS: 0.99.2 >main.cvd version from DNS: 57 >main.cvd is up to date (version: 57, sigs: 4218790, f-level: 60, builder: amishhammer) >daily.cvd version from DNS: 21660 >daily.cvd is up to date (version: 21660, sigs: 225709, f-level: 63, builder: neo) >Retrieving http://database.clamav.net/bytecode.cvd >Ignoring mirror 145.58.29.83 (due to previous errors) >Trying to download http://database.clamav.net/bytecode.cvd (IP: 194.109.6.97) >Downloading bytecode.cvd [100%] >Loading signatures from bytecode.cvd >LibClamAV debug: Initializing phishcheck module >LibClamAV debug: Phishcheck: Compiling regex: ^ *(http|https|ftp:(//)?)?[0-9]{1,3}(\.[0-9]{1,3}){3}[/?:]? *$ >LibClamAV debug: Phishcheck module initialized >LibClamAV debug: Bytecode initialized in JIT mode >LibClamAV debug: in cli_cvdload() >LibClamAV debug: MD5(.tar.gz) = ec5fe4a17ebfbcbbd873fa6048d5b001 >LibClamAV debug: cli_versig: Decoded signature: ec5fe4a17ebfbcbbd873fa6048d5b001 >LibClamAV debug: cli_versig: Digital signature is correct. >LibClamAV debug: in cli_tgzload() >LibClamAV debug: bytecode.info loaded >LibClamAV debug: in cli_tgzload_cleanup() >LibClamAV debug: in cli_tgzload() >LibClamAV debug: Initializing engine->root[0] >LibClamAV debug: Initialising AC pattern matcher of root[0] >LibClamAV debug: cli_initroots: Initializing BM tables of root[0] >LibClamAV debug: Initializing engine->root[1] >LibClamAV debug: Initialising AC pattern matcher of root[1] >LibClamAV debug: cli_initroots: Initializing BM tables of root[1] >LibClamAV debug: Initializing engine->root[2] >LibClamAV debug: Initialising AC pattern matcher of root[2] >LibClamAV debug: Initializing engine->root[3] >LibClamAV debug: Initialising AC pattern matcher of root[3] >LibClamAV debug: Initializing engine->root[4] >LibClamAV debug: Initialising AC pattern matcher of root[4] >LibClamAV debug: Initializing engine->root[5] >LibClamAV debug: Initialising AC pattern matcher of root[5] >LibClamAV debug: Initializing engine->root[6] >LibClamAV debug: Initialising AC pattern matcher of root[6] >LibClamAV debug: Initializing engine->root[7] >LibClamAV debug: Initialising AC pattern matcher of root[7] >LibClamAV debug: Initializing engine->root[8] >LibClamAV debug: Initialising AC pattern matcher of root[8] >LibClamAV debug: Initializing engine->root[9] >LibClamAV debug: Initialising AC pattern matcher of root[9] >LibClamAV debug: Initializing engine->root[10] >LibClamAV debug: Initialising AC pattern matcher of root[10] >LibClamAV debug: Initializing engine->root[11] >LibClamAV debug: Initialising AC pattern matcher of root[11] >LibClamAV debug: Initializing engine->root[12] >LibClamAV debug: Initialising AC pattern matcher of root[12] >LibClamAV debug: Initializing engine->root[13] >LibClamAV debug: Initialising AC pattern matcher of root[13] >LibClamAV debug: Initializing engine->root[14] >LibClamAV debug: Initialising AC pattern matcher of root[14] >LibClamAV debug: Loading trusted bytecode >LibClamAV debug: bytecode: Parsed 6 APIcalls, maxapi 42 >LibClamAV debug: Parsed 46 BBs, 210 instructions >LibClamAV debug: Parsed 1 functions >LibClamAV debug: Bytecode 3986185.cbc(1) has logical signature: BC.Legacy.Exploit.CVE_2010_2568-4.{};Engine:56-255,Target:0;0;4c0000000114020000000000c000000000000046 >LibClamAV debug: 3986185.cbc loaded >LibClamAV debug: Loading trusted bytecode >LibClamAV debug: bytecode: Parsed 11 APIcalls, maxapi 66 >LibClamAV debug: Parsed 48 BBs, 230 instructions >LibClamAV debug: Parsed 1 functions >LibClamAV debug: Bytecode 3986187.cbc(2) has logical signature: BC.Legacy.Exploit.CVE_2010_1885-2;Engine:52-255,Target:3;0;6863703a2f2f{25-700}736372697074{1-3}6465666572 >LibClamAV debug: 3986187.cbc loaded >LibClamAV debug: Loading trusted bytecode >LibClamAV debug: bytecode: Parsed 7 APIcalls, maxapi 89 >LibClamAV debug: Parsed 11 BBs, 43 instructions >LibClamAV debug: Parsed 1 functions >LibClamAV debug: Bytecode 3986188.cbc(3) has logical signature: BC.Heuristics.Trojan.Agent-1350164.{};Engine:56-255,IconGroup2:BIFROSE,Target:1;0;EP+0:60be00??41008dbe00??feff57eb0b908a064688074701db75078b1e83eefc11db72edb80100000001db75078b1e83eefc11db11c001 >LibClamAV debug: 3986188.cbc loaded >LibClamAV debug: Loading trusted bytecode >LibClamAV debug: bytecode: Parsed 9 APIcalls, maxapi 87 >LibClamAV debug: Parsed 20 BBs, 67 instructions >LibClamAV debug: Parsed 1 functions >LibClamAV debug: 3986206.cbc loaded >LibClamAV debug: Loading trusted bytecode >LibClamAV debug: bytecode: Parsed 11 APIcalls, maxapi 87 >LibClamAV debug: Parsed 26 BBs, 150 instructions >LibClamAV debug: Parsed 40 BBs, 131 instructions >LibClamAV debug: Parsed 2 functions >LibClamAV debug: 3986212.cbc loaded >LibClamAV debug: Loading trusted bytecode >LibClamAV debug: bytecode: Parsed 3 APIcalls, maxapi 66 >LibClamAV debug: Parsed 3 BBs, 13 instructions >LibClamAV debug: Parsed 1 functions >LibClamAV debug: Bytecode 3986214.cbc(6) has logical signature: BC.Legacy.Exploit.CVE_2010_3338-1.{Exploit-CVE_2010_3338};Engine:56-255,Target:1;0;S1+3125:003c005000 >LibClamAV debug: 3986214.cbc loaded >LibClamAV debug: Loading trusted bytecode >LibClamAV debug: bytecode: Parsed 3 APIcalls, maxapi 66 >LibClamAV debug: Parsed 3 BBs, 23 instructions >LibClamAV debug: Parsed 1 functions >LibClamAV debug: Bytecode 3986215.cbc(7) has logical signature: BC.Legacy.Exploit.CVE_2010_3963-1.{Exploit-CVE_2010_3963};Engine:56-255,Target:1;(1|0);EOF-64:453a5c776f;453a5c776f >LibClamAV debug: 3986215.cbc loaded >LibClamAV debug: Loading trusted bytecode >LibClamAV debug: bytecode: Parsed 2 APIcalls, maxapi 66 >LibClamAV debug: Parsed 3 BBs, 27 instructions >LibClamAV debug: Parsed 1 functions >LibClamAV debug: Bytecode 3986216.cbc(8) has logical signature: BC.Legacy.Exploit.CVE_2010_3943-1.{Exploit-CVE_2010_3943};Engine:56-255,Target:1;(0&2&1);S0+14736:ffff595f5e;S0+15632:8b00385dfc;S0+19520:83661c0059 >LibClamAV debug: 3986216.cbc loaded >LibClamAV debug: Loading trusted bytecode >LibClamAV debug: bytecode: Parsed 3 APIcalls, maxapi 66 >LibClamAV debug: Parsed 3 BBs, 13 instructions >LibClamAV debug: Parsed 1 functions >LibClamAV debug: Bytecode 3986217.cbc(9) has logical signature: BC.Legacy.Exploit.CVE_2010_3939-1.{Exploit-CVE_2010_3939};Engine:56-255,Target:1;0;S0+0:81ecc80000 >LibClamAV debug: 3986217.cbc loaded >LibClamAV debug: Loading trusted bytecode >LibClamAV debug: bytecode: Parsed 3 APIcalls, maxapi 66 >LibClamAV debug: Parsed 3 BBs, 33 instructions >LibClamAV debug: Parsed 1 functions >LibClamAV debug: Bytecode 3986218.cbc(10) has logical signature: BC.Legacy.Exploit.CVE_2010_3942-1.{Exploit-CVE_2010_3942};Engine:56-255,Target:1;(0&2&1);S0+4096:d6ffd05959;S0+9456:c6730f8b07;S0+12912:a0b9400089 >LibClamAV debug: 3986218.cbc loaded >LibClamAV debug: Loading trusted bytecode >LibClamAV debug: bytecode: Parsed 3 APIcalls, maxapi 66 >LibClamAV debug: Parsed 3 BBs, 13 instructions >LibClamAV debug: Parsed 1 functions >LibClamAV debug: Bytecode 3986219.cbc(11) has logical signature: BC.Legacy.Exploit.CVE_2010_3940-1.{Exploit-CVE_2010_3940};Engine:56-255,Target:1;0;S1+608:256400000a >LibClamAV debug: 3986219.cbc loaded >LibClamAV debug: Loading trusted bytecode >LibClamAV debug: bytecode: Parsed 3 APIcalls, maxapi 66 >LibClamAV debug: Parsed 3 BBs, 13 instructions >LibClamAV debug: Parsed 1 functions >LibClamAV debug: Bytecode 3986220.cbc(12) has logical signature: BC.Legacy.Exploit.CVE_2010_3941-1.{Exploit-CVE_2010_3941};Engine:56-255,Target:1;0;S1+6656:436f756c64 >LibClamAV debug: 3986220.cbc loaded >LibClamAV debug: Loading trusted bytecode >LibClamAV debug: bytecode: Parsed 2 APIcalls, maxapi 66 >LibClamAV debug: Parsed 3 BBs, 19 instructions >LibClamAV debug: Parsed 1 functions >LibClamAV debug: Bytecode 3986221.cbc(13) has logical signature: BC.Legacy.Exploit.CVE_2010_3944-1.{Exploit-CVE_2010_3944};Engine:56-255,Target:1;(0&1);S0+1696:fc0000000f;S0+2864:1f837dfc00 >LibClamAV debug: 3986221.cbc loaded >LibClamAV debug: Loading trusted bytecode >LibClamAV debug: bytecode: Parsed 2 APIcalls, maxapi 66 >LibClamAV debug: Parsed 3 BBs, 11 instructions >LibClamAV debug: Parsed 1 functions >LibClamAV debug: Bytecode 3986222.cbc(14) has logical signature: BC.Legacy.Exploit.CVE_2010_3961-1.{Exploit-CVE_2010_3961};Engine:56-255,Target:1;0;S1+704:7665640044 >LibClamAV debug: 3986222.cbc loaded >LibClamAV debug: Loading trusted bytecode >LibClamAV debug: bytecode: Parsed 5 APIcalls, maxapi 66 >LibClamAV debug: Parsed 9 BBs, 38 instructions >LibClamAV debug: Parsed 1 functions >LibClamAV debug: Bytecode 3986223.cbc(15) has logical signature: BC.Legacy.Exploit.CVE_2010_3333-5.{Exploit-CVE_2010_3333};Engine:56-255,Target:0;0;5c7370{-100}5c736e2070467261676d656e7473{-100}5c7376 >LibClamAV debug: 3986223.cbc loaded >LibClamAV debug: Loading trusted bytecode >LibClamAV debug: bytecode: Parsed 3 APIcalls, maxapi 66 >LibClamAV debug: Parsed 3 BBs, 13 instructions >LibClamAV debug: Parsed 1 functions >LibClamAV debug: Bytecode 3986224.cbc(16) has logical signature: BC.Legacy.Exploit.CVE_2011_0026-1.{Exploit-CVE_2011_0026};Engine:56-255,Target:1;0;S1+1200:fffeffebd0 >LibClamAV debug: 3986224.cbc loaded >LibClamAV debug: Loading trusted bytecode >LibClamAV debug: bytecode: Parsed 3 APIcalls, maxapi 66 >LibClamAV debug: Parsed 3 BBs, 23 instructions >LibClamAV debug: Parsed 1 functions >LibClamAV debug: Bytecode 3986229.cbc(17) has logical signature: BC.Legacy.Exploit.CVE_2011_0030-1.{Exploit-CVE_2011_0030};Engine:56-255,Target:1;(1|0);S1+11272:483a5c7368656c6c;S1+2652:437372436c69656e7443616c6c536572766572 >LibClamAV debug: 3986229.cbc loaded >LibClamAV debug: Loading trusted bytecode >LibClamAV debug: bytecode: Parsed 3 APIcalls, maxapi 66 >LibClamAV debug: Parsed 3 BBs, 23 instructions >LibClamAV debug: Parsed 1 functions >LibClamAV debug: Bytecode 3986230.cbc(18) has logical signature: BC.Legacy.Exploit.CVE_2011_0045-1.{Exploit-CVE_2011_0045};Engine:56-255,Target:1;(1|0);S1+346:54726163654576656e74;S0+0:558bec83ec48c745f0080000c0c745f8 >LibClamAV debug: 3986230.cbc loaded >LibClamAV debug: Loading trusted bytecode >LibClamAV debug: bytecode: Parsed 3 APIcalls, maxapi 66 >LibClamAV debug: Parsed 3 BBs, 13 instructions >LibClamAV debug: Parsed 1 functions >LibClamAV debug: Bytecode 3986231.cbc(19) has logical signature: BC.Legacy.Exploit.CVE_2011_0090-1.{Exploit-CVE_2011_0090};Engine:56-255,Target:1;0;S0+64:558bec83ec68c745d80000000033c089 >LibClamAV debug: 3986231.cbc loaded >LibClamAV debug: Loading trusted bytecode >LibClamAV debug: bytecode: Parsed 3 APIcalls, maxapi 66 >LibClamAV debug: Parsed 3 BBs, 23 instructions >LibClamAV debug: Parsed 1 functions >LibClamAV debug: Bytecode 3986232.cbc(20) has logical signature: BC.Legacy.Exploit.CVE_2011_0089-1.{Exploit-CVE_2011_0089};Engine:56-255,Target:1;(1|0);S2+16304:020000005c5c7265647465616d5c7365;S1+6000:51ff15242443003bf4e803efffff8bf4 >LibClamAV debug: 3986232.cbc loaded >LibClamAV debug: Loading trusted bytecode >LibClamAV debug: bytecode: Parsed 3 APIcalls, maxapi 66 >LibClamAV debug: Parsed 3 BBs, 23 instructions >LibClamAV debug: Parsed 1 functions >LibClamAV debug: Bytecode 3986233.cbc(21) has logical signature: BC.Legacy.Exploit.CVE_2011_0088-1.{Exploit-CVE_2011_0088};Engine:56-255,Target:1;(1|0);S2+16224:4551466f020000005c5c726564746561;S1+5680:ec51ff15182443003bf4e838f0ffffb8 >LibClamAV debug: 3986233.cbc loaded >LibClamAV debug: Loading trusted bytecode >LibClamAV debug: bytecode: Parsed 3 APIcalls, maxapi 66 >LibClamAV debug: Parsed 3 BBs, 23 instructions >LibClamAV debug: Parsed 1 functions >LibClamAV debug: Bytecode 3986234.cbc(22) has logical signature: BC.Legacy.Exploit.CVE_2011_0039-1.{Exploit-CVE_2011_0039};Engine:56-255,Target:1;(1|0);S0+784:5c564d572d5850535032454e5c63245c;S1+992:747874446f6d61696e00020438045802 >LibClamAV debug: 3986234.cbc loaded >LibClamAV debug: Loading trusted bytecode >LibClamAV debug: bytecode: Parsed 3 APIcalls, maxapi 66 >LibClamAV debug: Parsed 3 BBs, 23 instructions >LibClamAV debug: Parsed 1 functions >LibClamAV debug: Bytecode 3986235.cbc(23) has logical signature: BC.Legacy.Exploit.CVE_2011_0087-1.{Exploit-CVE_2011_0087};Engine:56-255,Target:1;(1|0);S2+0:0a5b2a5d20466f756e642077696e646f;S0+80:550852ff15248140008b85f0feffff8b >LibClamAV debug: 3986235.cbc loaded >LibClamAV debug: Loading trusted bytecode >LibClamAV debug: bytecode: Parsed 3 APIcalls, maxapi 66 >LibClamAV debug: Parsed 3 BBs, 23 instructions >LibClamAV debug: Parsed 1 functions >LibClamAV debug: Bytecode 3986236.cbc(24) has logical signature: BC.Legacy.Exploit.CVE_2011_0086-1.{Exploit-CVE_2011_0086};Engine:56-255,Target:1;(1|0);S2+16:6e642077696e646f773a202578202825;S0+256:4000e8ad03000083c4048b550852ff15 >LibClamAV debug: 3986236.cbc loaded >LibClamAV debug: Loading trusted bytecode >LibClamAV debug: bytecode: Parsed 3 APIcalls, maxapi 66 >LibClamAV debug: Parsed 3 BBs, 13 instructions >LibClamAV debug: Parsed 1 functions >LibClamAV debug: Bytecode 3986242.cbc(25) has logical signature: BC.Legacy.Exploit.CVE_2011_0037-1.{Exploit-CVE_2011_0037};Engine:56-255,Target:1;0;S1+736:626c6564000000002028557365642066 >LibClamAV debug: 3986242.cbc loaded >LibClamAV debug: Loading trusted bytecode >LibClamAV debug: bytecode: Parsed 3 APIcalls, maxapi 66 >LibClamAV debug: Parsed 15 BBs, 85 instructions >LibClamAV debug: Parsed 1 functions >LibClamAV debug: Bytecode 3986244.cbc(26) has logical signature: BC.Legacy.Exploit.MS_04_11-1.{CVE_2011_0662,CVE_2011_1229_or_CVE_2011_1231,CVE_2011_1231,CVE_2011_1237,CVE_2011_1238,CVE_2011_1239,CVE_2011_1241,CVE_2011_1242};Engine:56-255,Target:1;(0|1|2|3|4|5|6);S2+16272:52534453bb1a649c7ea0154cb19ce3e3;S2+16240:000000000000000052534453646e64ce;S0+432:ff15d8ca40006a006830f10000681201;S2+16128:52534453645a82377e51384580df1e6c;S2+16272:00000000000000000000000052534453;S2+17568:0000000000000000525344537b499ed5;S2+16608:0000000000000000525344538c350b8e >LibClamAV debug: 3986244.cbc loaded >LibClamAV debug: Loading trusted bytecode >LibClamAV debug: bytecode: Parsed 9 APIcalls, maxapi 72 >LibClamAV debug: Parsed 214 BBs, 952 instructions >LibClamAV debug: Parsed 1 functions >LibClamAV debug: Bytecode 3986249.cbc(27) has logical signature: BC.Win.Trojan.Xpaj-7;Engine:60-255,Target:1;(1|0);5589e583ec;558bec83ec >LibClamAV debug: 3986249.cbc loaded >LibClamAV debug: Loading trusted bytecode >LibClamAV debug: bytecode: Parsed 3 APIcalls, maxapi 5 >LibClamAV debug: Parsed 43 BBs, 111 instructions >LibClamAV debug: Parsed 1 functions >LibClamAV debug: Bytecode 3986259.cbc(28) has logical signature: BC.Legacy.Exploit.CVE_2011_4373-2;Engine:56-255,Container:CL_TYPE_PDF,Target:5;0;0:424d????00000000 >LibClamAV debug: 3986259.cbc loaded >LibClamAV debug: Loading trusted bytecode >LibClamAV debug: bytecode: Parsed 7 APIcalls, maxapi 55 >LibClamAV debug: Parsed 15 BBs, 76 instructions >LibClamAV debug: Parsed 8 BBs, 29 instructions >LibClamAV debug: Parsed 2 functions >LibClamAV debug: Bytecode 3986282.cbc(29) has logical signature: BC.Legacy.Exploit.CVE_2012_0158-20.{CVE_2012_0158};Engine:56-255,Target:0;(0&1);0:7b5c7274;*:4430434631314530 >LibClamAV debug: 3986282.cbc loaded >LibClamAV debug: Loading trusted bytecode >LibClamAV debug: bytecode: Parsed 4 APIcalls, maxapi 16 >LibClamAV debug: Parsed 22 BBs, 58 instructions >LibClamAV debug: Parsed 1 functions >LibClamAV debug: Bytecode 3986283.cbc(30) has logical signature: BC.Legacy.Exploit.CVE_2012_1888-1.{};Engine:56-255,Target:0;0;0:2020300d0a53454354494f4e0d0a*454e544954494553{-500}4d54455854 >LibClamAV debug: 3986283.cbc loaded >LibClamAV debug: Loading trusted bytecode >LibClamAV debug: bytecode: Parsed 3 APIcalls, maxapi 5 >LibClamAV debug: Parsed 17 BBs, 65 instructions >LibClamAV debug: Parsed 1 functions >LibClamAV debug: Bytecode 3986289.cbc(31) has logical signature: BC.Legacy.Exploit.Briefcase-1.{CVE_2012_1527,CVE_2012_1528};Engine:56-255,Target:0;0;0:444453480205011414000000 >LibClamAV debug: 3986289.cbc loaded >LibClamAV debug: Loading trusted bytecode >LibClamAV debug: bytecode: Parsed 4 APIcalls, maxapi 16 >LibClamAV debug: Parsed 14 BBs, 41 instructions >LibClamAV debug: Parsed 1 functions >LibClamAV debug: Bytecode 3986292.cbc(32) has logical signature: BC.Legacy.Exploit.CVE_2012_1886-2.{};Engine:56-255,Target:2;0;0:d0cf11e0a1b11ae1*57006f0072006b0062006f006f006b*88000800 >LibClamAV debug: 3986292.cbc loaded >LibClamAV debug: Loading trusted bytecode >LibClamAV debug: bytecode: Parsed 4 APIcalls, maxapi 16 >LibClamAV debug: Parsed 15 BBs, 54 instructions >LibClamAV debug: Parsed 1 functions >LibClamAV debug: Bytecode 3986301.cbc(33) has logical signature: BC.Legacy.Exploit.CVE_2013_0030-2.{};Engine:60-255,Target:3;(0&2&1);646f63756d656e742e637265617465656c656d656e7428;3a7368617065;73657461747472696275746528{-5}70617468 >LibClamAV debug: 3986301.cbc loaded >LibClamAV debug: Loading trusted bytecode >LibClamAV debug: bytecode: Parsed 8 APIcalls, maxapi 55 >LibClamAV debug: Parsed 101 BBs, 378 instructions >LibClamAV debug: Parsed 1 functions >LibClamAV debug: Bytecode 3986303.cbc(34) has logical signature: BC.Legacy.Exploit.CVE_2013_0024-1.{};Engine:60-255,Target:3;(0&2&1);646f63756d656e742e626f64792e676574656c656d656e747362797461676e616d6528222a22293b;646f63756d656e742e73656c656374696f6e2e63726561746572616e676528;2e6d6f7665746f656c656d656e747465787428{-100}2e636f6c6c617073652874727565293b{-100}2e73656c65637428{-100}2e706173746568746d6c28 >LibClamAV debug: 3986303.cbc loaded >LibClamAV debug: Loading trusted bytecode >LibClamAV debug: bytecode: Parsed 8 APIcalls, maxapi 55 >LibClamAV debug: Parsed 30 BBs, 108 instructions >LibClamAV debug: Parsed 1 functions >LibClamAV debug: Bytecode 3986305.cbc(35) has logical signature: BC.Legacy.Exploit.CVE_2013_3146-2.{};Engine:60-255,Target:0;0;2e676574656c656d656e747362797461676e616d6528*636f6c756d6e2d636f756e74 >LibClamAV debug: 3986305.cbc loaded >LibClamAV debug: Loading trusted bytecode >LibClamAV debug: bytecode: Parsed 5 APIcalls, maxapi 42 >LibClamAV debug: Parsed 61 BBs, 261 instructions >LibClamAV debug: Parsed 1 functions >LibClamAV debug: Bytecode 3986306.cbc(36) has logical signature: BC.Legacy.Exploit.Andr-2.{Extra_Field,Master_Key};Engine:56-255,Target:0;(0&2&1);0:504b0304;*:416e64726f69644d616e69666573742e786d6c;*:636c61737365732e646578 >LibClamAV debug: 3986306.cbc loaded >LibClamAV debug: Loading trusted bytecode >LibClamAV debug: bytecode: Parsed 8 APIcalls, maxapi 55 >LibClamAV debug: Parsed 38 BBs, 135 instructions >LibClamAV debug: Parsed 1 functions >LibClamAV debug: Bytecode 3986310.cbc(37) has logical signature: BC.Legacy.Exploit.CVE_2013_3893-1.{CVE_2013_3893};Engine:60-255,Target:3;0;2e6170706c79656c656d656e7428*2e6f6e6c6f736563617074757265*2e7365746361707475726528*2e7365746361707475726528 >LibClamAV debug: 3986310.cbc loaded >LibClamAV debug: Loading trusted bytecode >LibClamAV debug: bytecode: Parsed 4 APIcalls, maxapi 16 >LibClamAV debug: Parsed 35 BBs, 96 instructions >LibClamAV debug: Parsed 1 functions >LibClamAV debug: Bytecode 3986318.cbc(38) has logical signature: BC.Legacy.Exploit.CVE_2012_4148-1.{};Engine:70-255,Target:10;(0&2&1);0:255044462d312e;*:2f416e6e6f74;*:2f53756274797065{-5}2f576964676574 >LibClamAV debug: 3986318.cbc loaded >LibClamAV debug: Loading trusted bytecode >LibClamAV debug: bytecode: Parsed 4 APIcalls, maxapi 42 >LibClamAV debug: Parsed 83 BBs, 646 instructions >LibClamAV debug: Parsed 1 functions >LibClamAV debug: Bytecode 3986321.cbc(39) has logical signature: BC.Win.Virus.Ransom-9157.{A,B};Engine:56-255,Target:1;((1&2)|0);81c1????????81c2????????81c1;0bf2*0bca;0bd3*0bc1 >LibClamAV debug: 3986321.cbc loaded >LibClamAV debug: Loading trusted bytecode >LibClamAV debug: bytecode: Parsed 6 APIcalls, maxapi 42 >LibClamAV debug: Parsed 19 BBs, 65 instructions >LibClamAV debug: Parsed 1 functions >LibClamAV debug: Bytecode 3986322.cbc(40) has logical signature: BC.Legacy.Exploit.CVE_2014_8460-1.{};Engine:73-255,Target:10;0;2f537562727320 >LibClamAV debug: 3986322.cbc loaded >LibClamAV debug: Loading trusted bytecode >LibClamAV debug: bytecode: Parsed 4 APIcalls, maxapi 16 >LibClamAV debug: Parsed 9 BBs, 35 instructions >LibClamAV debug: Parsed 1 functions >LibClamAV debug: Bytecode 3986326.cbc(41) has logical signature: BC.Win.Trojan.Phasebot-1.{};Engine:56-255,Target:1;0;0:4d5a{-58}5045 >LibClamAV debug: 3986326.cbc loaded >LibClamAV debug: Loading trusted bytecode >LibClamAV debug: bytecode: Parsed 4 APIcalls, maxapi 16 >LibClamAV debug: Parsed 11 BBs, 50 instructions >LibClamAV debug: Parsed 1 functions >LibClamAV debug: Bytecode 3986327.cbc(42) has logical signature: BC.Legacy.Exploit.CVE_2012_1535-2.{};Engine:56-255,Target:0;((1|0)&2);0:465753;0:d0cf11e0a1b11ae1*465753;4f54544f >LibClamAV debug: 3986327.cbc loaded >LibClamAV debug: Loading trusted bytecode >LibClamAV debug: bytecode: Parsed 4 APIcalls, maxapi 16 >LibClamAV debug: Parsed 12 BBs, 52 instructions >LibClamAV debug: Parsed 1 functions >LibClamAV debug: Bytecode 3986328.cbc(43) has logical signature: BC.Legacy.Exploit.CVE_2012_1458-1.{};Engine:56-255,Target:0;(0&1);0:49545346;4c5a5843 >LibClamAV debug: 3986328.cbc loaded >LibClamAV debug: Loading trusted bytecode >LibClamAV debug: bytecode: Parsed 4 APIcalls, maxapi 16 >LibClamAV debug: Parsed 16 BBs, 52 instructions >LibClamAV debug: Parsed 1 functions >LibClamAV debug: Bytecode 3986334.cbc(44) has logical signature: BC.Legacy.Exploit.CVE_2015_3078-1;Engine:56-255,Target:0;0;4:6d6f6f76*00000001(61|68)766343 >LibClamAV debug: 3986334.cbc loaded >LibClamAV debug: Loading trusted bytecode >LibClamAV debug: bytecode: Parsed 3 APIcalls, maxapi 16 >LibClamAV debug: Parsed 9 BBs, 21 instructions >LibClamAV debug: Parsed 1 functions >LibClamAV debug: Bytecode 3986337.cbc(45) has logical signature: BC.Legacy.Exploit.CVE_2015_5093-2.{};Engine:74-255,Target:10;0;6170702e646f632e676574416e6e6f74733344*6d616b654d6561737572656d656e74 >LibClamAV debug: 3986337.cbc loaded >LibClamAV debug: Loading trusted bytecode >LibClamAV debug: bytecode: Parsed 7 APIcalls, maxapi 55 >LibClamAV debug: Parsed 13 BBs, 47 instructions >LibClamAV debug: Parsed 1 functions >LibClamAV debug: Bytecode 4306126.cbc(46) has logical signature: BC.Unix.Exploit.Agent-1393645-1.{};Engine:56-255,Target:0;0;04002d6c68{14}2003{4}000000 >LibClamAV debug: 4306126.cbc loaded >LibClamAV debug: Loading trusted bytecode >LibClamAV debug: bytecode: Parsed 5 APIcalls, maxapi 42 >LibClamAV debug: Parsed 10 BBs, 48 instructions >LibClamAV debug: Parsed 25 BBs, 125 instructions >LibClamAV debug: Parsed 2 functions >LibClamAV debug: Bytecode 4306157.cbc(47) has logical signature: BC.Win.Packer.Troll-11;Engine:56-255,Target:1;0;2a8378100375248b40143d2005931974153d21059319740e3d2205931974 >LibClamAV debug: 4306157.cbc loaded >LibClamAV debug: in cli_tgzload_cleanup() >LibClamAV debug: /var/lib/clamav/clamav-7b5bd07178fb772d765c27413b508843.tmp/clamav-9121ca58ed82316224541a0a9f1500f3.cvd loaded >LibClamAV debug: environment detected: >LibClamAV debug: check_platform(0x0a415252, 0x18040903, 0x01040903) >LibClamAV debug: check_platform(0x0a 4 1 52 52,0x1 8 04 09 03,0x01 04 09 03) >LibClamAV debug: check_platform( OS CPU COM FL DCONF,BE PTR CXX VV.VV.VV, FLG CC VV.VV.VV) >LibClamAV debug: Engine version: 0.99.2 >LibClamAV debug: Host triple: powerpc64-unknown-linux-gnu >LibClamAV debug: Host CPU: generic >LibClamAV debug: OS: Linux >LibClamAV debug: OS release: 4.4.6-gentoo >LibClamAV debug: OS version: #1 SMP Sat May 21 11:50:18 CEST 2016 >LibClamAV debug: OS hardware: ppc64 >LibClamAV debug: OS LLVM category: 6 >LibClamAV debug: Has JIT compiled: 1 >LibClamAV debug: ------------------------------------------------------ >LibClamAV debug: Bytecode: mode is 0 >LibClamAV debug: Loading trusted bytecode >LibClamAV debug: bytecode: Parsed 9 APIcalls, maxapi 74 >LibClamAV debug: unknown inst type: 96 >LibClamAV debug: unknown inst type: 67 >LibClamAV debug: unknown inst type: 67 >LibClamAV debug: unknown inst type: 67 >LibClamAV debug: unknown inst type: 67 >LibClamAV debug: unknown inst type: 67 >LibClamAV debug: unknown inst type: 67 >LibClamAV debug: unknown inst type: 67 >LibClamAV debug: unknown inst type: 67 >LibClamAV debug: Parsed 53 BBs, 226 instructions >LibClamAV debug: Parsed 1 functions >LibClamAV debug: Bytecode: BC_STARTUP running (builtin) >LibClamAV debug: Bytecode 0: executing in interpeter mode >LibClamAV debug: bytecode: registered ctx variable at 0x3fffb2d4823c (+256) id 6 >LibClamAV debug: bytecode: registered ctx variable at 0x3fffb2f7d228 (+2) id 2 >LibClamAV debug: bytecode: registered ctx variable at 0x3fffb2d4813c (+256) id 1 >LibClamAV debug: bytecode: registered ctx variable at 0x3fffb2f7d22c (+4) id 5 >LibClamAV debug: bytecode: registered ctx variable at 0x3fffb2f7d230 (+648) id 4 >LibClamAV debug: bytecode: registered ctx variable at 0x2ba29890 (+744) id 7 >LibClamAV debug: bytecode debug: startup: bytecode execution in auto mode >LibClamAV debug: intepreter bytecode run finished in 70us, after executing 118 opcodes >LibClamAV debug: Bytecode: disable status is 0 >freshclam: llvm/lib/Target/PowerPC/PPCCodeEmitter.cpp:156: unsigned int {anonymous}::PPCCodeEmitter::getMachineOpValue(const llvm::MachineInstr&, const llvm::MachineOperand&): Assertion `MovePCtoLROffset && "MovePCtoLR not seen yet?"' failed.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 551426
:
436248
|
436250