-
-
Notifications
You must be signed in to change notification settings - Fork 173
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Bitdefender Endpoint Security Tools #2088
Comments
2018-12-19 09:19:07: stdedos uploaded file
|
2018-12-19 09:19:15: stdedos uploaded file
|
Can you figure out at which revision this problem started? My best guess is #1988. |
2018-12-20 10:24:51: stdedos commented
|
Please try the 32-bit builds and let me know if those are also detected as malware. |
2019-01-20 20:23:37: stdedos commented
|
I really don't understand what that means. I can't discount the possibility that the build host has been compromised so this should allow us to see more clearly: please try the latest builds I have uploaded.
Alternatively, you could even build your own xpra from source: Building MSWindows, it's really quite easy nowadays. As for changing the packer, we use cx_Freeze, it's been problematic on more than one occasion but there aren't any other options that I know of. |
2019-01-21 21:28:38: stdedos commented
|
Those are not built on the same system. The 32-bit builds use a different build VM.
Then I am very confident that this is bogus, unless MSYS2 itself is compromised.
All
32-bit builds are a tad slower when it comes to decoding video, but since client computers usually have a lot of power to spare compared to servers, this should not be a problem.
Yeah. |
BTW, you can also use the python3 installers, those don't seem to trigger the false positives. (and they're also built on the same system!) I've submitted false-positive samples to f-secure and bitdefender through their websites. I'm closing the ticket as invalid because there is no malware in those files. |
Got a response from f-secure, here's the gist of it: We have identified the issue as a False Positive, which will be resolved in an upcoming database update via Automatic updates. |
Received from bitdefender: We have received an answer from our Virus Analysis Labs. The file is clean and detection should be removed in the next couple of updates. |
Thank you for the updates! |
2019-01-22 14:57:47: stdedos commented
|
The mailing list is the preferred medium, because it is easily searchable.
Correct.
Just the server part.
Not much missing now: #1568. The server needs a bit more work, the client needs a new session-info graph tab, etc.. |
2019-02-01 12:36:45: stdedos commented
|
Summary: this is a false positive. f-secure said: We have identified the issue as a False Positive, which will be resolved in an upcoming database update via Automatic updates. bitdefender: We have received an answer from our Virus Analysis Labs. The file is clean and detection should be removed in the next couple of updates. |
2020-04-07 10:16:03: stdedos commented
|
Also detected as malware by Microsoft Windows Defender: #2781. |
Issue migrated from trac ticket # 2088
component: core | priority: minor | resolution: invalid
2018-12-19 09:18:57: stdedos created the issue
The text was updated successfully, but these errors were encountered: