Affected time range (times are CDT): June 24, 4:00 AM to June 24 10:30 AM
Description: An update to the ClamAV malware database introduced a signature that flagged any zip file as a virus. Therefore, any attempted course import, whether through the API or the UI, of a zipped package failed due to a failed virus scan check.
As part of our safety checks before we import a provided course, we use ClamAV to scan the file for any viruses. ClamAV maintains a database of known malware signatures which is automatically updated on a regular basis. This morning at approximately 4 AM CDT, a new update to this database was pushed out which contained a test signature that flagged any zip files that were scanned.
We began to receive tickets about these import issues from customers using both the UI and the API and getting the same result: a message that their uploaded course failed our virus scan. Therefore we could narrow the issue down to the virus scanner itself, where we then located the signature that was generating all of these failures. We tested this theory by using one of our own sample courses, and it too returned the same error message.
Upon further investigation, we noticed other people using the ClamAV tool posting in GitHub about the very same signature. They too had tested with known good zip files that were still being flagged based on this signature. We therefore concluded that this particular signature was most likely a false positive and not likely to indicate that the flagged file contained malware.
We added the signature in question to our whitelist and, after verifying that it solved the issue and allowed course imports, pushed it out to our production environment. After confirming with customers that reported import issues that their courses could now be successfully imported, we concluded that this issue was resolved.
As part of our corrective action, we notified ClamAV of the potential false positive through their online portal. Once we are notified that the database has been updated and the offending signature has been changed, we can safely remove it from our whitelist.
Below is a timeline of events occurring on June 24, 2022 (times in CDT):