oss-sec mailing list archives
R: Re: [oss-security] vsftpd download backdoored
From: "pinto.elia () gmail com" <pinto.elia () gmail com>
Date: Tue, 05 Jul 2011 05:22:45 +0000
Sorry for not quoting. Just for Info rpm5 have all the necessary for embedding all these check in a spec file from years. Regards. Elia ----Messaggio originale---- Da: Moritz Muehlenhoff Inviato: 04/07/2011, 18:56 A: oss-security () lists openwall com Oggetto: Re: [oss-security] vsftpd download backdoored Solar Designer wrote:
Here's a great example of why maintainers should sign their release tarballs, why distributions should insist on that, and why they should actually check the signatures indeed. I think we should be referring to this when convincing people to do that (I had moderate success so far - some projects started signing their tarballs after my suggestions/requests, some did not). http://scarybeastsecurity.blogspot.com/2011/07/alert-vsftpd-download-backdoored.html New vsftpd homepage: https://security.appspot.com/vsftpd.html
IIRC for such backdoored downloads CVE IDs were assigned in the past to properly track the status of distributions providing the affected piece of code. Can someone please assign an ID for this? Cheers, Moritz
Current thread:
- R: Re: [oss-security] vsftpd download backdoored pinto.elia () gmail com (Jul 04)