| Summary: | Is cauldron infected by the SucKIT rootkit? | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | Bjarne Thomsen <bjarne.thomsen> |
| Component: | RPM Packages | Assignee: | Mageia Bug Squad <bugsquad> |
| Status: | RESOLVED FIXED | QA Contact: | |
| Severity: | normal | ||
| Priority: | Normal | CC: | bittwister2, ftg |
| Version: | Cauldron | ||
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Source RPM: | chkrootkit-0.50-5.mga5.src.rpm | CVE: | |
| Status comment: | |||
|
Description
Bjarne Thomsen
2015-01-07 22:53:21 CET
Bit Twister
2015-01-08 00:35:27 CET
CC:
(none) =>
junknospam I confirm, but I don't know whether it's a false positive or not. CC:
(none) =>
ftg It is a false positive, caused by it finding a particular string that's in the systemd binary. It was supposed to have been fixed upstream in 0.50, but I guess the fix didn't work. I've added back our old patch to remove the false positive. Status:
NEW =>
RESOLVED |