On Fri, 22 Aug 2008, Jan Iven wrote:

> On 08/22/2008 02:57 PM, Stephan Wiesand wrote:
>> Hi Connie & Troy,
>>
>> RHSA-2008-0855 scares me.
>>
>> There's not much information in that advisory, but it sounds like
>> someone signed trojaned ssh packages with TUV's key.
>
> (Red Hat claims that these never made it through RHN to customer
> machines, so that only some unspecified other channels would be affected).

Well, they make no claims regarding their public ftp Server, do they?

>> Could you please verify that the SRPMS you built from had not been
>> tampered with, and let us know?
>
> Red Hat only mentions some binary RPMs as being affected, given that SL
> recompiles everything I hope we are largely safe. Nevertheless, they've
> released updates for all platforms.

I must have missed the "binary" part. And from the check script:

   # Alternatively, the script can be passed a list of RPM filenames:
   #
   #     $ bash ./openssh-blacklist-1.0.sh some.i386.rpm other.src.rpm

I don't think it's very likely that SL is in trouble. But let's make sure.
Unfortunately, I can't find the SL4/5 SRPMS on my SL mirror, hence the 
request.

Regards,
 	Stephan

-- 
Stephan Wiesand
   DESY - DV -
   Platanenallee 6
   15738 Zeuthen, Germany