[ale] FW: RUS-CERT: Several Debian hosts compromised, archive not affec ted

Preston Boyington PBoyington at polyengineering.com
Fri Nov 21 10:29:03 EST 2003



-----Original Message-----
From: Karsten M. Self [mailto:kmself at ix.netcom.com]
Sent: Friday, November 21, 2003 6:20 AM
To: debian-user
Subject: RUS-CERT: Several Debian hosts compromised, archive not
affected


http://cert.uni-stuttgart.de/files/fw/debian-security-20031121.txt


------------------------------------------------------------------------
[Note: The original announcement didn't have a GnuPG signature.]

From: Martin Schulze <joey at infodrom.org>
Subject: Some Debian Project machines have been compromised
To: Debian Announcements <debian-announce at lists.debian.org>
Date: Fri, 21 Nov 2003 11:46:19 +0100
Message-ID: <20031121104619.GK2458 at finlandia.infodrom.north.de>

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
The Debian Project                                http://www.debian.org/
Some Debian Project machines compromised                press at debian.org
November 21st, 2003
- ------------------------------------------------------------------------

Some Debian Project machines have been compromised

This is a very unfortunate incident to report about.  Some Debian
servers were found to have been compromised in the last 24 hours.

The archive is not affected by this compromise!

In particular the following machines have been affected:

  . master (Bug Tracking System)
  . murphy (mailing lists)
  . gluck (web, cvs)
  . klecker (security, non-us, web search, www-master)

Some of these services are currently not available as the machines
undergo close inspection.  Some services have been moved to other
machines (www.debian.org for example).

The security archive will be verified from trusted sources before it
will become available again.

Please note that we have recently prepared a new point release for
Debian GNU/Linux 3.0 (woody), release 3.0r2.  While it has not been
announced yet, it has been pushed to our mirrors already.  The
announcement was scheduled for this morning but had to be postponed.
This update has now been checked and it is not affected by the
compromise.

We apologise for the disruptions of some services over the next few
days.  We are working on restoring the services and verifying the
content of our archives.


Contact Information
- -------------------

For further information, please visit the Debian web pages at
<http://www.debian.org/> or send mail to <press at debian.org>.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.3 (GNU/Linux)

iD8DBQE/vfsJW5ql+IAeqTIRApjYAJ4v6QK07nyNNyBCvsosorej3cwMHACfZcLt
PwFJYJu8w1rU64Z82ddF6LY=
=If2b
-----END PGP SIGNATURE-----
------------------------------------------------------------------------

Peace.

-- 
Karsten M. Self <kmself at ix.netcom.com>        http://kmself.home.netcom.com/
 What Part of "Gestalt" don't you understand?
   Verio webhosting?  Guaranteed downtime:
     http://www.wired.com/news/politics/0,1283,57011,00.html
     http://www.dowethics.com/r/environment/freedom.html
-------------- next part --------------
An HTML attachment was scrubbed...




More information about the Ale mailing list