On Fri, 14 Feb 2020 20:21:32 +0100 Axel Beckert wrote:

[...]
> Hi,

Hello Axel, thanks a lot for looking into my bug report!

> 
> Francesco Poli (wintermute) wrote:
[...]
> > Does libkeyutils1/1.6.1-2 ship a rootkit?
> 
> Likely not. I looked through the whole diff between 1.6 and 1.6.1. At
> least nothing suspicious like obfuscated code.

And the .deb package builds in a [reproducible] manner, with the
checksum of libkeyutils1_1.6.1-2_amd64.deb shown by
tests.reproducible-builds.org identical to that of the same .deb
package in my /var/cache/apt/archives/

Hence, even looking at the *source* differences should be enough to be
reasonably sure...

[reproducible]: 
<https://tests.reproducible-builds.org/debian/rb-pkg/unstable/amd64/keyutils.html>

> 
> > Or is it a false positive from rkhunter?
> 
> Likely, because what triggers this is not the content of the file, but
> the filename itself
[...]
> Doesn't look like a rootkit addition to me, just bumping the SONAME.
> (And the adding of KEYCTL_MOVE neither.) Lowering the severity to
> default ("normal")...
[...]

I agree.

Thanks again for the very prompt analysis!


-- 
 http://www.inventati.org/frx/
 There's not a second to spare! To the laboratory!
..................................................... Francesco Poli .
 GnuPG key fpr == CA01 1147 9CD2 EFDF FB82  3925 3E1C 27E1 1F69 BFFE

Attachment: pgpg4XnMH74Yg.pgp
Description: PGP signature

Reply via email to