Package: chkrootkit Version: 0.44-2 Severity: normal
When mlnet (the mldonkey server) is running, chkrootkit wrongly detects it: Checking `bindshell'... INFECTED (PORTS: 4000) (indeed mlnet is listening on port 4000 and stopping it gets rid of the spurious detetcion). -- System Information: Debian Release: 3.1 APT prefers testing APT policy: (700, 'testing'), (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.11-rc2 Locale: LANG=C, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Versions of packages chkrootkit depends on: ii binutils 2.15-5 The GNU assembler, linker and bina ii debconf 1.4.48 Debian configuration management sy hi libc6 2.3.2.ds1-20 GNU C Library: Shared libraries an ii net-tools 1.60-10 The NET-3 networking toolkit -- debconf information: * chkrootkit/run_daily_opts: -q * chkrootkit/run_daily: true -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]