Hi,

Version 1.3.8, with SCAN_MODE_DEV=THOROUGH, was working fine (on a Debian 
Wheezy install).  There were no whitelisted 
ALLOWDEVFILEs needed.

when rkhunter was upgraded to 1.4.0-1, files in /dev/.udev/db/ started to get 
marked as suspicious.  these files had 
simulated forward slashes in them - e.g. "\x2fclass\x2fvc\x2fvcs1".  I traced 
the problem to line 15233 of the rkhunter 
script in the do_dev_whitelist_check() method

FNAMEGREP=`echo "${RKHTMPVAR}" | sed -e 's/\./\\\./g'`

The grep expression below it was failing to deal with the "\x2f' etc parts of 
the filenames, turning that into "x2f" and 
so the match wasn't made.  I changed the line to

FNAMEGREP=`echo "${RKHTMPVAR}" | sed -e 's/\\\\/\\\\\\\\/g' | sed -e 
's/\./\\\./g'`

and added  ALLOWDEVFILE="/dev/.udev/db/\\x2f*" to whitelist all the problematic 
files in that directory

Not sure yet if the /dev/.udev/db/ directory / files on my system are actually 
incorrect, it certainly looks like it. 
But this may be a general issue for dealing with any files with "\" in the name

I couldn't figure out how to avoid changing the rkhunter script (i.e. the right 
ALLOWDEVFILE expression) because the 
problem lies in grep treating \x2f as x2f and the input to grep is gotten from 
a listing of the files in /dev/.udev/db/

I will let the list know if my /dev/.udev/db directory and those files are 
actually messed up (or if anyone could tell me?)

doug




------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
Rkhunter-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/rkhunter-users

Reply via email to