-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 The Thursday 2006-12-28 at 12:38 -0500, Darko Gavrilovic wrote:
I interpreted the OP's question as more of a a question about rkhunter's usage and the false positives it generates as opposed to any inherent insecurities in a default SUSE install.
I rather think he asks if rkhunter's report's are real and there are security problems. He is preoccupied with having backdoors in 10.2. See: |> Does the second problem means, that openSUSE 10.2 has security hole in |> default install and fresh installation can be exploited remotly |> during/after online update, when making fresh install? Or one of the |> online repositories includes package with backdoor? He was asked to supply exact error messages in order to investigate further, but he hasn't come back yet. So, I'd ignore this. - -- Cheers, Carlos E. R. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2 (GNU/Linux) Comment: Made with pgp4pine 1.76 iD8DBQFFlHy6tTMYHG2NR9URAl+qAJ9xEH3l9IMhLtSG5sSs25ezsZ3VzQCfTDz2 HsRwblJ7D7o6OZnEXBaqBAE= =UhOI -----END PGP SIGNATURE----- --------------------------------------------------------------------- To unsubscribe, e-mail: opensuse-security+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security+help@opensuse.org