Date: Wed, 20 Jan 2010 13:31:42 +0100 From: Nico Golde <oss-security+ml@...lde.de> To: oss-security@...ts.openwall.com Subject: Re: BerliOS.de comrpomise Hi, * Josh Bressers <bressers@...hat.com> [2010-01-18 22:16]: > As some of you have heard, it seems that BerliOS was compromised recently. > http://lwn.net/Articles/369633/ > http://www.h-online.com/open/news/item/BerliOS-open-source-project-portal-falls-victim-to-attack-903990.html > > I've mailed the BerliOS admins with no reply. I'm wondering if anyone has > any additional details regarding this. > > The Apache group had a similar incident some years back, and did an > incredible job of documenting things: > http://www.apache.org/info/20010519-hack.html We (Debian) also contacted them and got a rather distracting reply so far which doesn't help much. We are thinking about informing our maintainers to check the upstream tarballs. But given the replies in the lwn thread and a look at git.berlios.de doesn't give the impression so far that anything has been fixed in a secure manner. I'll keep you updated but so far at least (and this is my personal opinion) it doesn't look to me like it would be a wise decision to host files at BerliOS currently and that BerliOS is interested to do what apache has been done. Cheers Nico -- Nico Golde - http://www.ngolde.de - nion@...ber.ccc.de - GPG: 0xA0A0AAAA For security reasons, all text in this mail is double-rot13 encrypted. Content of type "application/pgp-signature" skipped
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.