On Fri, 21 Nov 2003 at 12:38:50 +0100, Thomas Sjögren wrote: > Anyone to shed some light over this? > > "Someone has cracked all the servers of the Debian Project. There has > been a severe security mishap and guys should uninstall all stuff > downloaded and installed in the past 2 days. Please do not apt-get > anything right now! Please wait till an `official' release happens!" > http://article.gmane.org/gmane.linux.debian.user/117910 > > Server security mishap - you think?! >
This is exaggerated. I'm forwarding the official announcement from debian-announce mailing list: ========================================================================= Date: Fri, 21 Nov 2003 11:46:19 +0100 From: Martin Schulze <[EMAIL PROTECTED]> To: Debian Announcements <debian-announce@lists.debian.org> Subject: Some Debian Project machines have been compromised Message-ID: <[EMAIL PROTECTED]> ------------------------------------------------------------------------ The Debian Project http://www.debian.org/ Some Debian Project machines compromised [EMAIL PROTECTED] November 21st, 2003 ------------------------------------------------------------------------ Some Debian Project machines have been compromised This is a very unfortunate incident to report about. Some Debian servers were found to have been compromised in the last 24 hours. The archive is not affected by this compromise! In particular the following machines have been affected: . master (Bug Tracking System) . murphy (mailing lists) . gluck (web, cvs) . klecker (security, non-us, web search, www-master) Some of these services are currently not available as the machines undergo close inspection. Some services have been moved to other machines (www.debian.org for example). The security archive will be verified from trusted sources before it will become available again. Please note that we have recently prepared a new point release for Debian GNU/Linux 3.0 (woody), release 3.0r2. While it has not been announced yet, it has been pushed to our mirrors already. The announcement was scheduled for this morning but had to be postponed. This update has now been checked and it is not affected by the compromise. We apologise for the disruptions of some services over the next few days. We are working on restoring the services and verifying the content of our archives. Contact Information ------------------- For further information, please visit the Debian web pages at <http://www.debian.org/> or contact <[EMAIL PROTECTED]>. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED] ============================================================================= -- Tomasz Papszun SysAdm @ TP S.A. Lodz, Poland | And it's only [EMAIL PROTECTED] http://www.lodz.tpsa.pl/ | ones and zeros. [EMAIL PROTECTED] http://www.ClamAV.net/ A GPL virus scanner