Hacked!

This is a discussion about Hacked! in the Everything Linux category; I received a warning today from Tech Republic that the main source code for the Linux kernel was hacked last week. A hacker changed just 2 lines of the code which would of enabled him/them to gain access over a system running that code.

Everything Linux 1799 This topic was started by , . Last reply by ,


data/avatar/default/avatar37.webp

36 Posts
Location -
Joined 2003-11-28
I received a warning today from Tech Republic that the main source code for the Linux kernel was hacked last week. A hacker changed just 2 lines of the code which would of enabled him/them to gain access over a system running that code. The invection was spotted several days later and rectified.
 
What is the best messure to ensure security on the net while using Linux?

Participate in our website and join the conversation

You already have an account on our website? To log in, use the link provided below.
Login
Create a new user account. Registration is free and takes only a few seconds.
Register
This subject has been archived. New comments and votes cannot be submitted.
Dec 2
Created
Dec 2
Last Response
0
Likes
2 minutes
Read Time
User User User
Users

Responses to this topic


data/avatar/default/avatar38.webp

64 Posts
Location -
Joined 2003-01-03
Quote:I received a warning today from Tech Republic that the main source code for the Linux kernel was hacked last week. A hacker changed just 2 lines of the code which would of enabled him/them to gain access over a system running that code. The invection was spotted several days later and rectified.

What is the best messure to ensure security on the net while using Linux?

NO... NO... NO... NO... NO... NO... Debian servers got compromised using the Kernel integer Overflow. Not a buffer overflow... this one was extremely hard to detect. Its effects are affecting Every Kernel to a certain revision.

There is also a CVE for it. Give it a rest.

Debian Security Announcemnet 403-1

DO not ever spread the word like this. The two lines of code were bad to begin with. And it was a LOCAL exploit only. So they would have to get onto the machine first with a valid account then exploit the vulnerability.