Security Breach on

They have discovered this on August 28th, 2011.

Linus Torvalds on Google+ said

""" has been down, so people aren’t sending me nearly as many pull requests las they normally do (I couldĀ hope it’s because we’re late in the -rc cycle and everybody is being very good, but then my medication wears off and reality strikes again).

So I’m avoiding boredom by writing my own dive log software, because I’m tired of not being able to see my dives and add location information later on. The Java ones just aren’t doing anything for me.


Check his post – Click Here.

Message From


Earlier this month, a number of servers in the infrastructure were compromised. We discovered this August 28th. While we currently believe that the source code repositories were unaffected, we are in the process of verifying this and taking steps to enhance security across the infrastructure.

What happened?

  • Intruders gained root access on the server Hera. We believe they may have gained this access via a compromised user credential; how they managed to exploit that to root access is currently unknown and is being investigated.
  • Files belonging to ssh (openssh, openssh-server and openssh-clients) were modified and running live.
  • A trojan startup file was added to the system start up scripts
  • User interactions were logged, as well as some exploit code. We have retained this for now.
  • Trojan initially discovered due to the Xnest /dev/mem error message w/o Xnest installed; have been seen on other systems. It is unclear if systems that exhibit this message are susceptible, compromised or not. If developers see this, and you don’t have Xnest installed, please investigate.
  • It *appears* that 3.1-rc2 might have blocked the exploit injector, we don’t know if this is intentional or a side affect of another bugfix or change.

What Has Been Done so far:

  • We have currently taken boxes off line to do a backup and are in the process of doing complete reinstalls.
  • We have notified authorities in the United States and in Europe to assist with the investigation
  • We will be doing a full reinstall on all boxes on
  • We are in the process of doing an analysis on the code within git, and the tarballs to confirm that nothing has been modified

The Linux community and take the security of the domain extremely seriously, and are pursuing all avenues to investigate this attack and prevent future ones.


To know more check