Feeds

Torvalds dumps Kernel.org for Github after breach

Linux 3.1 finds temporary home

Internet Security Threat Report 2014

Linus Torvalds has released the most current build of Linux 3.1 via Github, rather than use kernel.org, which is still experiencing downtime.

Torvalds said in a post to LKLM.org that the move was simply a way to put the new code out there, rather than an indictment of the situation at kernel.org, which is still suffering after attackers gained root access to its servers using the Phalanx self-injecting rootkit.

The intrusion wasn’t detected for 17 days and is thought to have infected the systems of senior team members, with users being advised to change their passwords and update SSH keys.

“Master.kernel.org is still down, and there really hasn't been a ton of development going on, so I considered just skipping a week,” Torvalds said.

“But hey, the whole point (well, *one* of the points) of distributed development is that no single place is really any different from any other, so since I did a github account for my divelog thing, why not see how well it holds up to me just putting my whole kernel repo there too?”

Some users may be confused by the new setup, he said, but those who want to check can confirm his signed tags on the site before downloading. That said, there hasn’t been much development on the kernel itself, although dive logs are getting a brush up.

Meanwhile, kernel.org is doing a complete check for any stray malware that may be left on systems around the world, and a full investigation into what happened is ongoing. Torvalds didn’t rule out going back to kernel.org for distribution once the problems are sorted. ®

Remote control for virtualized desktops

More from The Register

next story
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Post-Microsoft, post-PC programming: The portable REVOLUTION
Code jockeys: count up and grab your fabulous tablets
Twitter App Graph exposes smartphone spyware feature
You don't want everyone to compile app lists from your fondleware? BAD LUCK
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.