Linked by Jordan Spencer Cunningham on Mon 14th Jun 2010 23:58 UTC
Bugs & Viruses Recently, the Linux version of UnrealIRCd was discovered to have had a Trojan worm its way into the source code. Even more embarrassing for the developers of Unreal is that the Trojan's been holding open the backdoor in the source code since November of 2009-- not very recently. And, of course, bloggers and press in general are taking the opportunity of another breach in Linux security to point out doomsday devices that don't really exist.
Thread beginning with comment 430082
To view parent comment, click here.
To read all comments associated with this story, please click here.
Member since:

"But it does mean that Linux users who believe they can't be infected by malware are simply wrong.

... Linux users who believe they can't be infected by malware because they use package managers to install their signed open source software still have no incident on record, after all these years, to contradict that belief.

I think "can't" is a bit too strong a word, I think "extremely unlikely to" is a better phrase. "can't" is too black and white.

"can't" implies that unless it happens, then it cannot and therefore will not happen. This in-turn implies that once it has happened, it can and therefore will happen.

If you were to say that it is extremely unlikely (never in x years), and then it happens, you can still say that it is extremely unlikely (once in x years).

Fair enough.
APT was introduced in 1998 and original test builds were circulated on IRC. The first Debian version that included it was Debian 2.1, released on 9 March 1999.

So then to describe the record for infection of end users systems via APT open source repositories you would suggest it be described as "it is extremely unlikely, say nonce in eleven years".

OK, I can live with that.

Here are the estimated infection rates for another frequently-used system, for objective comparison purposes:

Edited 2010-06-15 10:24 UTC

Reply Parent Score: 2