Hírolvasó

[$] COSMIC desktop makes its debut

1 év 1 hónap óta

Linux hardware vendor System76 started promoting its work on a Rust-based, Wayland desktop environment for its Pop!_OS Ubuntu-derivative distribution almost two years ago. On August 8, the company released an alpha version of the COSMIC desktop environment for users to test out. While it has rough edges and missing features, it is stable enough to get a good feel for what the finished product has in store—and the initial results are promising.

jzb

Magit 4.0 released

1 év 1 hónap óta

Version 4.0 of the Magit text-based Git user interface for Emacs has been released. Changes since the 3.3.0 release include the addition of context menus, a makeover for the menu-bar menu, new menu commands, and many other new features and bug fixes. See the release notes for full details.

jzb

Rust Project goals for 2024

1 év 1 hónap óta
The Rust project has developed a set of goals for the latter half of 2024.

Rust for Linux. The experimental support for Rust development in the Linux kernel is a watershed moment for Rust, demonstrating to the world that Rust is indeed capable of targeting all manner of low-level systems applications. And yet today that support rests on a number of unstable features, blocking the effort from ever going beyond experimental status. For 2024H2 we will work to close the largest gaps that block support.

Other goals include completing the 2024 Rust Edition and improving the language's async support.

corbet

Security updates for Monday

1 év 1 hónap óta
Security updates have been issued by AlmaLinux (httpd:2.4), Fedora (chromium, firefox, frr, neatvnc, nss, python-setuptools, and python3.13), Gentoo (AFLplusplus, Bundler, dpkg, GnuPG, GPAC, libde265, matio, MuPDF, PHP, protobuf, protobuf-python, protobuf-c, rsyslog, Ruby on Rails, and runc), Red Hat (389-ds-base, container-tools:rhel8, and httpd:2.4), SUSE (bind and ca-certificates-mozilla), and Ubuntu (linux-azure).
jake

[$] Meeting the Debian Technical Committee

1 év 1 hónap óta
It is something of a DebConf tradition that members of the Debian Technical Committee (TC) take the stage to talk about the work that the committee does—and more. DebConf24 in Busan, South Korea was no exception, as TC chair Sean Whitton, who will complete his term at the end of the year, and one of its newest members, Stefano Rivera, described the constitutional underpinnings of the TC, how it tries to make decisions when it needs to, and the constant process of recruiting new members. After that, they took a few questions from the audience. The session provided a nice overview of the TC and its role in Debian, but it may well be of interest further afield.
jake

A new kernel-version policy for Ubuntu

1 év 1 hónap óta
The Canonical Kernel Team has announced a new policy regarding the version of the kernel that will ship with each Ubuntu release; the result will generally be the shipping of newer releases.

To provide users with the absolute latest in features and hardware support, Ubuntu will now ship the absolute latest available version of the upstream Linux kernel at the specified Ubuntu release freeze date, even if upstream is still in Release Candidate (RC) status.

The post goes on to acknowledge that "there are issues with this approach"; there are a lot of policy details that will apply depending on just how raw the shipped kernel is.

corbet

[$] Distinguishing Debian testing from unstable

1 év 1 hónap óta
Sometimes, the smallest changes create the longest discussions. As a case in point, a proposal to make a one-line change in an informational text file on systems running the Debian unstable distribution has blown up into an interminable and sometimes unfriendly debate. At its core, though, this discussion comes down to a seemingly simple question: should a program be able to determine whether it is running on a Debian testing or unstable system?
corbet

New attack against the SLUB allocator

1 év 1 hónap óta

Researchers from Graz University of Technology have published details of a new attack on the Linux kernel called SLUBStick. The attack uses timing information to turn an ability to trigger use-after-free or double-free bugs into the ability to overwrite page tables, and thence into the ability to read and write arbitrary areas of memory. The good news is that this attack does require an existing bug to be usable; the bad news is that the kernel regularly sees bugs of this kind.

We assume that an unprivileged user has code execution. Additionally, we consider the presence of a heap vulnerability in the Linux kernel. We assume that the Linux kernel incorporates all defense mechanisms available in version 6.4, the most recent Linux kernel version when we started our work. These mechanisms include features such as WˆX, KASLR, SMAP, and kCFI. We do not assume any microarchitectural vulnerabilities, e.g., transient execution, fault injection, or hardware side channels.
daroc