Hírolvasó
Kernel prepatch 5.18-rc4
LibreSSL 3.5.2 released
Hot on the heels of OpenBSD 7.1's release, LibreSSL has been updated to 3.5.2!
The complete release notes may be read here: https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.5.2-relnotes.txt
[$] Handling messy pull-request diffstats
Security updates for Friday
OpenBSD 7.1 released
Ubuntu 22.04 LTS (Jammy Jellyfish) released
Ubuntu 22.04 LTS is the first LTS release where the entire recent Raspberry Pi device portfolio is supported, from the new Raspberry Pi Zero 2W to the Raspberry Pi 4. Ubuntu 22.04 LTS adds Rust for memory-safe systems-level programming. It also moves to OpenSSL v3, with new cryptographic algorithms for elevated security.
Debian Project Leader Election 2022 Results
[$] An introduction to Linux audio plugin APIs
This is an introduction to open-source plugin APIs for musicians and sound engineers alike. It focuses on the options in the larger ecosystem and how their shortcomings led to the creation of new alternatives with liberal licensing.
Security updates for Thursday
April 21, 2022: OpenBSD 7.1 Released
As usual, the release page lists the main highlights of the new release, which include
- OpenBSD/arm64 contains greatly improved support for Apple M1 systems [See earlier article].
- loongson platform retired.
- Many improvements to wireless networking. iwm(4) and iwx(4) have gained 80MHz channel support [See earlier article]. mtw(4), a driver for MediaTek MT7601U Wi-Fi devices, was added [See earlier article].
- Utility realpath(1) has been added.
- httpd(8) gained support for customised error pages and pre-compressed gzip files.
- Sysctl hw.perfpolicy is now set to auto by default at startup.
- igc(4), a driver for Intel 2.5Gb Ethernet controllers, has been added.
- Mouse tracking is now disabled by default in xterm(1). Setting X resource allowMouseOps to true reinstates the earlier behaviour.
- OpenSSH has been updated to version 9.0
[See earlier article].
- This includes support for ssh-agent restriction [See earlier article].
- Post-quantum KEX algorithm sntrup761x25519-sha512@openssh.com is now the default.
- sftp(1) client has gained a "cp" command that supports server-side copying of files (using the new "copy-data" protocol extension).
- The login class capability database now supports /etc/login.conf.d/${class}, and this is used by the ports system.
- Base now includes (optional) support for minimal runtime detection of undefined behaviour. As described in clang-local(1), this requires use of clang(1)'s -fsanitize-minimal-runtime flag.
The new release supports 13 distinct hardware platforms with thousands of prebuilt packages for all platforms.
If you want to delve further into the details before (or while, after) installing or upgrading to the new release, the detailed changelog has all the details. Those upgrading from the 7.0 release (or earlier) should consult the Upgrade Guide.
If you enjoy this release, please remember to donate to the project as a way of saying thanks to the developers for their work.
Two OpenWrt updates
OpenWrt 19.07.10 is the final release of the 19.07 release branch, this branch is now end of life and we will not fix problems on this branch any more, not even severe security problems. We encourage all users still using OpenWrt 19.07 to upgrade to OpenWrt 21.02 or more recent OpenWrt versions.
Router distributions are easy to forget about; now might be a good time to check any relevant systems and, if needed, doing an upgrade.
[$] LWN.net Weekly Edition for April 21, 2022
[$] Fedora considers deprecating legacy BIOS
Tromey: Faster GDB Startup
The first DWARF reader created “partial symbols”, which held a name and some associated, easy-to-compute data, like the kind of symbol (variable, function, struct tag, etc). The second DWARF reader (which is still there now) is called when more information was needed about a particular symbol — say, its type. This reader reads all the DIEs in a DWARF compilation unit and expands them into gdb’s symbol table, block, and type data structures.
Both of these scans were slow, but for the time being I’ve only rewritten the first scan, as it was the one that was first encountered and most obviously painful. (I’ve got a plan to fix up the CU expansion as well, but that’s a lengthy project of its own.)
Security updates for Wednesday
A pile of stable kernel updates
The More You Know, The More You Know You Don’t Know (Project Zero)
5 of the 7 [Android] 0-days from 2021 targeted GPU drivers. This is actually not that surprising when we consider the evolution of the Android ecosystem as well as recent public security research into Android. The Android ecosystem is quite fragmented: many different kernel versions, different manufacturer customizations, etc. If an attacker wants a capability against "Android devices", they generally need to maintain many different exploits to have a decent percentage of the Android ecosystem covered. However, if the attacker chooses to target the GPU kernel driver instead of another component, they will only need to have two exploits since most Android devices use 1 of 2 GPUs: either the Qualcomm Adreno GPU or the ARM Mali GPU.