Hírolvasó
[$] Strict memcpy() bounds checking for the kernel
Security updates for Friday
The GNU C Library copyright-assignment policy changes
The changes to accept patches with or without FSF copyright assignment will be effective after August 2nd, and will apply to all open branches. Code shared with other GNU packages via Gnulib will continue to require assignment to the FSF.
The library will continue to be licensed under the GNU Lesser Public License v2.1 or later.
FSF-funded call for white papers on philosophical and legal questions around Copilot
Linux Plumbers Conference: System Boot and Security Microconference Accepted into 2021 Linux Plumbers Conference
We are pleased to announce that the System Boot and Security Microconference has been accepted into the 2021 Linux Plumbers Conference. This microconference brings together those that are interested in the firmware, bootloaders, system boot and security. The events around last year’s BootHole showed how crucial platform initialization is for the overall system security. Those events may have showed the shortcomings in the current boot process, but they have also tightened the cooperation between various companies and organizations. Now is the time to use this opportunity to discuss the lessons learned and what can be done to improve in the future. Other cooperation discussions are also welcomed like those based on legal and organizational issues which may hinder working together.
Last year’s meetup achieved the following:
- TrenchBoot AMD: 3mdeb obtained funds from NLNet foundation to contribute to TrenchBoot for AMD platforms. The funding covered various open-source contributions to LandingZone, GRUB2, and Linux kernel
- TrenchBoot Steering Committee was created
- TrenchBoot Steering Committee participate with Arm D-RTM specification working group
- TrenchBoot Intel: Oracle implemented Intel TXT support in the Linux kernel and GRUB; a few version of RFC patches were posted and discussed; the design, except TPM driver in early kernel boot code, is mostly accepted at this point; next version of Linux kernel and GRUB patches are under development.
- GRUB: BootHole and further security developments; new UEFI LoadFile2 boot protocol implementation for GRUB – RFC patches posted; we want to discuss maintenance improvements and free software communities expectations.
- LVFS/fwupd had lots of contributions over last 12 months
- IT5570 added to the superio plugin
- Updated ESRT access implementation for FreeBSD
- uefi-capsule plugin on FreeBSD
- Add FreeBSD CI
- Port for BSD distros
- wip/3mdeb/qubes-wrapper
This year’s topics to be discussed include:
- TPMs, HSMs, secure elements
- Roots of Trust: SRTM and DRTM
- Intel TXT, SGX, TDX
- AMD SKINIT, SEV
- Ways to improve attestation,
- Integrity Measurement Architecture (IMA)
- TrenchBoot, tboot
- UEFI, coreboot, U-Boot, LinuxBoot, hostboot
- Measured Boot, Verified Boot, UEFI Secure Boot, UEFI Secure Boot Advanced Targeting (SBAT)
- shim
- boot loaders: GRUB2, SeaBIOS, network boot, PXE, iPXE
- u-root
- OpenBMC u-bmc
- Legal, organizational and other similar issues relevant for people interested in system boot and security.
Come and join us in the discussion about how to keep your system secure even at bootup.
We hope to see you there.
[$] Hole punching races against page-cache filling
Security updates for Thursday
[$] LWN.net Weekly Edition for July 29, 2021
[$] Python gets a "Developer-in-Residence"
A set of stable kernels
Security updates for Wednesday
Linux Plumbers Conference: Kernel Dependability and Assurance Microconference Accepted into 2021 Linux Plumbers Conference
We are pleased to announce that the Kernel Dependability and Assurance Microconference has been accepted into the 2021 Linux Plumbers Conference.
Linux development is producing kernels at an ever increasing rate, and at the same time with arguably increasing software quality. The process of kernel development has been adapting to handle the increasing number of contributors over the years to ensure a sufficient software quality. This quality is key in that Linux is now being used in applications that require a high degree of trust that the kernel is going to behave as expected. Some of the key areas we’re seeing Linux start to be used are in medical devices, civil infrastructure, caregiving robots, automotives, etc.
Last year’s miniconference raised awareness about this topic with the wider community. Since then the ELISA team has made contributions to the Documentation and tools. The team has deployed a CI server that runs static analysis tools and syzkaller on the Linux kernel repos and is making the results of last 10 days of linux-next are made available to the community.
This year’s topics to be discussed include:
- Identify missing features that will provide assurance in safety critical systems.
- Which test coverage infrastructures are most effective to provide evidence for kernel quality assurance? How should it be measured?
- Explore ways to improve testing framework and tests in the kernel with a specific goal to increase traceability and code coverage.
- Regression Testing for safety: Prioritize configurations and tests critical and important for quality and dependability
Come and join us in the discussion on how we can assure that Linux becomes the most trusted and dependable software in the world!
We hope to see you there.
[$] A look forward to Linux Plumbers 2021
Security updates for Tuesday
Paul E. Mc Kenney: Confessions of a Recovering Proprietary Programmer, Part XVIII: Preventing Involuntary Generosity
This sort of thing can of course be a bit annoying to our involuntarily generous USA citizen. Some unknown person out there gets a fancy toy, and our citizen gets some bank's dunning notices. Fortunately, there are quite a few things you can do, although I will not try to reproduce the entirety of the volumes of good advice that are available out there. Especially given that laws, processes, and procedures are all subject to change.
But at present, one important way to prevent this is to put a hold on your credit information through either of Experian, Equifax, or Transunion. I strongly suggest that you save yourself considerable time and hassle by doing this, which is free of charge for a no-questions-asked one-year hold. Taking this step is especially important if you are among the all too many of us whose finances don't have much slack, as was the case with my family back when my children were small. After all, it is one thing to have to deal with a few hassles in the form of phone calls, email, and paperwork, but it is quite another if you and your loved ones end up missing meals. Thankfully, it never came to that for my family, although one of my children did complain bitterly to a medical professional about the woefully insufficient stores of candy in our house.
Of course, I also have some advice for the vendor, retailer, digital-finance company, and bank that were involved in my case of attempted involuntary generosity:
- Put just a little more effort into determining who you are really doing business with.
- If the toy contains a computer and connects to the internet, consider the option of directing your dunning notices through the toy rather than to the email and phone of your involuntarily generous USA citizen.
- A loan application for a toy that is shipped to a non-residential address should be viewed with great suspicion.
- In fact, such a loan application should be viewed with with some suspicion even if the addresses match. Porch pirates and all that.
- If the toy is of a type that must connect to the internet to do anything useful, you have an easy method of dealing with non-payment, don't you?
I should hasten to add that after only a little discussion, these companies have thus far proven quite cooperative in my particular case, which is why they are thus far going nameless.
Longer term, it is hard to be optimistic, especially given advances in various easy-to-abuse areas of information technology. In the meantime, I respectfully suggest that you learn from my experience and put a hold on your credit information!
Update: And after a number of phone calls and letters, it was agreed that I did not take out the loan and that I am not responsible for repaying it. Sometimes you get lucky. I nevertheless reiterate my recommendation of putting a hold on your credit information.
Linux Plumbers Conference: RISC-V Microconference Accepted into 2021 Linux Plumbers Conference
We are pleased to announce that the RISC-V Microconference has been accepted into the 2021 Linux Plumbers Conference. The RISC-V software eco-system is gaining momentum at breakneck speed with three new Linux development platforms available this year. The new platforms bring new issues to deal with.
Last year’s meetup achieved the following:
- glibc upstreaming for RV32
- RISC-V platform specification improvements
- EBBR support for RISC-V
- Progress towards merging KVM
This year’s topics to be discussed include:
- Platform specification progress, including SBI-0.3 and the future plans for SBI-0.4. There has been significant progress on the platform specifications, including a server profile, that needs discussion.
- Privileged specification progress, possible 1.12 (which is a work in progress at the foundation).
- Support for the V and B specifications, along with questions about the drafts. The V extension is of particular interest, as there are implementation of the draft extensions that are likely to be incompatible with what will eventually be ratified so we need to discuss what exactly user ABI compatibility means.
- H extension / KVM discussion, which is probably part of the drafts. The KVM port has been hung up on the H extension ratification process, which is unlikely to proceed any time soon. We should discuss other options for a KVM port that avoid waiting for the H extension.
- Support for the batch of SOCs currently landing (JH7100, D1)
- Support for non-coherent systems
- How to handle compliance.
Come join us and participate in the discussion on how we can improve the support for RISC-V in the Linux kernel.
We hope to see you there.
[$] Hastening process cleanup with process_mrelease()
Security updates for Monday
Kernel prepatch 5.14-rc3
Here we are, a week later. After a relatively big rc2, things seem to have calmed down and rc3 looks pretty normal. Most of the fixes here are small, and the diffstat looks largely flat. And there's not an undue amount of stuff.