Hírolvasó
Security updates for Monday
Security updates have been issued by Debian (davical, intel-microcode, libpgf, php-horde, spamassassin, spip, and thunderbird), Mageia (clementine, dnsmasq, git, jasper, kdelibs4, kernel, libcroco, libgit2, libvirt, ncurses, openafs, proftpd, qbittorrent, signing-party, squid, and wireshark), openSUSE (java-1_8_0-openjdk and postgresql), Oracle (kernel), Red Hat (chromium-browser and openslp), and SUSE (kernel, libssh, and xen).
07/13 PCLinuxOS 2021.07
05/30 4MLinux 36.1
Kernel prepatch 5.5-rc2
The second 5.5 kernel prepatch is out.
"Things look normal - rc2 is usually fairly calm, and so it was this
week too."
12/15 MLL 15-Dec-2019
Russian police raid NGINX Moscow office
ZDNet reports
on a police raid at the NGINX office. "Moscow police executed the raid after last week the Rambler Group filed a copyright violation against NGINX Inc., claiming full ownership of the NGINX web server code. The Rambler Group is the parent company of rambler.ru, one of Russia's biggest search engines and internet portals.
According to copies of the search warrant posted on Twitter today, Rambler
claims that Igor Sysoev developed NGINX while he was working as a system
administrator for the company, hence they are the rightful owner of the
project."
03/05 Qubes 4.0.4
[$] Explicit pinning of user-space pages
The saga of get_user_pages() — and the problems it causes within
the kernel — has been extensively chronicled here; see the LWN kernel
index for the full series. In short, get_user_pages() is used
to pin user-space pages in memory for some sort of manipulation outside of
the owning process(es); that manipulation can sometimes surprise other
parts of the kernel that think they have exclusive rights to the pages in
question. This
patch series from John Hubbard does not solve all of the problems, but
it does create some infrastructure that may make a solution easier to come
by.
Security updates for Friday
Security updates have been issued by Fedora (knot-resolver and xen), openSUSE (kernel), and SUSE (haproxy, kernel, and openssl).
04/15 Zorin OS 16-beta
[$] Buffered I/O without page-cache thrashing
Linux offers two modes for file I/O: buffered and direct. Buffered I/O
passes through the kernel's page cache; it is relatively easy to use and
can yield significant performance benefits for data that is accessed
multiple times. Direct I/O, instead, goes straight between a user-space
buffer and the storage device. It can be much faster for situations where
caching by the operating system isn't necessary, but it is complex to use
and contains traps for the unwary. Now, it seems, Jens Axboe has come up
with a
way to get many of the benefits of direct I/O with a lot less bother.
Security updates for Thursday
Security updates have been issued by CentOS (firefox and nss-softokn), Fedora (samba), Oracle (nss, nss-softokn, nss-util, nss-softokn, and thunderbird), Scientific Linux (thunderbird), SUSE (firefox), and Ubuntu (librabbitmq and samba).
Meet Radiant Award Recipient Claudio Jeker
The Internet Security Research Group and partners have announced that Claudio Jeker (claudio@) is the third Radiant Award recipient. From the announcement:
We’re excited to announce the third Radiant Award recipient, Claudio Jeker.
When we at ISRG think about the greatest threats to Web security today, the lack of Border Gateway Protocol (BGP) security might top our list. Claudio's passion for networking, his focus on security, and his talent as a software developer are enabling him to make great contributions to fixing this and other Web security problems. In particular, he is making great contributions to OpenBSD and OpenBGPD.
Congratulations Claudio!
[$] LWN.net Weekly Edition for December 12, 2019
The LWN.net Weekly Edition for December 12, 2019 is available.
[$] Working toward securing PyPI downloads
An effort to protect package downloads from the Python
Package Index (PyPI) has resulted in a Python Enhancement Proposal
(PEP) and, perhaps belatedly, some discussion in the wider community. The
basic idea is to use The
Update Framework (TUF) to protect PyPI users from some malicious
actors who are aiming to interfere with the installation and update of
Python modules. But the name of the PEP and its wording, coupled with some recent typosquatting problems on PyPI, caused
some confusion along the way. There are some competing interests and
different cultures coming together over this PEP; the process has not run as
smoothly as anyone might want, though that seems to be resolving itself at
this point.
Security updates for Wednesday
Security updates have been issued by Arch Linux (crypto++ and thunderbird), Debian (cacti, freeimage, git, and jackson-databind), Fedora (nss), openSUSE (clamav, dnsmasq, munge, opencv, permissions, and shadowsocks-libev), Red Hat (nss, nss-softokn, nss-util, rh-maven35-jackson-databind, and thunderbird), Scientific Linux (nss, nss-softokn, nss-util, nss-softokn, and thunderbird), SUSE (caasp-openstack-heat-templates, crowbar-core, crowbar-openstack, crowbar-ui, etcd, flannel, galera-3, mariadb, mariadb-connector-c, openstack-dashboard-theme-SUSE, openstack-heat-templates, openstack-neutron, openstack-nova, openstack-quickstart, patterns-cloud, python-oslo.messaging, python-oslo.utils, python-pysaml2, libssh, and strongswan), and Ubuntu (git, libpcap, libssh, and thunderbird).
Behind the One-Way Mirror (EFF)
The Electronic Frontier Foundation has posted a detailed
study on third-party corporate surveillance on the Internet (and
beyond). "Both Google and Apple encourage developers to use ad IDs
for behavioral profiling in lieu of other identifiers like IMEI or phone
number. Ostensibly, this gives users more control over how they are
tracked, since users can reset their identifiers by hand if they
choose. However, in practice, even if a user goes to the trouble to reset
their ad ID, it’s very easy for trackers to identify them across resets by
using other identifiers, like IP address or in-app storage. Android’s
developer policy instructs trackers not to engage in such behavior, but the
platform has no technical safeguards to stop it. In February 2019, a study
found that over 18,000 apps on the Play store were violating Google’s
policy."
[$] OpenBSD system-call-origin verification
A new mechanism to help thwart return-oriented
programming (ROP) and similar attacks has recently been added to the
OpenBSD kernel. It will block system calls that are not made via the C
library (libc) system-call wrappers. Instead of being able to string
together some "gadgets" that make a system call directly, an attacker would
need to be able to call the wrapper, which is normally at a randomized location.