Hírolvasó
07/29 KDE neon 20210729
Security updates for (US) Thanksgiving
Security updates have been issued by Debian (haproxy and libvorbis), Fedora (mod_auth_mellon and xen), Oracle (389-ds-base, kernel, and tcpdump), SUSE (bsdtar, java-11-openjdk, java-1_7_0-openjdk, and libxml2), and Ubuntu (nss and python-psutil).
unwind(8) gains "Happy Eyeballs"-like flexibility
Florian Obser (florian@) has committed code to give unwind(8) a flexible approach to resolving strategies:
Modified files: sbin/unwind : resolver.c resolver.h usr.sbin/unwindctl: unwindctl.c Log message: Instead of only considering if a resolving strategy is dead, works or validates, measure how well it is doing.Security updates for Wednesday
Security updates have been issued by Debian (bsdiff, libvpx, tiff, and xmlrpc-epi), Fedora (freeimage, imapfilter, kernel, mingw-freeimage, and thunderbird), openSUSE (cups and djvulibre), Oracle (SDL), SUSE (ardana-db, ardana-keystone, ardana-neutron, ardana-nova, crowbar-core, crowbar-openstack, crowbar-ui, openstack-barbican, openstack-heat-templates, openstack-keystone, openstack-neutron, openstack-neutron-gbp, openstack-neutron-lbaas, openstack-nova, openstack-octavia, openstack-sahara, python-psutil, release-notes-suse-openstack-cloud, freerdp, mailman, and slurm), and Ubuntu (ruby2.3, ruby2.5).
[$] Fixing SCHED_IDLE
The Linux kernel scheduler is a complicated beast
and a lot of effort goes into improving it during every kernel release
cycle. The 5.4 kernel release includes a few improvements to the existing
SCHED_IDLE scheduling policy that can help users improve the
scheduling latency of their high-priority (interactive) tasks if they use
the SCHED_IDLE policy for the lowest-priority (background)
tasks. Read on for a description of this work contributed by Viresh Kumar.
Security updates for Tuesday
Security updates have been issued by Debian (libxdmcp, nss, php-imagick, and ruby2.1), openSUSE (java-11-openjdk), Red Hat (389-ds-base, kernel, kernel-rt, python-jinja2, qemu-kvm-ma, and tcpdump), SUSE (bluez, clamav, cpio, cups, gcc9, libpng16, libssh2_org, mailman, sqlite3, squid, strongswan, tiff, and webkit2gtk3), and Ubuntu (redmine).
p2k19 Hackathon Report: Stefan Sperling on iwm(4) wifi progress, more
Next up in our hackathon series from p2k19 is one from Stefan Sperling (stsp@),
who writes:
My main goal for the p2k19 hackathon was 9260 device support in iwm(4). Firmware updates for previous device generation were an important prerequisite step. One day before p2k19, the oldest generation of hardware supported by the iwm(4) driver was switched to latest available firmware images.
Stable kernel updates
Security updates for Monday
Security updates have been issued by Debian (chromium, enigmail, isc-dhcp, libice, libofx, and pam-python), Fedora (chromium, ghostscript, mingw-cfitsio, mingw-gdal, mingw-libidn2, and rsyslog), Gentoo (adobe-flash, chromium, expat, and firefox), openSUSE (apache2-mod_perl, haproxy, java-11-openjdk, and ncurses), Oracle (ghostscript, kernel, php:7.2, php:7.3, and sudo), Red Hat (chromium-browser, python27-python, and SDL), and Ubuntu (dpdk and libvpx).
The 5.4 kernel has been released
Linus has released the 5.4 kernel.
"Not a lot happened this last week, which is just how I like
it". Significant features in this release include
the haltpoll
CPU governor,
the iocost (formerly io.weight) I/O
controller,
the EROFS filesystem,
an implementation of the exFAT filesystem
that may yet be superseded by a better version,
the fs-verity file integrity mechanism,
support for the BPF
compile once, run everywhere mechanism,
the dm-clone
device mapper target,
the virtiofs
filesystem,
kernel lockdown support (at last),
kernel symbol namespaces, and a new
random-number generator meant to solve the
early-boot entropy problem.
See the KernelNewbies 5.4
page for a lot more details.
[$] Virtio without the "virt"
When virtio
was merged in Linux v2.6.24, its author, Rusty Russell, described
the goal as being for "common drivers to be efficiently used
across most virtual I/O
mechanisms". Today, much progress has been made toward that goal, with virtio
supported by multiple hypervisors and guest drivers shipped by many operating
systems. But these applications of virtio are implemented in software, whereas
Michael Tsirkin's "VirtIO
without the Virt" talk at KVM Forum 2019 laid out how
to implement virtio in hardware.
Security updates for Friday
Security updates have been issued by Fedora (dpdk, mingw-djvulibre, mingw-hunspell, mingw-ilmbase, mingw-OpenEXR, php-symfony, php-symfony3, and rsyslog), openSUSE (chromium and squid), SUSE (aspell, cups, djvulibre, and dpdk), and Ubuntu (djvulibre).
Bad Binder: Android In-The-Wild Exploit (Project Zero)
Over on the Project Zero blog, Maddie Stone has a lengthy post about a zero-day exploit that was found and fixed in the Android Binder interprocess communication mechanism. The post details the search for the problem, which was apparently being used in the wild, its fix, and how it can be exploited. This is all part of an effort to "make zero-day hard"; one of the steps the project is taking is to disseminate more information on these bugs. "Complete detailed analysis of the 0-days from the point of view of bug hunters and exploit developers and share it back with the community. Transparency and collaboration are key. We want to share detailed root cause analysis to inform developers and defenders on how to prevent these types of bugs in the future and improve detection. We hope that by publishing details about the exploit and its methodology, this can inform threat intelligence and incident responders. Overall, we want to make information that’s often kept in silos accessible to all."
[$] Fedora's modularity mess
Fedora's Modularity
initiative has been no stranger to controversy since its inception in 2016. Among other things, there
were enough problems with the original design that Modularity went back to the drawing board in early 2018.
Modularity has since been integrated with both the Fedora and Red Hat
Enterprise Linux (RHEL) distributions, but the controversy continues, with
some developers asking whether it's time for yet another redesign — or to
abandon the idea altogether. Over the last month or so, several lengthy,
detailed, and heated threads have explored this issue; read on for your
editor's attempt to integrate what was said.
Stable kernels 5.3.12, 4.19.85, and 4.14.155
Security updates for Thursday
Security updates have been issued by Fedora (oniguruma and thunderbird-enigmail), openSUSE (chromium, ghostscript, and slurm), Oracle (kernel), Red Hat (kpatch-patch), Slackware (bind), SUSE (python-ecdsa), and Ubuntu (bind9 and mariadb).
[$] LWN.net Weekly Edition for November 21, 2019
The LWN.net Weekly Edition for November 21, 2019 is available.
[$] LSM stacking and the future
The idea of stacking (or chaining) Linux
security modules (LSMs) goes back
15 years (at least) at this point; progress
has definitely been made along
the way, especially in the last decade or so. It has been possible to
stack "minor" LSMs with one major LSM (e.g. SELinux, Smack, or AppArmor) for
some time, but mixing, say, SELinux and AppArmor in the same
system has not been possible. Combining major security solutions may not
seem like a truly important feature, but there is a use case where it is
pretty clearly needed: containers. Longtime LSM stacker (and Smack
maintainer) Casey Schaufler
gave a presentation at the 2019
Linux Security Summit Europe to report on the status and plans for
allowing arbitrary LSM stacking.
krw@ adventures at p2k19
Next up in the series of p2k19 reports is Ken Westerback (krw@), who writes:
tl;dr - Great City, Great Coffee, Great Hacking. I already miss Bucharest.