Hírolvasó
Kóstolóval csábítaná a YouTube a potenciális előfizetőket
Régi önmagához nyúl vissza a Facebook
Gelsinger: porhintés a TSMC amerikai beruházása
Összerúgta a port a VMware és a Siemens
Introvertáltak az IT-ban: a hard skill nem elég
NMHH: hatástalan az óriásplatformok európai szabályozása
"az Európai Bizottság a jelek szerint nem hajlandó kiadni a politikai aktivistákkal kötött szerződések listáját"
Bypassing Ubuntu's user-namespace restrictions
Ubuntu 23.10 and 24.04 LTS introduced a feature using AppArmor to restrict access to user namespaces. Qualys has reported three ways to bypass AppArmor's restrictions and enable local users to gain full administrative capabilities within a user namespace. Ubuntu has followed up with a post that explains the namespace-restriction feature in detail, and says these bypasses do not constitute security vulnerabilities.
While a superficial observation of the application of user namespaces may indicate privileged (root level) access, this is a fictitious state that is operating as expected, with access control still mapped to the real (root namespace) user's permissions. As such, these bypasses do not enable more access than what the default Linux kernel unprivileged user namespace feature allows in most Linux distributions. They do, however, demonstrate limitations that we are looking to address in order to strengthen existing protections against as-of-yet-unknown Linux kernel vulnerabilities.LWN covered Ubuntu 24.04 LTS last May.
Rust adopting Ferrocene Language Specification
One recurring criticism of Rust has been that the language has no official specification. This is a barrier to adoption in some safety-conscious organizations, as well as to writing alternate language implementations. Now, the Rust project has announced that it will be adopting the Ferrocene Language Specification (FLS) developed by Ferrous Systems and maintaining it as part of the core project. While this may not satisfy die-hard standardization-process enthusiasts, it's a step toward removing another barrier to using Rust in safety-critical systems.
It's in that light that we're pleased to announce that we'll be adopting the FLS into the Rust Project as part of our ongoing specification efforts. This adoption is being made possible by the gracious donation of the FLS by Ferrous Systems. We're grateful to them for the work they've done in assembling the FLS, in making it fit for qualification purposes, in promoting its use and the use of Rust generally in safety-critical industries, and now, for working with us to take the next step and to bring the FLS into the Project.A burst of progress on the GCC Rust front end
"arany-rolexxel parádézol te takony hülyegyerek"
Adatszivárgás áldozata lett az adatszivárgásokat gyűjtő oldal tulajdonosa
[$] A process for handling Rust code in the core kernel
Üzletté vált az indiai kollégák akcentusának valós idejű amerikanizálása
Security updates for Thursday
A new home for kernel.org
The Linux kernel is massive — approximately 28 million lines of code. Since 2005, more than 13,500 developers from more than 1,300 different companies have contributed to the Linux kernel. Additionally, there are many kernel versions, and developers update the code constantly, distributing that code to developers who are working on various distributions of Linux. Akamai now delivers the infrastructure that these developers and their users rely on, at no cost, supporting the Git environments developers use to access kernel sources quickly, regardless of where they're based.