The GitHub blog describesa vulnerability in the libcue library (which is used by the GNOMEdesktop) that can be exploited by a remote attacker to run code on adesktop system if the target can be convinced to click on a malicious link.
Security updates have been issued by Fedora (chromium, firefox, and kernel), Gentoo (less and libcue), Red Hat (bind, libvpx, nodejs, and python3), Scientific Linux (firefox and thunderbird), SUSE (conmon, go1.20, go1.21, shadow, and thunderbird), and Ubuntu (libcue, ring, and ruby-kramdown).
The Linux Containers project hasannouncedthe release version0.1 of the Incus system container andvirtual-machine manager, which is a community-led fork of Canonical's LXD. Incus 0.1 "is roughlyequivalent to LXD 5.18 but with a number of breaking changes on top of theobvious rename". There have been some changes made in the two monthssince the fork:
One of the significant features added to the mainline kernel during the 6.6merge window was multi-grain timestamps, which allow the kernel toselectively store file modification times with higher resolution withouthurting performance. Unfortunately, this feature also caused somesurprising regressions, and was quickly ushered back out of the kernel as aresult. It is instructive to look at how this feature went wrong, and howthe developers involved plan to move forward from here.
Red Hat has announcedthat its longstanding "rhsa-announce" mailing list will be shut down onOctober10. That is the list that receives security advisories forRed Hat Enterprise Linux and a whole slew of related products. Anybody whowas counting on that list for Red Hat security advisories will need to findan alternative; a few options are listed in the announcement.
The latest round of stable kernels, 6.5.6,6.1.56, and 5.15.134, have been released. Each contains afairly large collection of important fixes throughout the kernel tree.
On its surface, the BPF virtual machine resembles many other computerarchitectures; it has registers and instructions to perform the usualoperations. But there is a key difference: BPF programs must pass thekernel's verifier before they can be run. The verifier imposes a long listof additional restrictions so that it can prove to itself that any givenprogram is safe to run; getting past those checks can be a source offrustration for BPF developers. At the 2023 GNU Tools Cauldron,Jose Marchesi looked at the problem of compiling for verified architecturesand how the compiler can generate code that will pass verification.
Security updates have been issued by Debian (grub2, libvpx, libx11, libxpm, and qemu), Fedora (firefox, matrix-synapse, tacacs, thunderbird, and xrdp), Oracle (glibc), Red Hat (bind, bind9.16, firefox, frr, ghostscript, glibc, ImageMagick, libeconf, python3.11, python3.9, and thunderbird), Scientific Linux (ImageMagick), SUSE (kernel, libX11, and tomcat), and Ubuntu (linux-hwe-5.15, linux-oracle-5.15).
Hardening the Linux kernel is an endless task, with work required onmultiple fronts. Sometimes, that work is not done in the kernel itself;other tools, including compilers, can have a significant role to play. At the 2023 GNU ToolsCauldron, Qing Zhao covered some of the work that has been done in theGCC compiler to help with the hardening of the kernel - along with workthat still needs to be done.
The eBPF in-kernel virtual machine isapproaching its tenth anniversary as part of Linux; it has grown into atool with many types of uses in the ecosystem. Alexei Starovoitov, whowas the creator of eBPF and did much of the development of it, especiallyin the early going, gave the opening talk atLinuxSecurity Summit Europe2023 on the relationship between BPF andsecurity. In it, he related some interesting history, from a somewhatdifferent perspective than what is often described, he said. Among otherthings, it shows how BPFhas been both a security problem and a security solution along the way.
The SteamOS Linuxdistribution is focused on gaming, naturally, but the effort to build ithas resulted in contributions to multiple areas in the Linux ecosystem. Alberto Garciahas been working on SteamOS and came to Bilbao, Spain to describe some of thosecontributions at Open Source Summit Europe2023. There are some obviousareas where a gaming-focused OS might contribute upstream, such asgraphics, but the talk showed contributions in several other areas as well.
Security updates have been issued by Debian (exim4), Fedora (firecracker, rust-aes-gcm, rust-axum, rust-tokio-tungstenite, rust-tungstenite, and rust-warp), Gentoo (nvidia-drivers), Mageia (chromium-browser-stable, glibc, and libwebp), Red Hat (kernel), SUSE (ghostscript and python3), and Ubuntu (firefox, libtommath, libvpx, and thunderbird).
In last week's episode, a need to preemptkernel code that is executing long-running instructions led to a deeperreexamination of how the kernel handles preemption. There are a number ofsupported preemption modes, varying from "none" (kernel code is neverpreemptible) to realtime (where the kernel is almost always preemptible).Making better use of the kernel's preemption machinery looked like apossible solution to the immediate problem, but it seems that there arebetter options in store. In short, kernel developers would like to givethe scheduler complete control over CPU-scheduling decisions.
For those who are curious about the recently concluded Git Contributor'sSummit, Taylor Blau has posted an extensive set of notesfrom the event. Topics include next-generation backends, libification,backward compatibility, project management, and more.
Version 3.12 of the Python programming language has been released. The "What's New In Python 3.12" page has plenty of details. Highlights of the release include isolated subinterpreter support, more improvements to error messages, more flexible f-strings, Linux perf support for profiling, and lots more.
Linus has released 6.6-rc4 for testing."There's nothing particularly odd in here, if you don't count a week ofno networking pull as being odd. That does result in rc4 being fairlysmall, but I suspect we'll just see a bigger rc5 to compensate."
The "Zero Day Initiative" site has posted a number of advisories (1, 2, 3, 4, 5, 6)describing a number of flaws in the Exim mail server, some of which areexploitable remotely. These problems, allegedly, were first reported tothe project in June 2022, well over one year ago. There is somedisagreement over the timing of events, with Exim developer HeikoSchlittermann claimingthat no actual information was received until last May, and an anonymousZDI representative disputingthat story.Either way, the vulnerabilities are now disclosed, but patches are not yeton offer; Schlittermann said that "Fixes are available in a protectedrepository and are ready to be applied by the distributionmaintainers", so hopefully that situation will change soon.
On September 27, 1983, Richard Stallman announced thefounding of the GNU project. His goal, which seemed wildly optimisticand unattainable at the time, was to write a complete Unix-like operatingsystem from the beginningand make it freely available. Exactly 40years later, the GNU projectcelebrated with a hacker meeting inSwitzerland. Your editor had the good fortune to be able to attend.
Security updates have been issued by Debian (firefox-esr, jetty9, and vim), Gentoo (Fish, GMP, libarchive, libsndfile, Pacemaker, and sudo), Oracle (nodejs:16 and nodejs:18), Red Hat (virt:av and virt-devel:av), Slackware (mozilla), SUSE (chromium, firefox, Golang Prometheus, iperf, libqb, and xen), and Ubuntu (linux-raspi).
While the CVE process was created in response to real problems, it's increasingly clear that CVE numbers arecreating problems of their own. At the 2023 GNU Tools Cauldron,Siddhesh Poyarekar expressed the frustration that toolchain developers havefelt as the result of arguing with security researchers about CVE-numberassignments. In response, the GNU toolchain community is trying to bettercharacterize what is - and is not - considered to be a security-relevantbug in its software.
Using larger block sizes in the kernel for I/O is a recurring topic instorage and block-layer circles. The topic came up in discussions at the Linux Storage, Filesystem, Memory-Management and BPF Summit (LSFMM)back in May. One of the participants in those discussions, Hannes Reinecke, gavea talk at Open Source Summit Europe 2023 with an overview of the reasonsbehind using larger blocks for I/O, the current status of that work, andwhere it all might lead from here.
The AI boom is clearly upon us, but there are still plenty of questionsswirling around this technology. Some of those questions are legal onesand there have been lawsuits filed to try to get clarification-and perhapsmonetary damages. Van Lindberg is a lawyer who is well-known in theopen-source world; he came to OpenSource Summit Europe2023 in Bilbao, Spain to try to put the currentwork in AI into its legal context.
Version118.0 of the Firefox browser has been released. Changes includeimproved fingerprinting prevention and automated translation: "Automatedtranslation of web content is now available to Firefox users! Unlikecloud-based alternatives, translation is done locally in Firefox, so thatthe text being translated does not leave your machine."
Security updates have been issued by Debian (exempi, glib2.0, lldpd, and netatalk), Fedora (curl, libppd, and linux-firmware), Oracle (kernel), and SUSE (Cadence, frr, modsecurity, python-CairoSVG, python-GitPython, and tcpreplay).
The 1.0 version of the LibrePCB "free, cross-platform, easy-to-use electronic design automation suite to draw schematics and design printed circuit boards". As noted in a blog post back in May, a grant has helped spur development of the tool. The focus for the release has been in adding features that were needed so that "there should be no show stopper anymore which prevents you from using LibrePCB for more complex PCB [printed circuit board] designs". New features include a 3D viewer and export format for working with designs in a mechanical computer aided design (CAD) tool, support for manufacturer part number (MFN) management, and lots of board editor features such as thermal relief pads in planes, blind & buried vias,keepout zones, and more. [Thanks to Alphonse Ogulla.]
The last year or so has seen the posting of a few new filesystem types thatare aimed at supporting container workloads. PuzzleFS, presented at the2023 Kangrejos gathering by ArielMiculas, is another contender in this area, but it has some features of itsown, including a novel compression mechanism and an implementation writtenin Rust.
The6.5.5,6.1.55,5.15.133,5.10.197,5.4.257,4.19.295, and4.14.326stable kernel updates have all been released; each contains another set ofimportant fixes.
Back in May, Andre Almeida presented somework toward the creation of user-space spinlocks using adaptivespinning. At that time, the work was stalled because there is, in Linux,currently no way to quickly determine whether a given thread is actuallyexecuting on a CPU. Some progress has since been made on that front; atthe 2023Open Source Summit Europe, Almeida returned to discuss how thatdifficulty might be overcome.
Security updates have been issued by Debian (gsl), Fedora (dotnet6.0 and dotnet7.0), Oracle (libwebp), Slackware (bind, cups, and seamonkey), SUSE (kernel and rust, rust1.72), and Ubuntu (cups, flac, gnome-shell, imagemagick, and python3.5).
All that Ankur Arora seemingly wanted to do with thispatch set was to make the process of clearing huge pages on x86systems go a little faster. What resulted was an extensive discussion onthe difficulties of managing preemption correctly in the kernel. It may bethat some changes will come to the plethora of preemption models that thekernel currently offers.
Security updates have been issued by Debian (mutt, netatalk, and python2.7), Fedora (chromium, golang-github-prometheus-exporter-toolkit, golang-github-xhit-str2duration, and golang-gopkg-alecthomas-kingpin-2), Oracle (dmidecode, frr, libwebp, open-vm-tools, and thunderbird), Red Hat (libwebp and open-vm-tools), SUSE (cups, frr, mariadb, openvswitch3, python39, qemu, redis7, rubygem-rails-html-sanitizer, and skopeo), and Ubuntu (bind9, cups, and libppd).
The "limited" C API for CPython extensions has been around for well over adecade at this point, but it has not seen much uptake. It is meant to giveextensions an API that will allow binaries built with it to be used formultiple versions of CPython, because those binaries will only access the stableABI that will not change when CPython does. Victor Stinner has beenworking on better definition for the API; as part of that work, he suggested that some of the C extensions in thestandard library start using it in an effort for CPython to "eat itsown dog food". The resulting discussion showed that there is still a fairamount of confusion about this API-and the thrust of Stinner's overall plan.