Security updates have been issued by Debian (node-tar and pngcheck), SUSE (colord, containerd, and tiff), and Ubuntu (containerd, linux-azure, linux-azure, linux-azure-5.4, linux-oem-5.17, and vim).
Version 2.39.0of the Git source-code management system is out. "It is comprised of483 non-merge commits since v2.38.0, contributed by 86 people, 31 of whichare new faces". This release seems to mostly offer incrementalimprovements; see the announcement or this GitHubblog post for details.
The 6.1 kernel was releasedon December 11; by the time of this release, 13,942 non-mergechangesets had been pulled into the mainline, growing the kernel by 412,000lines of code. This is thus not the busiest development cycle ever, butneither is it the slowest, and those changesets contained a number offundamental changes. This release will also be the long-term-supportkernel for 2022. Read on for a look at where the work in 6.1 came from.
Security updates have been issued by Debian (cacti, grub2, hsqldb, node-eventsource, and openexr), Fedora (bcel, keylime, rust-capnp, rust-sequoia-octopus-librnp, xfce4-screenshooter, and xfce4-settings), Oracle (nodejs:18), Scientific Linux (grub2), Slackware (libarchive), SUSE (go1.18, go1.19, nautilus, opera, python-slixmpp, and samba), and Ubuntu (python2.7, python3.5, qemu, and squid3).
Virtual-memory systems provide a great deal of flexibility in how memorycan be mapped and protected. Unfortunately, memory-management flexibilitycan also be useful to attackers bent on compromising a system. In theOpenBSD world, a new system call is being added to reduce this flexibility;it is, though, a system call that almost no code is expected to use.
Security updates have been issued by Debian (leptonlib), Fedora (woff), Red Hat (grub2), Slackware (emacs), SUSE (busybox, chromium, java-1_8_0-openjdk, netatalk, and rabbitmq-server), and Ubuntu (gcc-5, gccgo-6, glibc, protobuf, and python2.7, python3.10, python3.6, python3.8).
Each new kernel release fixes a lot of bugs, but each release alsointroduces new bugs of its own. That leads to a fundamentalquestion: is the kernel community fixing bugs more quickly than it is addingthem? The answer is less than obvious but, if it could be found, itwould give an important indication of the long-term future of the kernelcode base. While digging into the kernel's revision history cannot give adefinitive answer to that question, it can provide some hints as to whatthat answer might be.
Greg Kroah-Hartman has released the 6.0.12,5.15.82, 5.10.158, 5.4.226, 4.19.268, 4.14.301, and 4.9.335 stable kernels. As is the norm, theycontain important fixes throughout the kernel tree; users of those seriesshould upgrade.
Security updates have been issued by Debian (dlt-daemon, jqueryui, and virglrenderer), Fedora (firefox, vim, and woff), Oracle (kernel and nodejs:18), Red Hat (java-1.8.0-ibm and redhat-ds:11), Slackware (python3), SUSE (buildah, matio, and osc), and Ubuntu (heimdal and postgresql-9.5).
Version12.0 of the Tor browser has been released. Changes includemulti-locale support, Apple silicon support, HTTPS-only behavior by defaulton Android and more.
A read-only filesystem that will transparently share file data between disparatedirectory trees, while also providing integrity verification for the dataand the directory metadata, was recently posted as anRFCto the linux-kernel mailing list. Composefs was developedby Alexander Larsson (who posted it) and Giuseppe Scrivano for use by podman containers and OSTree (or "libostree" as itis now known) root directories, but there are likely others who want theabilities it provides. So far, there has been little response, either with feedback orcomplaints, but it is a small patch set (around 2K lines of code) andgenerally self-contained since it is a filesystem, so it would not be asurprise to see it appear in some upcoming kernel.
Security updates have been issued by Debian (cgal, ruby-rails-html-sanitizer, and xfce4-settings), Red Hat (dbus, grub2, kernel, pki-core, and usbguard), Scientific Linux (pki-core), SUSE (bcel, LibVNCServer, and xen), and Ubuntu (ca-certificates and u-boot).
Gccrs — the Rust front-end for GCC — has been approvedfor merging into the GCC trunk. That means that the next GCC release willbe able to compile Rust, sort of; as gccrs developer Arthur Cohen warns:"This is very much an extremely experimental compiler and will still geta lot of changes in the coming weeks and months up until the release".See this article and this one for more details on the currentstatus of gccrs.
Over on the Collabora blog, Adrian Ratiu writes about the addition of the kernel's Rust code to the KernelCI automated kernel testing project. The blog post looks at what it took to add the support and on some plans for future additions, as well.
The kernel's page cache holds pages from files in RAM, allowing thosepages to be accessed without expensive trips to persistent storage.Applications are normally entirely unaware of the page cache's operation;it speeds things up and that is all that matters. Some applications,though, can benefit from knowledge about how much of a given file ispresent in the page cache at any given time; the proposedcachestat() system call from Nhat Pham is the latest in a longseries of attempts to make that information available.
The kernel project is now more than three decades old; over that time, anumber of development practices have come and gone. Once upon a time, theuse of "magic numbers" to identify kernel data structures was seen as agood way to help detect and debug problems. Over the years, though, theuse of magic numbers has gone into decline; thispatch set from Ahelenia Ziemiańska may be an indication that the reignof magic numbers may be reaching its end.
Security updates have been issued by Debian (awstats, chromium, clamav, g810-led, giflib, http-parser, jhead, libpgjava, node-cached-path-relative, node-fetch, and vlc), Fedora (fastnetmon, kernel, librime, qpress, rr, thunderbird, and wireshark), Red Hat (kernel, kernel-rt, and kpatch-patch), Slackware (mozilla), SUSE (cherrytree and chromium), and Ubuntu (libbpf, libxml2, linux-gcp-5.15, linux-gke, linux-gke-5.15, and linux-gke).
The eighth and presumably final 6.1 kernelprepatch has been released for testing. "So everything looks good,and while the calming down may have happened later than I wished for, itdid happen. Let's hope this upcoming week is as quiet (or quieter)."
The software-interrupt mechanism is one of the oldest parts in the kernel;arguably, the basic design behind it predates Linux itself. Softwareinterrupts can get in the way of other work so, for almost aslong as they have existed, developers have wished that theycould be made to go away. That has never happened, though, and doesn'tlook imminent. Instead, Android systems have long carried a patch thattries to minimize the impact of software interrupts, at least in somesituations. John Stultz is now postingthat work, which contains contributions from a number of authors, inthe hope of getting it into the mainline kernel.
The Document Foundation(TDF) was created in 2010 to steward andsupport the development of the LibreOffice suite, which was then a new fork of OpenOffice.org. TDF hasclearly been successful; unlike OpenOffice,which is currently under the Apache umbrella, LibreOffice is an activelydeveloped and widely used project. But TDF has also been showing signs of stress in recentyears, and the situation does not appear to be getting better. There arecurrently some significant disagreements over just what role TDF shouldplay; if those cannot be resolved, there is a real chance that they couldrip the Foundation apart.
Security updates have been issued by CentOS (device-mapper-multipath, firefox, hsqldb, krb5, thunderbird, and xorg-x11-server), Debian (libraw), Fedora (freerdp and grub2), SUSE (bcel, emacs, glib2, glibc, grub2, nodejs10, and tomcat), and Ubuntu (linux-azure-fde and snapd).
The recent discussion of a proposed change to the Python language—the usualfare on the language's Ideasforum—was interesting, somewhat less for the actual feature underdiscussion than for the other issues raised. The change itself is a minor, conveniencefeature that would provide a reproducible iteration order for certainkinds of sets betweenseparate invocations of the interpreter. That is a pretty limited use case, and onethat could perhaps be fulfilled in other ways, but the discussion alsohighlighted some potentially worrying trends in the way that feature ideas are handled inthe Python community.
It was only a matter of time before somebody found a way to inject BPF intothe CPU scheduler. This patchseries, posted by Tejun Heo and containing work by David Vernet, JoshDon, and Barret Rhoden, does exactly that. The cover letter covers themotivation behind this work in detail:
As of late, concerns about the future of Twitter have caused many of itsusers to seek alternatives. Amid this upheaval, an open-sourcemicroblogging service called Mastodon has received a great deal ofattention. Mastodon is not reliant on any single company or centralauthority to run its servers; anyone can run their own. Servers communicatewith each other, allowing people on different servers to send each othermessages and follow each other's posts. Mastodon doesn't just talk toitself, though; it can exchange messages with anything that speaks the ActivityPub protocol.There are many such implementations, so someone who wants to deploy their ownmicroblogging service enjoys a variety of choices.
Security updates have been issued by Debian (frr, gerbv, mujs, and twisted), Fedora (nodejs and python-virtualbmc), Oracle (dotnet7.0, kernel, kernel-container, krb5, varnish, and varnish:6), SUSE (busybox, python3, tiff, and tomcat), and Ubuntu (harfbuzz).
The BPF subsystem, which allows code to be loaded into the kernel from userspace and safely executed in the kernel context, is bound to create a number ofchallenges for the kernel as a whole. One might not think that allocatingmemory for BPF programs would be high on the list of problems, but life(and memory management) can be surprising. The attempts to do a better jobof providing space for compiled BPF code have, to date, only been partiallysuccessful; now Song Liu is back with a newapproach to finish the job.
FFmpeg is an indispensable tool forworking with audio and video streams, but it can be challenging to learn to use well.FFmpeg — TheUltimate Guide, posted by Csaba Kopias, can help. "This guidecovers the ins and outs of FFmpeg starting with fundamental concepts andmoving to media transcoding and video and audio processing providingpractical examples along the way."
Security updates have been issued by Debian (chromium, commons-configuration2, graphicsmagick, heimdal, inetutils, ini4j, jackson-databind, and varnish), Fedora (drupal7-i18n, grub2, kubernetes, and python-slixmpp), Mageia (botan, golang, kernel, kernel-linus, radare2/rizin, and xterm), Red Hat (krb5, varnish, and varnish:6), SUSE (busybox, chromium, erlang, exiv2, firefox, freerdp, ganglia-web, java-1_8_0-openj9, nodejs12, nodejs14, opera, pixman, python3, sudo, tiff, and xen), and Ubuntu (libice and shadow).
Greg Kroah-Hartman has released the 5.10.156, 5.4.225, 4.19.267, 4.14.300, and 4.9.334 stable kernels. As usual, theycontain important fixes throughout the kernel tree.Update: 6.0.10 and 5.15.80 were released on November 26.
Security updates have been issued by Fedora (firefox), Mageia (dropbear, freerdp, java, libx11, and tumbler), Slackware (ruby), SUSE (erlang, grub2, libdb-4_8, and tomcat), and Ubuntu (exim4, jbigkit, and tiff).
Security updates have been issued by Debian (heimdal, libarchive, and nginx), Fedora (varnish-modules and xterm), Red Hat (firefox), Scientific Linux (firefox, hsqldb, and thunderbird), SUSE (Botan, colord, containerized-data-importer, ffmpeg-4, java-1_8_0-ibm, krb5, nginx, redis, strongswan, tomcat, and xtrabackup), and Ubuntu (apr-util, freerdp2, and sysstat).
For those who are waiting for Linux on Apple hardware, the Asahi Linuxproject has put out a detailedreport on progress toward a working kernel and distribution.