Security updates have been issued by Debian (qemu), Fedora (condor, grilo, libopenmpt, opencryptoki, and php), openSUSE (xen), and SUSE (ffmpeg, file, php72, rubygem-addressable, and xen).
As of this writing, 3,440 non-merge changesets have been pulled into themainline repository for the 5.15 development cycle. A mere 3,440 patchesmay seem like a slow start, but those patches are densely populated withsignificant new features. Read on for a look at what the first part of the5.15 merge window has brought.
On the ADA Logics blog, David Korczynski and Adam Korczynski write about their work integrating 115 open-source projects with Google's OSS-Fuzz project for doing continuous fuzz testing. They describe the process of integrating a project into OSS-Fuzz, and discuss their findings, which include more than 2000 bugs (500+ security relevant), of which 1300+ have been fixed at this point:
Security updates have been issued by openSUSE (ffmpeg and gstreamer-plugins-good), SUSE (apache2, apache2-mod_auth_mellon, ffmpeg, gstreamer-plugins-good, libesmtp, openexr, rubygem-puma, xen, and xerces-c), and Ubuntu (openssl).
Discussions on ways to "modernize" the Emacs editor have come up in various guises over the past fewyears. Changes of that nature tend to be somewhat contentious in the Emacscommunity, pitting the "old guard" that values the existing features (andkeybindings) against those who argue for changes to make Emacs moreapproachable (and aesthetically pleasing) to newcomers. Those discussionstend toward mega-thread status, so it should be no surprise that a queryabout possibly moving Emacs development to a "forge" (e.g. GitHub or GitLab) gotsimilar treatment. As always in Emacs-land, there are multiple facets tothe discussion, including the desirability of moving away from anemail-based workflow, accommodating younger, forge-centric developerswithout forcing existing developers into that model, and—naturally—licensing.
Security updates have been issued by CentOS (bind, GNOME, hivex, kernel, and sssd), Debian (gpac and squashfs-tools), Fedora (c-ares and openssl), openSUSE (dovecot23), Oracle (bind, hivex, kernel, and sssd), Red Hat (kernel), Scientific Linux (bind, hivex, kernel, libsndfile, libX11, and sssd), Slackware (ntfs), SUSE (dovecot23), and Ubuntu (ntfs-3g).
A longstanding tug-of-war between system package managers and Python's owninstallation mechanisms (primarily pip, but there are others) lookson its way to being resolved—or at least regularized. PEP 668("Graceful cooperation between external and Python packagemanagers") has been created to provide ways for the two types of package installationtowork together, rather than at cross-purposes at times.Since many operating systems depend on Python tools, with package versionsthat may differ from those of users' Python applications, making them play togethernicely should result in more stable systems.
The 5.15 merge window is off to a fast start; stay tuned for our usual fullsummary. It is worth mentioning, though, that the realtime preemptionlocking code has been pulled into themainline with little fanfare. This work began in 2004 and has fundamentallychanged many parts of the core kernel. With this pull, the sleepable locksthat make deterministic realtime response possible have finally joined allof that other work (though the kernel must be built with theREALTIME configuration option to use them).Congratulations are due to all of the realtime developers who pushed thisproject forward for nearly two decades.
Security updates have been issued by CentOS (libsndfile and libX11), Debian (ledgersmb, libssh, and postgresql-9.6), Fedora (squashfs-tools), openSUSE (389-ds, nodejs12, php7, spectre-meltdown-checker, and thunderbird), Oracle (kernel, libsndfile, and libX11), Red Hat (bind, cloud-init, edk2, glibc, hivex, kernel, kernel-rt, kpatch-patch, microcode_ctl, python3, and sssd), SUSE (bind, mysql-connector-java, nodejs12, sssd, and thunderbird), and Ubuntu (apr, squashfs-tools, thunderbird, and uwsgi).
The 5.14 kernel was released on August 29after a nine-week development period. This cycle was not as active as its predecessor, whichset a record for the number of developers involved, but there was still alot going on and a number of long-awaited features were merged. Now thatthe release is out, the time has come for our traditional look at where the code in 5.14 came from and how it got there.
Security updates have been issued by Debian (exiv2, grilo, gthumb, and redis), Fedora (krb5, nbdkit, and rubygem-addressable), Mageia (libass and opencontainers-runc), openSUSE (cacti, cacti-spine, go1.15, opera, qemu, and spectre-meltdown-checker), Red Hat (java-1.7.1-ibm, java-1.8.0-ibm, libsndfile, and libX11), SUSE (389-ds, qemu, and spectre-meltdown-checker), and Ubuntu (grilo).
The Linux kernel is a fast-moving project, but change can still besurprisingly slow to come at times. The nftables project to replace the kernel'spacket-filtering subsystem has its origins in 2008, but is still not beingused by most (or perhaps even many) production firewalls. The transitionmay be getting closer, though, as highlighted by the release of nftables 1.0.0 onAugust 19.
Security updates have been issued by Fedora (haproxy and libopenmpt), openSUSE (aws-cli, python-boto3, python-botocore,, dbus-1, and qemu), Oracle (rh-postgresql10-postgresql), Red Hat (compat-exiv2-023, compat-exiv2-026, exiv2, libsndfile, microcode_ctl, python27, rh-nodejs12-nodejs and rh-nodejs12-nodejs-nodemon, rh-nodejs14-nodejs and rh-nodejs14-nodejs-nodemon, and rh-python38), Scientific Linux (compat-exiv2-023 and compat-exiv2-026), SUSE (compat-openssl098), and Ubuntu (libssh, openssl, and openssl1.0).
As a general rule, the kernel community is happy to merge working devicedrivers without much concern for the availability of any associateduser-space code. What happens in user space is beyond the kernel's concernand unaffected by the kernel's license. There is an exception, though, inthe form of drivers for graphical processors (GPUs), which cannot be mergedin the absence of a working, freely-licensed user-space component. Thequestion of which drivers are subject to that rule has come up a few timesin recent years; that discussion has now come to a decision point with aneffort to block someHabana Labs driver updates from entry into the 5.15 kernel.
Sasha Levin has announced the release of the 5.13.13, 5.10.61, 5.4.143, 4.19.205, 4.14.245, 4.9.281, and 4.4.282 stable kernels. As usual, theycontain important fixes throughout the tree. Users of those series should upgrade.
Security updates have been issued by Fedora (community-mysql, containerd, dotnet3.1, dotnet5.0, perl-Encode, and tor), Mageia (gpsd), openSUSE (cacti, cacti-spine, go1.16, jetty-minimal, libmspack, mariadb, openexr, and tor), SUSE (aspell, jetty-minimal, libesmtp, mariadb, and unrar), and Ubuntu (firefox and mongodb).
One last reminder that LWN editor Jonathan Corbet will be presenting aversion of The Kernel Report at 9:00 US/Mountain (15:00 UTC) onAugust 26. This live presentation is part of a test of theinfrastructure for the 2021 LinuxPlumbers Conference, but anybody is welcome to attend regardless ofwhether they are registered for LPC or not. The meeting "room" will openone hour ahead of the talk at meet.lpc.events; we hope to see youthere.
A regression that was recently reported for 5.14 in the mediasubsystem is a bit of a strange beast. The kernel's user-space binary interface (ABI) was not changed, which is the usual test for a patch to getreverted, but the report still led to a reversion. The change did lead toproblems building a user-space application because it moved some headerfiles to staging/ as part of a cleanup for a deprecated—thoughapparently still functioning—driver for a DigitalVideo Broadcasting (DVB) device. There are a few different issuestangled together here, but the reversion of a regression in the user-spaceAPI (and not ABI) is a new wrinkle.
Security updates have been issued by Debian (openssl), openSUSE (libspf2, openssl-1_0_0, and openssl-1_1), Oracle (libsndfile), SUSE (nodejs10, nodejs12, openssl, openssl-1_0_0, openssl-1_1, and openssl1), and Ubuntu (openssl).
Users often store a lot of sensitive information on their computers—fromcredentials to banned texts to family photos—that they might normally expect to be protected by the login password of their account. Under somecircumstances, though, users can be required to log into their system sothat some third party (e.g. government agent) can examine and potentiallycopy said data. A new project, PAM Duress, provides a wayto add other passwords to an account, each with its own behavior, whichmight be a way to avoid granting full access to the system, though thelegality is in question.
Security updates have been issued by Debian (ledgersmb, tnef, and tor), Fedora (nodejs-underscore and tor), openSUSE (aws-cli, python-boto3, python-botocore,, fetchmail, firefox, and isync), SUSE (aws-cli, python-boto3, python-botocore, python-service_identity, python-trustme, python-urllib3 and python-PyYAML), and Ubuntu (linux-aws-5.8, linux-azure-5.8, linux-gcp-5.8, linux-oracle-5.8).
The first installment in this two-partseries looked at the difficulties that arise when Btrfs filesystemscontaining subvolumes are exported via NFS. Btrfs has a couple of quirksthat complicate life in this situation: the use of separate device numbersfor subvolumes and the lack of unique inode numbers across the filesystemas a whole. Recently, Neil Brown set off on an effort to tryto solve these problems, only to discover that the situation was evenmore difficult than expected and that many attempts would be required.
The 5.14-rc7 kernel prepatch has beenreleased. "So things continue to look normal, and unless there isany last-minute panic this upcoming week, this is likely the last rc beforea final 5.14."
OpenSSH 8.7 has been released. Changes includesteps toward deprecating scp andusing the SFTP protocol for file transfers instead, changes toremote-to-remote copies (they go through the local host by default now), astricter configuration-file parser, and more.
Unix-like systems — and their users — tend to expect all filesystems tobehave in the same way. But those users are also often interested in fancynew filesystems offering features that were never envisioned by thedevelopers of the Unix filesystem model; that has led to a number ofinteresting incompatibilities over time. Btrfs is certainly one of thosefilesystems; it provides a long list of features that are found in fewother systems, and some of those features interact poorly with thetraditional view of how filesystems work. Recently, Neil Brown has beentrying to resolve a specific source of confusion relating to how Btrfshandles inode numbers.
Unix-like systems abound with ways to confuse new users, many of which havebeen present since long before Linux entered the scene. One consistentsource of befuddlement is the "text file is busy" (ETXTBSY) errormessage that is delivered in response to an attempt to overwrite anexecutable image file. Linux is far less likely to deliverETXTBSY results than it once was, but they do still happen onoccasion. Recent work to simplify the mechanism behind ETXTBSYhas raised a more fundamental question: does this error check have anyvalue at all?
Security updates have been issued by CentOS (exiv2, firefox, and thunderbird), Fedora (libsndfile, python-docx, and xscreensaver), openSUSE (haproxy), and SUSE (haproxy).
As part of the ramp-up to the 2021Linux Plumbers Conference, LWN editor Jonathan Corbet will bepresenting a version of "The kernel report" at 9:00AM US/Mountain time(15:00 UTC) on Thursday, August 26. Registration for LPC is notrequired; all are welcome for an update on the state of kernel developmentand a perspective on 30 years of the Linux kernel. Please come for aninteresting discussion and to help the LPC crew stress-test the 2021infrastructure. The talk will be happening at meet.lpc.events; the more the merrier.
Back in June, we looked at a change toPython annotations, which provide a way to associate metadata, such as typeinformation, with functions. That changewas planned for the upcoming Python 3.10 release, but was deferred due toquestions about it and its impact on run-time uses of the feature.The Python steering council feltthat more time was needed to consider all of the different aspects of theproblem before deciding on the right approach; the feature freeze for Python 3.10 was onlyaround two weeks off when the decision was announced on April 20. But now, there is most of a yearbefore another feature freeze, which gives the council (and the greaterPython development community) some time to discuss it at a more leisurely pace.
The use of TransportLayer Security (TLS) encryption is ubiquitous on today's internet,though that has largely happened over the last 20 years or so; the firstpublic version of its predecessor, Secure Sockets Layer (SSL), appeared in1995. Before then, internet protocols were generally not encrypted, thus providingfertile ground for various types of "meddler-in-the-middle" (MitM) attacks.Later on, theSTARTTLS command was added to some protocols as abackward-compatible way to add TLS support, but the mechanism has suffered from anumber of flaws and vulnerabilities over the years. Some recent research,going by the name "NO STARTTLS", describes more, similarvulnerabilities and concludes that it is probably time to avoid usingSTARTTLS altogether.
These releases of Firefox91.0.1 and Firefox ESR91.0.1 fix two issues; one caused buttons on the tab bar to be resizedand the other caused tabs from private windows to be visible in non-privatewindows. There is also a fix for a headersplitting attack, and fixes for various stability issues.
Security updates have been issued by Fedora (firefox), openSUSE (cpio and rpm), Oracle (compat-exiv2-026, exiv2, firefox, kernel, kernel-container, qemu, sssd, and thunderbird), Red Hat (cloud-init, edk2, kernel, kpatch-patch, microcode_ctl, and sssd), and SUSE (cpio, firefox, and libcares2).
The Go blog has announced the release of version 1.17 of the Go programming language. The new version has some fairly small changes to the language, support for the Arm 64-bit architecture on Windows, along with other features, bug fixes, and more:
Even in the dog days of (northern-hemisphere) summer, the kernel communityis a busy place. There are many developments that show up on your editor'sradar, but which, for whatever reason, do not find their way into afull-length feature article. The time has come to catch up with a few ofthose topics; read on for updates on the realtime patch set, the effort toreinvent futexes, and the ntfs3 filesystem.