LWN.net's Journal
 
[Most Recent Entries] [Calendar View]

Wednesday, October 17th, 2012

    Time Event
    5:49p
    Security advisories for Wednesday
    CentOS has updated kernel (C6: denial of service).

    Fedora has updated qemu (F16: privilege escalation), libvirt (F16: denial of service) and qt (F16: CRIME attacks).

    openSUSE has updated mcrypt (code execution).

    Oracle has updated kernel (OL6: denial of service).

    Red Hat has updated openstack-keystone (multiple vulnerabilities), openstack-swift (insecure use of python pickle), python-django-horizon (cross-site scripting), java-1.6.0-openjdk (RHEL6; RHEL5: multiple vulnerabilities) and java-1.7.0-openjdk (RHEL6: multiple vulnerabilities).

    SUSE has updated firefox (multiple vulnerabilities).

    6:26p
    [$] Software interrupts and realtime
    The Linux kernel's software interrupt ("softirq") mechanism is a bit of a
    strange beast. It is an obscure holdover from the earliest days of Linux
    and a mechanism that few kernel developers ever deal with directly. Yet it
    is at the core of much of the kernel's most important processing.
    Occasionally softirqs make their presence known in undesired ways; it is
    not surprising that the kernel's frequent problem child — the realtime
    preemption patch set — has often run afoul of them. Recent versions of
    that patch set embody a new approach to the software interrupt problem that
    merits a look.

    << Previous Day 2012/10/17
    [Calendar]
    Next Day >>

LWN.net   About LJ.Rossia.org