LWN.net's Journal
[Most Recent Entries]
[Calendar View]
Thursday, May 23rd, 2013
| Time |
Event |
| 12:40a |
[$] LWN.net Weekly Edition for May 23, 2013 The LWN.net Weekly Edition for May 23, 2013 is available. | | 1:57p |
Thursday's security updates
Debian has updated
request-tracker4 (eight CVE numbers), and
the kfreebsd kernel (code execution).
Fedora has updated python-virtualenv (F17, F18:
temporary file and information disclosure vulnerabilities),
krb5 (F17, "UDP ping-pong
vulnerability" from 2002), and
nginx (F18: denial of service and
information disclosure).
openSUSE has updated samba (CIFS
share attribute verification failure).
Oracle has updated kernel (EL5: denial of service).
Red Hat has updated java-1.5.0-ibm (RHEL5-6: 16 "unspecified" vulnerabilities). | | 2:26p |
Introducing Boot to Qt The Qt Blog introduces "Boot to Qt", which is " a light-weight UI stack for embedded linux, based on the Qt Framework - Boot to Qt is built on an Android kernel/baselayer and offers an elegant means of developing beautiful and performant embedded devices." Access is invitation-only currently; a release is forecast for sometime around the end of the year. | | 3:37p |
Sharp: Linux Kernel Internships (OPW) Update Sarah Sharp reports on the response to the availability of a set of Outreach Program for Women internships working on the Linux kernel. " As coordinator for the Linux kernel OPW project, I was really worried about whether applicants would be able to get patches into the kernel. Everyone knows that kernel maintainers are the pickiest bastards^Wperfectionists about coding style, getting the proper Signed-off-by, sending plain text email, etc. I thought a couple applicants would be able to complete maybe one or two patches, tops. Boy was I wrong!" In the end, 41 applicants submitted 374 patches to the kernel, of which 137 were accepted. | | 3:45p |
Numerous security issues in X Window System clients X.Org has disclosed a long list of vulnerabilities that have been fixed in the X Window System client libraries; most of them expose clients to attacks by a hostile server. "Most of the time X clients & servers are run by the same user, with the server more privileged from the clients, so this is not a problem, but there are scenarios in which a privileged client can be connected to an unprivileged server, for instance, connecting a setuid X client (such as a screen lock program) to a virtual X server (such as Xvfb or Xephyr) which the user has modified to return invalid data, potentially allowing the user to escalate their privileges." There are 30 CVE numbers assigned to these vulnerabilities; expect the distributor updates to start flowing shortly. |
|