LWN.net's Journal
[Most Recent Entries]
[Calendar View]
Wednesday, October 2nd, 2013
| Time |
Event |
| 6:21a |
No Mir by default in Ubuntu 13.10 Developers at Canonical have concluded that the Mir desktop server (or, more specifically, the XMir layer) will not be ready in time to be shipped as the default configuration in the 13.10 release — though they do still plan to go with Mir for Ubuntu Touch. "More specifically, the multi-monitor support in XMir is working, but not to the extent we'd like to see it for all of our users. The core of Mir is working reliable, but with XMir being a key component for our 13.10 goals, we didn't want to compromise overall Ubuntu quality by shipping it." | | 4:18p |
Security advisories for Wednesday Fedora has updated libvirt (F19:
multiple vulnerabilities), python-djblets
(F18: multiple vulnerabilities), and ReviewBoard (F18: multiple vulnerabilities).
Red Hat has updated MRG Grid (RHEL6; RHEL5: denial of service).
Ubuntu has updated nas (13.04;
12.10; 12.04 LTS: multiple vulnerabilities) and python3.3 (13.04; 12.10: multiple vulnerabilities). | | 7:20p |
[$] Integrity and embedded devices
David Safford's talk for the 2013 Linux
Security Summit was in two parts—with two separate sets of slides.
That's because the US Department of Homeland Security (DHS), which sponsored
IBM's work on hardware roots of trust for embedded devices—part one of the talk—was quite clear
that it didn't want to be associated with any kind of device cracking. So
part two, which concerned circumventing "verified boot" on a Samsung
ARM Chromebook, had to be a completely separate talk. The DHS's misgivings
notwithstanding, the two topics are clearly related; understanding both
leads to a clearer picture of the security of our devices.
Subscribers can get the full report on the talk from this week's Security page. |
|