LWN.net's Journal
 
[Most Recent Entries] [Calendar View]

Friday, April 10th, 2015

    Time Event
    11:38a
    X.org election results
    As was discussed in this LWN article, the
    X.Org Foundation recently held an election to choose four board members and
    decide whether to change the organization's by-laws to enable it to become
    a member of Software in the Public Interest (SPI). The results
    are now available. The board members elected are Peter Hutterer, Martin
    Peres, Rob Clark, and Daniel Vetter. The measure to change the by-laws did
    not pass, though, despite receiving only two "no" votes, because the
    required two-thirds majority was not reached.
    3:07p
    Friday's security updates

    Arch Linux has updated mediawiki (multiple vulnerabilities).

    CentOS has updated xorg-x11-server (C7: information leak/denial of service).

    Debian has updated dpkg (integrity-verification bypass).

    Fedora has updated arj (F21: multiple vulnerabilities), echoping (F20; F21: multiple vulnerabilities), and python-dulwich (F20; F21: code execution).

    Mageia has updated batik (M4: information leak), chromium-browser-stable (M4: multiple vulnerabilities), jakarta-taglibs-standard (M4: code execution), less (M4: information leak), mediawiki (M4: multiple vulnerabilities), openldap (M4: denial of service), qt-creator (M4: key-verification failure), suricata (M4: denial of service), and xerces-c (M4: denial of service).

    Mandriva has updated arj (BS1: multiple vulnerabilities), less (BS1,2: information leak), mediawiki (BS1: multiple vulnerabilities), and ntp (BS1,2: multiple vulnerabilities).

    Oracle has updated xorg-x11-server (O6; O7: information leak/denial of service).

    Red Hat has updated qemu-kvm-rhev (RHEL OSP: privilege escalation) and xorg-x11-server (RHEL6,7: information leak/denial of service).

    Scientific Linux has updated krb5 (SL6: multiple vulnerabilities).

    SUSE has updated libXfont (SLE12: multiple vulnerabilities).

    Ubuntu has updated dpkg (integrity-verification bypass).

    5:54p
    Turon: Fearless Concurrency with Rust
    Aaron Turon has posted a
    lengthy introduction to concurrency
    in the Rust programming language.
    "Every data type knows whether it can safely be sent between or
    accessed by multiple threads, and Rust enforces this safe usage; there are
    no data races, even for lock-free data structures. Thread safety isn't just
    documentation; it's law.
    "

    << Previous Day 2015/04/10
    [Calendar]
    Next Day >>

LWN.net   About LJ.Rossia.org