LWN.net's Journal
 
[Most Recent Entries] [Calendar View]

Tuesday, July 21st, 2015

    Time Event
    8:43a
    Gorman: Continual testing of mainline kernels
    Mel Gorman introduces
    SUSE's kernel performance-testing system. "Marvin is a system that
    continually runs performance-related tests and is named after another robot
    doomed with repetitive tasks. When tests are complete it generates a
    performance comparison report that is publicly available but rarely
    linked. The primary responsibility of this system is to check SUSE Linux
    for Enterprise kernels for performance regressions but it is also
    configured to run tests against mainline releases.
    "
    4:14p
    Security advisories for Tuesday

    CentOS has updated bind (C7: denial of service) and thunderbird (C7; C6; C5: multiple vulnerabilities).

    Debian-LTS has updated cacti (SQL injection) and cacti (regression in previous update).

    Fedora has updated asterisk (F22: SSL server spoofing), bind (F21: denial of service), httpd (F22: multiple vulnerabilities), java-1.8.0-openjdk (F22; F21: multiple vulnerabilities), libunwind (F22: buffer overflow), php-horde-Horde-Auth (F22; F21: multiple vulnerabilities), php-horde-Horde-Core (F22; F21: multiple vulnerabilities), php-horde-Horde-Form (F22; F21: multiple vulnerabilities), php-horde-Horde-Icalendar (F22; F21: multiple vulnerabilities), polkit (F21: multiple vulnerabilities), and squashfs-tools (F21: two vulnerabilities).

    Oracle has updated bind (OL7: denial of service) and thunderbird (OL7; OL6: multiple vulnerabilities).

    Red Hat has updated bind (RHEL7: denial of service) and thunderbird (RHEL5,6,7: multiple vulnerabilities).

    Scientific Linux has updated bind (SL7: denial of service) and thunderbird (SL5,6,7: multiple vulnerabilities).

    SUSE has updated mariadb (SLE12: multiple vulnerabilities).

    Ubuntu has updated thunderbird (15.04, 14.10, 14.04, 12.04: multiple vulnerabilities).

    6:15p
    New Cloud Native Computing Foundation to Drive Alignment Among Container Technologies
    The Linux Foundation has announced
    the Cloud Native Computing Foundation. "This new organization aims to advance the state-of-the-art for building cloud native applications and services, allowing developers to take full advantage of existing and to-be-developed open source technologies. Cloud native refers to applications or services that are container-packaged, dynamically scheduled and micro services-oriented.

    Founding organizations include AT&T, Box, Cisco, Cloud Foundry Foundation, CoreOS, Cycle Computing, Docker, eBay, Goldman Sachs, Google, Huawei, IBM, Intel, Joyent, Kismatic, Mesosphere, Red Hat, Switch SUPERNAP, Twitter, Univa, VMware and Weaveworks. Other organizations are encouraged to participate as founding members in the coming weeks, as the organization establishes its governance model.
    "
    8:54p
    [$] Domesticating applications, OpenBSD style
    One of the many approaches to improving system security consists of
    reducing the attack surface of a given program by restricting the range of
    system calls available to it. If an application has no need for access to
    the network, say, then removing its ability to use the socket() system
    call should cause no loss in functionality while reducing the scope of the
    mischief that can be made should that application be compromised. In the
    Linux world, this kind of sandboxing can be done using a security module or
    the seccomp() system call. OpenBSD has lacked this capability so
    far, but it may soon gain it via a somewhat different approach than has
    been seen in Linux.

    << Previous Day 2015/07/21
    [Calendar]
    Next Day >>

LWN.net   About LJ.Rossia.org