LWN.net's Journal
[Most Recent Entries]
[Calendar View]
Tuesday, March 1st, 2016
Time |
Event |
12:17a |
Malcolm: GCC 6: -Wmisleading-indentation vs “goto fail;” David Malcolm takes a look at a new compiler warning in GCC 6, -Wmisleading-indentation. " At a high level, the underlying implementation looks at control statements (if/else, while, for), and if it sees them guard a single statement without braces, it looks at the followup statement. It complains if both have the same indentation.
That’s a simplified description – we spent a fair amount of time working on heuristics in the warning, to try to ensure that it warns for all cases that are reasonable to warn for, whilst not complaining unduly for indentation that’s merely bad (rather than being actively misleading). We’ve also tested it with a variety of coding styles: GNU, K&R, Linux kernel, etc." | 2:59p |
An OpenSSL advisory and the "DROWN" attack The OpenSSL project has disclosed a new high-profile vulnerability. This one, known as CVE-2016-800, or " DROWN", affects servers that still have the old SSLv2 protocol enabled. Yes, it has its own domain name and logo. " DROWN allows attackers to break the encryption and read or steal sensitive communications, including passwords, credit card numbers, trade secrets, or financial data. Our measurements indicate 33% of all HTTPS servers are vulnerable to the attack." The solution is to just disable SSLv2 completely. Note that there are several other vulnerabilities (with a lower presumed severity) fixed in the OpenSSL 1.0.2g and 1.0.1s releases. | 5:45p |
Security advisories for Tuesday CentOS has updated openssl (C6: multiple vulnerabilities).
Debian has updated openssl (multiple vulnerabilities) and perl (ambiguous environment).
Debian-LTS has updated linux-2.6 (multiple vulnerabilities), php5 (multiple vulnerabilities), and squid3 (denial of service).
Fedora has updated botan (F22:
three vulnerabilities), code-editor (F22:
three vulnerabilities), monotone (F22:
three vulnerabilities), okhttp (F23:
certificate pining bypass), okio (F23:
certificate pining bypass), qca (F22: three
vulnerabilities), qt-creator (F22: three
vulnerabilities), and subversion (F22:
multiple vulnerabilities).
openSUSE has updated dhcp
(Leap42.1: denial of service), KDE
Frameworks (Leap42.1: multiple vulnerabilities), and libqt5-qtbase (Leap42.1: two vulnerabilities).
Ubuntu has updated openssl (multiple vulnerabilities). | 10:26p |
Raspberry Pi 3 is out The Raspberry Pi 3 has been released and is on sale now for $35. " For Raspberry Pi 3, Broadcom have supported us with a new SoC, BCM2837. This retains the same basic architecture as its predecessors BCM2835 and BCM2836, so all those projects and tutorials which rely on the precise details of the Raspberry Pi hardware will continue to work. The 900MHz 32-bit quad-core ARM Cortex-A7 CPU complex has been replaced by a custom-hardened 1.2GHz 64-bit quad-core ARM Cortex-A53. Combining a 33% increase in clock speed with various architectural enhancements, this provides a 50-60% increase in performance in 32-bit mode versus Raspberry Pi 2, or roughly a factor of ten over the original Raspberry Pi." (Thanks to Forrest Cook) |
|