LWN.net's Journal
 
[Most Recent Entries] [Calendar View]

Tuesday, June 14th, 2016

    Time Event
    1:03p
    Git v2.9.0 released
    Version 2.9.0 of the Git source-code management system is out. There are
    various improvements and small changes that maintainers of scripts using
    Git will want to look at, but no major changes.
    3:48p
    Security updates for Tuesday

    Debian has updated icedove (code execution).

    Debian-LTS has updated libav (code execution).

    openSUSE has updated libtasn1 (13.2: two denial of service vulnerabilities) and nodejs (Leap42.1, 13.2: multiple vulnerabilities).

    Oracle has updated kernel 4.1.12 (OL7; OL6: privilege escalation), kernel 3.8.13 (OL7; OL6: privilege escalation), kernel 2.6.39 (OL6; OL5: privilege escalation).

    Red Hat has updated kernel (RHEL6.5: two remote denial of service vulnerabilities).

    SUSE has updated ImageMagick (SLE12-SP1: command execution) and ntp (SLE12-SP1; SLE12: multiple vulnerabilities).

    6:56p
    Ubuntu’s snap apps are coming to distros everywhere (Ars Technica)
    Ars Technica reports
    that Ubuntu's snapd tool has been
    ported to other Linux distributions.
    "To install snap packages on non-Ubuntu distributions, Linux desktop
    and server users will have to first install the newly cross-platform
    snapd. This daemon verifies the integrity of snap packages, confines them
    into their own restricted space, and acts as a launcher. Instructions for
    creating snaps and installing snapd on a variety of distributions are
    available at this website.

    Snapd itself is installed as traditional packages on these other operating
    systems. That means there's a snapd RPM package for Fedora, for
    example. It's the same snapd code for every Linux distribution, just
    packaged differently, and applications packaged as snaps should work on any
    Linux distro running snapd without needing to be re-packaged.
    "
    Snapd is available for Arch, Debian, and Fedora. It's also being tested by
    CentOS, Elementary, Gentoo, Mint, openSUSE, OpenWrt and RHEL.
    9:44p
    [$] Kernel building with GCC plugins
    It has long been understood that static-analysis tools can be useful in
    finding (and defending against) bugs and security problems in code. One of
    the best places to implement
    such tools is in the compiler itself, since much of the work required to
    analyze a program is already done in the compilation process. Despite the
    fact that GCC has had the ability to support security-oriented plugins for
    some years, the mainline kernel has never adopted any such plugins. That
    situation looks likely to change with the 4.8 kernel release, though.

    << Previous Day 2016/06/14
    [Calendar]
    Next Day >>

LWN.net   About LJ.Rossia.org