LWN.net's Journal
 
[Most Recent Entries] [Calendar View]

Thursday, October 20th, 2016

    Time Event
    12:02a
    [$] LWN.net Weekly Edition for October 20, 2016
    The LWN.net Weekly Edition for October 20, 2016 is available.
    1:44p
    An important set of stable kernel updates
    The
    4.8.3,
    4.7.9,
    and 4.4.26 stable kernel updates have been
    released. There's nothing in the announcements to indicate this, but they
    all contain a fix for CVE-2016-5195, a bug that can allow local attackers
    to overwrite files they should not have write access to. So the "all users
    must upgrade" message seems more than usually applicable this time around.
    3:49p
    Security advisories for Thursday

    CentOS has updated java-1.8.0-openjdk (C7; C6: multiple vulnerabilities).

    Debian has updated kernel (multiple vulnerabilities, one from 2015).

    Debian-LTS has updated kernel (multiple vulnerabilities, one from 2015) and libxvmc (code execution).

    Fedora has updated glibc-arm-linux-gnu (F23: denial of service) and perl-DBD-MySQL (F23: denial of service).

    Oracle has updated java-1.8.0-openjdk (OL7; OL6: multiple vulnerabilities).

    Red Hat has updated java-1.6.0-sun (multiple vulnerabilities), java-1.7.0-oracle (multiple vulnerabilities), and java-1.8.0-oracle (RHEL7&6: multiple vulnerabilities).

    Scientific Linux has updated java-1.8.0-openjdk (SL7&6: multiple vulnerabilities).

    SUSE has updated quagga (SLE11: code execution).

    Ubuntu has updated kernel (12.04; 14.04; 16.04; 16.10: privilege escalation), linux-lts-trusty (12.04: privilege escalation), linux-lts-xenial (14.04: privilege escalation), linux-raspi2 (16.04: privilege escalation), linux-snapdragon (16.04: privilege escalation), and linux-ti-omap4 (12.04: privilege escalation).

    9:12p
    More information about Dirty COW (aka CVE-2016-5195)
    The security hole fixed in the stable kernels released today has been dubbed Dirty COW (CVE-2016-5195) by a site devoted to the kernel privilege escalation vulnerability. There is some indication that it is being exploited in the wild. Ars Technica has some additional information. The Red Hat bugzilla entry and advisory are worth looking at as well.
    11:29p
    Ranking the Web With Radical Transparency (Linux.com)
    Linux.com interviews Sylvain Zimmer, founder of the Common Search project, which is an effort to create an open web search engine. "Being transparent means that you can actually understand why our top search result came first, and why the second had a lower ranking. This is why people will be able to trust us and be sure we aren't manipulating results. However for this to work, it needs to apply not only to the results themselves but to the whole organization. This is what we mean by 'radical transparency.' Being a nonprofit doesn't automatically clear us of any ulterior motives, we need to go much further.

    As a community, we will be able to work on the ranking algorithm collaboratively and in the open, because the code is open source and the data is publicly available. We think that this means the trust in the fairness of the results will actually grow with the size of the community.
    "

    << Previous Day 2016/10/20
    [Calendar]
    Next Day >>

LWN.net   About LJ.Rossia.org