LWN.net's Journal
[Most Recent Entries]
[Calendar View]
Tuesday, May 14th, 2019
Time |
Event |
2:47p |
Security updates for Tuesday Security updates have been issued by CentOS (flatpak, ghostscript, and python-jinja2), Debian (cups-filters, imagemagick, qt4-x11, and samba), Fedora (httpd and wpa_supplicant), openSUSE (freeradius-server, nmap, python-Jinja2, signing-party, and webkit2gtk3), Red Hat (java-1.7.1-ibm and java-1.8.0-ibm), Scientific Linux (python-jinja2), SUSE (cf-cli, java-1_8_0-openjdk, and libxslt), and Ubuntu (isc-dhcp, openjdk-8, openjdk-lts, samba, and VCFtools). | 4:06p |
[$] NFS topics
Trond Myklebust and Bruce Fields led a session on some topics of interest
in the NFS world at the 2019 Linux Storage, Filesystem, and
Memory-Management Summit. Myklebust discussed the intersection of NFS and
containers, as well adding TLS support to NFS. Fields also had some
container changes to discuss, along with a grab bag of other areas that
need attention. | 4:43p |
Maintainer's / Kernel Summit 2019 planning kick-off The planning process for the 2019 Linux Kernel and Maintainer's Summits (Lisbon, Portugal, September 9 to 12) has begun. If you have a topic that you would like to see discussed at either event, now is the time to send in a proposal to the ksummit-discuss list; click below for the details. | 5:18p |
An eBPF overview, part 5: Tracing user processes (Collabora blog) The fifth and final article in Adrian Ratiu's series on eBPF delves into userspace tracing. " In our previous parts we focused on tracing the Linux kernel, for which the eBPF-based projects are, in our humble opinion, the most safe, widely available and useful methods (eBPF is fully upstreamed in Linux, guarantees a stable ABI, comes enabled by default in almost all distributions and integrates with all other tracing mechanisms). It has really become a no-brainer choice for kernel work. However, up until now, talking in-depth about userspace tracing was deliberately avoided because it merits special treatment, hence this full part 5 article devoted to it." | 6:27p |
"ZombieLoad": a new set of speculative-execution attacks The curtain has finally been lifted on the latest set of speculative-execution vulnerabilities. This one has the delightful name of ZombieLoad; it is also known as "microarchitetural data sampling", but what's the fun in that? Various x86 processors stash data into hidden buffers that can, in some cases, be revealed via speculative execution. Exploits appear to be relatively hard. See this page from the kernel documentation for a fairly detailed description of the problem, and this page for mitigation information. | 7:12p |
A round of stable kernel updates This round of kernel updates address a speculative-execution vulnerability found in all Intel processors made since 2011. Greg Kroah-Hartman says in the 5.1.2 kernel patch: " Note, this release, and the other stable releases that are all being released right now at the same time, just went out all contain patches that have only seen the "public eye" for about 5 minutes. So be forwarned, they might break things, they might not build, but hopefully they fix things. Odds are we will be fixing a number of small things in this area for the next few weeks as things shake out on real hardware and workloads." In addition to 5.1.2, stable kernels 5.0.16, 4.19.43, 4.14.119, and 4.9.176 are available. More information may be found in the Xen security advisory and this new in-kernel documentation. | 7:51p |
[$] A filesystem for virtualization
A new filesystem aimed at sharing host filesystems with KVM guests, virtio-fs, was the
topic of a session led by Miklos Szeredi at the 2019 Linux Storage,
Filesystem, and Memory-Management Summit. The existing solution, which is
based on the 9P filesystem from Plan 9, has some
shortcomings, he said. Virtio-fs is a prototype that uses the Filesystem in
Userspace (FUSE) interface. |
|