LWN.net's Journal
 
[Most Recent Entries] [Calendar View]

Thursday, June 27th, 2019

    Time Event
    12:31a
    [$] LWN.net Weekly Edition for June 27, 2019
    The LWN.net Weekly Edition for June 27, 2019 is available.
    2:01p
    Security updates for Thursday
    Security updates have been issued by Fedora (drupal7-uuid, php-brumann-polyfill-unserialize, and php-typo3-phar-stream-wrapper2), openSUSE (ansible, compat-openssl098, exempi, glib2, gstreamer-0_10-plugins-base, gstreamer-plugins-base, libmediainfo, libssh2_org, SDL2, sqlite3, and wireshark), Oracle (firefox), Red Hat (thunderbird and vim), Scientific Linux (firefox), SUSE (java-1_8_0-ibm), and Ubuntu (bzip2 and expat).
    2:40p
    Stable kernels 4.14.131, 4.9.184, and 4.4.184
    Greg Kroah-Hartman has released the 4.14.131, 4.9.184, and 4.4.184 stable kernels. Each contains a
    single patch that fixes a problem in the TCP
    SACK panic
    fixes that was commonly seen by the Steam gaming
    community.
    2:56p
    [$] Providing wider access to bpf()
    The bpf()
    system call allows user space to load a BPF program into the kernel for
    execution, manipulate BPF maps, and carry out a number of other BPF-related
    functions. BPF programs are verified and sandboxed, but they are still
    running in a privileged context and, depending on the type of program
    loaded, are capable of creating various types of mayhem. As a result, most
    BPF operations, including the
    loading of almost all types of BPF program, are restricted to processes with
    the CAP_SYS_ADMIN capability — those running as root, as a general
    rule. BPF programs are useful in many contexts, though, so there has long been
    interest in making access to bpf() more
    widely available. One step in that direction has been posted
    by Song Liu; it works by adding a novel security-policy mechanism to the
    kernel.

    << Previous Day 2019/06/27
    [Calendar]
    Next Day >>

LWN.net   About LJ.Rossia.org