LWN.net's Journal
 
[Most Recent Entries] [Calendar View]

Monday, July 1st, 2019

    Time Event
    1:52p
    Mageia 7 released
    The Mageia distribution has released
    version 7
    . "Mageia 7 comes with a huge variety of desktops and
    window managers, improved support for Wayland and for hybrid graphics
    cards. On a more fun note, an effort was made to enhance gaming in Mageia,
    so there are many new upgrades and additions to the game
    collection.
    " See the release
    notes
    for details.
    2:48p
    Security updates for Monday
    Security updates have been issued by Debian (expat, golang-go.crypto, gpac, and rdesktop), Fedora (chromium, GraphicsMagick, kernel, kernel-headers, pdns, and xen), openSUSE (chromium, dbus-1, evince, libvirt, postgresql96, tomcat, and wireshark), Oracle (thunderbird and vim), Scientific Linux (thunderbird), Slackware (irssi), SUSE (gvfs), and Ubuntu (linux-lts-xenial, linux-aws, linux-azure and linux-oem, linux-oracle, linux-raspi2, linux-snapdragon).
    3:29p
    Google's Fuchsia OS Developer Site Debuts (Forbes)
    Forbes reports
    that Google has launched a new website, fuchsia.dev, with documentation
    and source for Fuchsia OS, including the Zircon
    microkernel
    . "Zircon was previously known as Magenta and it was designed to scale to any application from embedded RTOS (Real-Time Operating Systems) to mobile and desktop devices of all kinds. As a result, there has been much speculation that Fuchsia will be the natural successor to Android and Chrome OS, combining capabilities of both with backwards compatibility to run legacy applications built on either. In short, this thing is designed to run on anything from 32-bit or 64-bit ARM cores to 64-bit X86 processors and it has a potential to be rather disruptive."
    6:54p
    Hansen: SKS Keyserver Network Under Attack
    GnuPG contributors Robert J. Hansen (rjh) and Daniel Kahn Gillmor (dkg) were victims of a certificate spamming attack over the past week.
    This attack exploited a defect in the OpenPGP protocol itself in order to "poison" rjh and dkg's OpenPGP certificates. Anyone who attempts to import a poisoned certificate into a vulnerable OpenPGP installation will very likely break their installation in hard-to-debug ways. Poisoned certificates are already on the SKS keyserver network. There is no reason to believe the attacker will stop at just poisoning two certificates. Further, given the ease of the attack and the highly publicized success of the attack, it is prudent to believe other certificates will soon be poisoned.

    This attack cannot be mitigated by the SKS keyserver network in any reasonable time period. It is unlikely to be mitigated by the OpenPGP Working Group in any reasonable time period. Future releases of OpenPGP software will likely have some sort of mitigation, but there is no time frame. The best mitigation that can be applied at present is simple: stop retrieving data from the SKS keyserver network.

    (Thanks to Kareem Khazem)
    10:24p
    [$] TurboSched: the return of small-task packing
    CPU scheduling is a difficult task in the best of times; it is not trivial
    to pick the next process to run while maintaining fairness, minimizing
    energy use, and using the available CPUs to their fullest potential. The
    advent of increasingly complex system architectures is not making things
    easier; scheduling on asymmetric systems (such as the big.LITTLE
    architecture) is a case in point. The "turbo" mode provided by some recent
    processors is another. The TurboSched
    patch set
    from Parth Shah is an attempt to improve the scheduler's
    ability to get the best performance from such processors.

    << Previous Day 2019/07/01
    [Calendar]
    Next Day >>

LWN.net   About LJ.Rossia.org