LWN.net's Journal
 
[Most Recent Entries] [Calendar View]

Wednesday, August 14th, 2019

    Time Event
    2:53p
    Security updates for Wednesday
    Security updates have been issued by Debian (kernel, linux-4.9, otrs2, and tomcat8), Fedora (igraph and jhead), openSUSE (ansible, GraphicsMagick, kconfig, kdelibs4, live555, mumble, phpMyAdmin, proftpd, python-Django, and znc), Oracle (kernel and openssl), Red Hat (kernel, openssl, and rh-mysql80-mysql), Scientific Linux (kernel and openssl), Slackware (kernel), SUSE (containerd, docker, docker-runc, golang-github-docker-libnetwork and mariadb-100), and Ubuntu (linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon, linux-aws, linux-aws-hwe, linux-lts-xenial, linux-aws, linux-oem, linux-oracle, linux-raspi2, linux-snapdragon, linux-snapdragon, php5, php7.0, php7.2, and wpa).
    3:21p
    Kroah-Hartman: Patch Workflow With Mutt - 2019
    For those interested in the details of how one kernel developer works: Greg
    Kroah-Hartman has documented
    his email workflow
    in great detail. "The ability to edit a
    single message directly within my email client is essential. I end up
    having to fix up changelog text, editing the subject line to be correct,
    fixing the mail headers to not do foolish things with text formats, and in
    some cases, editing the patch itself for when it is corrupted or needs to
    be fixed (I want a Linkedin skill badge for 'can edit diff files by hand
    and have them still work')
    "
    3:45p
    EPEL 8.0 released
    EPEL 8.0 is out.
    "EPEL stands for Extra Packages for Enterprise Linux and is a
    subcommunity of the Fedora and CentOS projects aimed at bringing a
    subset of packages out of Fedora releases ready to be used and
    installed on various Red Hat Enterprise Linux (RHEL).
    "
    Beyond the update to RHEL (and CentOS) 8, this release features a new
    faster-moving
    "playground" package stream and support for the s390 architecture.
    6:47p
    [$] Hardening the "file" utility for Debian
    The file
    command would seem to be an ideal candidate for sandboxing; it routinely handles
    untrusted input. But an effort to add seccomp()
    filtering to file for Debian has run aground. The upstream file project has added
    support for sandboxing via seccomp() but it does not play well
    with other parts of the Debian world, package building in particular. This
    situation
    provides further evidence that seccomp() filtering is brittle and difficult to use.

    << Previous Day 2019/08/14
    [Calendar]
    Next Day >>

LWN.net   About LJ.Rossia.org