LWN.net's Journal
 
[Most Recent Entries] [Calendar View]

Thursday, June 10th, 2021

    Time Event
    12:00a
    [$] LWN.net Weekly Edition for June 10, 2021
    The LWN.net Weekly Edition for June 10, 2021 is available.
    2:08p
    Security updates for Thursday
    Security updates have been issued by Debian (htmldoc, lasso, and rails), Fedora (exiv2, firefox, and microcode_ctl), openSUSE (python-HyperKitty), Oracle (389-ds-base, qemu-kvm, qt5-qtimageformats, and samba), Red Hat (container-tools:3.0, container-tools:rhel8, postgresql:12, and postgresql:13), Scientific Linux (389-ds-base, hivex, libwebp, qemu-kvm, qt5-qtimageformats, samba, and thunderbird), SUSE (caribou, djvulibre, firefox, gstreamer-plugins-bad, kernel, libopenmpt, libxml2, python-Pillow, qemu, spice, spice-gtk, and ucode-intel), and Ubuntu (rpcbind).
    4:06p
    Another batch of stable kernels
    The 5.12.10, 5.10.43, 5.4.125, 4.19.194, 4.14.236, 4.9.272, and 4.4.272 stable kernels have been released. As
    usual, they contain fixes all over the kernel tree and users of those
    series should upgrade.
    10:01p
    Privilege escalation with polkit: How to get root on Linux with a seven-year-old bug (GitHub blog)
    On the GitHub blog, Kevin Backhouse writes
    about a privilege escalation vulnerability in polkit, which
    "enables an unprivileged local user to get a root shell on the
    system
    " CVE-2021-3560
    "is triggered by starting a dbus-send command but killing it while
    polkit is still in the middle of processing the request. [...] Why does
    killing the dbus-send command cause an authentication bypass? The
    vulnerability is in step four of the sequence of events listed above. What
    happens if polkit asks dbus-daemon for the UID of connection :1.96, but
    connection :1.96 no longer exists? dbus-daemon handles that situation
    correctly and returns an error. But it turns out that polkit does not
    handle that error correctly. In fact, polkit mishandles the error in a
    particularly unfortunate way: rather than rejecting the request, it treats
    the request as though it came from a process with UID 0. In other words, it
    immediately authorizes the request because it thinks the request has come
    from a root process.
    "
    10:19p
    [$] Implementing eBPF for Windows
    Extended BPF (eBPF), the general-purpose
    execution
    engine inside of the Linux kernel, has proved helpful for tracing and
    monitoring the system, for processing network packets, or generally for
    extending the behavior of the kernel. So helpful, in fact, that developers
    working on other operating systems have been watching it. Dave Thaler and
    Poorna Gaddehosur, on behalf of Microsoft, recently
    published an implementation of eBPF for Windows
    . A Linux feature making
    its way to Windows, in itself, deserves attention. Even more so when that
    feature has brought new degrees of programmability to the Linux kernel over
    the last few years. This makes it especially interesting to look at what the
    new project can do, and to ponder how the current ecosystem might evolve as
    eBPF begins its journey toward Windows.

    << Previous Day 2021/06/10
    [Calendar]
    Next Day >>

LWN.net   About LJ.Rossia.org