Language Selection

English French German Italian Portuguese Spanish


Syndicate content is a comprehensive source of news and opinions from and about the Linux community. This is the main feed, listing all articles which are posted to the site front page.
Updated: 5 hours 56 min ago

Kernel prepatch 4.6-rc5

Monday 25th of April 2016 08:36:48 AM
Linus has released the 4.6-rc5 kernel prepatch. "Things continue to be fairly calm: rc5 is bigger than rc4 was, but rc4 really was tiny. And while we're back to fairly normal commit counts for this time in the release window, the kinds of bugs people are finding remain very low grade: there's absolutely nothing scary in here. If things continue this way, this might be one of those rare releases that don't even get to rc7."

Rintel: Network Manager 1.2 is here

Friday 22nd of April 2016 11:42:58 PM

At his blog, Lubomir Rintel highlights some of the changes found in the new 1.2 release of Network Manager, the network-configuration utility suite shipped by many Linux distributions. High on the list are privacy improvements; the post notes that "the identity of a mobile host can also leak via Wi-Fi hardware addresses. A common way to solve this is to use random addresses when scanning for available access points, which is what NetworkManager now does (with a recent enough version of wpa_supplicant). The actual hardware address is used only after the device is associated to an access point." Network Manager can also now be used to manage tun, tap, macvlan, vxlan and IP tunnel software devices, and can run multiple VPN modules simultaneously. In addition, support for several hardware device classes was split into loadable modules, which will reduce memory overhead.

Friday's security updates

Friday 22nd of April 2016 03:01:00 PM

CentOS has updated java-1.7.0-openjdk (C6; C5; C7: multiple vulnerabilities) and java-1.8.0-openjdk (C6; C7: multiple vulnerabilities).

Debian has updated varnish (access control bypass) and xen (multiple vulnerabilities).

Fedora has updated drupal7-block_class (F23; F22: cross-site scripting), glpi (F23; F22: SQL injection), libtasn1 (F23: denial of service), and springframework-amqp (F22: code execution).

Mageia has updated chromium-browser-stable (M5: multiple vulnerabilities), imlib2 (M5: code execution), lha (M5: buffer overflow), and poppler (M5: denial of service).

Oracle has updated java-1.7.0-openjdk (O7; O6; O5: multiple vulnerabilities).

Red Hat has updated java-1.6.0-sun (RHEL 5,6,7: multiple vulnerabilities), java-1.7.0-openjdk (RHEL 5,7; RHEL6: multiple vulnerabilities), java-1.7.0-oracle (RHEL 5,6,7: multiple vulnerabilities), and java-1.8.0-oracle (RHEL 6,7: multiple vulnerabilities).

Scientific Linux has updated java-1.7.0-openjdk (SL 5,7; SL6: multiple vulnerabilities).

Ubuntu has updated mysql-5.5, mysql-5.6 (12.04, 14.04, 15.10: multiple vulnerabilities) and php5 (12.04, 14.04, 15.10: multiple vulnerabilities).

Ubuntu 16.04 LTS (Xenial Xerus) released

Thursday 21st of April 2016 11:08:40 PM
The Ubuntu team has announced the release of Ubuntu 16.04 LTS for Desktop, Server, Cloud, and Core. "Ubuntu 16.04 LTS is the first long-term support release available for the new "s390x" architecture for IBM LinuxONE and z Systems, as well as introducing the new Ubuntu MATE community flavour." Joining Ubuntu in this release are the flavors Kubuntu, Lubuntu, Mythbuntu, Ubuntu GNOME, Ubuntu Kylin, Ubuntu MATE, Ubuntu Studio, and Xubuntu. Maintenance updates will be provided for 5 years for Ubuntu Desktop, Ubuntu Server, Ubuntu Cloud, Ubuntu Core, and Ubuntu Kylin. All the remaining flavors will be supported for 3 years.

Three new stable kernel releases

Thursday 21st of April 2016 09:17:43 PM

Greg Kroah-Hartman has released the latest batch of stable kernels: 4.5.2, 4.4.8, and 3.14.67. Each contains updates and fixes throughout the tree.

Thursday's security updates

Thursday 21st of April 2016 02:25:44 PM

Fedora has updated springframework-amqp (F23: code execution).

openSUSE has updated giflib (13.2; 13.1: denial of service) and xerces-c (Leap 42.1: code execution).

Oracle has updated java-1.8.0-openjdk (O7; O6: multiple vulnerabilities).

Red Hat has updated java-1.8.0-openjdk (RHEL6; RHEL7: multiple vulnerabilities).

Scientific Linux has updated java-1.8.0-openjdk (SL6; SL7: multiple vulnerabilities).

[$] Weekly Edition for April 21, 2016

Thursday 21st of April 2016 12:38:46 AM
The Weekly Edition for April 21, 2016 is available.

Introducing open source DC/OS

Wednesday 20th of April 2016 05:03:54 PM
Mesosphere has announced the release of DC/OS under the Apache License 2.0. "DC/OS derives from Mesosphere’s Datacenter Operating System, a commercial product built around Apache Mesos. Open sourcing DCOS has always been part of our strategic roadmap and we’re proud to have collaborated with our launch partners for today’s unveiling. DC/OS is a software platform that’s 100 percent open source, comprised of more than 30 component technologies, including Apache Mesos and Marathon. Some of the technologies were always open source, including Mesos, while others were previously proprietary code developed by Mesosphere, such as the GUI and our Minuteman load balancer." Over 60 partner companies participated in the open source release.

Security advisories for Wednesday

Wednesday 20th of April 2016 03:59:02 PM

Fedora has updated kernel (F23: three vulnerabilities).

openSUSE has updated apparmor (13.1: profile updates), samba (13.1; 11.4: multiple vulnerabilities), and tiff (13.1: denial of service).

SUSE has updated samba (SLES10-SP4: three vulnerabilities) and kernel (SLE11-SP4: multiple vulnerabilities).

Ubuntu has updated firefox (regressions in previous update).

[$] Persistent-memory error handling

Wednesday 20th of April 2016 02:19:48 PM
One of the key advantages of persistent memory is that it is, for lack of a better word, persistent; data stored there will be available for recall in the future, regardless of whether the system has remained up in the meantime. But, like memory in general, persistent memory can fail for a number of reasons and, given the quantities in which it is expected to be deployed, failures are a certainty. How should the operating system and applications deal with errors in persistent memory? One of the first plenary sessions at the 2016 Linux Storage, Filesystem, and Memory-Management Summit, led by Jeff Moyer, took on this question.

Tuesday's security updates

Tuesday 19th of April 2016 04:02:14 PM

Fedora has updated libreswan (F22: denial of service).

openSUSE has updated systemd (13.2: two vulnerabilities).

The Android Security 2015 Annual Report

Tuesday 19th of April 2016 01:30:18 PM
Google has announced the availability of the Android security 2015 year in review [PDF]. "Android’s open source model has also allowed device manufacturers to introduce new security capabilities. Samsung KNOX, for example, has taken advantage of unique hardware capabilities to strengthen the root of trust on Samsung devices. Samsung has also introduced new kernel monitoring capabilities on their Android devices. Samsung is not unique in their contributions to the Android ecosystem. Blackberry has worked to enhance the security of their devices by enabling kernel hardening and other features in the Blackberry PRIV. CopperheadOS has both introduced security improvements to their own version of Android and made significant contributions to the Android Open Source Project. These are just some of the various contributions made possible through open sourcing that improved the Android ecosystem in 2015."

Schaller: Fedora Workstation Phase 1 – Homestretch

Tuesday 19th of April 2016 10:52:51 AM
Christian Schaller celebrates the completion of the (informal) first phase of the Fedora Workstation project. "Another major piece of engineering that is coming to a close is moving major applications such as Firefox, LibreOffice and Eclipse to GTK3. This was needed both to get these applications able to run natively on Wayland, but it also enabled us to make them work nicely for HiDPI. This has also played out into how GTK3 have positioned itself which to be a toolkit dedicated to pushing the Linux desktop forward and helping that quickly adapt and adopt to changes in the technology landscape."

Garrett: Remembering David MacKay

Monday 18th of April 2016 10:01:32 PM
Matthew Garrett remembers David MacKay, shortly after his passing. "I was already aware of the importance of free software in terms of developers, but working with David made it clear to me how important it was to users as well. A community formed around Dasher, helping us improve it and allowing us to develop support for new use cases that made the difference between someone being able to type at two words per minute and being able to manage twenty. David saw that this collaborative development would be vital to creating something bigger than his original ideas, and it succeeded in ways he couldn't have hoped for." (Thanks to Paul Wise)

Security updates for Monday

Monday 18th of April 2016 04:36:06 PM

Arch Linux has updated chromium (multiple vulnerabilities) and libtasn1 (denial of service).

Debian has updated fuseiso (two vulnerabilities), openssh (privilege escalation), and tomcat7 (multiple vulnerabilities).

Fedora has updated firefox (F23: multiple vulnerabilities) and xerces-c (F22: code execution).

openSUSE has updated Chromium (Leap42.1; 13.1: multiple vulnerabilities), gcc5 (Leap42.1: predictable random values), krb5 (Leap42.1: null pointer dereference), mercurial (Leap42.1: three vulnerabilities), optipng (Leap42.1; 13.2: three vulnerabilities), perl-YAML-LibYAML (Leap42.1: three vulnerabilities, one from 2013), samba (13.2: multiple vulnerabilities), and tiff (13.2: denial of service).

Red Hat has updated chromium-browser (RHEL6: multiple vulnerabilities).

Slackware has updated thunderbird (multiple vulnerabilities) and samba (multiple vulnerabilities).

SUSE has updated Chromium (SPH for SLE12: multiple vulnerabilities) and openssl (SOSC5&SM2.1: multiple vulnerabilities).

Ubuntu has updated optipng (multiple vulnerabilities) and samba (multiple vulnerabilities).

How Badlock was discovered and fixed

Monday 18th of April 2016 01:14:53 PM
This post on the Red Hat Enterprise Linux blog describes the discovery and repair of the "Badlock" vulnerability. One begins to understand a little better why it took as long as it did. "The code was rewritten; in March 2016 the changes needed to fix all eight CVEs amounted to about 200 individual patches against a development version of Samba, with about half of those responsible for fixing CVE-2015-5370. When backported to previous stable Samba versions, they needed additional hundred patches. To oldest supported Samba version — about four hundred patches. What started as an individual snowflake became an avalanche but it wasn’t finished yet."

[$] Maru: a pocket desktop

Monday 18th of April 2016 11:50:43 AM
It appears to be widely accepted that the Linux desktop has achieved limited success at best, while the Linux palmtop — in the form of Android — has been wildly successful. The two classes of systems are generally thought of as being quite different, but it is worth remembering that the handsets we carry now have more computing power than the desktop systems we were using in the recent past. Given the right peripherals, an Android handset should be more than capable of providing a reasonable desktop experience. The Maru distribution is an experiment intended to prove that point by turning a smartphone device into a portable Debian desktop.

Kernel prepatch 4.6-rc4

Monday 18th of April 2016 11:17:05 AM
The 4.6-rc4 kernel prepatch is out for testing. "So there really isn't anything particularly interesting here. Just like I like it in the rc series. Let's hope it stays that way."

Brauch: Processing scientific data in Python and numpy, but doing it fast

Friday 15th of April 2016 08:56:27 PM
On his blog, Sven Brauch has some suggestions on how to use NumPy to process scientific data and how to avoid some pitfalls that will ruin its performance. "In general, copying data is cheap. But if your program simulates 25 million particles, each having a float64 location in 3d, you already have 8*3*25e6 = 600 MB of data. Thus, if you write r = r + v*dt, you will copy 1.2 GB of data around in memory: once 600 MB to calculate v*dt, and again to calculate r+(v*dt), and only then the result is written back to r. This can really become a major bottleneck if you aren’t careful. Fortunately, it is usually easy to circumvent; instead of writing r = r+dv, write r += dv. Instead of a = 3*a + b, write a *= 3; a+= b. This avoids the copying completely. For calculating v*dt and adding it to r, the situation is a bit more tricky; one good idea is to just have the unit of v be such that you don’t need to multiply by dt. If that is not possible, it might even be worth it to keep a copy of v which is multiplied by dt already, and update that whenever you update v. This is advantageous if only few v values change per step of your simulation. I would not recommend writing it like this everywhere though, it’s often not worth the loss in readability; just for really large arrays and when the code is executed frequently."

Costa: Designing a Userspace Disk I/O Scheduler for Modern Datastores: the Scylla example (Part 1)

Friday 15th of April 2016 05:22:55 PM
Over at the Scylla blog, Glauber Costa looks at why a high-performance datastore application might want to do its own I/O scheduling. "If one is using a threaded approach for managing I/O, a thread can be assigned to a different priority group by tools such as ionice. However, ionice only allows us to choose between general concepts like real-time, best-effort and idle. And while Linux will try to preserve fairness among the different actors, that doesn’t allow any fine tuning to take place. Dividing bandwidth among users is a common task in network processing, but it is usually not possible with disk I/O without resorting to infrastructure like cgroups. More importantly, modern designs like the Seastar framework used by Scylla to build its infrastructure may stay away from threads in favor of a thread-per-core design in the search for better scalability. In the light of these considerations, can a userspace application like Scylla somehow guarantee that all actors are served according to the priorities we would want them to obey?"

More in Tux Machines

Linux Foundation's Badge Program Launches to Boost Security of Open Source Apps

Today, May 3, 2016, Linux Foundation, a non-profit organization dedicated to promoting Linux and open source projects, has announced the general availability of its free badge program. Read more

Jolla's $12m lifeline will help push 'secure' Android rival Sailfish OS

Finnish mobile startup Jolla, the maker of Sailfish OS, has secured $12m in funding which should keep the firm afloat until the end of the year. The company announced the new round today, which will alleviate some of the financial troubles that have caused it to abandon the Jolla tablet, lay off staff, and apply for debt restructuring in Finland. The company split its hardware and software businesses last July. Read more

Jenkins Embrace and Extend?

Unity 8 Won't Be the Default Desktop Session for Ubuntu 16.10 (Yakkety Yak)

The Ubuntu Online Summit started just a few moments ago, and you can watch the Ubuntu Engineering team live right now talking about the features planned for the next Ubuntu release. We reported last week that the development of the Ubuntu 16.10 (Yakkety Yak) operating system had begun, with daily live ISO images being made available for early adopters and public testers who want to track the development cycle of the upcoming Ubuntu release. Read more