Language Selection

English French German Italian Portuguese Spanish

Linux 5.0 and Linux 5.2 Kernel Coverage

Filed under
Linux
  • Watch Out For BCache Corruption Issues On Linux 5.0 & GCC 9

    If you make use of BCache as a Linux block cache so that an SSD cache for a slower HDD, watch out as there is an active corruption bug.

    It appears that those employing BCache and running Linux 5.0 or newer when built by GCC 9, there is a nasty corruption bug exposed.

  • POWER Gets SMAP-Like Functionality, 32-bit KASAN Support On Linux 5.2

    Not only has the Linux 5.2 kernel been exciting on the x86_64 and ARM front, but there is also a fair amount of new IBM POWER architecture updates that landed for this summer 2019 kernel update.

    First up, POWER is now supporting a kernel user-space access/execution prevention technology. This feature is similar to Intel's SMAP (Supervisor Mode Access Prevention) and similar SMEP / PAN / PXN technologies. This feature will prevent the kernel from accidentally accessing user-space outside of certain calls or ever executing user-space.

  • New Input Drivers Sent In For The Linux 5.2 Kernel

    Input subsystem maintainer Dmitry Torokhov sent in his pull request on Monday with various touch controller additions as well as the new GPIO vibrator driver.

    New input device support coming with Linux 5.2 includes Azoteq IQS550/572/525 touch controllers, Microchip AT42QT1050 keys, and Goodix GT5663 as the main additions.

More in Tux Machines

GNOME 3.33.2 released!

Hello GNOME developers,

GNOME 3.33.2 is now available. This is the second unstable release
leading to 3.34 stable series.

I had to disable gnome-contacts, gnome-calendar and gnome-maps because of the not-very-well coordinated evolution-data-server transition.

If you want to compile GNOME 3.33.2, you can use the official
BuildStream project snapshot.

https://download.gnome.org/teams/releng/3.33.2/gnome-3.33.2.tar.xz

The list of updated modules and changes is available here:

https://download.gnome.org/core/3.33/3.33.2/NEWS

The source packages are available here:

https://download.gnome.org/core/3.33/3.33.2/sources/

WARNING!
--------
This release is a snapshot of development code. Although it is
buildable and usable, it is primarily intended for testing and hacking
purposes. GNOME uses odd minor version numbers to indicate development
status.

For more information about 3.34, the full schedule, the official module
lists and the proposed module lists, please see our 3.33 wiki page:

https://www.gnome.org/start/unstable


Cheers,

Abderrahim Kitouni,
GNOME Release Team
Read more Also: GNOME 3.33.2 Released As Another Step Towards The GNOME 3.34 Desktop

Security Leftovers

  • Serious Security: Don't let your SQL server attack you with ransomware [Ed: Article focuses on things like Windows and RDP. SQL Server is proprietary software that runs on a platform with NSA back doors. So if you choose it, then you choose to have no security at all, only an illusion of it. Why does the article paint Windows issues as pertaining to MySQL?]
    Tales from the honeypot: this time a MySQL-based attack. Old tricks still work, because we're still making old mistakes - here's what to do. [...] As regular readers will know, one of the popular vehicles for malware crooks at the moment is Windows RDP, short for Remote Desktop Protocol.
  • How Screwed is Intel without Hyper-Threading?
    As it stands Microsoft is pushing out OS-level updates to address the four MDS vulnerabilities and you’ll get those with this month's Windows 10 1903 update. However, this doesn’t mitigate the problem entirely, for that we need motherboard BIOS updates and reportedly Intel has released the new microcode to motherboard partners. However as of writing no new BIOS revisions have been released to the public. We believe we can test a worst case scenario by disabling Hyper-Threading and for older platforms that won’t get updated this might end up being the only solution.
  • SandboxEscape drops three more Windows 10 zero-day exploits

    SandboxEscaper also indicated that she was in the market to sell flaws to "people who hate the US", a move made in apparent response to FBI subpoenas against her Google account.

  • Huawei can’t officially use microSD cards in its phones going forward

    The SD Association is also by no means the first to cut ties: Google, ARM, Intel, Qualcomm, and Broadcom are also among the companies that have stopped working with Huawei due to the ban. The Wi-Fi Alliance (which sets Wi-Fi standards across the industry) has also “temporarily restricted” Huawei’s membership due to the US ban, and Huawei has also voluntarily left JEDEC (a semiconductor standards group best known for defining RAM specifications) over the issues with the US as well, according to a report from Nikkei Asian Review. All this could severely hamper Huawei’s ability to produce hardware at all, much less compete in the US technology market.

  • Huawei barred from SD Association: What’s that mean for its phones and microSD cards?

    As such, companies that aren’t on the SD Association’s list of members can’t officially produce and sell devices with SD card support that use the SD standards. According to SumahoInfo, the member page showed Huawei a few weeks ago, but no longer lists the firm this week.

Today in Techrights

today's howtos and python programming