Language Selection

English French German Italian Portuguese Spanish

Linux Kernel 4.4.5 LTS Released with ARM64, Btrfs, JFFS2, and AMDGPU Updates

Filed under
Linux

Just a few minutes ago, kernel developer Greg Kroah-Hartman had the great pleasure of announcing the release and immediate availability for download of Linux kernel 4.4.5 LTS.

As you may or may not know, Linux 4.5 is the newest and most advanced long-term supported (LTS) kernel branch, which is currently used in the popular Arch Linux rolling operating system, Solus, Manjaro Linux, as well as the upcoming Ubuntu 16.04 LTS (Xenial Xerus). Today's Linux kernel 4.4.5 update is the fifth maintenance build in the series, and according to the appended shortlog, it's a fairly normal one.

Read more

More in Tux Machines

Security Leftovers

  • Researchers find Android design defects that allow attacks

    The researchers — Yanick Fratantonio of the University of California, and Chenxiong Qian, Simon Pak Ho Chung and Wenke Lee, all from the Georgia Institute of Technology — called it a Cloak and Dagger attack as it happened without the owner of the smartphone being aware that any attack had taken place.

    The attack does not exploit any vulnerability, but takes advantage of two permissions that are allowed for apps to use certain features on Android.

  • The internet of unreliable and broken things
    Fine, the current process is rocky. Some of that is that it’s not matured yet (Alexa, when did Vincent Price die? No, not “play vincent price die”, not “christ die”, not “do you speak some price dead”, you stupid pile of undocumented microchips!) Some of it is that basically every large company underestimates how much people’s accounts are set up incorrectly or incompletely; after all, employees have everything set up right, because they know what they’re doing, and so this never comes up in testing. Some of it is because I’m joining dots on three or four very different puzzles: I’m sure if I were to get a Google Home and use Google Mail to send my shopping list to Google Keep and then buy things from Google Shopping, or if I were to get some theoretical Home Siri device and play music from my Apple account and put things in my Apple iCloud account… then all this would be a lot more seamless. But you should beware people who proclaim that technology would be easy if all us heathens were just to renounce our diverse needs and join their true faith. Mastery goes to the designer who can cope with us real people, in all our glittering and varied patterns and colours and desires. Not just the ones who take the easy way out and block you if you haven’t already bought all the rest of your stuff from them too.
  • 9 Ways Organizations Sabotage Their Own Security: Lessons from the Verizon DBIR
    Datasets from the recent Verizon 2017 Data Breach Investigations Report (DBIR) show that some security teams still may be operating under false assumptions regarding what it takes to keep their organizations secure. For starters, the same security standards don't apply across all vertical industries, says Suzanne Widup, a senior consultant for the Verizon RISK Team and co-author of the Verizon DBIR.
  • “Yahoobleed” flaw leaked private e-mail attachments and credentials
  • Web Developer Security Checklist
    If you have drunk the MVP cool-aid and believe that you can create a product in one month that is both valuable and secure — think twice before you launch your “proto-product”. After you review the checklist below, acknowledge that you are skipping many of these critical security issues. At the very minimum, be honest with your potential users and let them know that you don’t have a complete product yet and are offering a prototype without full security.
  • Obstacles to the Adoption of Secure Communication Tools

    [...] we interviewed 60 participants about their experience with different communication tools and their perceptions of the tools' security properties. We found that the adoption of secure communication tools is hindered by fragmented user bases and incompatible tools. Furthermore, the vast majority of participants did not understand the essential concept of end-to-end encryption, limiting their motivation to adopt secure tools

  • VMware Patches Multiple Security Issues in Workstation
    VMware fixed two bugs in its VMware Workstation late Thursday night, including an insecure library loading vulnerability and a NULL pointer dereference vulnerability. The virtualization software company warned of the issues Thursday night in a security advisory VMSA-2017-0009.

Linux Devices, Tizen, and Android

Peppermint 8 Linux OS Released, It's Based on Ubuntu 16.04.2 LTS with Linux 4.8

Mark Greaves of the Peppermint development team was proud to announce today the release and immediate availability of the Peppermint 8 GNU/Linux distribution. Based on the Ubuntu 16.04.2 LTS (Xenial Xerus) operating system and the HWE (hardware enablement) Linux 4.8 kernel and graphics stacks from Ubuntu 16.10 (Yakkety Yak), which includes the X.Org Server 1.19 and Mesa 17.0.2 packages, Peppermint 8 is here in its final, production-ready state to conquer your personal computers with a highly customized MATE desktop environment. Read more

Security Leftovers: Russian Critic, NTFS Chaos, CentOS Patches, and British Airways Grounded