All posts by jake

Security updates for Tuesday

Post Syndicated from jake original https://lwn.net/Articles/956156/

Security updates have been issued by Debian (curl, openssh, osslsigncode, and putty), Fedora (chromium, filezilla, libfilezilla, mingw-gstreamer1, mingw-gstreamer1-plugins-bad-free, mingw-gstreamer1-plugins-base, mingw-gstreamer1-plugins-good, opensc, thunderbird, unrealircd, and xorg-x11-server-Xwayland), Gentoo (Ceph, FFmpeg, Flatpak, Gitea, and SABnzbd), Mageia (chromium-browser-stable), Slackware (kernel and postfix), and SUSE (cppcheck, distribution, gstreamer-plugins-bad, jbigkit, and ppp).

Ruby 3.3.0 Released

Post Syndicated from jake original https://lwn.net/Articles/956115/

As is the tradition for the Ruby programming language, December 25 is the date for new major releases; this year, Ruby 3.3.0 was released. It comes with a new parser called “Prism” that is “both a C library that will be used internally by CRuby and a Ruby gem that can be used by any tooling which needs to parse Ruby code“. The release also has many performance improvements, especially in the YJIT (Yet another Ruby JIT) just-in-time compiler. Ruby 3.3 adds a new Ruby-based JIT, RJIT, that targets x86_64, which is available for experimental purposes. There are lots of other improvements and new features described in the announcement.

Security updates for Friday

Post Syndicated from jake original https://lwn.net/Articles/956012/

Security updates have been issued by Debian (bluez, chromium, gst-plugins-bad1.0, openssh, and thunderbird), Fedora (chromium, firefox, kernel, libssh, nss, opensc, and thunderbird), Gentoo (Arduino, Exiv2, LibRaw, libssh, NASM, and QtWebEngine), Mageia (gstreamer), and SUSE (gnutls, gstreamer-plugins-bad, libcryptopp, libqt5-qtbase, ppp, tinyxml, xorg-x11-server, and zbar).

Security updates for Thursday

Post Syndicated from jake original https://lwn.net/Articles/955914/

Security updates have been issued by Debian (firefox-esr), Fedora (kernel), Mageia (bluez), Oracle (fence-agents, gstreamer1-plugins-bad-free, opensc, openssl, postgresql:10, and postgresql:12), Red Hat (postgresql:15 and tigervnc), Slackware (proftpd), and SUSE (docker, rootlesskit, firefox, go1.20-openssl, go1.21-openssl, gstreamer-plugins-bad, libreoffice, libssh2_org, poppler, putty, rabbitmq-server, wireshark, xen, xorg-x11-server, and xwayland).

[$] The Linux graphics stack in a nutshell, part 1

Post Syndicated from jake original https://lwn.net/Articles/955376/

Linux graphics developers often speak of modern Linux graphics
when they refer to a number of individual software components and how they
interact
with each other.
Among other things, it’s a mix of kernel-managed display resources,
Wayland for compositing, accelerated 3D rendering, and decidedly not X11.
In a two-part series, we will take a fast-paced journey
through the graphics code to see how it converts application data
to pixel data and displays it on the screen. In this installment, we look
at application rendering, Mesa internals, and the
necessary kernel features.

[$] The Linux graphics stack in a nutshell, part 1

Post Syndicated from jake original https://lwn.net/Articles/955376/

Linux graphics developers often speak of modern Linux graphics
when they refer to a number of individual software components and how they
interact
with each other.
Among other things, it’s a mix of kernel-managed display resources,
Wayland for compositing, accelerated 3D rendering, and decidedly not X11.
In a two-part series, we will take a fast-paced journey
through the graphics code to see how it converts application data
to pixel data and displays it on the screen. In this installment, we look
at application rendering, Mesa internals, and the
necessary kernel features.

Security updates for Monday

Post Syndicated from jake original https://lwn.net/Articles/955566/

Security updates have been issued by Debian (freeimage, ghostscript, intel-microcode, spip, and xorg-server), Fedora (chromium, perl, perl-Devel-Cover, perl-PAR-Packer, polymake, PyDrive2, seamonkey, and vim), Gentoo (Leptonica), Mageia (audiofile, gimp, golang, and poppler), Oracle (buildah, containernetworking-plugins, gstreamer1-plugins-bad-free, kernel, kernel-container, libxml2, pixman, podman, postgresql, postgresql:15, runc, skopeo, tracker-miners, and webkit2gtk3), and SUSE (fish).

Security updates for Friday

Post Syndicated from jake original https://lwn.net/Articles/955336/

Security updates have been issued by Debian (bluez and haproxy), Fedora (curl, dotnet6.0, dotnet7.0, tigervnc, and xorg-x11-server), Red Hat (avahi and gstreamer1-plugins-bad-free), Slackware (bluez), SUSE (cdi-apiserver-container, cdi-cloner-container, cdi- controller-container, cdi-importer-container, cdi-operator-container, cdi- uploadproxy-container, cdi-uploadserver-container, cont, cosign, curl, gstreamer-plugins-bad, haproxy, ImageMagick, kernel, kernel-firmware, libreoffice, tiff, traceroute, tracker-miners, webkit2gtk3, and xrdp), and Ubuntu (audiofile, budgie-extras, libreoffice, strongswan, vim, and yajl).

25 years of Postfix

Post Syndicated from jake original https://lwn.net/Articles/955248/

Wietse Venema posted a note to the postfix-users mailing list about the 25th anniversary of the Postfix mail server. As can be seen, it had a pivotal role in bringing more awareness of open-source software to IBM. Beyond that, of course, it is an excellent piece of software in its own right.

As a few on this list may recall, it is 25 years ago today that the
“IBM secure mailer” had its public beta release. This was accompanied
by a nice article in the New York Times business section.

There is some literature at https://www.postfix.org/press.html that
attests how this project accelerated open-source adoption by a very
large company.

That release was even noticed by a small publication in its first year of operation.

(Thanks to Kees van Vloten.)

Security updates for Thursday

Post Syndicated from jake original https://lwn.net/Articles/955130/

Security updates have been issued by Debian (chromium and rabbitmq-server), Fedora (chromium, kernel, perl-CryptX, and python-jupyter-server), Mageia (curl), Oracle (curl and postgresql), Red Hat (gstreamer1-plugins-bad-free, linux-firmware, postgresql, postgresql:10, and postgresql:15), Slackware (xorg), SUSE (catatonit, containerd, runc, container-suseconnect, gimp, kernel, openvswitch, poppler, python-cryptography, python-Twisted, python3-cryptography, qemu, squid, tiff, webkit2gtk3, xorg-x11-server, and xwayland), and Ubuntu (xorg-server and xorg-server, xwayland).

[$] Logo and trademark issues for openSUSE

Post Syndicated from jake original https://lwn.net/Articles/954760/

A contest for new logos
for the openSUSE project and for
four separate distributions of it,
Tumbleweed, Leap, Slowroll, and
Kalpa, has turned into a
bit of an uproar in that community. A vote
has been held on the candidates
and winners have been announced, but
some are questioning why there is a need to change the existing logo (the
“Geeko”
chameleon) at all. In addition, there are questions about whether the
new logo will be trademarked (as previous ones have been)—and how many
years that will take.

[$] Project Bluefin: A customized Fedora Silverblue desktop image

Post Syndicated from jake original https://lwn.net/Articles/954059/

So-called “immutable” Linux distributions have been in development for
some time, but (unless you count Chrome OS) haven’t gained much traction. Project Bluefin, is a heavily
customized set of Fedora
Silverblue
images coming from the Universal Blue community; they are
designed to deliver a reliable Linux desktop that’s as easy to use as a
Chromebook but more customizable. Bluefin’s mission is to change up
the desktop experience and attract a new generation of open-source
contributors with a “cloud-native”
take
on developing and delivering the operating system.

Ext4 data corruption in stable kernels

Post Syndicated from jake original https://lwn.net/Articles/954285/

There is a problem in multiple stable kernel releases that is causing data corruption in ext4 filesystems. It is caused by a problematic commit that is in multiple stable kernels:

The commit got merged in 6.5-rc1 so all stable kernels that have
91562895f803 (“ext4: properly sync file size update after O_SYNC direct
IO”) before 6.5 are corrupting data – I’ve noticed at least 6.1 is still
carrying the problematic commit.

More information can be found in a Debian bug report. It has also delayed the release of Debian 12.3 images. “Please do not upgrade any systems at this time, we urge caution for users
with UnattendeUpgrades configured.

(Thanks to Alex Ridevski for giving us a heads up on this.)

Security updates for Friday

Post Syndicated from jake original https://lwn.net/Articles/954092/

Security updates have been issued by Fedora (chromium), Mageia (firefox, thunderbird, and vim), SUSE (kubevirt, virt-api-container, virt-controller-container, virt-handler-container, virt-launcher-container, virt-libguestfs-tools- container, virt-operator-container), and Ubuntu (freerdp2, glibc, and tinyxml).

Security updates for Thursday

Post Syndicated from jake original https://lwn.net/Articles/953977/

Security updates have been issued by Debian (tzdata), Fedora (gmailctl), Oracle (kernel), Red Hat (linux-firmware, postgresql:12, postgresql:13, and squid:4), SUSE (cdi-apiserver-container, cdi-cloner-container, cdi- controller-container, cdi-importer-container, cdi-operator-container, cdi- uploadproxy-container, cdi-uploadserver-container, cont, frr, libtorrent-rasterbar, qbittorrent, openssl-3, openvswitch, openvswitch3, and suse-build-key), and Ubuntu (bluez, curl, linux, linux-aws, linux-azure, linux-laptop, linux-lowlatency,
linux-oem-6.5, linux-oracle, linux-raspi, linux-starfive, linux-gcp, open-vm-tools, postgresql-12, postgresql-14, postgresql-15, and python-cryptography).

[$] A schism in the OpenPGP world

Post Syndicated from jake original https://lwn.net/Articles/953797/

The OpenPGP standard for email
encryption has been around since 1997, when it was derived from the
venerable Pretty Good
Privacy
(PGP) program that was released in 1991. Since it came about,
OpenPGP has been the decentralized, interoperable way to exchange encrypted
email, though
its use never really took off as advocates hoped. Now, though, it
would seem that a split in the OpenPGP community threatens to
fragment the OpenPGP-encrypted-email landscape, potentially leading to
interoperability woes.