Language Selection

English French German Italian Portuguese Spanish

MHI: Linux 5.7 Getting A New Bus From Qualcomm

Filed under
Linux

Linux 5.7 will support the MHI protocol developed by Qualcomm as part of the new kernel bus being introduced.

Greg Kroah-Hartman has queued the MHI bus code into the char-misc's "-next" Git branch ahead of the Linux 5.7 merge window opening up around the start of April.

Read more

More in Tux Machines

today's howtos

Security Leftovers

  • Security updates for Monday

    Security updates have been issued by Debian (firefox-esr, gnutls28, and libmtp), Fedora (cyrus-sasl, firefox, glibc, squid, and telnet), Gentoo (firefox), Mageia (dcraw, firefox, kernel, kernel-linus, librsvg, and python-nltk), openSUSE (firefox, haproxy, icu, and spamassassin), Red Hat (nodejs:10, openstack-manila, python-django, python-XStatic-jQuery, and telnet), Slackware (firefox), SUSE (bluez, exiv2, and libxslt), and Ubuntu (firefox).

  • Open Source Security Podcast: Episode 191 - Security scanners are all terrible

    Josh and Kurt talk about security scanners. They're all pretty bad today, but there are some things we can do to make them better. Step one is to understand the problem. Do you know why you're running the scanner and what the reports mean?

  • Misconfigured Docker API Ports Targeted by Kinsing Malware

    Security researchers observed an attack campaign that targeted misconfigured Docker API ports with samples of Kinsing malware. According to Aqua Security, the campaign began when it capitalized on an unprotected Docker API port to run a Ubuntu container. The command used for creating the Ubuntu container included a shell script “d.sh.” By means of its 600+ lines of code, the shell script began by disabling security measures, clearing logs and disabling other malware and cryptominer samples. It’s then that the command killed rival malicious Docker containers before loading its Kinsing payload.

  • L1d Cache Flush On Context Switch Moves Forward For Linux In Light Of Vulnerabilities

    A new patch series sent out just under one month ago was providing opt-in L1 data cache flushing on context switching. That work has now been revived again and now with documentation added it's clear that this work is being done in response to a recent CVE being made public. The patches originally sent out by an Amazon engineer characterized the work as for the "paranoid due to the recent snoop assisted data sampling vulnerabilities, to flush their L1D on being switched out. This protects their data from being snooped or leaked via side channels after the task has context switched out."

Galaxy Chromebook reviews

I can't imagine using something this fancy without wiping out the toy OS and installing Ubuntu Linux instead. One thing that struck me is that The Verge's full-column warning (partially embedded below) about the clickwrap contracts the user must agree to just to start the machine. These are commonplace with gadgets, but rarely in such great numbers or with such hostile presentation. The reviewer writes they were unable to read them. Tech companies have turned Linux into a transmission vector for adhesion contracts that are virtually impossible to read. To think, they used to complain that the GPL was a virus! Read more

Android Leftovers