Language Selection

English French German Italian Portuguese Spanish

X.Org Foundation Still Works Towards Becoming An SPI Project

Filed under
Graphics/Benchmarks

For the better part of a year, the X.Org Foundation has been evaluating a possible merger with SPI. That work is still ongoing and could be put up for a vote in the weeks ahead.

At yesterday's X.Org Board of Directors' meeting (IRC log), an update was shared and comes down to Keith Packard working with the SPI on constructing a resolution to bring to the SPI board. However, first the X.Org board will need to review the draft, etc. Assuming the SPI board votes in favor of this resolution, the following step is then to take the revised X.Org Foundation member by-laws to a vote by all X.Org Foundation members.

Read more

More in Tux Machines

today's howtos

Red Hat Financial News

Server Administration

Security Leftovers

  • Security advisories for Wednesday
  • There’s a new DDoS army, and it could soon rival record-setting Mirai
    For almost three months, Internet-of-things botnets built by software called Mirai have been a driving force behind a new breed of attacks so powerful they threaten the Internet as we know it. Now, a new botnet is emerging that could soon magnify or even rival that threat. The as-yet unnamed botnet was first detected on November 23, the day before the US Thanksgiving holiday. For exactly 8.5 hours, it delivered a non-stop stream of junk traffic to undisclosed targets, according to this post published Friday by content delivery network CloudFlare. Every day for the next six days at roughly the same time, the same network pumped out an almost identical barrage, which is aimed at a small number of targets mostly on the US West Coast. More recently, the attacks have run for 24 hours at a time.
  • Open source Roundcube webmail can be attacked ... by sending it an e-mail
    The developers of open source webmail package Roundcube want sysadmins to push in a patch, because a bug in versions prior to 1.2.3 let an attacker crash it remotely – by sending what looks like valid e-mail data. The authors overlooked sanitising the fifth argument (the _from parameter) in mail() – and that meant someone only needed to compose an e-mail with malicious info in that argument to attack Roundcube. [...] Roundcube posted a patch to GitHub at the end of November, and issued a version 1.2.3 here.
  • Latest Android security update fixes Dirty COW, GPS vulnerabilities
  • Open Source Flaws Found in Security Software
    Yet another industry survey has flagged open source software that according to one estimate accounts for half of the global code base as a growing security threat. Moreover, a review released by Flexera Software also found that the very security products designed to protect IT infrastructure are themselves riddled with vulnerabilities embedded in open source software.