|
|
Subscribe / Log in / New account

Brief items

Security

The Problems and Promise of WebAssembly (Project Zero)

Over at Google's Project Zero blog, Natalie Silvanovich looks at some of the bugs the project has found in WebAssembly, which is a binary format to run code in the browser for web applications. She also looks to the future: "There are two emerging features of WebAssembly that are likely to have a security impact. One is threading. Currently, WebAssembly only supports concurrency via JavaScript workers, but this is likely to change. Since JavaScript is designed assuming that this is the only concurrency model, WebAssembly threading has the potential to require a lot of code to be thread safe that did not previously need to be, and this could lead to security problems. WebAssembly GC [garbage collection] is another potential feature of WebAssembly that could lead to security problems. Currently, some uses of WebAssembly have performance problems due to the lack of higher-level memory management in WebAssembly. For example, it is difficult to implement a performant Java Virtual Machine in WebAssembly. If WebAssembly GC is implemented, it will increase the number of applications that WebAssembly can be used for, but it will also make it more likely that vulnerabilities related to memory management will occur in both WebAssembly engines and applications written in WebAssembly."

Comments (11 posted)

Security quote of the week

Some people enter the technology industry to build newer, more exciting kinds of technology as quickly as possible. My keynote will savage these people and will burn important professional bridges, likely forcing me to join a monastery or another penance-focused organization. In my keynote, I will explain why the proliferation of ubiquitous technology is good in the same sense that ubiquitous Venus weather would be good, i.e., not good at all. Using case studies involving machine learning and other hastily-executed figments of Silicon Valley's imagination, I will explain why computer security (and larger notions of ethical computing) are difficult to achieve if developers insist on literally not questioning anything that they do since even brief introspection would reduce the frequency of git commits. At some point, my microphone will be cut off, possibly by hotel management, but possibly by myself, because microphones are technology and we need to reclaim the stark purity that emerges from amplifying our voices using rams' horns and sheets of papyrus rolled into cone shapes. I will explain why papyrus cones are not vulnerable to buffer overflow attacks, and then I will conclude by observing that my new start-up papyr.us is looking for talented full-stack developers who are comfortable executing computational tasks on an abacus or several nearby sticks.
James Mickens in the abstract for a keynote at the 27th USENIX Security Symposium (Bruce Schneier recommends watching the video of the talk that is available with the abstract.)

Comments (none posted)

Kernel development

Kernel release status

The 4.19 merge window is still open. The process of merging changes into the mainline continues, with 10,650 changesets added as of this writing.

Stable updates: it was a busy week for stable kernels:

One cause for all of these updates was the need to fix residual problems with the L1TF mitigations. There were complaints about a lack of testing, but the real problem, according to Linus Torvalds, is that "because this was all done under embargo, we didn't get the kind of test robot coverage we usually get".

Comments (none posted)

Quotes of the week

Imagining the worst scenario with the most stupid user doesn't prove anything. We have sensible users who want to achieve security. Our job is to design processes that help them with that goal.
James Bottomley

So this merge window has been horrible.
Linus Torvalds

Comments (none posted)

Distributions

Debian: 25 years and counting

The Debian project is celebrating the 25th anniversary of its founding by Ian Murdock on August 16, 1993. The "Bits from Debian" blog had this to say: "Today, the Debian project is a large and thriving organization with countless self-organized teams comprised of volunteers. While it often looks chaotic from the outside, the project is sustained by its two main organizational documents: the Debian Social Contract, which provides a vision of improving society, and the Debian Free Software Guidelines, which provide an indication of what software is considered usable. They are supplemented by the project's Constitution which lays down the project structure, and the Code of Conduct, which sets the tone for interactions within the project. Every day over the last 25 years, people have sent bug reports and patches, uploaded packages, updated translations, created artwork, organized events about Debian, updated the website, taught others how to use Debian, and created hundreds of derivatives." Happy birthday to the project from all of us here at LWN.

Comments (6 posted)

Flatpak 1.0 released

The 1.0 release of the Flatpak application distribution system is out. There are a number of performance improvements, the ability to mark applications as being at end-of-life, up-front confirmation of requested permissions, and more. "Apps can now request access the host SSH agent to securely access remote servers or Git repositories."

Comments (16 posted)

Distribution quotes of the week

This issue was fixed fairly quickly, because you really don't want to be in a situation where drunk people would have financial motivation to pour liquids on high voltage equipment in crowded rooms. This is not a problem one has to face in most data centers.
Jussi Pakkanen

Flexibility sits on a scale between fragile and robust. The trick is working out how many footguns are appropriate to leave around our distribution.
Stuart Prescott

I understand and accept that the sponsorship of this kids football team is unusual. I will not be voting for every such request. [...]

I consider this one decision an opportunity to see if we get any traction or interest from putting our logo prominently in an unusual place. And I think that's a worthwhile idea - after all we're not going to attract new blood with totally new ideas to the Project if we only advertise ourselves in the usual places.

Richard Brown: openSUSE decides to recruit from younger ranks

Comments (none posted)

Development

Vetter: Why no 2D Userspace API in DRM?

On his blog, Daniel Vetter answers an often-asked question about why the direct rendering manager (DRM) does not have a 2D API (and won't in the future): "3D has it easy: There’s OpenGL and Vulkan and DirectX that require a certain feature set. And huge market forces that make sure if you use these features like a game would, rendering is fast. Aside: This means the 2D engine in a browser actually needs to work like a 3D action game, or the GPU will crawl. The [impedance] mismatch compared to traditional 2D rendering designs is huge. On the 2D side there’s no such thing: Every blitter engine is its own bespoke thing, with its own features, limitations and performance characteristics. There’s also no standard benchmarks that would drive common performance characteristics - today blitters are [needed] mostly in small systems, with very specific use cases. Anything big enough to run more generic workloads will have a 3D rendering block anyway. These systems still have blitters, but mostly just to help move data in and out of VRAM for the 3D engine to consume."

Comments (24 posted)

Development quotes of the week

Believe it or don't, no license, no matter how clever, will allow you to be financially successful if you blow the business execution.
Josh Berkus

It didn't take long to find many sections of code from similar blog posts. Almost all of the blog posts either wrote a disclaimer or should have written one. They all solved one small piece of a problem, but took many liberties in their solution to make it simpler to read. It's understandable. Most readers appreciate brevity when learning a concept.

The code from these blog posts had spread through the codebase like a disease, scattering issues here and there without any rhyme or reason. And there wasn't any obvious cure other than to read everything manually and fix issues as I went along. Without unit tests or automated deployments, this took almost a year. I'm almost certain the cost of fixing the code exceeded the margin on revenue due to writing it in the first place.

Stephen Mann (Thanks to Paul Wise.)

Comments (1 posted)

Page editor: Jake Edge
Next page: Announcements>>


Copyright © 2018, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds