Posts
342
Following
95
Followers
3594
@msw @jacques @bagder Are people ignoring the fact that I do not think we have tools that can easily generate those SBOM files today?

Yes, I know about the REUSE tool from the FSFE, that's the best that we currently have but I don't think the output from it is what anyone seems to want these days. I've been publishing the output from that for years for usbutils and no one seems to even have noticed...

Am I just missing all of the wonderful tools out there that can simply generate a SBOM in a variety of needed formats from a project's tarball or normal autotools or meson build process?
0
0
2
repeated

Really nice talk by @gregkh at @KernelRecipes on the Cyber Resilience Act.

Really comforting, lots of facts-checking and acknowledging that the EU legal people are not against Open-Source developers. They do understand open-source and they did seek (and obtain) information from relevant technical people. It might not be perfect but I also really think it’s a step in the right direction, making manufacturers (and importers and distributors) responsible

2
5
2
repeated

CRA? D'ont be afraid! You are already doing it!

Just check if your open source project is covered

0
3
1
repeated

@gregkh now, doing his "usual non technical talk". After CVEs, CRA!

1
5
2
repeated

Thorsten Leemhuis (acct. 1/4)

Edited 1 month ago

The based Binder driver has hit linux-next and thus is slated for inclusion in 6.18. Congrats to Alice and everyone who helped making this possible!

From the patch description (https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=eafedbc7c050c44744fbdf80bdf3315e860b7513):

""We're generally not proponents of rewrites (nasty uncomfortable things that make you late for dinner!). So why rewrite Binder?

Binder has been evolving over the past 15+ years to meet the evolving needs of Android. Its responsibilities, expectations, and complexity have grown considerably during that time. While we expect Binder to continue to evolve along with Android, there are a number of factors that currently constrain our ability to develop/maintain it. Briefly those are:

1. Complexity: […]
2. Things to improve: Thousand-line functions, error-prone error handling, and confusing structure […]
3. Security critical […]

The biggest change is obviously the choice of programming language. We decided to use Rust because it directly addresses a number of the challenges within Binder that we have faced during the last years. […]""

0
10
4
Some days it's great to get a patch series like this in your inbox: https://lore.kernel.org/all/20250912081718.3827390-1-tzungbi@kernel.org/ implementing a feature to resolve so many reference count issues that a number of us kernel developers have been grumbling about for years.

Bonus is that it "looks like" the pattern that the Rust implementation in the kernel uses so switching between the two languages shouldn't be that difficult as the terminology and usage is not so different.
1
7
28
@msw @jacques @bagder I have no problem adding additional data like "This config option means you will not be vulnerable" to our records today, if people want to submit that information to us. We take patches and additions to the kernel cve.org records on a weekly basis from vendors that work to narrow down affected kernel ranges and add additional references.

So we could do what you want today, no changes to anything that cve.org does right now would be needed, just send us a patch! But that was not what was being proposed at all, unfortunately.
0
0
5
Pro tip, when sending a bug to the kernel security team, and it's reviewed and shown to not actually be a bug at all due to the report being "written" by a llm which can't actually parse C very well, don't proceed to "curse" the reviewer for pointing this out.

{sigh}
8
36
89
repeated

The other day me and @gregkh shot down a draft proposal to add a new role in the CVE ecosystem (SADP: "supplier ADP") that would append data to CVEs with details about dependencies and how they are or are not vulnerable to each particular CVE.

Imagine the amount of dependencies that use curl or the Linux kernel etc. These sweet innocent proposal makers thought in the terms of 5-10 dependencies per CVE. Not tens or hundreds of thousands which is far from unthinkable.

4
3
3
repeated

Thorsten Leemhuis (acct. 1/4)

Recording (https://www.youtube.com/watch?v=O8Q8nIzEG6c ) and slides (https://static.sched.com/hosted_files/osseu2025/b3/pdx86-community-health-2025.pdf ) from Hans de Goede's talk "Creating a Healthy Vibrant [] Subsystem Community" are now online.

From the abstract: "End 2020 I became the maintainer of the drivers/platform/x86 (pdx86) kernel subsytem. The subject of this talk is my experience in creating a friendly welcoming environment, growing the pdx86 community and how this helped me to avoid burnout by being able to delegate to community members."

https://osseu2025.sched.com/event/25VmE/creating-a-healthy-vibrant-kernel-subsystem-community-hans-de-goede-red-hat

0
7
2
repeated
Edited 2 months ago

The video of my presentation at OSSummit Europe is now available. 🇳🇱🐧

Those were 180 slides in 40 mins. 🫣😁 I hope people find it useful. Thanks! 🙂

Abstract & slides in the comments.

Linux Kernel Self-Protection Project 🐧🛡⚔️

https://www.youtube.com/watch?v=nz0GId_zsIk

1
8
2
repeated

Suggestion for the week-end: Open Source Summit Europe 2025 video binge watching.

The Linux Foundation has just released all the videos they took at the OSS EU 2025 conference in Amsterdam. They are so many of them that they are hard to count!

https://www.youtube.com/watch?v=IGDWXA32xG4&list=PLbzoR-pLrL6qKwLt8A787ggMLHNivOHve

So, now you can attend OSS EU 2025 and the Embedded Linux Conference Europe 2025 free of charge, or if you attended, you can watch the many interesting talks that you missed.

Thanks to Ross Burton for sharing the news!

1
6
2
repeated

our community have always tried to embrace the upstream-first approach to development, and one of the largest roadblocks in that respect is often the Linux Kernel itself.

For better or worse it takes quite a lot of effort to get devicetree files and drivers upstreamed, but this is by far one of the more important goals for wider Linux Mobile adoption: upstream support makes devices more visible and encourages kernel maintainers to take more of an interest in the work we do

with that in mind, we are proposing an adjustment to the community device category requirements: to get your device into the community category it would now HAVE to have a devicetree in upstream, more specifically the upstream kernel needs to boot with some kind of display output and a working USB port - the bare minimum for easy tinkering, testing, and further development.

We hope that this will encourage device maintainers to get involved in upstream kernel development and submit their work rather than keeping everything in a kernel fork that they maintain

We are very open to feedback on this, please let us know what you think in the GitLab issue

https://gitlab.postmarketos.org/postmarketOS/postmarketos/-/issues/116

2
8
1
@darix @ptesarik @larsmb Good news is that it will be trivial to get root on the thing so that you can update the kernel yourself to a more secure one :)
1
0
3
@larsmb Surely nothing has changed in Linux since 2020 :)
1
0
1
repeated
repeated
Edited 3 months ago

Urgent help for OpenPrinting needed!

As many here know, I am co-founder and lead of OpenPrinting since 2001, known as the print guru for Linux and free software by many. I also got one of the 8 fellows of the Linux Foundation for this.

Up to now I was working at Canonical, hired back in 2006 just to run OpenPrinting and also to maintain printing-related Ubuntu packages.

... 🧵

Please boost.

27
60
0
@trini Contact the CNA that created it and get them to reject it, if they don't complain to cve.org.
1
0
1
@stsquad @hrw Fixing the lack of almost all riscv soc drivers to be upstream so that I can boot a kernel.org release on one of them (i.e. a normal developer can test their changes) would be a good start. Which is one of the things that article says...
1
0
5
Show older