Announcement

Collapse
No announcement yet.

AlmaLinux 9.4 Beta Restores Support For Some Hardware Deprecated By RHEL

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • AlmaLinux 9.4 Beta Restores Support For Some Hardware Deprecated By RHEL

    Phoronix: AlmaLinux 9.4 Beta Restores Support For Some Hardware Deprecated By RHEL

    AlmaLinux 9.4 Beta is out today for this popular community-oriented Linux distribution derived from upstream Red Hat Enterprise Linux. Besides pulling in the RHEL 9.4 Beta changes, AlmaLinux 9.4 also restores hardware support for some devices that was deprecated by upstream RHEL...

    Phoronix, Linux Hardware Reviews, Linux hardware benchmarks, Linux server benchmarks, Linux benchmarking, Desktop Linux, Linux performance, Open Source graphics, Linux How To, Ubuntu benchmarks, Ubuntu hardware, Phoronix Test Suite

  • #2
    You might want to update the article to differentiate between disabled vs deprecated.

    Deprecated software is only removed in the next major release (so any drivers deprecated in RHEL 9.x will be removed in RHEL 10.x).

    The actual announcement stated "The following device drivers were modified to re-add PCI IDs for hardware disabled in upstream". Maybe those drivers were deprecated in RHEL 8.x? it is unclear.

    It would be clearer to state they have re-added support for hardware disabled in RHEL9.

    Comment


    • #3
      If IBM doesn't watch out they'll create a situation where the best version of RHEL comes from someone else. Like how they lost control of the PC market to the clone makers in the 80s.

      Comment


      • #4
        removing good old and mission critical tested hw support by removing PCI IDs? What ridiculously unserious Linux distribution is that even, ..?!?!?! Sad. Hope Clean Linux never will follow this modern trend, ... https://cleanlinux.com. ;-)

        Comment


        • #5
          I guess bit-for-bit identical went out the window.

          Comment


          • #6
            Originally posted by rene View Post
            What ridiculously unserious Linux distribution is that even, ..?!?!?! https://cleanlinux.com. ;-)
            Is there any Linux distribution that is not "ridiculously unserious"?

            Comment


            • #7
              Originally posted by andyprough View Post
              If IBM doesn't watch out they'll create a situation where the best version of RHEL comes from someone else. Like how they lost control of the PC market to the clone makers in the 80s.
              this already happened with Fedora... Fedora is already better than RHEL... now people step up and provide even better long term support on RHEL clones.
              Phantom circuit Sequence Reducer Dyslexia

              Comment


              • #8
                Originally posted by sophisticles View Post
                Is there any Linux distribution that is not "ridiculously unserious"?
                "Russian espionage
                Security fiasco at Microsoft puts authorities under pressure
                Ironically, emails from Microsoft's security department fell into the hands of Russian hackers. And therefore possibly details about vulnerabilities in the state IT infrastructure
                Microsoft logo with holes
                Due to the Microsoft problems, CISA is instructing the authorities to check communication with the company for possible disclosed security gaps.
                US authorities actually sounded the alarm in June. But since the attackers from the Russian Federation have recently increased their attacks, the US Cybersecurity and Infrastructure Security Agency (CISA) is now sounding the alarm again and putting pressure on the authorities to take large-scale measures. Not only Microsoft's own systems are at risk, but also those of its customers and therefore the authorities, according to reports from "Heise Online" and "Cyberscoop" with reference to the CISA letter from the beginning of April.
                What happened? The attackers had stolen a kind of master key for large parts of the Microsoft cloud. This allows the perpetrators known as Midnight Blizzard to create new access data for the services. And so the hackers were able, among other things, to steal emails from Microsoft's security department - the very department that communicates with B2B customers about their security problems. And that also includes the authorities. By reading the emails, the attackers can find out where various vulnerabilities are found in the IT infrastructure of these same government institutions.
                Big clear out
                The authorities are now instructed to check all their communication with Microsoft. The question is whether internal secrets and vulnerabilities were mistakenly revealed to the hackers working for Russia. And an analysis of what this means for IT security. Microsoft also provides the authorities with metadata from the correspondence that is to be analyzed.
                If there is cause for concern, the authorities should act quickly: According to CISA, tokens, passwords, API keys or other authentication data should be cleaned up if there is even the suspicion that they have been compromised. Logs for registrations, token spending and other account activities should also be checked for suspicious processes. And finally, this opportunity should be used to clear out by deactivating software that is no longer needed by the authority.
                All work should be completed by the end of April and a report must be submitted to CISA by May 1st. It is unclear which specific authorities are affected. However, the report from "Heise Online" assumes that there are likely to be many - otherwise CISA would have communicated bilaterally with the authorities concerned."‚Äč

                Ausgerechnet E-Mails von Microsofts Sicherheitsabteilung fielen in die Hände russischer Hacker. Und somit eventuell Details zu Schwachstellen in staatlicher IT-Infrastruktur
                Phantom circuit Sequence Reducer Dyslexia

                Comment


                • #9
                  Originally posted by andyprough View Post
                  If IBM doesn't watch out they'll create a situation where the best version of RHEL comes from someone else. Like how they lost control of the PC market to the clone makers in the 80s.
                  You mean IBM might pull another OS/2 job on us? Shirley you jest!

                  Comment


                  • #10
                    Originally posted by andyprough View Post
                    If IBM doesn't watch out they'll create a situation where the best version of RHEL comes from someone else. Like how they lost control of the PC market to the clone makers in the 80s.
                    I was under the impression we were already there.

                    Comment

                    Working...
                    X