Search the Community
Showing results for tags 'Security'.
-
Hi, everyone! X.Org security update now available with version 1.19.3-r3. By default xorg-server ebuild installs the /usr/bin/Xorg binary with suid . In 1.19 it was found a regression which allowed a privilege escalation. This is now fixed with patch. More details can be found here: https://www.mail-archive.com/xorg-announce@lists.x.org/msg01138.html A notice on suid USE flag. By default this USE flag is enabled and with unpatched xorg-server there is a security risk. Upstream recommendation is to disable suid USE. This can be achieved by: echo "x11-base/xorg-server -suid"
-
Hello, dear Funtoo developers and users! Installing some packages that were not checked or that have not secure dependencies Portage warns about masked packages. But I used --autounmask-write option. Is it possible to see now which packages and libraries in my system were manually unmasked? Is it really possible to be familiar with those source codes? Please, give advise.
- 2 replies
-
- threats
- vulnerabilities
-
(and 1 more)
Tagged with:
-
Is there an equivalent function in funtoo for glsa-check? I'm still getting the hang of kits vs the portage tree, but as far as I can tell glsa-check always returns nothing since the meta-repo doesn't include the glsa notices.
-
A new wireless attack techniques discovered. The weaknesses are in the Wi-Fi standard itself, and not in individual products or implementations. Therefore, any correct implementation of WPA2 is likely affected. To prevent the attack, users must update affected products as soon as security updates become available. Note that if your device supports Wi-Fi, it is most likely affected. More info here: https://www.krackattacks.com/
-
https://forums.openvpn.net/topic17625.html