Jump to content
funtoo forums

Search the Community

Showing results for tags 'security'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Funtoo Discussion Forums
    • News and Announcements
    • General Discussion
    • Dev Central
    • Funtoo Hosting
    • Funtoo Infrastructure
  • Help Central
    • General Help
    • Installation Help
    • Portage Help
    • Desktop Help
    • Server Help
  • Funtoo Services

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


freenode


github


Location


Interests

Found 5 results

  1. Oleg Vinichenko

    X,Org security update

    Hi, everyone! X.Org security update now available with version 1.19.3-r3. By default xorg-server ebuild installs the /usr/bin/Xorg binary with suid . In 1.19 it was found a regression which allowed a privilege escalation. This is now fixed with patch. More details can be found here: https://www.mail-archive.com/xorg-announce@lists.x.org/msg01138.html A notice on suid USE flag. By default this USE flag is enabled and with unpatched xorg-server there is a security risk. Upstream recommendation is to disable suid USE. This can be achieved by: echo "x11-base/xorg-server -suid" >> /etc/portage/package.use emerge -1 xorg-server This will work in most cases, when login managers are used, such as GDM or similar. In case you are starting the X via xinit or startx, disable of suid USE may impact the X start. You can leave the suid USE turned on, as xorg-server has the vulnerability fix applied.
  2. Hello, dear Funtoo developers and users! Installing some packages that were not checked or that have not secure dependencies Portage warns about masked packages. But I used --autounmask-write option. Is it possible to see now which packages and libraries in my system were manually unmasked? Is it really possible to be familiar with those source codes? Please, give advise.
  3. Is there an equivalent function in funtoo for glsa-check? I'm still getting the hang of kits vs the portage tree, but as far as I can tell glsa-check always returns nothing since the meta-repo doesn't include the glsa notices.
  4. A new wireless attack techniques discovered. The weaknesses are in the Wi-Fi standard itself, and not in individual products or implementations. Therefore, any correct implementation of WPA2 is likely affected. To prevent the attack, users must update affected products as soon as security updates become available. Note that if your device supports Wi-Fi, it is most likely affected. More info here: https://www.krackattacks.com/
  5. https://forums.openvpn.net/topic17625.html
×