Announcing: Slashdot Deals - Explore geek apps, games, gadgets and more. (what is this?)

Thank you!

We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!



Some Linux Distros Found Vulnerable By Default

Chuck Bucket default settings (541 comments)

This all comes down to default settings in a distro; what will be the least burdensome setting without compromising too much security. With Gentoo things are made a bit more secure. As an example users aren't automatically added to the wheel group, so I think this issue is in line with that. Additionally, I'm running gentoo-2.4.28-hardened-r4 kernel, is there a setting within the kernel that would prevent this? I see CONFIG_BSD_PROCESS_ACCT which I do not have set, but is that all that would be needed, or is /etc/security/limits.conf the proper place to set this? (just trying to figure out if my server is vuln w/o trying it and crashing my server first).

I for one am glad this is out now, instead of after an exploit is out using it! I'm checking my Linux and FreeBSD servers at home tonight.


more than 9 years ago


Chuck Bucket hasn't submitted any stories.


Slashdot Login

Need an Account?

Forgot your password?