<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<atom:link href="https://dev1galaxy.org/extern.php?action=feed&amp;tid=6064&amp;type=rss" rel="self" type="application/rss+xml" />
		<title><![CDATA[Dev1 Galaxy Forum / Gnome vulnerability found]]></title>
		<link>https://dev1galaxy.org/viewtopic.php?id=6064</link>
		<description><![CDATA[The most recent posts in Gnome vulnerability found.]]></description>
		<lastBuildDate>Thu, 26 Oct 2023 23:39:48 +0000</lastBuildDate>
		<generator>FluxBB</generator>
		<item>
			<title><![CDATA[Re: Gnome vulnerability found]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=45116#p45116</link>
			<description><![CDATA[<div class="quotebox"><cite>UnixMan1230 wrote:</cite><blockquote><div><p>Leave it to GNOME to break things (again). Bad enough that they broke extensions for the umpteenth time, now they&#039;re also getting ready to push wayland-only in the future.</p><p>Link to the article:<br /><a href="https://news.itsfoss.com/gnome-wayland-xorg/" rel="nofollow">https://news.itsfoss.com/gnome-wayland-xorg/</a></p><p>Unless wayland gets it together with NVIDIA cards (Which is a startling number of PC&#039;s these days), I can see this ending badly for users of that brand. Then again, when was NVIDIA ever really kind towards Linux?....</p></div></blockquote></div><p>Recently, they have been more kind, although that might not mean much.</p><p>Gnome on the other hand, those devs are poison and should be barred from adding their bloat to other communities. Just say no to bloat.</p>]]></description>
			<author><![CDATA[dummy@example.com (zapper)]]></author>
			<pubDate>Thu, 26 Oct 2023 23:39:48 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=45116#p45116</guid>
		</item>
		<item>
			<title><![CDATA[Re: Gnome vulnerability found]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=44986#p44986</link>
			<description><![CDATA[<p>Leave it to GNOME to break things (again). Bad enough that they broke extensions for the umpteenth time, now they&#039;re also getting ready to push wayland-only in the future.</p><p>Link to the article:<br /><a href="https://news.itsfoss.com/gnome-wayland-xorg/" rel="nofollow">https://news.itsfoss.com/gnome-wayland-xorg/</a></p><p>Unless wayland gets it together with NVIDIA cards (Which is a startling number of PC&#039;s these days), I can see this ending badly for users of that brand. Then again, when was NVIDIA ever really kind towards Linux?....</p>]]></description>
			<author><![CDATA[dummy@example.com (UnixMan1230)]]></author>
			<pubDate>Sat, 21 Oct 2023 19:16:05 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=44986#p44986</guid>
		</item>
		<item>
			<title><![CDATA[Re: Gnome vulnerability found]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=44922#p44922</link>
			<description><![CDATA[<p>Not to mention, even XFCE4 and MATE, LXQT, etc... all are bright and shiny enough as it is. Most DEs have too many linux framework dependencies that aren&#039;t reasonable. Even Lumina looks semi flashy, but I could see myself using it at least... <img src="https://dev1galaxy.org/img/smilies/tongue.png" width="15" height="15" alt="tongue" /></p><p>CDE is a bit too dull for me, but I probably will mostly stick to the following:</p><p>JWM</p><p>Btw, I recently am now using startx to start some of my operating systems with. I have done so in Hyperbola, wondering if the same method works in devuan though.</p><p>Does this work for devuan:</p><p>&#160; &#160; &#160; &#160; #!/bin/sh<br />&#160; &#160; &#160; &#160; #<br />&#160; &#160; &#160; &#160; # ~/.xinitrc<br />&#160; &#160; &#160; &#160; #<br />&#160; &#160; &#160; &#160; # Executed by startx (run your window manager from here)<br />&#160; &#160; &#160; &#160; #<br />&#160; &#160; &#160; &#160; # exec enlightenment_start<br />&#160; &#160; &#160; &#160; # exec i3<br />&#160; &#160; &#160; &#160; # exec awesome<br />&#160; &#160; &#160; &#160; # exec bspwm<br />&#160; &#160; &#160; &#160; # exec startfluxbox<br />&#160; &#160; &#160; &#160; # exec openbox-session<br />&#160; &#160; &#160; &#160; # exec pekwm<br />&#160; &#160; &#160; &#160; # exec dwm<br />&#160; &#160; &#160; &#160; # exec icewm-session<br />&#160; &#160; &#160; &#160; &#160; &#160;exec jwm<br />&#160; &#160; &#160; &#160; # exec notion<br />&#160; &#160; &#160; &#160; # exec evilwm</p><p>And then when I press startx in a logged in user in terminal, it would start?</p><p>or adding startx to the bottom of&#160; a .bash_profile&#160; like this:</p><p>&#160; GNU nano 5.2&#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; .bash_profile&#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; &#160; Modified&#160; <br />#<br /># ~/.bash_profile<br />#</p><p>[[ -f ~/.bashrc ]] &amp;&amp; . ~/.bashrc<br />startx &amp;&amp; exit</p><p>Sorry if off topic, just curious.</p>]]></description>
			<author><![CDATA[dummy@example.com (zapper)]]></author>
			<pubDate>Tue, 17 Oct 2023 20:41:55 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=44922#p44922</guid>
		</item>
		<item>
			<title><![CDATA[Re: Gnome vulnerability found]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=44815#p44815</link>
			<description><![CDATA[<p>Hello:</p><div class="quotebox"><cite>boughtonp wrote:</cite><blockquote><div><p>... article link and a bit of information...</p></div></blockquote></div><p>Yes, sorry about that.<br />Posted in a hurry.</p><div class="quotebox"><cite>zapper wrote:</cite><blockquote><div><p>Too much eye candy = fisher price ugliness.</p></div></blockquote></div><p>I&#039;d say <em>needless</em> eye candy+associated bloat = lack of Linux sense.<br />There&#039;s plenty of MS stuff for that.</p><p>A.</p>]]></description>
			<author><![CDATA[dummy@example.com (Altoid)]]></author>
			<pubDate>Tue, 10 Oct 2023 21:41:59 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=44815#p44815</guid>
		</item>
		<item>
			<title><![CDATA[Re: Gnome vulnerability found]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=44814#p44814</link>
			<description><![CDATA[<p>Gnome makes me think of the idea of making a linux desktop environment look like a fisher price product. </p><p>Say it with me...</p><p>U-G-L-Y!</p><p>Actually, most desktop environments, but ones like KDE5 Gnome3 Cinnamon all are on the top of the no way in hell will I ever use even on devuan.</p><p>I don&#039;t like most desktop environments, even Lumina, which at least is a neutral one for me.</p><p>Too much eye candy = fisher price ugliness.</p>]]></description>
			<author><![CDATA[dummy@example.com (zapper)]]></author>
			<pubDate>Tue, 10 Oct 2023 21:02:58 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=44814#p44814</guid>
		</item>
		<item>
			<title><![CDATA[Re: Gnome vulnerability found]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=44810#p44810</link>
			<description><![CDATA[<p>Here&#039;s the article link and a bit of information...</p><p><a href="https://www.theregister.com/2023/10/10/linux_gnome_libcue_exploit/" rel="nofollow">//www.theregister.com/2023/10/10/linux_gnome_libcue_exploit</a></p><div class="quotebox"><cite>https://www.theregister.com/2023/10/10/linux_gnome_libcue_exploit/ wrote:</cite><blockquote><div><p>Researchers discovered a high-severity remote code execution (RCE) vulnerability in an inherent component of GNOME-based Linux distros, potentially impacting a huge number of users.</p><p>Tracked as CVE-2023-43641, exploiting the vulnerability in the relatively small libcue library takes advantage of the tracker-miners application to facilitate a one-click RCE attack.</p><p>The issue is thought to affect all GNOME-based distros, including RHEL, SUSE, and Debian, but has only been proven to work on the latest versions of Ubuntu and Fedora so far.</p><p>A user just has to download a file and have it stored in a commonly scanned directory, such as the downloads, music, or videos folders, and the attacker can achieve RCE on their machine.</p></div></blockquote></div><p>Debian/Devuan security status: <a href="https://security-tracker.debian.org/tracker/CVE-2023-43641" rel="nofollow">//security-tracker.debian.org/tracker/CVE-2023-43641</a></p>]]></description>
			<author><![CDATA[dummy@example.com (boughtonp)]]></author>
			<pubDate>Tue, 10 Oct 2023 17:10:06 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=44810#p44810</guid>
		</item>
		<item>
			<title><![CDATA[Gnome vulnerability found]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=44809#p44809</link>
			<description><![CDATA[<p>Hello:</p><p>Just a heads-up.<br />Found this at The Register this morning:</p><div class="quotebox"><cite>Connor Jones at The Register wrote:</cite><blockquote><div><p><strong>Researcher bags two-for-one deal on Linux bugs while probing GNOME component<br /></strong>One-click exploit could potentially affect most major distros.</p></div></blockquote></div><p>Wouldn&#039;t ever use Gnome but some people do.<br /><span class="bbc">libcue2</span> is present in the Devuan repositories and in my box because of <span class="bbc">audacious-plugins</span>.</p><div class="codebox"><pre><code>~$ apt list | grep libcue
libcue-dev/oldoldstable 2.2.1-2 amd64
libcue-dev/oldoldstable 2.2.1-2 i386
libcue2/oldoldstable,now 2.2.1-2 amd64 [installed,automatic]
libcue2/oldoldstable 2.2.1-2 i386
~$ </code></pre></div><p>Should get fixed soon.<br />Best,</p><p>A.</p>]]></description>
			<author><![CDATA[dummy@example.com (Altoid)]]></author>
			<pubDate>Tue, 10 Oct 2023 16:27:28 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=44809#p44809</guid>
		</item>
	</channel>
</rss>
