Tails Linux introduces reforms in security audit postmortem to make you safer When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works. Tails Linux introduces reforms in security audit postmortem..."> Tails Linux introduces reforms in security audit postmortem to make you safer When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works. Tails Linux introduces reforms in security audit postmortem..." /> Tails Linux introduces reforms in security audit postmortem to make you safer When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works. Tails Linux introduces reforms in security audit postmortem..." />

Upgrade to Pro

Tails Linux introduces reforms in security audit postmortem to make you safer

When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.

Tails Linux introduces reforms in security audit postmortem to make you safer

Paul Hill

Neowin
@ziks_99 ·

May 17, 2025 10:16 EDT

Alongside the release of Tails 6.11 earlier this year, the Tails Project revealed that Radically Open Security was auditing the Tails operating system to better protect users. The audit has now concluded and no remote code vulnerabilities were found.
The only issues that were found required a compromised low-privileged amnesia user, which is the default account in Tails. Luckily for users, the Tails developers are quick on their toes and asked for information about the vulnerabilities before the report was published and released fixes for the discovered issues, which users now already enjoy.
Here’s an overview of what was fixed:

ID
Impact
Description
Issue
Status
Release

OTF-001

High

Local privilege escalation in Tails Upgrader

#20701
Fixed
6.11

OTF-002

High

Arbitrary code execution in Python scripts

#20702
Fixed
6.11

#20744
Fixed
6.12

OTF-003

Moderate

Argument injection in privileged GNOME scripts

#20709
Fixed
6.11

#20710
Fixed
6.11

OTF-004

Low

Untrusted search path in Tor Browser launcher

#20733
Fixed
6.12

Following the fixing of the bugs, the Tails team also did a postmortem of the audit to find out what cultural things need to change and which technical things need to be changed that had a role in allowing the entry of bugs into the operating system in the first place.
The major cultural change that Tails has adopted is how it shares vulnerabilities with the public. So far, it said it has been too secretive about vulnerabilities, but going forward, has adopted the security issue response policy based on the policy of the Tor Project’s Network Team.
It also found that refactoring large amounts of code can also be a way in for security bugs so from now on it will be more intentional and only do large refactoring when it’s worth the effort and risk.
For anyone running Tails, these are extremely positive developments. Tails is used by all sorts of people for sensitive work, so knowing that it’s being proactive on security is reassuring.
Source: Tails

Tags

Report a problem with article

Follow @NeowinFeed
#tails #linux #introduces #reforms #security
Tails Linux introduces reforms in security audit postmortem to make you safer
When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works. Tails Linux introduces reforms in security audit postmortem to make you safer Paul Hill Neowin @ziks_99 · May 17, 2025 10:16 EDT Alongside the release of Tails 6.11 earlier this year, the Tails Project revealed that Radically Open Security was auditing the Tails operating system to better protect users. The audit has now concluded and no remote code vulnerabilities were found. The only issues that were found required a compromised low-privileged amnesia user, which is the default account in Tails. Luckily for users, the Tails developers are quick on their toes and asked for information about the vulnerabilities before the report was published and released fixes for the discovered issues, which users now already enjoy. Here’s an overview of what was fixed: ID Impact Description Issue Status Release OTF-001 High Local privilege escalation in Tails Upgrader #20701 Fixed 6.11 OTF-002 High Arbitrary code execution in Python scripts #20702 Fixed 6.11 #20744 Fixed 6.12 OTF-003 Moderate Argument injection in privileged GNOME scripts #20709 Fixed 6.11 #20710 Fixed 6.11 OTF-004 Low Untrusted search path in Tor Browser launcher #20733 Fixed 6.12 Following the fixing of the bugs, the Tails team also did a postmortem of the audit to find out what cultural things need to change and which technical things need to be changed that had a role in allowing the entry of bugs into the operating system in the first place. The major cultural change that Tails has adopted is how it shares vulnerabilities with the public. So far, it said it has been too secretive about vulnerabilities, but going forward, has adopted the security issue response policy based on the policy of the Tor Project’s Network Team. It also found that refactoring large amounts of code can also be a way in for security bugs so from now on it will be more intentional and only do large refactoring when it’s worth the effort and risk. For anyone running Tails, these are extremely positive developments. Tails is used by all sorts of people for sensitive work, so knowing that it’s being proactive on security is reassuring. Source: Tails Tags Report a problem with article Follow @NeowinFeed #tails #linux #introduces #reforms #security
WWW.NEOWIN.NET
Tails Linux introduces reforms in security audit postmortem to make you safer
When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works. Tails Linux introduces reforms in security audit postmortem to make you safer Paul Hill Neowin @ziks_99 · May 17, 2025 10:16 EDT Alongside the release of Tails 6.11 earlier this year, the Tails Project revealed that Radically Open Security was auditing the Tails operating system to better protect users. The audit has now concluded and no remote code vulnerabilities were found. The only issues that were found required a compromised low-privileged amnesia user, which is the default account in Tails. Luckily for users, the Tails developers are quick on their toes and asked for information about the vulnerabilities before the report was published and released fixes for the discovered issues, which users now already enjoy. Here’s an overview of what was fixed: ID Impact Description Issue Status Release OTF-001 High Local privilege escalation in Tails Upgrader #20701 Fixed 6.11 OTF-002 High Arbitrary code execution in Python scripts #20702 Fixed 6.11 #20744 Fixed 6.12 OTF-003 Moderate Argument injection in privileged GNOME scripts #20709 Fixed 6.11 #20710 Fixed 6.11 OTF-004 Low Untrusted search path in Tor Browser launcher #20733 Fixed 6.12 Following the fixing of the bugs, the Tails team also did a postmortem of the audit to find out what cultural things need to change and which technical things need to be changed that had a role in allowing the entry of bugs into the operating system in the first place. The major cultural change that Tails has adopted is how it shares vulnerabilities with the public. So far, it said it has been too secretive about vulnerabilities, but going forward, has adopted the security issue response policy based on the policy of the Tor Project’s Network Team. It also found that refactoring large amounts of code can also be a way in for security bugs so from now on it will be more intentional and only do large refactoring when it’s worth the effort and risk. For anyone running Tails, these are extremely positive developments. Tails is used by all sorts of people for sensitive work, so knowing that it’s being proactive on security is reassuring. Source: Tails Tags Report a problem with article Follow @NeowinFeed