Linux, plaintext & minimalism

Notice: This blog have moved to hunden.linuxkompis.se. Read more about it here: My blog have a new home and a new address.

February 6, 2019

How to stay updated about security vulnerabilities on Gentoo Linux

One of the most basic and probably one of the most important thing you can do to keep your system less insecure, is to simply keep it updated. But—for obvious reasons—installing every single update might not always be the most desirable for thing for some users running Gentoo Linux.

Keeping yourself updated on all the possible security vulnerabilities for your packages isn’t an easy or fun task though. Thanks to the website Gentoo Linux Security Advisories (GLSA) that’s not an issue! All the security vulnerabilities and its solutions for Gentoo Linux gets published there for easy access.

And besides visiting the website itself, there’s also 3 optional and handy ways of easily staying informed about the news there; via a handy command-line tool, via e-mail and via two news feeds.

All the information mentioned below can be found on their website here: Stay informed – Gentoo Linux.

The command-line tool

The tool glsa-check comes bundled with the package app-portage/gentoolkit and it can check if any of your installed packages is affected:

$ glsa-check -t affected
This system is not affected by any of the listed GLSAs

It can do a few other things as well. To list all the available options just run glsa-check without any arguments.


All advisories are posted to the gentoo-announce mailing list. You can subscribe by sending an emtpy e-mail to gentoo-announce+subscribe@lists.gentoo.org. A confirmation e-mail will be sent back to you and you need to reply to the message to complete the subscription.

News feeds

They also offer two news feeds that you can subscribe to:

Tags: Gentoo Linux | Security


I don't have a commenting system simply because I haven't found a solution that I like. If you want to leave any feedback and/or have any questions, feel free to contact me either via e-mail, fediverse, XMPP or IRC (I'm Hund at freenode.net).