The central voice for Linux and Open Source security news.
Imagine this scenario: you're managing Linux servers that host critical applications, where uptime is everything and security is non-negotiable. You're diligent about patching, monitoring, and hardening your systems against threats, but a breach occurs anyway. It's not flashy like a ransomware attack , nor is it obvious like failed login attempts''it's hidden in plain sight. Someone found a way to elevate their access quietly, bypassing all the restrictions intended to keep users in their lane. That's privilege escalation''a type of vulnerability that doesn't kick in at step one of an attack but often paves the way for the worst-case scenario.
Let's talk about a threat that's smart, sneaky, and dangerous to your Linux systems: rootkits. If you've ever heard the term tossed around and wondered what a rootkit is and why it's such a headache, you're in the right place. These are not your usual malware nuisances ''they're tools that let attackers dig into a system, stay hidden for the long game, and potentially wreak havoc without leaving many breadcrumbs. For Linux admins and infosec pros, rootkits aren't just pests; they're an adversary that requires awareness, vigilance, and a specific approach to deal with.
Template email is more than a design tool in the campaign of consistent communication; it also has a hidden danger.
Containers were never just a convenience''they were a promise. A promise of isolation, security, and the ability to run workloads in confined, controlled environments where nothing leaks, nothing escapes, and the risks to the host system remain minimal. But when that promise is broken, when the boundaries between a container and the underlying host collapse, the implications are severe. That's exactly what the vulnerabilities addressed in Docker Desktop 4.44.3 threaten to do. These flaws don't just challenge best practices''they actively undermine the fundamental assurances Docker containers were designed to provide.
Update to 139.0.7258.154 CVE-2025-9478: Use after free in ANGLE
CVE-2025-8067 Out-Of-Bounds Read in UDisks Daemon
Update to release v0.27.0 Resolves: rhvz#2388453, rhbz#2384137, rhbz#2384154 Upstream new features and fixes
CVE-2025-8010: Type Confusion in V8 CVE-2025-8011: Type Confusion in V8 CVE-2025-8576: Use after free in Extensions CVE-2025-8578: Use after free in Cast CVE-2025-8579: Inappropriate implementation in Gemini Live in Chrome
Remove prebuild libffts.a library
New udisks2 packages are available for Slackware 15.0 and -current to fix a security issue.