The central voice for Linux and Open Source security news.
The tee.fail attack targets how Linux handles trusted execution environments. Think of it as a way to peek inside hardware-backed enclaves that should be locked tight. The attack plays with timing and cache behavior to pull data from those protected spaces, and researchers proved it works without needing full kernel access. That's what makes it unsettling '' it sidesteps the layers we usually rely on to keep sensitive code and keys safe.
I've been around Linux long enough to stop expecting much from intro books. Most of them walk through commands '' maybe a few flags '' and never explain why those commands behave the way they do. You end up memorizing steps instead of understanding the system underneath.
Linux just cleared 5% of the U.S. desktop market, based on recent Linux adoption statistics. That's small in absolute terms but meaningful if you've watched the curve over the years. Linux used to sit in racks and lab machines '' out of sight, mostly stable, rarely targeted. Now it's on more workstations, inside environments that weren't built with it in mind.
SonicWall confirmed a breach in its cloud backup system that exposed customer configuration files. It's the kind of incident that looks small until you see what was taken. Inside those backups were network layouts, VPN details, and even admin credentials.
An update that solves one vulnerability can now be installed.
* bsc#1249473 Cross-References: * CVE-2025-48041
* bsc#1252414 * bsc#1252417 Cross-References: * CVE-2025-53057
* bsc#1252414 * bsc#1252417 Cross-References: * CVE-2025-53057
An update that solves two vulnerabilities can now be installed.
An update that solves five vulnerabilities and has one security fix can now be installed.