Linux.com RSS Feed
To view each : SHIFT then click item

LinuxSecurity.com - Hybrid RSS

The central voice for Linux and Open Source security news.

What Is a Privilege Escalation Vulnerability? 8.27.2025

Imagine this scenario: you're managing Linux servers that host critical applications, where uptime is everything and security is non-negotiable. You're diligent about patching, monitoring, and hardening your systems against threats, but a breach occurs anyway. It's not flashy like a ransomware attack , nor is it obvious like failed login attempts''it's hidden in plain sight. Someone found a way to elevate their access quietly, bypassing all the restrictions intended to keep users in their lane. That's privilege escalation''a type of vulnerability that doesn't kick in at step one of an attack but often paves the way for the worst-case scenario.

Linux Rootkits: Detecting, Preventing, and Surviving an Attack 8.26.2025

Let's talk about a threat that's smart, sneaky, and dangerous to your Linux systems: rootkits. If you've ever heard the term tossed around and wondered what a rootkit is and why it's such a headache, you're in the right place. These are not your usual malware nuisances ''they're tools that let attackers dig into a system, stay hidden for the long game, and potentially wreak havoc without leaving many breadcrumbs. For Linux admins and infosec pros, rootkits aren't just pests; they're an adversary that requires awareness, vigilance, and a specific approach to deal with.

Cybersecurity Best Practices for Email Templates Enhancing Data Security 8.28.2025

Template email is more than a design tool in the campaign of consistent communication; it also has a hidden danger.

New Docker Vulns Threaten Container Escape, Host Machine Compromise 8.26.2025

Containers were never just a convenience''they were a promise. A promise of isolation, security, and the ability to run workloads in confined, controlled environments where nothing leaks, nothing escapes, and the risks to the host system remain minimal. But when that promise is broken, when the boundaries between a container and the underlying host collapse, the implications are severe. That's exactly what the vulnerabilities addressed in Docker Desktop 4.44.3 threaten to do. These flaws don't just challenge best practices''they actively undermine the fundamental assurances Docker containers were designed to provide.

Fedora 41: chromium Critical Use After Free CVE-2025-9478 Advisory 8.30.2025

Update to 139.0.7258.154 CVE-2025-9478: Use after free in ANGLE

Fedora 42: UDisks2 Vulnerability CVE-2025-8067 Out-Of-Bounds Read Issue 8.30.2025

CVE-2025-8067 Out-Of-Bounds Read in UDisks Daemon

Fedora 42: Important Information Leak in docker-buildx v0.27.0 Resolved 8.30.2025

Update to release v0.27.0 Resolves: rhvz#2388453, rhbz#2384137, rhbz#2384154 Upstream new features and fixes

Fedora 42: CEF Critical Type Confusion Issues CVE-2025-8010 2025-b7cb89ddd3 8.30.2025

CVE-2025-8010: Type Confusion in V8 CVE-2025-8011: Type Confusion in V8 CVE-2025-8576: Use after free in Extensions CVE-2025-8578: Use after free in Cast CVE-2025-8579: Inappropriate implementation in Gemini Live in Chrome

Fedora 42: rocm-rpp Library Update - Remove libffts.a 2025-ca3edc5c88 8.30.2025

Remove prebuild libffts.a library

Slackware 15.0: udisks2 Critical Local Escalation Fix SSA:2025-242-01 8.30.2025

New udisks2 packages are available for Slackware 15.0 and -current to fix a security issue.


© 1997-2025 hackerzinc
All rights reserved.