LinuxSecurity.com – Hybrid RSS The central voice for Linux and Open Source security news.
- Mageia 2025-0326: golangby LinuxSecurity Advisories on December 13, 2025 at 5:46 am
MGASA-2025-0326 – Updated golang packages fix security vulnerabilities
- Mageia 2025-0104: codeblocksby LinuxSecurity Advisories on December 13, 2025 at 5:46 am
MGAA-2025-0104 – Updated codeblocks packages fix bug
- Fedora 41: apptainer 2025-df330356b2by LinuxSecurity Advisories on December 13, 2025 at 1:27 am
Apply fuse2fs patches that were accidentally empty Update to upstream 1.4.5, including a fix for CVE-2025-65105
- Fedora 43: apptainer 2025-cf169a01e8by LinuxSecurity Advisories on December 13, 2025 at 1:12 am
Apply fuse2fs patches that were accidentally empty Update to upstream 1.4.5, including a fix for CVE-2025-65105
- Fedora 42: apptainer 2025-ff963b3775by LinuxSecurity Advisories on December 13, 2025 at 12:50 am
Apply fuse2fs patches that were accidentally empty Update to upstream 1.4.5, including a fix for CVE-2025-65105
- openSUSE: 2025:4390-1 : rhinoby LinuxSecurity Advisories on December 12, 2025 at 8:30 pm
An update that solves one vulnerability can now be installed.
- AIs Quiet Move Into the Linux Kernel Raises New Linux Kernel Security Questionsby Brittany Day on December 9, 2025 at 3:12 am
AI-written patches are starting to land in kernel discussions, and the timing has people watching closely. The code looks ordinary at first glance, yet the review notes keep circling the same point: something in the logic feels off. Kernel developers are treating it as a Linux kernel security issue because intent gets harder to read when the author is essentially a model working from patterns instead of lived experience.
- Understanding Firewall Rule Order and Its Impact on Traffic Decisionsby MaK Ulac on December 8, 2025 at 11:06 am
Firewall rule order shapes how a firewall makes decisions. The system checks each rule in a specific sequence, and that sequence affects whether traffic is allowed or denied. People often expect one rule to take effect, then watch another one shape the decision instead. The list is usually the reason.
- Secure Boot: Strengthening Linux System Integrity from the Firmware Upby Brittany Day on December 5, 2025 at 3:19 am
Secure Boot sits at the point where firmware and operating system trust intersect, and it decides what code is allowed to start the machine. Most systems treat it like background plumbing, but it has a direct influence on Linux security best practices because it defines whether the kernel you think you are running is actually the one that loads. When it works as intended, it gives you a predictable baseline for the rest of the stack. When it doesn’t, the failure usually shows up in places that are hard to diagnose and even harder to monitor.
- The Hidden Linux Memory Leaks Undermining Your Hardening Effortsby Brittany Day on December 2, 2025 at 3:35 am
Out-of-bounds reads aren’t flashy, but they sit close to the root of a lot of quiet trouble in Linux security. The bug shows up when software pulls data past a buffer’s edge and exposes pieces of memory it never meant to share. Most of the time, the leak feels small. Sometimes it hands over the kind of detail an attacker can fold into an ASLR bypass used to execute malicious code or a later privilege move.













