![Linux updated](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/31164611/linux-1500-updated-patch-400x200.webp)
XZ Utils backdoor update: Which Linux distros are affected and what can you do?
UPDATE: April 9, 09:23 AM ET A new story has been published: XZ Utils backdoor: Detection tools, scripts, rules The news that XZ Utils, a compression utility present in most …
![Linux alert](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/29183422/linux-alert-1500-2-400x200.webp)
Beware! Backdoor found in XZ utilities used by many Linux distros (CVE-2024-3094)
UPDATE: April 9, 09:23 AM ET Two stories have been published since this initial release: Which Linux distros are affected and what can you do? XZ Utils backdoor: Detection …
![Curl](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/10083338/curl-logo2-400x200.jpg)
Curl project squashes high-severity bug in omnipresent libcurl library (CVE-2023-38545)
Curl v8.4.0 is out, and fixes – among other things – a high-severity SOCKS5 heap buffer overflow vulnerability (CVE-2023-38545). Appropriate patches for some older …
![Linux](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103829/Linux2-400x200.jpg)
GNOME users at risk of RCE attack (CVE-2023-43641)
If you’re running GNOME on you Linux system(s), you are probably open to remote code execution attacks via a booby-trapped file, thanks to a memory corruption …
![Linux](https://img.helpnetsecurity.com/wp-content/uploads/2022/06/10122853/linux-red-danger-400x200.jpg)
“Looney Tunables” bug allows root access on Linux distros (CVE-2023-4911)
A vulnerability (CVE-2023-4911) in the GNU C Library (aka “glibc”) can be exploited by attackers to gain root privileges on many popular Linux distributions, …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093741/danger1-400x200.jpg)
Google “confirms” that exploited Chrome zero-day is actually in libwebp (CVE-2023-5129)
UPDATE (September 28, 2023, 03:15 a.m. ET): The CVE-2023-5129 ID has been either rejected or withdrawn by the CVE Numbering Authority (Google), since it’s a duplicate of …
![intel](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/09115818/intel-1400-400x200.jpg)
Downfall attacks can gather passwords, encryption keys from Intel processors
A variety of Intel Core processors and the devices using them are vulnerable to “Downfall”, a new class of attacks made possible by CVE-2022-40982, which enables …
![Linux](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103829/Linux2-400x200.jpg)
Nimbuspwn bugs allow attackers to gain root privileges on some Linux machines (CVE-2022-29799, CVE-2022-29800)
Microsoft has unearthed two security vulnerabilities (CVE-2022-29799, CVE-2022-29800) in the networkd-dispatcher daemon that may be exploited by attackers to gain root on many …
![Linux](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103831/linux-400x200.jpg)
Easily exploitable Linux bug gives root access to attackers (CVE-2022-0847)
An easily exploitable vulnerability (CVE-2022-0847) in the Linux kernel can be used by local unprivileged users to gain root privileges on vulnerable systems by taking …
![linux tux](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195038/linux-tux-400x200.jpg)
PolKit vulnerability can give attackers root on many Linux distros (CVE-2021-4034)
A memory corruption vulnerability (CVE-2021-4034) in PolKit, a component used in major Linux distributions and some Unix-like operating systems, can be easily exploited by …
![Linux](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103829/Linux2-400x200.jpg)
Researchers flag 7-years-old privilege escalation flaw in Linux kernel (CVE-2021-33909)
A vulnerability (CVE-2021-33909) in the Linux kernel’s filesystem layer that may allow local, unprivileged attackers to gain root privileges on a vulnerable host has been …
RemotePC adds new features for Linux remote access
RemotePC has updated their remote access for Linux offering with new features: Linux Remote Sound – enables users to listen to audio files from the remote machine on …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD