Patch Now or Panic Later: Critical Linux Vulnerabilities Demand Immediate Fix!
Attackers can exploit two new local privilege escalation vulnerabilities to root systems running major Linux distributions. Users must patch immediately, as the libblockdev/udisks flaw is like leaving your front door open with a welcome mat for hackers. Don’t let “allow_active” users become “allow all access” users. Patch those Linux systems now!

Hot Take:
In the epic saga of Linux vs. Hackers, it seems like the hackers have found the cheat code again. With two new vulnerabilities, it’s like the bad guys have discovered the backstage pass to the Linux concert. Get ready for the Linuxland Rollercoaster – it’s going to be a wild ride!
Key Points:
- Two LPE vulnerabilities in Linux, CVE-2025-6018 and CVE-2025-6019, were discovered, offering hackers a shortcut to root privileges.
- The first flaw was found in the PAM framework on openSUSE Leap 15 and SUSE Linux Enterprise 15.
- The second flaw was discovered in libblockdev, affecting most Linux distributions due to the default udisks daemon.
- Qualys developed proof-of-concept exploits and tested these successfully on multiple Linux distributions.
- Immediate patching is recommended to prevent root access, which could lead to system-wide compromise.
Already a member? Log in here