A flaw in the Linux kernel critical vulnerability, CVE-2025-38236, was found by Google Project Zero researcher Jann Horn. The bug enables attackers to privilege-escalate from inside the Chrome browser Linux renderer sandbox all the way to full kernel-level control. The bug is present in the MSG_OOB (out-of-band) feature of UNIX domain sockets, which was added in Linux 5.15 and is available in versions 6.9 and later. While seldom utilized—by Oracle applications alone—MSG_OOB was enabled by default and remained available in sandboxed environments as a result of poor syscall filtering. The bug creates a use-after-free (UAF) state that can be attacked by a carefully crafted series of socket operations, enabling arbitrary kernel memory access and privilege escalation. The weakness came from the obscure and little-used state of the MSG_OOB feature, which saw minimal review despite being turned on by default. Google Chrome's Linux sandbox failed to properly limit access to this capability, leaving a hole in isolation. Horn's in-depth attack on a Debian Trixie box employed sophisticated methods such as memory reallocation, mprotect tampering, and stack offset analysis to evade kernel protections. The bug also points to a weakness in automated fuzz testing; while Google's syzkaller found the bug, it needed complicated syscall chains, showing the tool's inability to thoroughly cover deeply nested or esoteric kernel behaviors. In order to minimize such risks, Linux distributions need to disable esoteric kernel features such as MSG_OOB by default unless they are specifically required. Sandboxed application developers also need to ensure strict review and hardening of syscall filtering policies to block access to infrequently used kernel features. Kernel maintainers should also perform more intensive audits of infrequently used subsystems, and enhance fuzzing tools such as syzkaller to find deeper code paths with fewer syscall dependencies. End users must update their systems immediately since patches have already been issued in the Linux kernel as well as Chrome to fix this vulnerability
Security researchers have identified a new variant of the SparkCat malware circulating on both the Apple App Store and Google Play Store, more than a year after its initial discove...
The European Union’s cybersecurity agency, CERT-EU, has attributed a significant cloud breach involving the European Commission to the TeamPCP threat group. The attack targeted t...
Microsoft has rolled out automatic updates for unmanaged Windows 11 24H2 Home and Pro edition devices to Windows 11 25H2, also known as the Windows 11 2025 Update. This transition ...