Featured Linux Articles

Need an in-depth introduction to a new security topic? Our features articles will bring up up-to-date on everything from buffer overflows to SE Linux policy development.

Discover LinuxSecurity Features

Linux: Tee.Fail Moderate TEE Side-Channel Attack for 2024-001

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The tee.fail attack targets how Linux handles trusted execution environments. Think of it as a way to peek inside hardware-backed enclaves that should be locked tight. The attack plays with timing and cache behavior to pull data from those protected spaces, and researchers proved it works without needing full kernel access. That’s what makes it unsettling — it sidesteps the layers we usually rely on to keep sensitive code and keys safe.

Contribute to LinuxSecurity

Don’t sit on the sidelines of history. Join the Linux Security community
and write real news & articles about Linux that matters the most.

Why Software Supply Chain Security Matters in Linux Systems

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

For Linux users, software supply chain security means protecting the entire path from source to install. It covers who authors and reviews the code, how it is built, how artifacts and metadata are signed, where they are mirrored, and which keys the client trusts. In short: provenance, freshness, and scoped trust across the package pipeline.