Category: Uncategorized
-

Upgrade to Kernel 6.17
Linux Kernel 6.16 Reaches End of Life, It’s Time to Upgrade to Linux Kernel 6.17Linux kernel 6.17 is already available in the stable repositories of various distributions, including openSUSE Tumbleweed and Arch Linux. This is your friendly reminder that, as of today, the Linux 6.16 kernel series has reached the end of its supported life,…
-

Critical Vulnerability on sudo
CISA Alert: Critical Vulnerability in Sudo 🚨 A new vulnerability has been added by CISA to the Known Exploited Vulnerabilities (KEV) catalog: 🔹 CVE-2025-32463CVSS Score: 9.3 (Critical) Affected: All Sudo versions prior to 1.9.17p1Platforms: All Linux distributions and Unix-like systems According to CISA:Sudo contains a flaw that allows third-party functionality to be invoked without proper…
-

Austrian Army switches to Libre Office
Austria’s Armed Forces Gets Rid of Microsoft Office (Mostly) for LibreOfficeThe Austrian military prioritizes independence over convenience. Governments around the world, especially European ones, are increasingly reacting to the threat of American-based services pulling the rug from under them. We have already seen many instances of this, like Denmark moving away from Microsoft or Germany…
-

HacktoberFest 2025!
Hacktoberfest 2025: Contribute to Open Source! October means Hacktoberfest—the global celebration of open source. Organized by DigitalOcean and partners, this event encourages developers to contribute to projects they use and support. (VanLUG thanks our Event Sponsor, Z-Space Vancouver! Co-working spaces where Art and Technology meet. Follow them here.) Open source thrives on collaboration. In 2024,…
-

Sudo Flaw Exploited
Organizations Warned of Exploited Sudo VulnerabilityThe vulnerability could allow local, low-privileged attackers to execute commands with root privileges, leading to full system compromise. The US cybersecurity agency CISA on Monday (September 29, 2025) warned that a recently patched local privilege escalation vulnerability in Sudo has been exploited in the wild. A command-line utility for Linux…
