News & Information       http://info.owt.com

Linux

04/07/2026   LinuxSecurity.com
New version 3.0.3 (rhbz#2451141) Fixes CVE-2026-3608 (rhbz#2451621)
04/07/2026   LinuxSecurity.com
Security fix for CVE-2026-35091 and CVE-2026-35092
04/07/2026   LinuxSecurity.com
Fix several low-priority CVEs Build with new Gnulib
04/07/2026   LinuxSecurity.com
Update goose to fix fedora#2449678
04/07/2026   LinuxSecurity.com
version bumped from 1.15.1 to 1.15.2
04/07/2026   LinuxSecurity.com
New version 3.0.3 (rhbz#2451141) Fixes CVE-2026-3608 (rhbz#2451621)
04/02/2026   Linux Journal
MX Linux Pushes Back Against Age Verification: A Stand for Privacy and Open Source Principles

The MX Linux project has taken a firm stance in a growing controversy across the Linux ecosystem: mandatory age-verification requirements at the operating system level. In a recent update, the team made it clear, they have no intention of implementing such measures, citing concerns over privacy, practicality, and the core philosophy of open-source software.

As governments begin introducing laws that could require operating systems to collect user age data, MX Linux is joining a group of projects resisting the shift.

What Sparked the Debate?

The discussion around age verification stems from new legislation, particularly in regions like the United States and Brazil, that aims to protect minors online. These laws may require operating systems to:

  • Collect user age or date of birth during setup
  • Provide age-related data to applications
  • Enable content filtering based on age categories

At the same time, underlying Linux components such as systemd have already begun exploring technical changes, including storing birthdate fields in user records to support such requirements.

MX Linux Says “No” to Age Verification

In response, the MX Linux team has clearly rejected the idea of integrating age verification into their distribution. Their reasoning is rooted in several key concerns:

  • User privacy: Collecting age data introduces sensitive personal information into systems that traditionally avoid such tracking
  • Feasibility: Implementing consistent, secure age verification across a decentralized OS ecosystem is highly complex
  • Philosophy: Open-source operating systems are not designed to act as data collectors or gatekeepers

The developers emphasized that they do not want to burden users with intrusive requirements and instead encouraged concerned individuals to direct their efforts toward policymakers rather than Linux projects.

A Broader Resistance in the Linux Community

MX Linux is not alone. The Linux world is divided on how, or whether, to respond to these regulations.

Some projects are exploring compliance, while others are pushing back entirely. In fact, age verification laws have sparked:

  • Strong debate among developers and maintainers
  • Concerns about enforceability on open-source platforms
  • New projects explicitly created to resist such requirements

In some extreme cases, distributions have even restricted access in certain regions to avoid legal complications.

Why This Matters

At its core, this issue goes beyond a single feature, it raises fundamental questions about what an operating system should be.

Linux has long stood for:

03/31/2026   Linux Journal
LibreOffice Drives Europe’s Open Source Shift: A Growing Push for Digital Sovereignty

LibreOffice is increasingly at the center of Europe’s push toward open-source adoption and digital independence. Backed by The Document Foundation, the widely used office suite is playing a key role in helping governments, institutions, and organizations reduce reliance on proprietary software while strengthening control over their digital infrastructure.

Across the European Union, this shift is no longer experimental, it’s becoming policy.

A Broader Movement Toward Open Source

Europe has been steadily moving toward open-source technologies for years, but recent developments show clear acceleration. Governments and public institutions are actively transitioning away from proprietary platforms, often citing concerns about vendor lock-in, cost, and data control.

According to recent industry data, European organizations are adopting open source faster than their U.S. counterparts, with vendor lock-in concerns cited as a major driver.

LibreOffice sits at the center of this trend as a mature, fully open-source alternative to traditional office suites.

LibreOffice as a Strategic Tool

LibreOffice isn’t just another productivity application, it has become a strategic component in Europe’s digital policy framework.

The software:

  • Is fully open source and community-driven
  • Supports open standards like OpenDocument Format (ODF)
  • Allows governments to avoid dependency on specific vendors
  • Enables long-term control over data and infrastructure

These characteristics align closely with the European Union’s broader strategy to promote interoperability and transparency through open standards.

Government Adoption Across Europe

LibreOffice adoption is already happening at scale across multiple countries and sectors.

Examples include:

  • Germany (Schleswig-Holstein): transitioning tens of thousands of government systems to Linux and LibreOffice
  • Denmark: replacing Microsoft Office in public institutions as part of a broader digital sovereignty initiative
  • France and Italy: deploying LibreOffice across ministries and defense organizations
  • Spain and local governments: adopting LibreOffice to standardize workflows and reduce costs

In some cases, migrations involve hundreds of thousands of systems, demonstrating that open-source office software is viable at national scale.

03/26/2026   Linux Journal
From Linux to Blockchain: The Infrastructure Behind Modern Financial Systems

The modern internet is built on open systems. From the Linux kernel powering servers worldwide to the protocols that govern data exchange, much of today’s digital infrastructure is rooted in transparency, collaboration, and decentralization. These same principles are now influencing a new frontier: financial systems built on blockchain technology.

For developers and system architects familiar with Linux and open-source ecosystems, the rise of cryptocurrency is not just a financial trend, it is an extension of ideas that have been evolving for decades.

Open-Source Foundations and Financial Innovation

Linux has long demonstrated the power of decentralized development. Instead of relying on a single authority, it thrives through distributed contributions, peer review, and community-driven improvement.

Blockchain technology follows a similar model. Networks like Bitcoin operate on open protocols, where consensus is achieved through distributed nodes rather than centralized control. Every transaction is verified, recorded, and made transparent through cryptographic mechanisms.

For those who have spent years working within Linux environments, this architecture feels familiar. It reflects a shift away from trust-based systems toward verification-based systems.

Understanding the Stack: Nodes, Protocols, and Interfaces

At a technical level, cryptocurrency systems are composed of multiple layers. Full nodes maintain the blockchain, validating transactions and ensuring network integrity. Lightweight clients provide access to users without requiring full data replication. On top of this, exchanges and platforms act as interfaces that connect users to the underlying network.

For developers, interacting with these systems often involves APIs, command-line tools, and automation scripts, tools that are already integral to Linux workflows. Managing wallets, verifying transactions, and monitoring network activity can all be integrated into existing development environments.

03/24/2026   Linux Journal
Firefox 149 Arrives with Built-In VPN, Split View, and Smarter Browsing Tools

Mozilla has officially released Firefox 149.0, bringing a mix of new productivity features, privacy enhancements, and interface improvements. Released on March 24, 2026, this update continues Firefox’s steady push toward a more modern and user-focused browsing experience.

Rather than focusing on a single headline feature, Firefox 149 introduces several practical tools designed to improve how users multitask, stay secure, and interact with the web.

Built-In VPN Comes to Firefox

One of the most notable additions in Firefox 149 is the introduction of a built-in VPN feature. This optional tool provides users with an added layer of privacy while browsing, helping mask IP addresses and secure connections on public networks.

In some configurations, Mozilla is offering a free usage tier with limited monthly data, giving users a simple way to enhance privacy without installing separate software.

This move aligns with Mozilla’s long-standing emphasis on user privacy and security.

Split View for Better Multitasking

Firefox 149 introduces a Split View mode, allowing users to display two web pages side by side within a single browser window. This feature is especially useful for:

  • Comparing documents or products
  • Copying information between pages
  • Research and multitasking workflows

Instead of juggling multiple tabs and windows, users can now work more efficiently in a single, organized view.

Tab Notes: A New Productivity Tool

Another standout feature is Tab Notes, available through Firefox Labs. This tool allows users to attach notes directly to individual tabs, making it easier to:

  • Keep track of research
  • Save reminders tied to specific pages
  • Organize ongoing tasks

This feature reflects a growing trend toward integrating lightweight productivity tools directly into the browser experience.

Smarter Browsing with Optional AI Features

Firefox 149 also expands its experimental AI-powered features, including tools that can assist with summarizing content, providing quick explanations, or helping users interact with web pages more efficiently.

Importantly, Mozilla is keeping these features optional and user-controlled, maintaining its focus on transparency and privacy.

Developer and Platform Updates

For developers, Firefox 149 includes updates to web standards and APIs. One example is improved support for HTML features like enhanced popover behavior, which helps developers build more interactive web interfaces.

As always, these under-the-hood changes help ensure Firefox remains competitive and standards-compliant.

03/19/2026   Linux Journal
Blender 5.1 Released: Faster Workflows, Smarter Tools, and Major Performance Gains

The Blender Foundation has officially released Blender 5.1, the latest update to its powerful open-source 3D creation suite. This version focuses heavily on performance improvements, workflow refinements, and stability, while also introducing a handful of new features that expand what artists and developers can achieve.

Rather than reinventing the platform, Blender 5.1 is all about making existing tools faster, smoother, and more reliable — a release that benefits both professionals and hobbyists alike.

A Release Focused on Refinement

Blender 5.1 emphasizes polish over disruption, with developers addressing hundreds of issues and improving the overall production pipeline. The update includes widespread optimizations across rendering, animation, modeling, and the viewport, resulting in a more responsive and efficient experience.

Many of Blender’s internal libraries have also been updated to align with modern standards like VFX Platform 2026, ensuring better long-term compatibility and performance.

Performance Gains Across the Board

One of the standout aspects of Blender 5.1 is its performance boost:

  • Faster animation playback and shape key evaluation
  • Improved rendering speeds for both GPU and CPU
  • Reduced memory overhead and smoother viewport interaction
  • Optimized internal systems for better responsiveness

In some scenarios, animation and editing performance improvements can be dramatic, especially with complex scenes.

New Raycast Node for Advanced Shading

A major feature addition in Blender 5.1 is the Raycast shader node, which opens the door to advanced rendering techniques.

This node allows artists to trace rays within a scene and extract data from surfaces, enabling:

  • Non-photorealistic rendering (NPR) effects
  • Custom shading techniques
  • Decal projection and X-ray-style visuals

It’s a flexible tool that expands Blender’s shading capabilities, especially for stylized workflows.

Grease Pencil Gets a Big Upgrade

Blender’s 2D animation tool, Grease Pencil, sees meaningful improvements:

  • New fill workflow with support for holes in shapes
  • Better handling of imported SVG and PDF files
  • More intuitive drawing and editing behavior

These updates make Grease Pencil far more practical for hybrid 2D/3D workflows and animation pipelines.

Geometry Nodes and Modeling Improvements

Geometry Nodes continue to evolve with expanded functionality:

03/17/2026   Linux Journal
The Need for Cloud Security in a Modern Business Environment

Cloud systems are an emergent standard in business, but migration efforts and other directional shifts have introduced vulnerabilities. Where some attack patterns are mitigated, cloud platforms leave businesses open to new threats and vectors. The dynamic nature of these environments cannot be addressed by traditional security systems, necessitating robust cloud security for contemporary organizations.

Just as businesses have come to acknowledge the value of cloud operations, so too have cyber attackers. Protecting sensitive assets and maintaining regulatory compliance, while simultaneously ensuring business continuity against cloud attacks, requires a modern strategy. When any window could be an opportunity for infiltration, a comprehensive approach serves to limit exploitation.

Unlike traditional on-premise infrastructure, cloud environments dramatically expand an organization’s threat surface. Resources are distributed across regions, heavily dependent on APIs, and frequently created or decommissioned in minutes. This constant change makes it difficult to maintain a fixed security perimeter and increases the likelihood that misconfigurations or exposed services go unnoticed, creating opportunities for exploitation.

The Vulnerabilities of Cloud Security Services

Any misconfiguration, insecure application programming interface (API), or identity management solution may become an invitation for cyberattacks. Amid the rise of artificial intelligence (AI) technology, it is possible for even inexperienced individuals to exploit such weaknesses in cloud systems. Cloud environments are designed for accessibility, a benefit that can be taken advantage of.

“Unlike traditional software, AI systems can be manipulated through language and indirect instructions,” Lee Chong Ming wrote for Business Insider. “[AI expert Sander] Schulhoff said people with experience in both AI security and cybersecurity would know what to do if an AI model is tricked into generating malicious code.”

At the same time that many businesses are migrating to cloud platforms and implementing cloud security features, they are adopting AI technology in order to accelerate workflows and other processes. These systems may have their advantages for certain industries, but their presence can create its own vulnerabilities. Addressing the shortcomings of cloud systems and AI at the same time compounds the security challenges of today.

03/12/2026   Linux Journal
Google Brings Chrome to ARM Linux: A Long-Awaited Step for Modern Linux Devices

Google has officially announced that Chrome is coming to ARM64 Linux systems, marking a major milestone for both the Linux and ARM ecosystems. The native browser is expected to launch in Q2 2026, finally closing a long-standing gap for users running Linux on ARM-based hardware.

For years, ARM Linux users have relied on Chromium builds or workarounds to access a Chrome-like experience. That’s about to change.

Why This Announcement Matters

Until now, Google Chrome on Linux was limited to x86_64 systems, leaving ARM-based devices without an official build.

That meant users had to:

  • Use Chromium instead of Chrome

  • Run emulated versions of Chrome

  • Miss out on proprietary features like sync, DRM support, and Google services

With this new release, ARM Linux users will finally get the full Chrome experience, including seamless integration with Google’s ecosystem.

What Users Can Expect

The upcoming ARM64 version of Chrome will bring the same features users expect on other platforms:

  • Google account sync (bookmarks, history, tabs)

  • Access to the Chrome Web Store and extensions

  • Built-in features like translation, autofill, and security protections

  • Support for DRM services and media playback

This brings ARM Linux closer to feature parity with macOS (ARM support since 2020) and Windows on ARM (since 2024).

The Rise of ARM on Linux

The timing of this move reflects a broader shift in computing. ARM-based hardware is rapidly gaining traction across:

  • Laptops powered by Snapdragon and future ARM chips

  • Developer boards like Raspberry Pi

  • High-performance systems such as NVIDIA’s ARM-based AI desktops

Google itself highlighted growing demand for Chrome on these systems, especially as ARM expands beyond mobile devices into mainstream computing.

Partnerships and Deployment

Google is also working with hardware vendors to streamline adoption. Notably, Chrome will be integrated into NVIDIA’s Linux-on-ARM DGX Spark systems, making installation easier for high-performance AI workstations.

For general users, Chrome will be available for download directly from Google once released.

Why This Took So Long

Interestingly, this move comes years after Chrome was already available on ARM-based platforms like Apple Silicon Macs and Windows devices.

03/10/2026   Linux Journal
CrackArmor Exposed: Critical Flaws in AppArmor Put Millions of Linux Systems at Risk

A newly disclosed set of vulnerabilities has sent shockwaves through the Linux security community. Dubbed “CrackArmor,” these flaws affect AppArmor, one of the most widely used security modules in Linux, potentially exposing millions of systems to serious compromise.

Discovered by the Qualys Threat Research Unit, the vulnerabilities highlight a concerning reality: even core security mechanisms can harbor weaknesses that go unnoticed for years.

What Is CrackArmor?

“CrackArmor” refers to a group of nine critical vulnerabilities found in the Linux kernel’s AppArmor module. AppArmor is a mandatory access control (MAC) system designed to restrict what applications can do, helping contain attacks and enforce system policies.

These flaws stem from a class of issues known as “confused deputy” vulnerabilities, where a lower-privileged user can trick trusted processes into performing actions on their behalf.

Why These Vulnerabilities Are Serious

The impact of CrackArmor is significant because it undermines one of Linux’s core security layers. Researchers found that attackers could:

  • Escalate privileges to root from an unprivileged account

  • Bypass AppArmor protections entirely

  • Break container isolation, affecting Kubernetes and cloud workloads

  • Execute arbitrary code in the kernel

  • Trigger denial-of-service (DoS) conditions

In some demonstrations, attackers were able to gain full root access in seconds under controlled conditions.

How Widespread Is the Risk?

The scope of the issue is massive. AppArmor is enabled by default in major distributions such as:

  • Ubuntu

  • Debian

  • SUSE

Because of this, researchers estimate that over 12.6 million Linux systems could be affected.

These systems span:

  • Enterprise servers

  • Cloud infrastructure

  • Containers and Kubernetes clusters

  • IoT and edge devices

This widespread deployment significantly amplifies the potential impact.

A Long-Standing Problem

One of the most concerning aspects of CrackArmor is how long the vulnerabilities have existed. According to researchers, the flaws date back to around 2017 (Linux kernel 4.11) and remained undiscovered in production environments for years.

This long exposure window increases the risk that similar weaknesses may exist elsewhere in critical system components.