Two flaws have been found in KDE, a graphical user environment for Linux. Both flaws have to do with the way temporary files are created by different processes. These files are not created in a secure manner and could be exploited to gain elevated privileges on the affected machine. For more, go to:
- Business transforms when it comes together | Unite your IT , Ops, and Applications teams with shared solutions. Get Ready - Red Hat Cloud
- Upskill your Team. Transition your Career. Cyber Security Foundation & Practitioner™ instructor-led course, for anyone needing a solid understanding of Cyber Security.