Many Linux distributions released security notifications covering AlmaLinux, Debian, Fedora, and Red Hat Enterprise Linux which contain critical flaws in core system files. Administrators should install patches immediately for applications like Chromium and ImageMagick because these vulnerabilities could enable denial of service attacks or remote code execution risks. Critical fixes address issues within tools like Python and libpng to stop attackers from exploiting known flaws. Users on other distributions such as Oracle and Ubuntu also need to prioritize updates for kernel components and webmail software to ensure safety against active exploits in the wild.
Critical Linux Security Updates for Enterprise and Home Users
This week's Linux Security Roundup highlights several critical patches that demand immediate attention from system administrators and desktop users alike. Managing servers feels less like IT support these days and more like constant maintenance work. This week brought a heavy batch of patches across the ecosystem that requires immediate attention from system administrators. Reading through the latest advisories helps teams prioritize which Linux security updates actually matter versus routine bug fixes. Users who rely on stable infrastructure should not delay deployment because many flaws are already active in the wild.
Enterprise Distributions and Core Services
Red Hat based platforms released numerous advisories targeting the kernel and boot loaders across versions seven through ten. A use after free flaw was patched within grub2 to stop potential denial of service attacks during boot sequences. Container tools received important fixes because isolation failures in this area are often used by attackers to gain root access on compromised systems. Admins should install patches for tools including Python and VIM immediately to maintain system integrity against privilege escalation attempts.
Web Applications and Desktop Security
Debian and Fedora users should pay close attention to changes involving Chromium and ImageMagick this week. Exploits are already active in the wild so users must act quickly to prevent execution risks within web browsers that handle daily user input. Memory corruption flaws were found inside tools like Vim and GIMP which could lead to local privilege escalation on affected machines. Developers relying on Python libraries should verify their packages are updated before deploying new scripts to production servers.
Virtualization and Specialized Platforms
Qubes OS issued a bulletin concerning EPT structures within paging mechanisms that require verification via cryptographic signatures. This specific fix addresses vulnerabilities that could otherwise allow unprivileged users to access memory they should not touch inside the operating system. Oracle Linux focused on infrastructure components like SOS reporting and FreeRDP connections used for remote desktop work across enterprise data centers. It has been observed that applying these fixes alongside dependent packages requires careful testing to avoid breaking build tools or database clients.

The Security Updates in Detail
Here is an in-depth overview of the updates recently released for AlmaLinux, Debian GNU/Linux, Fedora Linux, Oracle Linux, Qubes OS, Red Hat Enterprise Linux, Rocky Linux, Slackware Linux, SUSE Linux, and Ubuntu Linux.
AlmaLinux
AlmaLinux issued several security notifications covering versions 8 through 10. Specific vulnerabilities include a use after free flaw in grub2 and integer truncation issues within libpng that could enable denial of service attacks. Other critical fixes address remote code execution risks found in applications like GIMP and libarchive to prevent exploitation by attackers. System administrators should install patches for tools including .NET, Python, and VIM immediately to maintain system integrity.
- ALSA-2026:4648: grub2 security update (Moderate)
- ALSA-2026:4672: container-tools:rhel8 security update (Important)
- ALSA-2026:4445: .NET 10.0 security update (Important)
- ALSA-2026:4472: compat-openssl11 security update (Moderate)
- ALSA-2026:4447: libvpx security update (Important)
- ALSA-2026:4456: .NET 9.0 security update (Important)
- ALSA-2026:4728: libpng security update (Important)
- ALSA-2026:4772: glibc security update (Moderate)
- ALSA-2026:4473: python3.11 security update (Moderate)
- ALSA-2026:5146: yggdrasil security update (Important)
- ALSA-2026:5063: libarchive security update (Important)
- ALSA-2026:4715: vim security update (Moderate)
- ALSA-2026:4717: opencryptoki security update (Moderate)
- ALSA-2026:5145: yggdrasil-worker-package-manager security update (Important)
- ALSA-2026:5113: gimp:2.8 security update (Important)
- ALSA-2026:4649: grub2 security update (Moderate)
- ALSA-2026:4713: python3.12 security update (Moderate)
- ALSA-2026:4723: kernel security update (Moderate)
- ALSA-2026:4705: nginx security update (Moderate)
- ALSA-2026:4629: libvpx security update (Important)
- ALSA-2026:4759: kernel security update (Moderate)
- ALSA-2026:5080: libarchive security update (Important)
- ALSA-2026:4898: capstone security update (Important)
- ALSA-2026:4760: grub2 security update (Moderate)
- ALSA-2026:4828: mysql security update (Moderate)
Debian GNU/Linux
Debian has issued multiple security bulletins highlighting serious risks within software packages like Chromium and ImageMagick. Exploits are already active in the wild so users must act quickly. Critical flaws exist within tools such as Ansible, OpenSSL, and Freetype that could allow attackers to execute code or access sensitive information. Administrators should prioritize updating these vulnerable packages to prevent denial of service conditions on Debian systems.
- [DSA 6165-1] chromium security update
- ELA-1657-1 imagemagick security update
- [DLA 4502-1] ansible security update
- [DSA 6167-1] gst-plugins-base1.0 security update
- [DSA 6166-1] nodejs security update
- [DSA 6168-1] freetype security update
- ELA-1658-1 openssl security update
- [DLA 4503-1] evolution-data-server security update
- [DSA 6170-1] snapd security update
- [DSA 6169-1] imagemagick security update
- ELA-1659-1 imagemagick security update
- [DLA 4504-1] libvirt security update
- [DSA 6171-1] chromium security update
- [DSA 6172-1] webkit2gtk security update
- [DSA 6173-1] freeciv security update
Fedora Linux
Fedora Linux versions 42 through 44 are receiving multiple security advisories to patch critical vulnerabilities across various software packages. Specific flaws include remote code execution risks within QGIS workflows alongside scripting issues found in database administration tools. Administrators must apply updates for Chromium, OpenSSH, and Python libraries immediately. Other affected software includes Vim and system services that could allow unauthorized access or denial of service events if left unpatched.
- Fedora 42 Update: pgadmin4-9.13-1.fc42
- Fedora 42 Update: qgis-3.44.8-1.fc42
- Fedora 42 Update: python3.6-3.6.15-53.fc42
- Fedora 43 Update: python3.6-3.6.15-53.fc43
- Fedora 44 Update: pgadmin4-9.13-1.fc44
- Fedora 44 Update: qgis-3.44.8-1.fc44
- Fedora 42 Update: mingw-openexr-3.3.8-1.fc42
- Fedora 42 Update: yarnpkg-1.22.22-17.fc42
- Fedora 43 Update: vim-9.2.148-1.fc43
- Fedora 43 Update: mingw-openexr-3.3.8-1.fc43
- Fedora 44 Update: mingw-openexr-3.4.6-1.fc44
- Fedora 44 Update: yarnpkg-1.22.22-17.fc44
- Fedora 43 Update: chromium-146.0.7680.80-1.fc43
- Fedora 44 Update: systemd-259.5-1.fc44
- Fedora 44 Update: forgejo-14.0.3-1.fc44
- Fedora 42 Update: vim-9.2.148-1.fc42
- Fedora 42 Update: kiss-fft-131.2.0-1.fc42
- Fedora 43 Update: libtasn1-4.21.0-1.fc43
- Fedora 43 Update: kiss-fft-131.2.0-1.fc43
- Fedora 44 Update: mac-12.50-1.fc44
- Fedora 44 Update: aqualung-2.0-6.fc44
- Fedora 44 Update: kiss-fft-131.2.0-1.fc44
- Fedora 43 Update: dotnet10.0-10.0.104-1.fc43
- Fedora 43 Update: openssh-10.0p1-7.fc43
- Fedora 43 Update: bpfman-0.5.4-4.fc43
- Fedora 44 Update: chromium-146.0.7680.80-1.fc44
- Fedora 44 Update: vim-9.2.148-1.fc44
- Fedora 44 Update: cpp-httplib-0.37.1-2.fc44
- Fedora 44 Update: polkit-127-2.fc44.1
- Fedora 42 Update: openssh-9.9p1-13.fc42
- Fedora 42 Update: uxplay-1.73.3-1.fc42
- Fedora 42 Update: wordpress-6.9.4-1.fc42
- Fedora 42 Update: cpp-httplib-0.37.1-2.fc42
- Fedora 43 Update: libsoup3-3.6.6-2.fc43
- Fedora 43 Update: glib2-2.86.4-2.fc43
- Fedora 43 Update: wordpress-6.9.4-1.fc43
- Fedora 43 Update: uxplay-1.73.3-1.fc43
- Fedora 43 Update: cpp-httplib-0.37.1-2.fc43
- Fedora 44 Update: python3.6-3.6.15-54.fc44
- Fedora 44 Update: wordpress-6.9.4-1.fc44
- Fedora 42 Update: python-scitokens-1.9.7-1.fc42
- Fedora 42 Update: chromium-146.0.7680.80-1.fc42
- Fedora 42 Update: python-ujson-5.12.0-1.fc42
- Fedora 43 Update: python-scitokens-1.9.7-1.fc43
- Fedora 43 Update: python-ujson-5.12.0-1.fc43
- Fedora 44 Update: openssh-10.2p1-6.fc44
- Fedora 44 Update: python-scitokens-1.9.7-1.fc44
- Fedora 44 Update: python-ujson-5.12.0-1.fc44
Oracle Linux
Oracle recently issued security advisories for multiple versions of its enterprise operating system ranging from seven through ten. Critical infrastructure components like system kernels and GRUB2 boot loaders are patched against serious vulnerabilities in this release. Beyond the core system files, other affected packages include SOS reporting capabilities, FreeRDP, MySQL databases, and timezone data tools across the platform. Security flaws involving memory corruption risks or potential privilege escalation issues are fixed within these widely used software components.
- ELBA-2026-50157 Oracle Linux 10 sos bug fix update
- ELBA-2026-50156 Oracle Linux 9 sos bug fix update
- ELBA-2026-50156 Oracle Linux 8 sos bug fix update
- ELSA-2026-2714 Important: Oracle Linux 7 freerdp security update
- ELSA-2026-4723 Moderate: Oracle Linux 10 kernel security update
- ELSA-2026-4717 Moderate: Oracle Linux 10 opencryptoki security update
- ELSA-2026-4715 Moderate: Oracle Linux 10 vim security update
- ELSA-2026-4713 Moderate: Oracle Linux 10 python3.12 security update
- ELSA-2026-4705 Moderate: Oracle Linux 10 nginx security update
- ELSA-2026-4649 Moderate: Oracle Linux 10 grub2 security update
- ELBA-2026-4712 Oracle Linux 10 shadow-utils bug fix and enhancement update
- ELSA-2026-4629 Important: Oracle Linux 10 libvpx security update
- ELBA-2026-4793 Oracle Linux 10 samba bug fix and enhancement update
- ELBA-2026-4709 Oracle Linux 10 flatpak bug fix and enhancement update
- ELBA-2026-4716 Oracle Linux 10 fwupd-efi bug fix and enhancement update
- ELBA-2026-4707 Oracle Linux 10 virt-v2v bug fix and enhancement update
- ELBA-2026-4706 Oracle Linux 10 gnome-remote-desktop bug fix and enhancement update
- ELBA-2026-4710 Oracle Linux 10 libvirt bug fix and enhancement update
- ELBA-2026-4704 Oracle Linux 10 alsa-lib bug fix and enhancement update
- ELBA-2026-4703 Oracle Linux 10 mariadb10.11 bug fix and enhancement update
- ELBA-2026-4702 Oracle Linux 10 rpm-ostree bug fix and enhancement update
- ELBA-2026-4701 Oracle Linux 10 alsa-sof-firmware bug fix and enhancement update
- ELBA-2026-4586 Oracle Linux 9 samba bug fix and enhancement update
- ELSA-2026-4728 Important: Oracle Linux 8 libpng security update
- ELSA-2026-4672 Important: Oracle Linux 8 container-tools:rhel8 security update
- ELBA-2026-4829 Oracle Linux 8 sos bug fix and enhancement update
- ELBA-2026-4902 Oracle Linux 10 tzdata bug fix and enhancement update
- ELBA-2026-4708 Oracle Linux 10 fence-agents bug fix and enhancement update
- ELBA-2026-4897 Oracle Linux 10 ipa bug fix and enhancement update
- ELSA-2026-4898 Important: Oracle Linux 9 capstone security update
- ELSA-2026-4760 Moderate: Oracle Linux 9 grub2 security update
- ELSA-2026-4828 Moderate: Oracle Linux 9 mysql security update
- ELSA-2026-4648 Moderate: Oracle Linux 8 grub2 security update
- ELBA-2026-4902 Oracle Linux 9 tzdata bug fix and enhancement update
- ELSA-2026-4759 Moderate: Oracle Linux 9 kernel security update
- ELBA-2026-4904 Oracle Linux 8 cups bug fix and enhancement update
- ELBA-2026-4902 Oracle Linux 8 tzdata bug fix and enhancement update
- ELBA-2026-50158 Oracle Linux 8 kexec-tools bug fix update
- ELSA-2026-4148 Important: Oracle Linux 7 python-pyasn1 security update
Qubes OS
he Qubes OS team recently issued security bulletin number 110 concerning a significant vulnerability in their system. Identified as XSA-480, this flaw allows for a use after free condition within paging structures referred to as EPT. Review the full text and accompanying cryptographic signatures provided below to ensure authenticity before applying any updates.
Red Hat Enterprise Linux
Red Hat Product Security has issued a series of security advisories targeting various components within their Enterprise Linux ecosystem. Critical packages including the kernel, vsftpd, and grub2 require attention across multiple versions ranging from standard releases to specialized services. Although many updates carry a moderate severity rating, important patches exist for specific software like libpng and JBoss Enterprise Application Platform. Users on OpenShift platforms or running version 4 through 10 should prioritize applying these fixes immediately to ensure system safety.
- RHSA-2026:4554: Moderate: vsftpd security update
- RHSA-2026:4553: Moderate: vsftpd security update
- RHSA-2026:4672: Important: container-tools:rhel8 security update
- RHSA-2026:4654: Moderate: grub2 security update
- RHSA-2026:4653: Moderate: grub2 security update
- RHSA-2026:4652: Moderate: grub2 security update
- RHSA-2026:4648: Moderate: grub2 security update
- RHSA-2026:4649: Moderate: grub2 security update
- RHSA-2026:4629: Important: libvpx security update
- RHSA-2026:4630: Important: Red Hat Data Grid 8.6.0 security update
- RHSA-2026:4661: Moderate: redhat-ds:12 security update
- RHSA-2026:4746: Moderate: python3.12 security update
- RHSA-2026:4720: Moderate: 389-ds-base security update
- RHSA-2026:4717: Moderate: opencryptoki security update
- RHSA-2026:4705: Moderate: nginx security update
- RHSA-2026:4728: Important: libpng security update
- RHSA-2026:4729: Important: libpng security update
- RHSA-2026:4731: Important: libpng security update
- RHSA-2026:4753: Important: osbuild-composer security update
- RHSA-2026:4715: Moderate: vim security update
- RHSA-2026:4713: Moderate: python3.12 security update
- RHSA-2026:4730: Important: libpng security update
- RHSA-2026:4723: Moderate: kernel security update
- RHSA-2026:4732: Important: libpng security update
- RHSA-2026:4693: Important: container-tools:rhel8 security update
- RHSA-2026:4745: Moderate: kernel security update
- RHSA-2026:4832: Important: java-1.8.0-ibm security update
- RHSA-2026:4828: Moderate: mysql security update
- RHSA-2026:4823: Moderate: grub2 security update
- RHSA-2026:4824: Moderate: compat-openssl11 security update
- RHSA-2026:4822: Moderate: grub2 security update
- RHSA-2026:4825: Moderate: compat-openssl11 security update
- RHSA-2026:4830: Moderate: grub2 security update
- RHSA-2026:4772: Moderate: glibc security update
- RHSA-2026:4759: Moderate: kernel security update
- RHSA-2026:4760: Moderate: grub2 security update
- RHSA-2026:4756: Important: libpng security update
- RHSA-2026:4761: Important: Red Hat JBoss Enterprise Application Platform 8.1.5 update
- RHSA-2026:4901: Important: rhc security update
- RHSA-2026:4907: Important: rhc security update
- RHSA-2026:4899: Moderate: kernel security update
- RHSA-2026:4898: Important: capstone security update
- RHSA-2026:4900: Moderate: grub2 security update
- RHSA-2026:4892: Important: rhc security update
- RHSA-2026:4419: Important: OpenShift Container Platform 4.15.62 bug fix and security update
- RHSA-2026:5031: Important: rhc security update
- RHSA-2026:5030: Important: rhc security update
- RHSA-2026:5022: Important: rhc security update
- RHSA-2026:4998: Moderate: grub2 security update
- RHSA-2026:4952: Important: rhc security update
- RHSA-2026:4924: Important: Red Hat JBoss Enterprise Application Platform 7.4.24 security update
- RHSA-2026:4917: Important: Red Hat JBoss Enterprise Application Platform 7.4.24 security update
- RHSA-2026:4915: Important: Red Hat JBoss Enterprise Application Platform 7.4.24 security update
- RHSA-2026:4916: Important: Red Hat JBoss Enterprise Application Platform 7.4.24 security update
- RHSA-2026:5079: Important: rhc security update
- RHSA-2026:5074: Moderate: grub2 security update
- RHSA-2026:5063: Important: libarchive security update
- RHSA-2026:4464: Important: OpenShift Container Platform 4.16.58 packages and security update
- RHSA-2026:4465: Important: OpenShift Container Platform 4.16.58 bug fix and security update
- RHSA-2026:4418: Moderate: OpenShift Container Platform 4.15.62 packages and security update
- RHSA-2026:4580: Moderate: Red Hat build of MicroShift 4.16.58 security update
- RHSA-2026:5113: Important: gimp:2.8 security update
- RHSA-2026:5080: Important: libarchive security update
- RHSA-2026:5145: Important: yggdrasil-worker-package-manager security update
- RHSA-2026:5124: Moderate: capstone security update
- RHSA-2026:5077: Important: rhc security update
- RHSA-2026:5123: Moderate: capstone security update
- RHSA-2026:5076: Important: rhc security update
- RHSA-2026:5125: Moderate: capstone security update
- RHSA-2026:5078: Important: rhc security update
- RHSA-2026:5167: Important: podman security update
- RHSA-2026:4480: Moderate: OpenShift Container Platform 4.17.51 bug fix and security update
- RHSA-2026:5152: Moderate: python3.11 security update
- RHSA-2026:5146: Important: yggdrasil security update
Rocky Linux
Rocky Linux administrators have been notified of several important security patches covering multiple software components across the distribution. Critical updates specifically target version eight where issues within libpng and container tools like podman require immediate attention from system owners. Users should also install a low severity patch for libarchive alongside an update addressing vulnerabilities in the GIMP ecosystem labeled with specific release identifiers. Broader updates for Python libraries and virtualization packages are also required for versions eight through ten.
- RLSA-2026:4672: Important: container-tools:rhel8 security update
- RLSA-2026:4629: Important: libvpx security update
- RLSA-2023:7754: Moderate: pixman security update
- RLSA-2026:4828: Moderate: mysql security update
- RLSA-2023:6980: Moderate: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update
- RLSA-2023:5537: Important: libvpx security update
- RLSA-2023:5998: Important: python39:3.9 and python39-devel:3.9 security update
- RLSA-2023:7042: Moderate: python27:2.7 security and bug fix update
- RLSA-2025:17129: Important: idm:DL1 security update
- RLSA-2023:5994: Important: python27:2.7 security update
- RLSA-2026:4728: Important: libpng security update
- RLSA-2026:4672: Important: container-tools:rhel8 security update
- RLSA-2023:3018: Low: libarchive security update
- RLSA-2026:5113: Important: gimp:2.8 security update
Slackware Linux
Slackware Linux has released updated expat packages for version 15.0 along with current branches to fix serious security problems. These patches target critical vulnerabilities that involve NULL pointers and could lead to infinite loops during processing. This update resolves multiple significant issues discovered inside the core processing functions of the software.
SUSE Linux
OpenSUSE has issued multiple moderate security advisories for its Tumbleweed distribution affecting several ruby4.0-rubygem packages including actiontext and activemodel. Critical flaws within components like FreeRDP are being fixed to stop system exploits while development tools get moderate risk updates too. Immediate upgrades are required since severe issues could impact over thirty distinct CVEs across the Linux ecosystem if left unpatched. Updates also cover the stable Leap 15 series with patches targeting major vulnerabilities in enterprise products.
- openSUSE-SU-2026:10339-1: moderate: ruby4.0-rubygem-actiontext-8.0-8.0.3-1.3 on GA media
- openSUSE-SU-2026:10342-1: moderate: ruby4.0-rubygem-activemodel-8.0-8.0.3-1.3 on GA media
- openSUSE-SU-2026:10341-1: moderate: ruby4.0-rubygem-activejob-8.0-8.0.3-1.3 on GA media
- openSUSE-SU-2026:10337-1: moderate: ruby4.0-rubygem-actionmailer-8.0-8.0.3-1.3 on GA media
- openSUSE-SU-2026:10335-1: moderate: ruby4.0-rubygem-actioncable-8.0-8.0.3-1.3 on GA media
- SUSE-SU-2026:0900-1: moderate: Security update for python-black
- openSUSE-SU-2026:10346-1: moderate: ruby4.0-rubygem-fluentd-1.17.1-1.5 on GA media
- openSUSE-SU-2026:10348-1: moderate: ruby4.0-rubygem-grpc-1.70.1-1.7 on GA media
- openSUSE-SU-2026:10344-1: moderate: ruby4.0-rubygem-activestorage-8.0-8.0.3-1.3 on GA media
- openSUSE-SU-2026:10350-1: moderate: ruby4.0-rubygem-jquery-rails-4.6.0-1.9 on GA media
- openSUSE-SU-2026:10347-1: moderate: ruby4.0-rubygem-globalid-1.2.1-1.9 on GA media
- openSUSE-SU-2026:10353-1: moderate: ruby4.0-rubygem-loofah-2.23.1-1.5 on GA media
- openSUSE-SU-2026:10345-1: moderate: ruby4.0-rubygem-activesupport-8.0-8.0.3-1.3 on GA media
- SUSE-SU-2026:0902-1: important: Security update for freerdp
- SUSE-SU-2026:0906-1: moderate: Security update for clamav
- SUSE-SU-2026:0908-1: important: Security update for xen
- openSUSE-SU-2026:0084-1: important: Security update for chromium
- openSUSE-SU-2026:10363-1: moderate: ruby4.0-rubygem-rubyzip-2.3.2-1.19 on GA media
- openSUSE-SU-2026:10360-1: moderate: ruby4.0-rubygem-rails-8.0-8.0.3-1.3 on GA media
- openSUSE-SU-2026:10362-1: moderate: ruby4.0-rubygem-railties-8.0-8.0.3-1.3 on GA media
- openSUSE-SU-2026:10361-1: moderate: ruby4.0-rubygem-rails-html-sanitizer-1.6.0-1.9 on GA media
- openSUSE-SU-2026:10357-1: moderate: ruby4.0-rubygem-puma-6.4.3-1.5 on GA media
- openSUSE-SU-2026:10359-1: moderate: ruby4.0-rubygem-rack-session-2.1.1-1.3 on GA media
- openSUSE-SU-2026:10358-1: moderate: ruby4.0-rubygem-rack-3.1.18-1.3 on GA media
- openSUSE-SU-2026:10356-1: moderate: ruby4.0-rubygem-nokogiri-1.18.9-1.4 on GA media
- openSUSE-SU-2026:10354-1: moderate: ruby4.0-rubygem-minitar-0.9-1.21 on GA media
- openSUSE-SU-2026:10355-1: moderate: ruby4.0-rubygem-multi_xml-0.6.0-1.31 on GA media
- SUSE-SU-2026:0911-1: important: Security update for curl
- SUSE-SU-2026:0910-1: moderate: Security update for vim
- openSUSE-SU-2026:0088-1: critical: Security update for krb5-appl
- openSUSE-SU-2026:0086-1: important: Security update for python-simpleeval
- SUSE-SU-2026:0917-1: important: Security update for kubernetes
- SUSE-SU-2026:0913-1: important: Security update for 389-ds
- SUSE-SU-2026:0914-1: important: Security update for 389-ds
- SUSE-SU-2026:0928-1: important: Security update for the Linux Kernel
- openSUSE-SU-2026:20373-1: moderate: Security update for python-Django
- openSUSE-SU-2026:20372-1: critical: Security update for chromium
- openSUSE-SU-2026:20375-1: moderate: Security update for python-PyPDF2
- openSUSE-SU-2026:20374-1: critical: Security update for krb5-appl
- openSUSE-SU-2026:20366-1: important: Security update for docker-stable
- openSUSE-SU-2026:10367-1: moderate: ruby4.0-rubygem-web-console-4.2.1-1.9 on GA media
- openSUSE-SU-2026:10371-1: moderate: curl-8.19.0-1.1 on GA media
- openSUSE-SU-2026:10369-1: moderate: skaffold-2.18.0-1.1 on GA media
- openSUSE-SU-2026:10368-1: moderate: ruby4.0-rubygem-websocket-extensions-0.1.5-1.24 on GA media
- openSUSE-SU-2026:10364-1: moderate: ruby4.0-rubygem-sprockets-4.2.1-1.9 on GA media
- openSUSE-SU-2026:10366-1: moderate: ruby4.0-rubygem-thor-1.4.0-1.3 on GA media
- openSUSE-SU-2026:10370-1: moderate: smb4k-4.0.5-1.2 on GA media
- openSUSE-SU-2026:10365-1: moderate: ruby4.0-rubygem-sprockets-3.7-3.7.5-1.5 on GA media
- SUSE-SU-2026:0923-1: important: Security update for gvfs
- openSUSE-SU-2026:10383-1: moderate: cargo1.93-1.93.0-3.1 on GA media
- openSUSE-SU-2026:10382-1: moderate: cargo1.92-1.92.0-2.1 on GA media
- openSUSE-SU-2026:10380-1: moderate: python311-uv-0.10.11-1.1 on GA media
- openSUSE-SU-2026:10376-1: moderate: chromedriver-146.0.7680.80-1.1 on GA media
- openSUSE-SU-2026:10377-1: moderate: python312-3.12.13-2.1 on GA media
- openSUSE-SU-2026:10375-1: moderate: coturn-4.9.0-1.1 on GA media
- SUSE-SU-2026:0933-1: important: Security update for freerdp
- SUSE-SU-2026:0931-1: low: Security update for jq
- SUSE-SU-2026:0932-1: important: Security update for tomcat
- openSUSE-SU-2026:10393-1: moderate: python311-pyasn1-0.6.3-1.1 on GA media
- openSUSE-SU-2026:10391-1: moderate: GraphicsMagick-1.3.46-3.1 on GA media
- openSUSE-SU-2026:10388-1: moderate: mumble-1.5.857-2.1 on GA media
- openSUSE-SU-2026:10390-1: moderate: tempo-cli-2.10.3-1.1 on GA media
- SUSE-SU-2026:0935-1: low: Security update for php-composer2
- SUSE-SU-2026:0938-1: important: Security update for GraphicsMagick
- openSUSE-SU-2026:10398-1: moderate: python311-3.11.15-3.1 on GA media
- openSUSE-SU-2026:10394-1: moderate: python313-3.13.12-2.1 on GA media
Ubuntu Linux
Ubuntu security teams have released several advisories to patch critical vulnerabilities found within the Linux kernel and supporting software packages. These flaws could allow unprivileged users to escape containers or manipulate system profiles on affected machines. Vulnerabilities span across various core applications including Flask, Python, and Snapd on both newer and older release tracks.
- [USN-8094-1] Linux kernel vulnerabilities
- [USN-8095-1] Linux kernel vulnerabilities
- [USN-8096-1] Linux kernel vulnerabilities
- [USN-8098-1] Linux kernel vulnerabilities
- [USN-8087-2] python-cryptography regression
- [USN-8097-1] Roundcube Webmail vulnerabilities
- [USN-8095-2] Linux kernel (FIPS) vulnerabilities
- [USN-8100-1] Linux kernel (NVIDIA) vulnerabilities
- [USN-8096-2] Linux kernel (FIPS) vulnerabilities
- [USN-8099-1] curl vulnerabilities
- [USN-8098-2] Linux kernel (GCP) vulnerabilities
- [USN-8093-1] libssh vulnerability
- [USN-8101-1] Vim vulnerabilities
- [USN-8095-3] Linux kernel (Real-time) vulnerabilities
- [USN-8094-2] Linux kernel vulnerabilities
- [USN-8096-4] Linux kernel (Real-time) vulnerabilities
- [USN-8096-3] Linux kernel vulnerabilities
- [USN-8102-1] snapd vulnerability
- [USN-8104-1] Flask vulnerability
- [USN-8102-2] snapd regression
- [USN-8106-1] Valkey vulnerabilities
- [USN-8098-3] Linux kernel vulnerabilities
- [USN-8107-1] Linux kernel (AWS FIPS) vulnerabilities
- [USN-8103-1] Exiv2 vulnerabilities
- [USN-8097-2] roundcube regression
- [USN-8108-1] Bouncy Castle vulnerabilities
- [USN-8105-1] FreeRDP vulnerabilities
- [USN-8018-3] Python 2.7 vulnerabilities
- [USN-8103-2] Exiv2 regression
- [USN-8105-2] FreeRDP regression
- [USN-8111-1] OpenStack Glance vulnerability
- [USN-8112-2] Linux kernel (FIPS) vulnerabilities
- [USN-8112-1] Linux kernel vulnerabilities
How to upgrade packages
This quick overview shows exactly what commands you need to run so the latest security patches and bug fixes actually make it onto your system without hunting down individual .deb or .rpm files.
Debian/Ubuntu (apt)
The first thing to do is refresh the local package index; running sudo apt update contacts all configured repositories and pulls in the newest lists of available versions. Skipping this step leaves the system blind to any recent uploads, which explains why “upgrade” sometimes claims there’s nothing to do even after a security advisory has been published. Once the index is current, invoke sudo apt upgrade -y; the -y flag answers every prompt automatically so the process doesn’t pause for user input. This command upgrades all installed packages that have newer versions in the repositories while preserving configuration files.
sudo apt update sudo apt upgrade -y
Fedora/RedHat/Rocky/Alma/Oracle (dnf or yum)
On modern Fedora and recent Red Hat derivatives, dnf is the package manager; older RHEL releases still rely on yum. Begin with a check‑update operation—sudo dnf check-update or sudo yum check-update—to see exactly which packages are awaiting an upgrade. This preview step can be useful for spotting unexpected kernel bumps before they land. To actually apply the updates, run sudo dnf upgrade -y (or sudo yum update if you prefer the older tool). The upgrade command pulls down the new binaries and runs any necessary post‑install scripts, such as rebuilding initramfs when a kernel changes.
sudo dnf check-update sudo dnf upgrade -y
or on older releases
sudo yum check-update sudo yum update
SUSE (zypper)
SUSE’s command line front‑end is called zypper. First execute sudo zypper refresh so that the metadata for all enabled repos gets updated; without this, zypper will happily report “No updates available” even though newer packages sit on the mirror. After a fresh refresh, issue sudo zypper update -y; this upgrades every package to the latest version in the configured repositories and automatically handles service restarts when required.
sudo zypper refresh sudo zypper update -y
Slackware (slackpkg and pkgtool)
Slackware doesn’t have a single unified updater, but the official way to pull updates is through slackpkg. Start with sudo slackpkg update to download the newest package list from the chosen mirror. Then run sudo slackpkg upgrade-all; this command walks through each installed package and replaces it with the most recent build available in the official repository. For users who prefer a more granular approach, specifying a package name after upgrade limits the operation to that single item. When dealing with community‑maintained repositories, pkgtool takes over: a combined sudo pkgtool update && sudo pkgtool upgrade will sync and apply updates from the mirrors listed in /etc/slackpkg/mirrors.
sudo slackpkg update sudo slackpkg upgrade-all