Here is a roundup of this week's Linux security updates. Major distributions including RHEL and Debian release critical updates for kernel flaws or database integrity to maintain system security against container escape risks. Failing to apply these updates leaves systems exposed to vulnerabilities from browsers and Python libraries used in community distros that might crash services through crafted messages. You should not ignore these critical advisories as Fedora, Slackware, SUSE, and Ubuntu release patches that keep data safe without relying on complex manual configurations when applied regularly.
Linux Security Updates This Week: Critical Patches for Enterprise and Desktop Systems
This week brings a heavy load of security advisories across the major Linux distributions that demand immediate attention from administrators. Users need to prioritize kernel updates and container tools immediately because unpatched systems face high risks of remote code execution or privilege escalation. Ignoring these patches leaves your infrastructure wide open for attackers exploiting known buffer overflows and logic flaws in common software stacks found on servers and desktops alike.
RHEL, AlmaLinux, and Oracle Red Hat Family Patches
The enterprise side of the market faces a significant wave of maintenance requests from Red Hat, its clones like AlmaLinux and Rocky Linux, plus Oracle Linux. Administrators must review advisories impacting software like MySQL and Nginx because versions eight through ten face known vulnerabilities that could compromise database integrity. High-risk components including osbuild-composer and ImageMagick require prioritized installation to maintain system security now. Specific fixes exist for Gimp and Valkey which are important updates, while others handle stability improvements for LVM2 tools. Failing to apply these updates leaves systems exposed to container escape risks or memory corruption bugs found within the browser engine during normal use.
Fedora, Debian, and Community Distro Adjustments
Fedora Linux users on versions forty-two through forty-four must prioritize installing critical security patches to protect their systems from known vulnerabilities in packages like Localsearch and Python-Diskcache. Users managing services built on Debian GNU/Linux should address flaws within popular software like Chromium and Firefox ESR that allow attackers to escape sandbox protections. We have seen this happen after a bad driver update leaves a server running unpatched legacy code, resulting in unexpected downtime during peak traffic times. Fixes also resolve logic flaws in Mapserver alongside integer underflows in Strongswan that might crash services through crafted messages sent by compromised clients.
SUSE, Ubuntu, Slackware Fixes
SUSE recently issued numerous security advisories targeting vulnerabilities within their Linux Enterprise operating systems covering Docker and Helm components. Critical patches address kernel flaws on IBM cloud infrastructure that could let attackers escape containers entirely. Ubuntu releases security advisories for several components including LibTIFF and strongSwan which require immediate updates to prevent modified ciphertext from bypassing authentication tag verification checks. Slackware Linux systems can now install new security updates designed to protect Mozilla Firefox and Thunderbird from known vulnerabilities while also resolving unbounded NSEC3 iterations in bind alongside a flaw allowing screen manipulation via x0vncserver in TigerVNC.

The Security Updates in Detail
Here is an in-depth overview of the updates recently released for AlmaLinux, Debian GNU/Linux, Fedora Linux, Oracle Linux, Qubes OS, Red Hat Enterprise Linux, Rocky Linux, Slackware Linux, SUSE Linux, and Ubuntu Linux.
AlmaLinux
AlmaLinux issued moderate security advisories for versions eight and nine regarding dangerous vulnerabilities found in tools like MySQL and Python. These specific updates resolve critical security issues that could allow remote attackers to execute arbitrary code or gain elevated privileges without proper authorization on affected systems. Updates for Slackware included TigerVNC and libpng while fixes targeted Go libraries within the AlmaLinux environment instead. According to the severity ratings provided in the release notes, buffer overflows pose significant risks to users who delay installing the patches.
- ALSA-2026:5602: vim security update (Moderate)
- ALSA-2026:5640: mysql:8.4 security update (Moderate)
- ALSA-2026:5603: opencryptoki security update (Moderate)
- ALSA-2026:5581: nginx:1.24 security update (Moderate)
- ALSA-2026:5578: virt:rhel and virt-devel:rhel security update (Moderate)
- ALSA-2026:5599: nginx security update (Moderate)
- ALSA-2026:5580: mysql:8.0 security update (Moderate)
- ALSA-2026:5513: 389-ds:1.4 security update (Moderate)
- ALSA-2026:5585: gnutls security update (Moderate)
- ALSA-2026:5587: opencryptoki security update (Moderate)
- ALSA-2026:5588: python3 security update (Moderate)
- ALSA-2026:5913: ncurses security update (Moderate)
- ALSA-2026:5939: freerdp security update (Important)
- ALSA-2026:5941: golang security update (Important)
- ALSA-2026:5942: golang security update (Important)
Debian GNU/Linux
The Debian Project recently issued several security advisories addressing critical flaws within popular software packages. In applications like Chromium and Firefox-ESR, discovered vulnerabilities could allow attackers to escape sandbox protections or execute arbitrary code. These updates also resolve logic flaws in Mapserver alongside integer underflows in Strongswan that might crash services through crafted messages. System administrators should install these patches quickly since issues range from privilege escalation to potential information disclosure depending on the specific software affected.
- ELA-1660-1 evolution-data-server security update
- [DLA 4505-1] ruby-rack security update
- [DSA 6175-1] libyaml-syck-perl security update
- [DSA 6174-1] spip security update
- ELA-1661-1 mapserver security update
- [DLA 4506-1] mapserver security update
- [DLA 4507-1] vlc security update
- [DSA 6176-1] strongswan security update
- ELA-1663-1 linux-6.1 security update
- ELA-1664-1 linux-5.10 security update
- ELA-1662-1 awstats security update
- [DLA 4508-1] nss security update
- [DLA 4509-1] awstats security update
- [DSA 6177-1] chromium security update
- [DSA 6178-1] firefox-esr security update
- [DLA 4511-1] thunderbird security update
- [DLA 4510-1] firefox-esr security update
- [DSA 6180-1] ruby-rack security update
- [DSA 6179-1] thunderbird security update
- ELA-1666-1 libvpx security update
- ELA-1665-1 strongswan security update
- [DLA 4512-1] strongswan security update
- [DSA 6181-1] bind9 security update
- ELA-1668-1 gvfs security update
- ELA-1667-1 gvfs security update
- [DLA 4513-1] gvfs security update
- [DSA 6182-1] libxml-parser-perl security update
Fedora Linux
Fedora Linux users on versions 42, 43, or 44 must prioritize installing critical security patches to protect their systems from known vulnerabilities. Recent updates address serious issues within popular packages like Localsearch which fixes heap buffer overflows, while Python-Diskcache requires a patch for arbitrary code execution risks. Among the improvements are essential tools including Rust libraries and .NET runtimes that received significant releases alongside Chromium and Wireshark updates. Failing to apply these updates leaves systems exposed to container escape risks or memory corruption bugs found within the browser engine during normal use.
- Fedora 43 Update: localsearch-3.10.2-2.fc43
- Fedora 43 Update: xen-4.20.2-4.fc43
- Fedora 43 Update: scitokens-cpp-1.4.1-1.fc43
- Fedora 42 Update: scitokens-cpp-1.4.1-1.fc42
- Fedora 44 Update: scitokens-cpp-1.4.1-1.fc44
- Fedora 42 Update: python-diskcache-5.6.3-12.fc42
- Fedora 43 Update: cmake-3.31.11-1.fc43
- Fedora 43 Update: giflib-5.2.2-9.fc43
- Fedora 43 Update: python-diskcache-5.6.3-12.fc43
- Fedora 44 Update: python-diskcache-5.6.3-12.fc44
- Fedora 42 Update: containernetworking-plugins-1.9.1-1.fc42
- Fedora 43 Update: chromium-146.0.7680.153-1.fc43
- Fedora 43 Update: python-multipart-1.3.1-1.fc43
- Fedora 43 Update: containernetworking-plugins-1.9.1-1.fc43
- Fedora 44 Update: chromium-146.0.7680.153-1.fc44
- Fedora 44 Update: musescore-4.6.5-37.fc44
- Fedora 44 Update: containernetworking-plugins-1.9.1-1.fc44
- Fedora 44 Update: chromium-146.0.7680.164-1.fc44
- Fedora 44 Update: dotnet8.0-8.0.125-1.fc44
- Fedora 44 Update: dotnet9.0-9.0.115-1.fc44
- Fedora 44 Update: dotnet10.0-10.0.104-1.fc44
- Fedora 44 Update: wireshark-4.6.4-2.fc44
- Fedora 44 Update: freerdp-3.24.0-2.fc44
- Fedora 43 Update: vim-9.2.240-1.fc43
- Fedora 43 Update: libopenmpt-0.8.6-1.fc43
- Fedora 43 Update: rust-wycheproof-0.6.0-1.fc43
- Fedora 43 Update: rust-asn1_derive-0.22.0-1.fc43
- Fedora 43 Update: rubygem-json-2.13.2-2.fc43
- Fedora 43 Update: rust-cryptoki-sys-0.5.0-2.fc43
- Fedora 43 Update: rust-cryptoki-0.12.0-2.fc43
- Fedora 43 Update: python-cryptography-46.0.5-1.fc43
- Fedora 43 Update: rust-asn1-0.22.0-1.fc43
- Fedora 43 Update: pyOpenSSL-26.0.0-1.fc43
- Fedora 43 Update: kryoptic-1.5.0-2.fc43
- Fedora 43 Update: headscale-0.28.0-1.fc43
- Fedora 43 Update: fontforge-20230101-20.fc43
- Fedora 43 Update: vtk-9.2.6-44.fc43
- Fedora 42 Update: fontforge-20230101-19.fc42
- Fedora 42 Update: vtk-9.2.6-38.fc42
- Fedora 44 Update: libopenmpt-0.8.6-1.fc44
- Fedora 44 Update: headscale-0.28.0-1.fc44
- Fedora 42 Update: chromium-146.0.7680.164-1.fc42
- Fedora 42 Update: php-phpseclib-2.0.52-1.fc42
- Fedora 42 Update: dotnet9.0-9.0.115-1.fc42
- Fedora 42 Update: samtools-1.23.1-1.fc42
- Fedora 42 Update: htslib-1.23.1-1.fc42
- Fedora 42 Update: bcftools-1.23.1-1.fc42
- Fedora 42 Update: roundcubemail-1.6.14-1.fc42
- Fedora 42 Update: mongo-c-driver-1.30.7-2.fc42
- Fedora 42 Update: dotnet8.0-8.0.125-1.fc42
- Fedora 42 Update: dotnet10.0-10.0.104-1.fc42
- Fedora 43 Update: python3.12-3.12.13-2.fc43
- Fedora 43 Update: perl-XML-Parser-2.51-1.fc43
- Fedora 43 Update: samtools-1.23.1-1.fc43
- Fedora 43 Update: htslib-1.23.1-1.fc43
- Fedora 43 Update: bcftools-1.23.1-1.fc43
- Fedora 43 Update: mongo-c-driver-1.30.7-2.fc43
- Fedora 43 Update: php-phpseclib-2.0.52-1.fc43
- Fedora 43 Update: python-uv-build-0.10.12-1.fc43
- Fedora 43 Update: roundcubemail-1.6.14-1.fc43
- Fedora 43 Update: rust-tar-0.4.45-1.fc43
- Fedora 43 Update: rust-astral-tokio-tar-0.6.0-1.fc43
- Fedora 43 Update: suricata-7.0.15-1.fc43
- Fedora 43 Update: python-fastar-0.9.0-2.fc43
- Fedora 43 Update: uv-0.10.12-1.fc43
- Fedora 43 Update: rust-nix-0.31.2-1.fc43
- Fedora 43 Update: maturin-1.9.6-5.fc43
- Fedora 44 Update: uv-0.11.2-1.fc44
- Fedora 44 Update: rust-reqsign-tencent-cos-3.0.0-1.fc44
- Fedora 44 Update: rust-reqsign-huaweicloud-obs-3.0.0-1.fc44
- Fedora 44 Update: rust-reqsign-file-read-tokio-3.0.0-1.fc44
- Fedora 44 Update: rust-reqsign-aliyun-oss-3.0.0-1.fc44
- Fedora 44 Update: rust-reqsign-command-execute-tokio-3.0.0-1.fc44
- Fedora 44 Update: rust-reqsign-azure-storage-3.0.0-1.fc44
- Fedora 44 Update: rust-reqsign-0.20.0-1.fc44
- Fedora 44 Update: rust-rustls-native-certs-0.8.3-1.fc44
- Fedora 44 Update: rust-webpki-root-certs-1.0.6-1.fc44
- Fedora 44 Update: rust-openssl-probe0.1-0.1.6-1.fc44
- Fedora 44 Update: rust-reqsign-http-send-reqwest-4.0.0-1.fc44
- Fedora 44 Update: rust-reqsign-google-3.0.0-1.fc44
- Fedora 44 Update: rust-astral-reqwest-retry-0.9.1-1.fc44
- Fedora 44 Update: rust-reqsign-core-3.0.0-1.fc44
- Fedora 44 Update: rust-astral-reqwest-middleware-0.5.1-1.fc44
- Fedora 44 Update: rust-astral_async_http_range_reader-0.10.0-1.fc44
- Fedora 44 Update: rust-openssl-probe-0.2.1-1.fc44
- Fedora 44 Update: rust-reqsign-aws-v4-3.0.0-1.fc44
- Fedora 44 Update: python-uv-build-0.11.2-1.fc44
- Fedora 44 Update: rust-native-tls-0.2.18-1.fc44
- Fedora 44 Update: rust-ambient-id-0.0.11-1.fc44
- Fedora 44 Update: perl-XML-Parser-2.51-1.fc44
- Fedora 44 Update: giflib-6.1.2-1.fc44
- Fedora 44 Update: samtools-1.23.1-1.fc44
- Fedora 44 Update: bcftools-1.23.1-1.fc44
- Fedora 44 Update: htslib-1.23.1-1.fc44
- Fedora 44 Update: mongo-c-driver-1.30.7-2.fc44
- Fedora 44 Update: rubygem-json-2.19.2-1.fc44
- Fedora 44 Update: roundcubemail-1.7~rc5-1.fc44
- Fedora 44 Update: suricata-8.0.4-1.fc44
- Fedora 44 Update: uv-0.10.12-1.fc44
- Fedora 44 Update: rust-nix-0.31.2-1.fc44
- Fedora 44 Update: rust-astral-tokio-tar-0.6.0-1.fc44
- Fedora 44 Update: python-fastar-0.9.0-2.fc44
- Fedora 44 Update: rust-tar-0.4.45-1.fc44
- Fedora 44 Update: python-uv-build-0.10.12-1.fc44
- Fedora 44 Update: maturin-1.9.6-5.fc44
- Fedora 42 Update: python3.6-3.6.15-55.fc42
- Fedora 42 Update: python3.11-3.11.15-2.fc42
- Fedora 42 Update: rust-ingredients-0.2.2-3.fc42
- Fedora 42 Update: rust-cargo-c-0.10.19-2.fc42
- Fedora 42 Update: rustup-1.29.0-2.fc42
- Fedora 42 Update: rust-sequoia-chameleon-gnupg-0.13.1-11.fc42
- Fedora 42 Update: rust-pty-process-0.5.3-1.fc42
- Fedora 42 Update: uv-0.10.12-1.fc42
- Fedora 42 Update: rust-nix-0.31.2-1.fc42
- Fedora 42 Update: rust-tar-0.4.45-1.fc42
- Fedora 42 Update: python-fastar-0.8.0-4.fc42
- Fedora 42 Update: maturin-1.9.6-4.fc42
- Fedora 42 Update: rust-astral-tokio-tar-0.6.0-1.fc42
- Fedora 42 Update: python-uv-build-0.10.12-1.fc42
- Fedora 43 Update: python3.6-3.6.15-55.fc43
- Fedora 43 Update: python3.11-3.11.15-2.fc43
- Fedora 43 Update: python-ply-3.11-33.fc43
- Fedora 43 Update: python3.13-3.13.12-2.fc43
- Fedora 43 Update: bind-dyndb-ldap-11.11-11.fc43
- Fedora 43 Update: bind-9.18.47-1.fc43
- Fedora 43 Update: chromium-146.0.7680.164-1.fc43
- Fedora 43 Update: rust-cargo-c-0.10.19-2.fc43
- Fedora 43 Update: rust-ingredients-0.2.2-3.fc43
- Fedora 43 Update: rustup-1.29.0-2.fc43
- Fedora 43 Update: pypy3.10-7.3.19-11.3.10.fc43
- Fedora 43 Update: pypy-7.3.21-3.fc43
- Fedora 43 Update: rust-sequoia-chameleon-gnupg-0.13.1-11.fc43
- Fedora 43 Update: rust-pty-process-0.5.3-1.fc43
- Fedora 44 Update: python3.6-3.6.15-55.fc44
- Fedora 44 Update: python3.11-3.11.15-2.fc44
- Fedora 44 Update: python3.13-3.13.12-2.fc44
- Fedora 44 Update: python-ply-3.11-33.fc44
- Fedora 44 Update: rust-ingredients-0.2.2-3.fc44
- Fedora 44 Update: rust-cargo-c-0.10.19-2.fc44
- Fedora 44 Update: rustup-1.29.0-2.fc44
- Fedora 44 Update: pypy3.10-7.3.19-11.3.10.fc44
- Fedora 44 Update: pypy-7.3.21-3.fc44
- Fedora 44 Update: rust-pty-process-0.5.3-1.fc44
- Fedora 44 Update: rust-sequoia-chameleon-gnupg-0.13.1-11.fc44
Oracle Linux
Oracle Linux has released a major update cycle that addresses critical patches across multiple system releases for administrators to apply now. Many advisories carry important ratings because they fix significant vulnerabilities found in core components like the kernel or glibc libraries during this round of maintenance. Administrators need to review new advisories impacting software like MySQL and Nginx because versions 8 through 10 face known vulnerabilities. Stability improvements for lvm2 and bootc resolve specific errors while ensuring better performance across different hardware platforms too.
- ELBA-2026-50163 dracut bug fix update
- ELBA-2026-50165 xfsprogs bug fix update
- ELSA-2026-5146 Important: Oracle Linux 10 yggdrasil security update
- ELSA-2026-50160 Important: Unbreakable Enterprise kernel security update
- ELSA-2026-5145 Important: Oracle Linux 10 yggdrasil-worker-package-manager security update
- ELSA-2026-5063 Important: Oracle Linux 10 libarchive security update
- ELBA-2026-5235 Oracle Linux 10 sos bug fix and enhancement update
- ELBA-2026-4711 Oracle Linux 10 bootc bug fix and enhancement update
- ELSA-2026-50160 Important: Oracle Linux 9 Unbreakable Enterprise kernel security update
- ELBA-2026-50164 Oracle Linux 9 xfsprogs bug fix update
- ELBA-2026-50162 Oracle Linux 9 dracut bug fix update
- ELBA-2026-50161 Oracle Linux 9 e2fsprogs bug fix update
- ELSA-2026-5602 Moderate: Oracle Linux 9 vim security update
- ELSA-2026-5080 Important: Oracle Linux 9 libarchive security update
- ELBA-2026-5600 Oracle Linux 9 dlm bug fix and enhancement update
- ELBA-2026-5321 Oracle Linux 9 kernel bug fix and enhancement update
- ELBA-2026-5236 Oracle Linux 9 nss bug fix and enhancement update
- ELSA-2026-5588 Moderate: Oracle Linux 8 python3 security update
- ELSA-2026-5587 Moderate: Oracle Linux 8 opencryptoki security update
- ELSA-2026-5585 Moderate: Oracle Linux 8 gnutls security update
- ELSA-2026-5581 Moderate: Oracle Linux 8 nginx:1.24 security update
- ELSA-2026-5513 Moderate: Oracle Linux 8 389-ds:1.4 security update
- ELSA-2026-5113 Important: Oracle Linux 8 gimp:2.8 security update
- ELBA-2026-5586 Oracle Linux 8 coreutils bug fix and enhancement update
- ELBA-2026-5579 Oracle Linux 8 cyrus-imapd bug fix and enhancement update
- ELBA-2026-5584 Oracle Linux 8 autofs bug fix and enhancement update
- ELSA-2026-4772 Moderate: Oracle Linux 8 glibc security update
- ELBA-2026-5583 Oracle Linux 8 curl bug fix and enhancement update
- ELBA-2026-5582 Oracle Linux 8 gvfs bug fix and enhancement update
- ELBA-2026-50166 Oracle Linux 8 systemd bug fix update
- ELSA-2026-3685 Important: Oracle Linux 7 kernel security update
- ELBA-2026-4833 Oracle Linux 7 tzdata bug fix and enhancement update
- ELSA-2026-5603 Moderate: Oracle Linux 9 opencryptoki security update
- ELBA-2026-5605 Oracle Linux 9 lvm2 bug fix and enhancement update
- ELBA-2026-5601 Oracle Linux 9 bootc bug fix and enhancement update
- ELBA-2026-5235 Oracle Linux 9 sos bug fix and enhancement update
- ELSA-2026-5640 Moderate: Oracle Linux 9 mysql:8.4 security update
- ELSA-2026-5599 Moderate: Oracle Linux 9 nginx security update
- ELSA-2026-5941 Important: Oracle Linux 10 golang security update
- ELSA-2026-5939 Important: Oracle Linux 10 freerdp security update
- ELSA-2026-5913 Moderate: Oracle Linux 10 ncurses security update
- ELSA-2026-5942 Important: Oracle Linux 9 golang security update
- ELSA-2026-5580 Moderate: Oracle Linux 8 mysql:8.0 security update
Red Hat Enterprise Linux
Red Hat Product Security has released a series of security advisories covering numerous packages across their Enterprise Linux distributions this week. Updates address vulnerabilities in essential tools like Python and libvpx while also targeting the system kernel for RHEL versions ranging from seven to ten. Moderate risk ratings apply to only a handful of modules instead. Users must prioritize installation of these high-risk components including osbuild-composer and ImageMagick to maintain system security now.
- RHSA-2026:5315: Moderate: python3.12 security update
- RHSA-2026:5231: Important: libvpx security update
- RHSA-2026:5226: Moderate: python3.9 security update
- RHSA-2026:5225: Moderate: python3.9 security update
- RHSA-2026:5229: Important: libvpx security update
- RHSA-2026:5218: Moderate: python3.9 security update
- RHSA-2026:5233: Moderate: grub2 security update
- RHSA-2026:5215: Moderate: python3 security update
- RHSA-2026:5230: Important: libvpx security update
- RHSA-2026:5222: Important: podman security update
- RHSA-2026:5234: Moderate: skopeo security update
- RHSA-2026:5224: Moderate: capstone security update
- RHSA-2026:5219: Moderate: python3.9 security update
- RHSA-2026:5223: Moderate: python3.11 security update
- RHSA-2026:5227: Important: libvpx security update
- RHSA-2026:5228: Important: libvpx security update
- RHSA-2026:5221: Moderate: python3 security update
- RHSA-2026:5214: Moderate: compat-openssl11 security update
- RHSA-2026:5197: Moderate: kernel security update
- RHSA-2026:5216: Moderate: python3 security update
- RHSA-2026:5217: Moderate: compat-openssl11 security update
- RHSA-2026:5196: Moderate: 389-ds:1.4 security update
- RHSA-2026:5327: Important: osbuild-composer security update
- RHSA-2026:5326: Important: libvpx security update
- RHSA-2026:5324: Important: libvpx security update
- RHSA-2026:5320: Important: libvpx security update
- RHSA-2026:5323: Important: libvpx security update
- RHSA-2026:5319: Important: libvpx security update
- RHSA-2026:5393: Moderate: python security update
- RHSA-2026:5389: Important: gimp security update
- RHSA-2026:5390: Important: gimp security update
- RHSA-2026:5388: Important: gimp security update
- RHSA-2026:5533: Important: osbuild-composer security update
- RHSA-2026:5513: Moderate: 389-ds:1.4 security update
- RHSA-2026:5511: Moderate: 389-ds:1.4 security update
- RHSA-2026:5514: Moderate: redhat-ds:11 security update
- RHSA-2026:5512: Moderate: redhat-ds:11 security update
- RHSA-2026:5482: Moderate: Red Hat JBoss Enterprise Application Platform 8.1.5 XP 6.0.3.GA release
- RHSA-2026:5445: Important: valkey security update
- RHSA-2026:5461: Important: osbuild-composer security update
- RHSA-2026:5399: Moderate: python3.12 security update
- RHSA-2026:5434: Important: gimp:2.8 security update
- RHSA-2026:5437: Important: gimp:2.8 security update
- RHSA-2026:5436: Important: gimp:2.8 security update
- RHSA-2026:5435: Important: gimp:2.8 security update
- RHSA-2026:5391: Important: gimp security update
- RHSA-2026:5544: Important: osbuild-composer security update
- RHSA-2026:5578: Moderate: virt:rhel and virt-devel:rhel security update
- RHSA-2026:5602: Moderate: vim security update
- RHSA-2026:5603: Moderate: opencryptoki security update
- RHSA-2026:5587: Moderate: opencryptoki security update
- RHSA-2026:5585: Moderate: gnutls security update
- RHSA-2026:5599: Moderate: nginx security update
- RHSA-2026:5588: Moderate: python3 security update
- RHSA-2026:5580: Moderate: mysql:8.0 security update
- RHSA-2026:5581: Moderate: nginx:1.24 security update
- RHSA-2026:5598: Moderate: 389-ds-base security update
- RHSA-2026:5597: Moderate: 389-ds-base security update
- RHSA-2026:5576: Moderate: 389-ds:1.4 security update
- RHSA-2026:5573: Important: ImageMagick security update
- RHSA-2026:5569: Moderate: redhat-ds:12 security update
- RHSA-2026:5568: Moderate: redhat-ds:11 security update
- RHSA-2026:5640: Moderate: mysql:8.4 security update
- RHSA-2026:5732: Moderate: kernel-rt security update
- RHSA-2026:5127: Moderate: OpenShift Container Platform 4.18.36 bug fix and security update
- RHSA-2026:5727: Moderate: kernel security update
- RHSA-2026:5692: Moderate: kernel security update
- RHSA-2026:5691: Moderate: kernel security update
- RHSA-2026:5689: Moderate: kernel security update
- RHSA-2026:5693: Moderate: kernel security update
- RHSA-2026:5690: Moderate: kernel-rt security update
- RHSA-2026:5831: Important: udisks2 security update
- RHSA-2026:5611: Important: Red Hat JBoss Web Server 6.2.1 release and security update
- RHSA-2026:5612: Important: Red Hat JBoss Web Server 6.2.1 release and security update
- RHSA-2026:5821: Moderate: kernel security update
- RHSA-2026:5813: Moderate: kernel security update
- RHSA-2026:5853: Important: osbuild-composer security update
- RHSA-2026:5852: Important: osbuild-composer security update
- RHSA-2026:5936: Important: freerdp security update
- RHSA-2026:5932: Important: firefox security update
- RHSA-2026:5930: Important: firefox security update
- RHSA-2026:5931: Important: firefox security update
- RHSA-2026:5919: Moderate: opencryptoki security update
- RHSA-2026:5917: Moderate: opencryptoki security update
- RHSA-2026:5913: Moderate: ncurses security update
- RHSA-2026:5086: Moderate: OpenShift Container Platform 4.14.63 packages and security update
- RHSA-2026:5087: Moderate: OpenShift Container Platform 4.14.63 bug fix and security update
- RHSA-2026:5944: Important: golang security update
- RHSA-2026:5942: Important: golang security update
- RHSA-2026:5943: Important: golang security update
- RHSA-2026:5971: Important: Satellite 6.16.7 Async Update
- RHSA-2026:5970: Important: Satellite 6.17.7 Async Update
- RHSA-2026:5968: Important: Satellite 6.18.4 Async Update
- RHSA-2026:5958: Moderate: libtiff security update
- RHSA-2026:5941: Important: golang security update
- RHSA-2026:5939: Important: freerdp security update
Rocky Linux
Rocky Linux users across multiple distributions must install several new security patches to address vulnerabilities within their system components. Although advisories primarily target Rocky Linux 8, specific updates also affect version 9 and the newer distribution 10 depending on which software package is in use. Critical fixes exist for kernel variants alongside important libraries like libarchive that need attention sooner than moderate severity tools such as vim or opencryptoki. While most warnings carry a moderate severity rating, administrators still need to apply these fixes immediately to maintain system security integrity.
- RLSA-2026:4772: Moderate: glibc security update
- RLSA-2023:5994: Important: python27:2.7 security update
- RLSA-2023:6980: Moderate: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update
- RLSA-2023:7042: Moderate: python27:2.7 security and bug fix update
- RLSA-2025:17129: Important: idm:DL1 security update
- RLSA-2026:5578: Moderate: virt:rhel and virt-devel:rhel security update
- RLSA-2026:5580: Moderate: mysql:8.0 security update
- RLSA-2026:5640: Moderate: mysql:8.4 security update
- RLSA-2026:3964: Moderate: kernel-rt security update
- RLSA-2026:3963: Moderate: kernel security update
- RLSA-2026:5080: Important: libarchive security update
- RLSA-2026:4898: Important: capstone security update
- RLSA-2026:4759: Moderate: kernel security update
- RLSA-2026:4717: Moderate: opencryptoki security update
- RLSA-2026:4705: Moderate: nginx security update
- RLSA-2026:4713: Moderate: python3.12 security update
- RLSA-2026:4723: Moderate: kernel security update
- RLSA-2026:4715: Moderate: vim security update
- RLSA-2026:5146: Important: yggdrasil security update
- RLSA-2026:5145: Important: yggdrasil-worker-package-manager security update
- RLSA-2026:5063: Important: libarchive security update
Slackware Linux
Slackware Linux systems can now install new security updates designed to protect Mozilla Firefox and Thunderbird from known vulnerabilities. Both applications have reached version 140 through this latest release cycle. Administrators should also note that separate advisories target the bind and TigerVNC packages on version 15.0 or -current systems. Specific fixes include resolving unbounded NSEC3 iterations in bind alongside a flaw allowing screen manipulation via x0vncserver in TigerVNC.
- mozilla-firefox (SSA:2026-083-01)
- mozilla-thunderbird (SSA:2026-083-02)
- bind (SSA:2026-084-01)
- tigervnc (SSA:2026-084-02)
SUSE Linux
SUSE recently issued numerous security advisories targeting vulnerabilities within their Linux Enterprise operating systems. Essential infrastructure tools including Docker and Helm received patches for critical flaws along with updates to Python libraries. Specific updates address memory access issues found in Chromium while others handle integer overflows located within core components. System administrators need to apply these fixes quickly across various system branches to maintain safety for openSUSE and Enterprise users alike.
- openSUSE-SU-2026:0093-1: important: Security update for chromium
- openSUSE-SU-2026:0094-1: important: Security update for chromium
- SUSE-SU-2026:0948-1: important: Security update for helm
- SUSE-SU-2026:0949-1: important: Security update for runc
- SUSE-SU-2026:0950-1: important: Security update for docker
- SUSE-SU-2026:0972-1: important: Security update for docker-stable
- SUSE-SU-2026:0971-1: moderate: Security update for python39
- openSUSE-SU-2026:10405-1: moderate: python314-3.14.3-3.1 on GA media
- openSUSE-SU-2026:10404-1: moderate: python310-3.10.20-2.1 on GA media
- openSUSE-SU-2026:10406-1: moderate: lemon-3.51.3-1.1 on GA media
- openSUSE-SU-2026:10403-1: moderate: python311-pypdf-6.9.1-1.1 on GA media
- openSUSE-SU-2026:10402-1: moderate: python311-PyPDF2-2.11.1-8.1 on GA media
- openSUSE-SU-2026:10401-1: moderate: freeciv-3.2.4-1.1 on GA media
- openSUSE-SU-2026:10399-1: moderate: GraphicsMagick-1.3.46-4.1 on GA media
- SUSE-SU-2026:0960-1: important: Security update for gvfs
- SUSE-SU-2026:0983-1: important: Security update for the Linux Kernel (Live Patch 37 for SUSE Linux Enterprise 15 SP4)
- SUSE-SU-2026:0978-1: important: Security update for strongswan
- SUSE-SU-2026:0979-1: important: Security update for strongswan
- SUSE-SU-2026:0976-1: important: Security update for go1.26-openssl
- SUSE-SU-2026:0977-1: critical: Security update for go1.25-openssl
- SUSE-SU-2026:0975-1: critical: Security update for python-Authlib
- SUSE-SU-2026:0981-1: important: Security update for strongswan
- SUSE-SU-2026:0982-1: moderate: Security update for util-linux
- SUSE-SU-2026:0992-1: important: Security update for the Linux Kernel (Live Patch 44 for SUSE Linux Enterprise 15 SP4)
- SUSE-SU-2026:0987-1: moderate: Security update for util-linux
- SUSE-SU-2026:0984-1: important: Security update for the Linux Kernel
- SUSE-SU-2026:0985-1: important: Security update for the Linux Kernel (Live Patch 43 for SUSE Linux Enterprise 15 SP4)
- SUSE-SU-2026:0998-1: important: Security update for gstreamer-plugins-ugly
- SUSE-SU-2026:0997-1: important: Security update for the Linux Kernel (Live Patch 45 for SUSE Linux Enterprise 15 SP4)
- openSUSE-SU-2026:0095-1: important: Security update for python-cbor2
- SUSE-SU-2026:1000-1: important: Security update for the Linux Kernel (Live Patch 24 for SUSE Linux Enterprise 15 SP5)
- SUSE-SU-2026:1041-1: important: Security update for the Linux Kernel
- SUSE-SU-2026:1042-1: important: Security update for govulncheck-vulndb
- SUSE-SU-2026:1039-1: important: Security update for the Linux Kernel (Live Patch 29 for SUSE Linux Enterprise 15 SP5)
- openSUSE-SU-2026:20390-1: moderate: Security update for protobuf
- openSUSE-SU-2026:20394-1: low: Security update for mumble
- openSUSE-SU-2026:20383-1: important: Security update for net-snmp
- openSUSE-SU-2026:20380-1: important: Security update for snpguest
- openSUSE-SU-2026:20388-1: important: Security update for postgresql17
- openSUSE-SU-2026:20393-1: important: Security update for python-simpleeval
- openSUSE-SU-2026:20378-1: important: Security update for libpng16
- SUSE-SU-2026:1003-1: important: Security update for the Linux Kernel
- SUSE-SU-2026:1008-1: important: Security update for Prometheus
- openSUSE-SU-2026:10415-1: moderate: glances-common-4.5.2-1.1 on GA media
- openSUSE-SU-2026:10413-1: moderate: firefox-esr-140.9.0-1.1 on GA media
- openSUSE-SU-2026:10416-1: moderate: python313-PyMuPDF-1.27.2.2-1.1 on GA media
- openSUSE-SU-2026:10407-1: moderate: azure-storage-azcopy-10.32.2-1.1 on GA media
- openSUSE-SU-2026:10410-1: moderate: pnpm-10.32.1-1.1 on GA media
- openSUSE-SU-2026:10412-1: moderate: python311-pydicom-3.0.2-1.1 on GA media
- openSUSE-SU-2026:10414-1: moderate: perl-Crypt-URandom-0.550.0-1.1 on GA media
- openSUSE-SU-2026:10409-1: moderate: pgvector-devel-0.8.2-1.1 on GA media
- openSUSE-SU-2026:10411-1: moderate: python311-dynaconf-3.2.13-1.1 on GA media
- SUSE-SU-2026:1013-1: important: Security update 5.0.7 for Multi-Linux Manager Client Tools
- SUSE-SU-2026:1027-1: important: Security update for salt
- SUSE-SU-2026:1028-1: important: Security update for salt
- SUSE-SU-2026:1029-1: important: Security update for salt
- SUSE-SU-2026:1035-1: important: Maintenance update for Multi-Linux Manager 4.3 Release Notes Release Notes
- SUSE-SU-2026:1037-1: important: Security update for grafana
- SUSE-SU-2026:1002-1: important: Security update for the Linux Kernel (Live Patch 28 for SUSE Linux Enterprise 15 SP5)
- SUSE-SU-2026:1046-1: important: Security update for the Linux Kernel (Live Patch 36 for SUSE Linux Enterprise 15 SP4)
- SUSE-SU-2026:1063-1: moderate: Security update for frr
- SUSE-SU-2026:1062-1: important: Security update for python310
- SUSE-SU-2026:1064-1: important: Security update for python-tornado6
- SUSE-SU-2026:1065-1: moderate: Security update for sqlite3
- SUSE-SU-2026:1068-1: important: Security update for pgvector
- SUSE-SU-2026:1067-1: moderate: Security update for python-urllib3
- SUSE-SU-2026:1060-1: important: Security update for the Linux Kernel (Live Patch 35 for SUSE Linux Enterprise 15 SP5)
- SUSE-SU-2026:1059-1: important: Security update for the Linux Kernel (Live Patch 34 for SUSE Linux Enterprise 15 SP5)
- openSUSE-SU-2026:0097-1: important: Security update for chromium
- openSUSE-SU-2026:0096-1: important: Security update for chromium
- SUSE-SU-2026:1048-1: important: Security update for the Linux Kernel (Live Patch 33 for SUSE Linux Enterprise 15 SP5)
- SUSE-SU-2026:1049-1: important: Security update for the Linux Kernel (Live Patch 30 for SUSE Linux Enterprise 15 SP5)
- SUSE-SU-2026:1075-1: important: Security update for python-pyasn1
- SUSE-SU-2026:1077-1: important: Security update for the Linux Kernel
- SUSE-SU-2026:1073-1: important: Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise 15 SP6)
- SUSE-SU-2026:1083-1: important: Security update for the Linux Kernel (Live Patch 13 for SUSE Linux Enterprise 15 SP6)
- SUSE-SU-2026:1090-1: important: Security update for python3
- SUSE-SU-2026:1091-1: important: Security update for kea
- SUSE-SU-2026:1094-1: important: Security update for python-deepdiff
- SUSE-SU-2026:1092-1: important: Security update for xen
- SUSE-SU-2026:1089-1: important: Security update for the Linux Kernel (Live Patch 14 for SUSE Linux Enterprise 15 SP6)
- openSUSE-SU-2026:0099-1: important: Security update for glusterfs
- openSUSE-SU-2026:0098-1: important: Security update for python-nltk
- openSUSE-SU-2026:0100-1: important: Security update for v2ray-core
- SUSE-SU-2026:1105-1: important: Security update for containerd
- SUSE-SU-2026:1098-1: important: Security update for cosign
- SUSE-SU-2026:1107-1: important: Security update for python312
- SUSE-SU-2026:1096-1: important: Security update for the Linux Kernel (Live Patch 4 for SUSE Linux Enterprise 15 SP7)
- SUSE-SU-2026:1117-1: important: Security update for python311
- SUSE-SU-2026:1099-1: important: Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise 15 SP7)
- SUSE-SU-2026:1100-1: important: Security update for the Linux Kernel (Live Patch 18 for SUSE Linux Enterprise 15 SP6)
- SUSE-SU-2026:1102-1: important: Security update for the Linux Kernel (Live Patch 8 for SUSE Linux Enterprise 15 SP7)
- SUSE-SU-2026:1126-1: important: Security update for MozillaFirefox
- SUSE-SU-2026:1122-1: moderate: Security update for redis
- SUSE-SU-2026:1125-1: important: Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 15 SP7)
- SUSE-SU-2026:1129-1: important: Security update for freerdp
- openSUSE-SU-2026:0104-1: important: Security update for glusterfs
- openSUSE-SU-2026:0102-1: important: Security update for python-pydicom
- openSUSE-SU-2026:0103-1: important: Security update for v2ray-core
- openSUSE-SU-2026:20429-1: important: Security update for python-dynaconf
- openSUSE-SU-2026:20422-1: important: Security update for chromium
- openSUSE-SU-2026:20419-1: important: Security update for python-pyOpenSSL
- openSUSE-SU-2026:20428-1: important: Security update for gimp
- openSUSE-SU-2026:20410-1: important: Security update for exiv2
- openSUSE-SU-2026:20412-1: important: Security update for salt
- openSUSE-SU-2026:20421-1: moderate: Security update for python-ldap
- openSUSE-SU-2026:20415-1: important: Security update for 389-ds
- openSUSE-SU-2026:20414-1: important: Security update for tomcat11
- openSUSE-SU-2026:20406-1: important: Security update for python-tornado6
- openSUSE-SU-2026:20399-1: moderate: Security update for libsodium
- openSUSE-SU-2026:20404-1: important: Security update for curl
- openSUSE-SU-2026:20402-1: important: Security update for gstreamer-plugins-ugly
- openSUSE-SU-2026:20403-1: important: Security update for vim
- openSUSE-SU-2026:20407-1: moderate: Security update for python-orjson
- openSUSE-SU-2026:20397-1: moderate: Security update for poppler
- openSUSE-SU-2026:10417-1: moderate: python311-deepdiff-8.6.2-1.1 on GA media
- openSUSE-SU-2026:10423-1: moderate: nginx-1.29.7-1.1 on GA media
- openSUSE-SU-2026:10421-1: moderate: kea-3.0.3-1.1 on GA media
- openSUSE-SU-2026:10426-1: moderate: python311-intake-2.0.9-1.1 on GA media
- openSUSE-SU-2026:10422-1: moderate: libtpms-devel-0.10.2-1.1 on GA media
- openSUSE-SU-2026:10419-1: moderate: rclone-1.73.3-1.1 on GA media
- openSUSE-SU-2026:10420-1: moderate: amazon-cloudwatch-agent-1.300064.0-2.1 on GA media
- openSUSE-SU-2026:10425-1: moderate: python311-cbor2-5.9.0-1.1 on GA media
- openSUSE-SU-2026:10424-1: moderate: jupyter-bqplot-jupyterlab-0.5.46-14.1 on GA media
- openSUSE-SU-2026:10418-1: moderate: python311-jsonpath-ng-1.8.0-1.1 on GA media
Ubuntu Linux
Ubuntu recently released security advisories for several components including LibTIFF and strongSwan. These vulnerabilities could allow attackers to crash services or gain unauthorized access if the systems remain unpatched. Critical patches address kernel flaws on IBM cloud infrastructure that could let attackers escape containers entirely. Additionally, cryptography modules require immediate updates to prevent modified ciphertext from bypassing authentication tag verification checks.
- [USN-8110-1] Net-CIDR vulnerability
- [USN-8109-1] Debian Goodies vulnerability
- [USN-8113-1] LibTIFF vulnerabilities
- [USN-8116-1] Linux kernel (Intel IoTG Real-time) vulnerabilities
- [USN-8096-5] Linux kernel (NVIDIA Tegra IGX) vulnerabilities
- [USN-8095-4] Linux kernel (AWS) vulnerabilities
- [USN-8114-1] GVfs vulnerabilities
- [USN-8115-1] pyOpenSSL vulnerabilities
- [USN-8119-2] systemd vulnerabilities
- [USN-8119-1] systemd vulnerabilities
- [USN-8094-3] Linux kernel (Real-time) vulnerabilities
- [USN-8117-1] strongSwan vulnerability
- [USN-8118-1] sized-chunks vulnerabilities
- [USN-8112-4] Linux kernel (Azure FIPS) vulnerabilities
- [USN-8112-3] Linux kernel (Azure) vulnerabilities
- [USN-8059-9] Linux kernel (Azure FIPS) vulnerabilities
- [USN-8098-4] Linux kernel vulnerabilities
- [USN-8098-6] Linux kernel (FIPS) vulnerabilities
- [USN-8098-5] Linux kernel vulnerabilities
- [USN-8120-1] Redis vulnerability
- [USN-8112-5] Linux kernel (Azure) vulnerabilities
- [USN-8121-1] Linux kernel (AWS FIPS) vulnerability
- [USN-8122-1] PJSIP vulnerabilities
- [USN-8098-8] Linux kernel (Azure FIPS) vulnerabilities
- [USN-8098-7] Linux kernel (Azure) vulnerabilities
- [USN-8124-1] Bind vulnerabilities
- [USN-8126-1] Linux kernel (Azure) vulnerabilities
- [USN-8125-1] Linux kernel (Azure) vulnerabilities
- [USN-8094-4] Linux kernel (Azure) vulnerabilities
- [USN-8123-1] Mbed TLS vulnerabilities
- [USN-8128-1] CryptX vulnerabilities
- [USN-8098-9] Linux kernel (IBM) vulnerabilities
Security patches remain the most effective defense against modern threats facing Linux infrastructure. Applying these updates regularly keeps your data safe and systems resilient without relying on complex manual configurations. Administrators should set schedules for maintenance tasks to avoid conflicts with critical applications running in production environments. Keeping repositories current ensures no new risks slip through unnoticed. Best wishes for a stable deployment week ahead.