This week brings a massive wave of patches across major distributions, with Red Hat and its clones facing the most urgent critical vulnerabilities in their Cockpit web interface. Administrators must prioritize these fixes immediately because memory handling flaws can allow remote code execution without authentication on newer platforms. Debian, Ubuntu, Fedora, SUSE, and Slackware users also need to update browsers and kernels to prevent potential security breaches on their networks today. Ignoring these advisories is a fast track to system compromise, so run the update commands for your distribution without delay.
Apply these critical Linux security updates before attackers scan your network
This week brings a massive wave of patches across the major distributions, and ignoring them is a fast track to system compromise. Administrators need to prioritize the kernel and application fixes immediately because memory handling flaws can allow remote code execution without authentication. The following overview breaks down exactly which Linux security updates require immediate attention for AlmaLinux, RHEL, Debian, Ubuntu, and others.
Enterprise distributions face critical Cockpit vulnerabilities
Red Hat Enterprise Linux users have the most urgent task this week due to a critical flaw in the Cockpit web interface. An unauthenticated attacker could potentially execute remote code on newer platforms if they do not apply the SSH command-line argument injection fix found in RHSA-2026:7382 through 7384. This specific issue stands out because it bypasses standard login procedures entirely, making it a priority over general maintenance tasks. The same kernel and crun security updates affecting AlmaLinux also appear here for versions six through ten, so system owners should install these patches promptly to prevent denial of service attacks.
Rocky Linux administrators across versions eight through ten must also address critical issues within essential software like the kernel and OpenSSH immediately. Users should verify their specific OS version since NodeJS versions 22 and 24 face critical problems on release nine specifically, requiring a targeted upgrade path rather than a blanket update. The updates for Fontforge and Vim are less urgent but still need regular maintenance soon enough to avoid moderate risks in utility functions.
Debian and Ubuntu users must patch browsers and kernels
Ubuntu has released numerous security notices to fix critical flaws found within the Linux kernel and various other software packages. Legacy versions on older distributions also remain vulnerable to memory buffer exploits that allow unauthenticated attackers to access sensitive data beyond just standard user privileges. Patches for OpenSSL and Django are also critical for maintaining security across all supported distributions, so system administrators must prioritize applying these fixes now to prevent potential security breaches on their networks today.
Debian has issued a wave of new security advisories targeting popular software such as Valkey, Tor, and Apache Traffic Server. Many of these patches address dangerous vulnerabilities including SQL injection flaws or denial of service risks found in Dovecot and Python-Tornado, while others fix memory disclosure issues. One update even fixes a regression in the dovecot package causing authentication errors on Bookworm systems. System administrators must prioritize applying these patches immediately because they are essential to resolving the critical code execution threats present in Firefox ESR and PostgreSQL across all affected Debian distributions.
Fedora and SUSE require prompt action for rolling releases
Fedora has issued several security notifications requiring users on versions 42 and 43 to apply critical patches for their systems. Administrators must act quickly on specific risks like a dangerous double-free vulnerability in giflib or flaws within Nextcloud version 33. Updates for other tools such as BIND, OpenSC, and Cockpit could potentially lead to memory corruption or privilege escalation issues if ignored by the user base.
SUSE has released numerous security updates to address vulnerabilities across both openSUSE Tumbleweed and SUSE Linux Enterprise distributions. Administrators must prioritize critical patches found within OpenSSL 3 as well as the Linux Kernel Live Patch for version 15 SP5. Several other important advisories cover fixes for ImageMagick, Python, and BIND while resolving risks on various service packs. Moderate vulnerabilities in packages like corosync were also fixed to ensure system stability for Tumbleweed users.
Slackware Linux Security Team recently patched security issues in Mozilla Thunderbird and Firefox for version 15.0 or the current development branch. Users should upgrade immediately to reach version 140 for safety since use-after-free errors could potentially corrupt chunk data inside specific functions within libpng. Critical flaws involving DANE client code and CMS processing are resolved through new OpenSSL packages available now.

The Security Updates in Detail
Here is an in-depth overview of the updates recently released for AlmaLinux, Debian GNU/Linux, Fedora Linux, Red Hat Enterprise Linux, Rocky Linux, Slackware Linux, SUSE Linux, and Ubuntu Linux.
AlmaLinux
Recent notifications from AlmaLinux warn of moderate security issues affecting multiple operating system versions. Users on version eight specifically need to update their kernels and crun software immediately because these patches fix memory handling flaws and prevent denial of service attacks. Additional advisories address critical flaws in applications ranging from database servers to font editors like FreeRDP and Nginx for versions eight through ten. These vulnerabilities allow attackers to execute arbitrary code on vulnerable systems if patches are not applied quickly.
- ALSA-2026:6621: crun security update (Moderate)
- ALSA-2026:6572: kernel-rt security update (Moderate)
- ALSA-2026:6571: kernel security update (Moderate)
- ALSA-2026:6622: crun security update (Moderate)
- ALSA-2026:6799: freerdp security update (Important)
- ALSA-2026:6906: nginx security update (Important)
- ALSA-2026:7080: nodejs22 security update (Important)
- ALSA-2026:6463: openssh security update (Important)
- ALSA-2026:7081: libtiff security update (Moderate)
- ALSA-2026:6631: fontforge security update (Important)
- ALSA-2026:6766: python3.9 security update (Important)
- ALSA-2026:6923: nginx:1.24 security update (Important)
- ALSA-2026:6462: openssh security update (Important)
- ALSA-2026:6628: fontforge security update (Important)
- ALSA-2025:4049: libtasn1 security update (Moderate)
- ALSA-2025:4063: ruby:3.1 security update (Moderate)
- ALSA-2025:2872: pcs security update (Important)
- ALSA-2025:11047: pcs security update (Moderate)
- ALSA-2025:3210: container-tools:rhel8 security update (Important)
- ALSA-2025:3026: kernel security update (Important)
- ALSA-2024:10987: pcs security update (Moderate)
- ALSA-2025:3027: kernel-rt security update (Important)
- ALSA-2025:3388: python-jinja2 security update (Important)
- ALSA-2025:4048: xmlrpc-c security update (Moderate)
- ALSA-2025:8254: pcs security update (Important)
- ALSA-2025:12527: virt:rhel and virt-devel:rhel security update (Moderate)
- ALSA-2026:6750: gstreamer1-plugins-bad-free, gstreamer1-plugins-base, and gstreamer1-plugins-good security update (Important)
- ALSA-2026:6949: go-toolset:rhel8 security update (Important)
- ALSA-2026:6915: vim security update (Important)
- ALSA-2026:6918: freerdp security update (Important)
- ALSA-2026:6391: mysql:8.4 security update (Moderate)
- ALSA-2026:6435: mariadb:10.11 security update (Moderate)
- ALSA-2026:6461: openssh security update (Important)
Debian GNU/Linux
Debian has issued a wave of new security advisories targeting popular software such as Valkey, Tor, and Apache Traffic Server. Many of these patches address dangerous vulnerabilities including SQL injection flaws or denial of service risks found in Dovecot and Python-Tornado, while others fix memory disclosure issues. One update even fixes a regression in the dovecot package causing authentication errors on Bookworm systems. System administrators must prioritize applying these patches immediately because they are essential to resolving the critical code execution threats present in Firefox ESR and PostgreSQL across all affected Debian distributions.
- [DSA 6198-1] valkey security update
- [DSA 6197-1] dovecot security update
- [DSA 6200-1] tor security update
- [DSA 6199-1] trafficserver security update
- [DSA 6197-2] dovecot regression update
- ELA-1672-1 python-tornado security update
- [DSA 6201-1] openssl security update
- [DSA 6303-1] tiff security update
- [DSA 6202-1] firefox-esr security update
- ELA-1676-1 postgresql-11 security update
- ELA-1677-1 postgresql-9.6 security update
- ELA-1678-1 bind9 security update
- [DLA 4524-1] postgresql-13 security update
- [DLA 4525-1] libyaml-syck-perl security update
- [DSA 6204-1] openssh security update
- ELA-1679-1 libyaml-syck-perl security update
- [DLA 4526-1] firefox-esr security update
- [DSA 6205-1] chromium security update
- ELA-1680-1 clamav new upstream version
- ELA-1679-1 libyaml-syck-perl security update
- [DLA 4527-1] inetutils security update
- [DLA 4528-1] webkit2gtk security update
- [DSA 6206-1] gdk-pixbuf security update
Fedora Linux
Fedora has issued several security notifications requiring users on versions 42 and 43 to apply critical patches for their systems. Administrators must act quickly on specific risks like a dangerous double-free vulnerability in giflib or flaws within Nextcloud version 33. Updates for other tools such as BIND, OpenSC, and Cockpit could potentially lead to memory corruption or privilege escalation issues if ignored by the user base. Because they address serious flaws ranging from buffer overflows to smart card library weaknesses across the distribution, system owners should install these updates promptly.
- Fedora 42 Update: giflib-5.2.2-9.fc42
- Fedora 42 Update: nextcloud-33.0.1-1.fc42
- Fedora 43 Update: calibre-9.6.0-1.fc43
- Fedora 42 Update: kea-3.0.3-1.fc42
- Fedora 43 Update: corosync-3.1.10-2.fc43
- Fedora 43 Update: pspp-2.1.1-5.fc43
- Fedora 43 Update: goose-1.23.2-7.fc43
- Fedora 43 Update: rauc-1.15.2-1.fc43
- Fedora 43 Update: kea-3.0.3-1.fc43
- Fedora 42 Update: bind-dyndb-ldap-11.11-10.fc42
- Fedora 42 Update: bind-9.18.47-1.fc42
- Fedora 42 Update: roundcubemail-1.6.15-1.fc42
- Fedora 43 Update: opensc-0.27.1-1.fc43
- Fedora 43 Update: python-biopython-1.87-1.fc43
- Fedora 43 Update: cef-146.0.9^chromium146.0.7680.164-1.fc43
- Fedora 43 Update: python-pydicom-3.0.2-1.fc43
- Fedora 43 Update: roundcubemail-1.6.15-1.fc43
- Fedora 42 Update: opensc-0.27.1-1.fc42
- Fedora 42 Update: dnsdist-1.9.12-1.fc42
- Fedora 42 Update: doctl-1.154.0-1.fc42
- Fedora 42 Update: libcgif-0.5.3-1.fc42
- Fedora 42 Update: libpng12-1.2.57-25.fc42
- Fedora 42 Update: libpng15-1.5.30-25.fc42
- Fedora 42 Update: crun-1.27-1.fc42
- Fedora 43 Update: cockpit-360-1.fc43
- Fedora 43 Update: mbedtls-3.6.6-1.fc43
- Fedora 43 Update: dnsdist-2.0.3-1.fc43
- Fedora 43 Update: util-linux-2.41.4-7.fc43
- Fedora 43 Update: doctl-1.154.0-1.fc43
- Fedora 43 Update: libpng12-1.2.57-25.fc43
- Fedora 43 Update: fido-device-onboard-0.5.5-8.fc43
- Fedora 43 Update: libcgif-0.5.3-1.fc43
- Fedora 43 Update: libpng15-1.5.30-25.fc43
Red Hat Enterprise Linux
Red Hat has issued multiple security updates addressing vulnerabilities within its Enterprise Linux systems across release versions ranging from six to ten. These advisories target flaws in widely used tools such as fontforge, vim, and the kernel carrying moderate or important severity ratings with some critical issues noted throughout the collection. A serious injection vulnerability in Cockpit allows attackers to potentially execute remote code without authentication on newer platforms. Administrators should prioritize these fixes immediately.
- RHSA-2026:6620: Important: vim security update
- RHSA-2026:6621: Moderate: crun security update
- RHSA-2026:6617: Important: vim security update
- RHSA-2026:6622: Moderate: crun security update
- RHSA-2026:6570: Moderate: kernel security update
- RHSA-2026:6635: Important: fontforge security update
- RHSA-2026:6630: Moderate: gnutls security update
- RHSA-2026:6628: Important: fontforge security update
- RHSA-2026:6647: Important: libarchive security update
- RHSA-2026:6632: Moderate: kernel security update
- RHSA-2026:6631: Important: fontforge security update
- RHSA-2026:6618: Moderate: gnutls security update
- RHSA-2026:6616: Important: freerdp security update
- RHSA-2026:6619: Important: vim security update
- RHSA-2026:6571: Moderate: kernel security update
- RHSA-2026:6572: Moderate: kernel-rt security update
- RHSA-2026:6665: Important: freerdp security update
- RHSA-2026:6692: Moderate: kernel security update
- RHSA-2026:6725: Important: vim security update
- RHSA-2026:6713: Important: ImageMagick security update
- RHSA-2026:6712: Important: freerdp security update
- RHSA-2026:6766: Important: python3.9 security update
- RHSA-2026:6764: Important: freerdp security update
- RHSA-2026:6750: Important: gstreamer1-plugins-bad-free, gstreamer1-plugins-base, and gstreamer1-plugins-good security update
- RHSA-2026:6738: Moderate: gnutls security update
- RHSA-2026:6737: Moderate: gnutls security update
- RHSA-2026:6743: Important: freerdp security update
- RHSA-2026:6736: Important: vim security update
- RHSA-2026:6731: Important: vim security update
- RHSA-2026:6729: Important: vim security update
- RHSA-2026:6727: Important: freerdp security update
- RHSA-2026:6730: Important: vim security update
- RHSA-2026:6954: Moderate: kernel security update
- RHSA-2026:6953: Moderate: kernel security update
- RHSA-2026:6940: Moderate: kernel security update
- RHSA-2026:6949: Important: go-toolset:rhel8 security update
- RHSA-2026:6948: Low: kernel-rt security update
- RHSA-2026:6918: Important: freerdp security update
- RHSA-2026:6915: Important: vim security update
- RHSA-2026:6923: Important: nginx:1.24 security update
- RHSA-2026:6917: Important: thunderbird security update
- RHSA-2026:6907: Important: nginx:1.24 security update
- RHSA-2026:6906: Important: nginx security update
- RHSA-2026:6825: Moderate: rsync security update
- RHSA-2026:6817: Important: capstone security update
- RHSA-2026:6888: Important: microcode_ctl security update
- RHSA-2026:6799: Important: freerdp security update
- RHSA-2026:6986: Moderate: kernel security update
- RHSA-2026:6958: Important: freerdp security update
- RHSA-2026:6961: Moderate: kernel security update
- RHSA-2026:7001: Important: fontforge security update
- RHSA-2026:7081: Moderate: libtiff security update
- RHSA-2026:7010: Important: python3.12 security update
- RHSA-2026:7035: Important: libpng12 security update
- RHSA-2026:7013: Moderate: kernel security update
- RHSA-2026:7032: Important: libpng12 security update
- RHSA-2026:7033: Important: libpng12 security update
- RHSA-2026:7034: Important: libpng12 security update
- RHSA-2026:7036: Important: libpng12 security update
- RHSA-2026:7005: Important: git-lfs security update
- RHSA-2026:7003: Moderate: kernel security update
- RHSA-2026:7002: Important: nginx security update
- RHSA-2026:7093: Important: libarchive security update
- RHSA-2026:7123: Important: nodejs:22 security update
- RHSA-2026:7106: Important: libarchive security update
- RHSA-2026:7105: Important: libarchive security update
- RHSA-2026:7107: Important: openssh security update
- RHSA-2026:7100: Moderate: kernel-rt security update
- RHSA-2026:7080: Important: nodejs22 security update
- RHSA-2026:7011: Important: grafana security update
- RHSA-2026:7009: Important: grafana-pcp security update
- RHSA-2026:7244: Important: python3.12 security update
- RHSA-2026:6492: Important: OpenShift Container Platform 4.12.87 bug fix and security update
- RHSA-2026:7310: Important: nodejs22 security update
- RHSA-2026:7304: Moderate: libtiff security update
- RHSA-2026:7302: Important: nodejs:22 security update
- RHSA-2026:7292: Important: freerdp security update
- RHSA-2026:7259: Important: git-lfs security update
- RHSA-2026:6552: Moderate: OpenShift Container Platform 4.18.37 packages and security update
- RHSA-2026:6553: Important: OpenShift Container Platform 4.18.37 bug fix and security update
- RHSA-2026:7350: Important: nodejs:24 security update
- RHSA-2026:7343: Important: nginx:1.26 security update
- RHSA-2026:7342: Important: kea security update
- RHSA-2026:7328: Important: rhc security update
- RHSA-2026:7315: Important: rhc security update
- RHSA-2026:7382: Critical: cockpit: Unauthenticated remote code execution due to SSH command-line argument injection
- RHSA-2026:7384: Critical: cockpit: Unauthenticated remote code execution due to SSH command-line argument injection
- RHSA-2026:7383: Critical: cockpit: Unauthenticated remote code execution due to SSH command-line argument injection
- RHSA-2026:7381: Critical: cockpit: Unauthenticated remote code execution due to SSH command-line argument injection
Rocky Linux
Rocky Linux administrators across versions eight through ten must install multiple security patches to address known vulnerabilities immediately. Critical issues within essential software like the kernel and OpenSSH require urgent attention from anyone managing production environments today. Some advisories also target moderate risks found in utilities such as Vim or Fontforge that still need regular maintenance soon enough. Users should verify their specific OS version since NodeJS versions 22 and 24 face critical problems on release nine specifically.
- RLSA-2026:6036: Moderate: kernel-rt security update
- RLBA-2024:5287: lldpd bug fix and enhancement update
- RLSA-2026:5932: Important: firefox security update
- RLSA-2026:6005: Important: freerdp security update
- RLSA-2026:6281: Important: python3.11 security update
- RLSA-2026:5581: Moderate: nginx:1.24 security update
- RLSA-2026:5513: Moderate: 389-ds:1.4 security update
- RLSA-2026:6283: Important: python3.12 security update
- RLSA-2026:6037: Moderate: kernel security update
- RLSA-2026:5587: Moderate: opencryptoki security update
- RLSA-2026:5585: Moderate: gnutls security update
- RLSA-2026:6391: Moderate: mysql:8.4 security update
- RLSA-2026:5603: Moderate: opencryptoki security update
- RLSA-2026:6301: Important: squid security update
- RLSA-2026:6300: Important: gstreamer1-plugins-bad-free, gstreamer1-plugins-base, gstreamer1-plugins-good, and gstreamer1-plugins-ugly-free security update
- RLSA-2026:6188: Important: thunderbird security update
- RLSA-2026:6285: Important: python3.12 security update
- RLSA-2026:6340: Important: freerdp security update
- RLSA-2026:5602: Moderate: vim security update
- RLSA-2026:6390: Moderate: rsync security update
- RLSA-2026:5942: Important: golang security update
- RLSA-2026:5930: Important: firefox security update
- RLSA-2026:6266: Moderate: libxslt security update
- RLSA-2026:6286: Important: python3.11 security update
- RLSA-2026:6382: Important: grafana security update
- RLSA-2026:6383: Important: grafana-pcp security update
- RLSA-2026:6923: Important: nginx:1.24 security update
- RLSA-2026:6628: Important: fontforge security update
- RLSA-2026:6621: Moderate: crun security update
- RLSA-2026:6153: Moderate: kernel security update
- RLSA-2026:6949: Important: go-toolset:rhel8 security update
- RLSA-2026:7123: Important: nodejs:22 security update
- RLSA-2026:6470: Important: perl-YAML-Syck security update
- RLSA-2026:6439: Important: libpng15 security update
- RLSA-2026:6750: Important: gstreamer1-plugins-bad-free, gstreamer1-plugins-base, and gstreamer1-plugins-good security update
- RLSA-2026:6907: Important: nginx:1.24 security update
- RLSA-2026:6445: Important: libpng12 security update
- RLSA-2026:6918: Important: freerdp security update
- RLSA-2026:6461: Important: openssh security update
- RLSA-2026:6436: Moderate: rsync security update
- RLSA-2026:6915: Important: vim security update
- RLSA-2026:6631: Important: fontforge security update
- RLSA-2026:6388: Important: grafana-pcp security update
- RLSA-2026:6817: Important: capstone security update
- RLSA-2026:6622: Moderate: crun security update
- RLSA-2026:5941: Important: golang security update
- RLSA-2026:6342: Important: thunderbird security update
- RLSA-2026:6825: Moderate: rsync security update
- RLSA-2026:6799: Important: freerdp security update
- RLSA-2026:6906: Important: nginx security update
- RLSA-2026:6053: Moderate: kernel security update
- RLSA-2026:6344: Important: grafana security update
- RLSA-2026:6259: Important: gstreamer1-plugins-bad-free, gstreamer1-plugins-base, gstreamer1-plugins-good, and gstreamer1-plugins-ugly-free security update
- RLSA-2026:5931: Important: firefox security update
- RLSA-2026:5913: Moderate: ncurses security update
- RLSA-2026:6766: Important: python3.9 security update
- RLSA-2026:7343: Important: nginx:1.26 security update
- RLSA-2026:7350: Important: nodejs:24 security update
- RLSA-2026:7302: Important: nodejs:22 security update
- RLSA-2026:7005: Important: git-lfs security update
- RLSA-2026:7081: Moderate: libtiff security update
- RLSA-2026:7259: Important: git-lfs security update
- RLSA-2026:7011: Important: grafana security update
- RLSA-2026:7009: Important: grafana-pcp security update
- RLSA-2026:7350: Important: nodejs:24 security update
- RLSA-2026:7302: Important: nodejs:22 security update
- RLSA-2026:7342: Important: kea security update
- RLSA-2026:6917: Important: thunderbird security update
- RLSA-2026:6570: Moderate: kernel security update
- RLSA-2026:6572: Moderate: kernel-rt security update
- RLSA-2026:6571: Moderate: kernel security update
Slackware Linux
Recent updates from the Slackware Linux Security Team patch security issues in Mozilla Thunderbird and Firefox. Users on version 15.0 or the current development branch should upgrade immediately to reach version 140 for safety. Libpng requires a separate update as well because use-after-free errors could potentially corrupt chunk data inside specific functions. Critical flaws involving DANE client code and CMS processing are resolved through new OpenSSL packages available now.
- mozilla-thunderbird (SSA:2026-098-02)
- mozilla-firefox (SSA:2026-098-01)
- libpng (SSA:2026-099-01)
- openssl (SSA:2026-101-01)
SUSE Linux
SUSE has released numerous security updates to address vulnerabilities across both openSUSE Tumbleweed and SUSE Linux Enterprise distributions. Administrators must prioritize critical patches found within OpenSSL 3 as well as the Linux Kernel Live Patch for version 15 SP5. Several other important advisories cover fixes for ImageMagick, Python, and BIND while resolving risks on various service packs. Moderate vulnerabilities in packages like corosync were also fixed to ensure system stability for Tumbleweed users.
- openSUSE-SU-2026:10488-1: moderate: corosync-3.1.10-4.1 on GA media
- openSUSE-SU-2026:10489-1: moderate: libinput-devel-1.31.1-1.1 on GA media
- SUSE-SU-2026:1203-1: important: Security update for ImageMagick
- SUSE-SU-2026:1206-1: important: Security update for python
- SUSE-SU-2026:1205-1: important: Security update for govulncheck-vulndb
- SUSE-SU-2026:1192-1: important: Security update for python-pyOpenSSL
- SUSE-SU-2026:1193-1: important: Security update for gimp
- SUSE-SU-2026:1194-1: important: Security update for google-cloud-sap-agent
- openSUSE-SU-2026:20461-1: low: Security update for dnsdist
- openSUSE-SU-2026:10499-1: moderate: python311-social-auth-app-django-5.7.0-1.1 on GA media
- openSUSE-SU-2026:10497-1: moderate: heroic-games-launcher-2.20.1-5.1 on GA media
- openSUSE-SU-2026:10498-1: moderate: libeverest-3.6.6-1.1 on GA media
- openSUSE-SU-2026:10494-1: moderate: SDL2_image-devel-2.8.10-1.1 on GA media
- openSUSE-SU-2026:10495-1: moderate: ckermit-9.0.302-20.1 on GA media
- openSUSE-SU-2026:10496-1: moderate: git-cliff-2.12.0-1.1 on GA media
- SUSE-SU-2026:1213-1: important: Security update for openssl-3
- SUSE-SU-2026:1214-1: important: Security update for openssl-3
- SUSE-SU-2026:1215-1: important: Security update for openssl-3
- SUSE-SU-2026:1217-1: important: Security update for freerdp
- SUSE-SU-2026:1212-1: important: Security update for the Linux Kernel (Live Patch 30 for SUSE Linux Enterprise 15 SP5)
- SUSE-SU-2026:1220-1: moderate: Security update for python-poetry
- SUSE-SU-2026:1222-1: important: Security update for the Linux Kernel (Live Patch 40 for SUSE Linux Enterprise 15 SP4)
- SUSE-SU-2026:1225-1: important: Security update for the Linux Kernel (Live Patch 15 for SUSE Linux Enterprise 15 SP6)
- SUSE-SU-2026:1236-1: important: Security update for the Linux Kernel (Live Patch 12 for SUSE Linux Enterprise 15 SP6)
- SUSE-SU-2026:1230-1: important: Security update for bind
- SUSE-SU-2026:1231-1: important: Security update for the Linux Kernel (Live Patch 48 for SUSE Linux Enterprise 15 SP4)
- openSUSE-SU-2026:20477-1: important: Security update for aws-c-event-stream
- openSUSE-SU-2026:20465-1: important: Security update for tigervnc
- openSUSE-SU-2026:20476-1: moderate: Security update for mapserver
- openSUSE-SU-2026:20464-1: important: Security update for cockpit-repos
- openSUSE-SU-2026:20466-1: important: Security update for libpng16
- openSUSE-SU-2026:10507-1: moderate: python311-lupa-2.7-1.1 on GA media
- openSUSE-SU-2026:10501-1: moderate: MozillaThunderbird-140.9.1-1.1 on GA media
- openSUSE-SU-2026:10505-1: moderate: libIex-3_4-33-3.4.9-1.1 on GA media
- openSUSE-SU-2026:10504-1: moderate: corepack24-24.14.1-1.1 on GA media
- openSUSE-SU-2026:10502-1: moderate: dcmtk-3.7.0-2.1 on GA media
- openSUSE-SU-2026:10503-1: moderate: firefox-esr-140.9.1-1.1 on GA media
- openSUSE-SU-2026:10506-1: moderate: jupyter-jupyterlab-templates-0.5.3-1.1 on GA media
- openSUSE-SU-2026:10500-1: moderate: 389-ds-3.1.4+e2562f589-1.1 on GA media
- SUSE-SU-2026:1237-1: important: Security update for the Linux Kernel (Live Patch 47 for SUSE Linux Enterprise 15 SP4)
- SUSE-SU-2026:1239-1: important: Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise 15 SP6)
- SUSE-SU-2026:1254-1: important: Security update for the Linux Kernel (Live Patch 32 for SUSE Linux Enterprise 15 SP5)
- SUSE-SU-2026:1257-1: important: Security update for openssl-1_1
- SUSE-SU-2026:1252-1: important: Security update for tigervnc
- SUSE-SU-2026:1248-1: important: Security update for the Linux Kernel (Live Patch 28 for SUSE Linux Enterprise 15 SP5)
- openSUSE-SU-2026:10514-1: moderate: go1.25-1.25.9-1.1 on GA media
- openSUSE-SU-2026:10517-1: moderate: python313-Django6-6.0.4-1.1 on GA media
- openSUSE-SU-2026:10513-1: moderate: fontforge-20251009-6.1 on GA media
- openSUSE-SU-2026:10516-1: moderate: python311-Django4-4.2.30-1.1 on GA media
- openSUSE-SU-2026:10511-1: moderate: MozillaFirefox-149.0.2-1.1 on GA media
- openSUSE-SU-2026:10510-1: moderate: sudo-1.9.17p2-2.1 on GA media
- SUSE-SU-2026:1242-1: important: Security update for the Linux Kernel (Live Patch 45 for SUSE Linux Enterprise 15 SP4)
- openSUSE-SU-2026:10528-1: moderate: libradcli10-1.5.0-1.1 on GA media
- openSUSE-SU-2026:10529-1: moderate: tekton-cli-0.44.1-1.1 on GA media
- openSUSE-SU-2026:10527-1: moderate: perl-XML-Parser-2.570.0-1.1 on GA media
- openSUSE-SU-2026:10524-1: moderate: crun-1.27-1.1 on GA media
- openSUSE-SU-2026:10522-1: moderate: python315-3.15.0~a8-1.1 on GA media
Ubuntu Linux
Ubuntu has released numerous security notices to fix critical flaws found within the Linux kernel and various other software packages. Legacy versions on older distributions also remain vulnerable to memory buffer exploits that allow unauthenticated attackers to access sensitive data. Beyond kernel updates, patches for OpenSSL and Django are also critical for maintaining security across all supported distributions. System administrators must prioritize applying these fixes now to prevent potential security breaches on their networks today.
- [USN-8150-1] SPIP vulnerabilities
- [USN-8147-1] libarchive vulnerabilities
- [USN-8148-4] Linux kernel (Real-time) vulnerabilities
- [USN-8145-3] Linux kernel (GCP) vulnerabilities
- [USN-8152-1] Linux kernel (OEM) vulnerabilities
- [USN-8151-1] lambdaisland/uri vulnerability
- [USN-8153-1] Salt vulnerabilities
- [USN-8089-3] ADSys, Juju Core, LXD vulnerabilities
- [USN-8154-1] Django vulnerabilities
- [USN-8149-2] Linux kernel vulnerabilities
- [USN-8159-1] Linux kernel vulnerabilities
- [USN-8155-1] OpenSSL vulnerabilities
- [USN-8156-1] GDK-PixBuf vulnerability
- [USN-8157-1] Squid vulnerabilities
- [USN-8148-5] Linux kernel vulnerabilities
- [USN-8159-2] Linux kernel (FIPS) vulnerabilities
- [USN-8159-3] Linux kernel (Real-time) vulnerabilities
- [USN-8158-1] Dogtag PKI vulnerability
- [USN-8163-1] Linux kernel (Azure FIPS) vulnerabilities
- [USN-8162-1] Linux kernel (NVIDIA Tegra) vulnerabilities
- [USN-8145-4] Linux kernel (HWE) vulnerabilities
- [USN-8165-1] Linux kernel (Azure FIPS) vulnerabilities
- [USN-8164-1] Linux kernel (Intel IoTG Real-time) vulnerabilities
- [USN-8154-2] Django vulnerabilities
- [USN-8155-2] OpenSSL vulnerabilities
- [USN-8160-1] MongoDB vulnerability
- [USN-8161-1] QEMU vulnerabilities
How to upgrade packages
This quick overview shows exactly what commands you need to run so the latest security patches and bug fixes actually make it onto your system without hunting down individual .deb or .rpm files.
Debian/Ubuntu (apt)
The first thing to do is refresh the local package index; running sudo apt update contacts all configured repositories and pulls in the newest lists of available versions. Skipping this step leaves the system blind to any recent uploads, which explains why “upgrade” sometimes claims there’s nothing to do even after a security advisory has been published. Once the index is current, invoke sudo apt upgrade -y; the -y flag answers every prompt automatically so the process doesn’t pause for user input. This command upgrades all installed packages that have newer versions in the repositories while preserving configuration files.
sudo apt update sudo apt upgrade -y
Fedora/RedHat/Rocky/Alma/Oracle (dnf or yum)
On modern Fedora and recent Red Hat derivatives, dnf is the package manager; older RHEL releases still rely on yum. Begin with a check‑update operation—sudo dnf check-update or sudo yum check-update—to see exactly which packages are awaiting an upgrade. This preview step can be useful for spotting unexpected kernel bumps before they land. To actually apply the updates, run sudo dnf upgrade -y (or sudo yum update if you prefer the older tool). The upgrade command pulls down the new binaries and runs any necessary post‑install scripts, such as rebuilding initramfs when a kernel changes.
sudo dnf check-update sudo dnf upgrade -y
or on older releases
sudo yum check-update sudo yum update
SUSE (zypper)
SUSE’s command line front‑end is called zypper. First execute sudo zypper refresh so that the metadata for all enabled repos gets updated; without this, zypper will happily report “No updates available” even though newer packages sit on the mirror. After a fresh refresh, issue sudo zypper update -y; this upgrades every package to the latest version in the configured repositories and automatically handles service restarts when required.
sudo zypper refresh sudo zypper update -y
Slackware (slackpkg and pkgtool)
Slackware doesn’t have a single unified updater, but the official way to pull updates is through slackpkg. Start with sudo slackpkg update to download the newest package list from the chosen mirror. Then run sudo slackpkg upgrade-all; this command walks through each installed package and replaces it with the most recent build available in the official repository. For users who prefer a more granular approach, specifying a package name after upgrade limits the operation to that single item. When dealing with community‑maintained repositories, pkgtool takes over: a combined sudo pkgtool update && sudo pkgtool upgrade will sync and apply updates from the mirrors listed in /etc/slackpkg/mirrors.
sudo slackpkg update sudo slackpkg upgrade-all