This week's Linux security updates demand immediate attention because a critical unauthenticated remote code execution flaw in Cockpit leaves AlmaLinux and Oracle Linux systems wide open to unauthorized command execution, so patching those servers should be your absolute top priority. Fedora 42 through 44 are getting hammered with massive patch waves that fix KDE Plasma components, core libraries like cURL and Python, and several memory corruption bugs that would otherwise let attackers run wild on your desktops. RHEL and Rocky admins need to grab the critical authentication fix for the rhc package first, then tackle important updates for BIND, Firefox, and NodeJS while carefully installing Ubuntu cloud kernels to avoid breaking Azure, GCP, or NVIDIA driver stability. Debian, SUSE, Slackware, Gentoo, and Qubes OS also pushed essential fixes for systemd, sudo, FUSE, and a screensaver login bypass that could easily let attackers skip authentication during brief display transitions if you leave your workstation unattended.
Linux Security Updates: Critical Cockpit RCE and Fedora 44 Patches Require Immediate Attention
This week's Linux security updates bring a dangerous unauthenticated remote code execution flaw in Cockpit to AlmaLinux and Oracle Linux systems, alongside massive patch waves for Fedora 42 through 44 and critical kernel fixes across Ubuntu cloud variants. Administrators managing production environments should prioritize the Cockpit remediation immediately, as this vulnerability allows attackers to execute arbitrary commands without credentials. The rest of the release cycle includes important updates for BIND, Firefox, NodeJS, and a slew of KDE Plasma components that demand routine maintenance windows.
Critical Alert: Unauthenticated Cockpit RCE in This Week's Linux Security Updates
The most urgent item in this batch targets the Cockpit web management tool on AlmaLinux and Oracle Linux systems running versions eight through ten. Both distributions have released advisories addressing an unauthenticated remote code execution vulnerability caused by SSH command-line argument injection. This flaw allows malicious actors to bypass authentication entirely and run arbitrary code on affected machines, which is a nightmare scenario for any server administrator. The severity rating is critical, indicating that automated exploitation tools are likely already circulating in the wild. System owners should apply the patches labeled ALSA-2026:7383 for AlmaLinux and ELSA-2026-7383 for Oracle Linux without delay. If immediate patching is impossible due to operational constraints, restricting network access to the Cockpit port until remediation occurs is a necessary stopgap measure to prevent unauthorized control of the infrastructure.
Fedora 42 Through 44 Receive Massive KDE Plasma and Core Fixes
Fedora users are facing a significant update cycle across versions 42, 43, and 44 that addresses heap buffer overflows, credential leaks, and memory corruption issues. A large portion of the updates focuses on KDE Plasma tools, with dozens of packages like plasma-workspace, kwin, and various framework components receiving version bumps to address stability and security concerns. Beyond the desktop environment, core libraries such as cURL, Python, libpng, and erlang also require attention. The volume of changes suggests a coordinated push to harden the stack before broader deployment, so administrators should expect service restarts for affected services like Podman and NetworkManager during the update process. Running these updates promptly will prevent potential privilege escalation risks that could compromise system integrity on workstations and development servers alike.
RHEL and Rocky Linux Updates Highlight Critical RHC Patch
Red Hat Enterprise Linux distributions continue their steady stream of security advisories, though one item stands out due to its critical rating. The rhc package has received a critical update that addresses authentication flaws, making this a priority over the numerous important fixes for Firefox, NodeJS, and GStreamer. Rocky Linux mirrors much of this content, with updates targeting the kernel, BIND, Vim, and .NET frameworks across versions eight through ten. Administrators running OpenShift Container Platform should also review the associated bug fix and security advisories to ensure cluster stability. The presence of multiple Perl XML-Parser and nghttp2 updates indicates ongoing efforts to mitigate parsing vulnerabilities that have plagued these libraries in recent months, so verifying application compatibility after installation is a prudent step for enterprise environments.
Ubuntu Kernels and Qubes Screensaver Bypass Need Review
Ubuntu has issued a wide array of updates spanning USN-8166 through USN-8188, covering everything from Vim and Rust to Redis and Polkit. Cloud administrators managing instances on Azure, GCP, or NVIDIA infrastructure must pay close attention to the kernel variants, as these fixes address vulnerabilities in drivers and networking stacks specific to those environments. The FIPS and Real-time kernel updates also require verification to ensure compliance and latency requirements remain met after installation. Meanwhile, Qubes OS users should apply bulletin 111 to fix a login bypass vulnerability in xfce4-screensaver version four point three. This flaw allows input to skip the lock screen during display transitions, potentially granting unauthorized access to underlying applications if the system is left unattended for brief periods. Patching this issue restores standard login procedures and closes the gap that attackers could exploit during activation phases.
Debian, SUSE, Slackware, and Gentoo Roundup
Other distributions are also pushing essential fixes that should not be ignored. Debian has released advisories targeting FFmpeg, systemd, OpenSSH, PostgreSQL, and BIND, with several updates addressing privilege escalation risks and excessive CPU drain from malicious DNS zones. SUSE and openSUSE have deployed a massive wave of kernel live patches alongside updates for sudo, Podman, Chromium, and Python libraries, reflecting the breadth of vulnerabilities affecting enterprise workloads. Slackware administrators need to apply fixes for libarchive, Xorg-server, libexif, and CUPS to address heap buffer overflows and type confusion errors that could crash services or leak data. Gentoo users should install advisories GLSA 202604-03 and 202604-04 to patch arbitrary file creation flaws in DTrace and multiple vulnerabilities within FUSE, which could allow attackers to run unauthorized code on compromised systems.

A Closer Look at Recent Security Updates
Below is a comprehensive breakdown of the latest security patches released for AlmaLinux, Debian GNU/Linux, Fedora Linux, Gentoo Linux, Qubes OS, Red Hat Enterprise Linux, Rocky Linux, Slackware Linux, SUSE Linux, and Ubuntu Linux.
AlmaLinux
AlmaLinux recently released a batch of security patches to address dangerous flaws across versions eight through ten. These updates target critical and important vulnerabilities in widely used packages like Firefox, Squid, NodeJS, BIND, and Thunderbird. The patched weaknesses could allow malicious actors to execute arbitrary code or trigger denial of service attacks on affected systems. Server administrators need to install these fixes promptly to maintain a secure environment.
- ALSA-2026:7672: firefox security update (Important)
- ALSA-2026:7666: nghttp2 security update (Important)
- ALSA-2026:6817: capstone security update (Important)
- ALSA-2026:8119: squid security update (Important)
- ALSA-2026:7675: nodejs24 security update (Important)
- ALSA-2026:7682: openexr security update (Important)
- ALSA-2026:6825: rsync security update (Moderate)
- ALSA-2026:6632: kernel security update (Moderate)
- ALSA-2026:7711: vim security update (Important)
- ALSA-2026:7680: perl-XML-Parser security update (Important)
- ALSA-2026:7992: golang-github-openprinting-ipp-usb security update (Important)
- ALSA-2026:7383: cockpit: Unauthenticated remote code execution due to SSH command-line argument injection (Critical)
- ALSA-2026:7342: kea security update (Important)
- ALSA-2026:7005: git-lfs security update (Important)
- ALSA-2026:8075: bind security update (Important)
- ALSA-2026:8259: vim security update (Important)
- ALSA-2026:7915: bind9.18 security update (Important)
- ALSA-2026:8052: firefox security update (Important)
- ALSA-2026:6570: kernel security update (Moderate)
- ALSA-2026:7002: nginx security update (Important)
- ALSA-2026:7350: nodejs:24 security update (Important)
- ALSA-2026:7384: cockpit: Unauthenticated remote code execution due to SSH command-line argument injection (Critical)
- ALSA-2026:7259: git-lfs security update (Important)
- ALSA-2026:7343: nginx:1.26 security update (Important)
- ALSA-2026:7668: nghttp2 security update (Important)
- ALSA-2026:7671: firefox security update (Important)
- ALSA-2026:7679: perl-XML-Parser security update (Important)
- ALSA-2026:8096: perl:5.32 security update (Moderate)
- ALSA-2026:7896: nodejs:20 security update (Important)
- ALSA-2026:6917: thunderbird security update (Important)
- ALSA-2026:7009: grafana-pcp security update (Important)
- ALSA-2026:7677: fontforge security update (Important)
- ALSA-2026:7123: nodejs:22 security update (Important)
- ALSA-2026:7011: grafana security update (Important)
- ALSA-2026:7670: nodejs:24 security update (Important)
- ALSA-2026:1240: fence-agents security update (Important)
- ALSA-2026:6907: nginx:1.24 security update (Important)
- ALSA-2026:1241: resource-agents security update (Important)
- ALSA-2026:8155: bind9.16 security update (Important)
- ALSA-2026:7681: perl-XML-Parser security update (Important)
- ALSA-2026:7667: nghttp2 security update (Important)
- ALSA-2026:8339: nodejs:20 security update (Important)
- ALSA-2026:8317: squid:4 security update (Important)
- ALSA-2026:8312: bind security update (Important)
- ALSA-2026:8093: pcs security update (Moderate)
- ALSA-2026:8352: bind security update (Important)
- ALSA-2026:8472: .NET 9.0 security update (Important)
- ALSA-2026:8492: libarchive security update (Important)
- ALSA-2026:8457: freerdp security update (Important)
- ALSA-2026:8469: .NET 8.0 security update (Important)
- ALSA-2026:8459: thunderbird security update (Important)
- ALSA-2026:8510: libarchive security update (Important)
Debian GNU/Linux
Debian recently issued a series of security advisories targeting critical vulnerabilities across numerous widely used software packages. The updates address serious flaws in essential tools like FFmpeg, systemd, OpenSSH, PostgreSQL, and Perl that could allow attackers to execute arbitrary code or escalate privileges. Certain flaws in systemd could let local attackers bypass security checks, whereas BIND resolvers face excessive CPU drain from malicious DNS zones. System administrators should prioritize applying these patches right away to keep their Debian systems secure against active exploitation attempts.
- ELA-1681-1 ffmpeg security update
- [DSA 6208-1] mediawiki security update
- [DSA 6207-1] flatpak security update
- [DLA 4529-1] bind9 security update
- [DLA 4530-1] gst-plugins-bad1.0 security update
- [DSA 6209-1] xdg-dbus-proxy security update
- [DLA 4533-1] systemd security update
- [DLA 4532-1] python3.9 regression and security update
- [DSA 6213-1] lxd security update
- [DSA 6212-1] incus security update
- [DLA 4535-1] openssh security update
- [DLA 4534-1] thunderbird security update
- ELA-1684-1 nss security update
- [DLA 4524-2] postgresql-13 regression update
- [DLA 4537-1] mapserver security update
- [DLA 4536-1] tiff security update
- [DSA 6214-1] chromium security update
- [DSA 6216-1] opam security update
- [DSA 6215-1] gimp security update
- [DSA 6217-1] luanti security update
- ELA-1685-1 perl security update
- ELA-1676-2 postgresql-11 regression update
- ELA-1677-2 postgresql-9.6 regression update
- ELA-1686-1 mapserver security update
- [DSA 6218-1] mupdf security update
- [DLA 4538-1] perl security update
Fedora Linux
Fedora recently pushed critical security patches across versions 42 through 44 to fix dangerous flaws in widely used software. The updates cover a messy mix of packages ranging from cURL and Python to libpng and various KDE Plasma tools. You will find corrections for heap buffer overflows, credential leaks, and memory corruption issues that could let attackers run arbitrary code on your machines. Get these installed as soon as possible before threat actors exploit the gaps.
- Fedora 42 Update: python-cairosvg-2.9.0-1.fc42
- Fedora 42 Update: cef-146.0.11^chromium146.0.7680.177-2.fc42
- Fedora 42 Update: moby-engine-29.4.0-1.fc42
- Fedora 42 Update: erlang-26.2.5.19-1.fc42
- Fedora 42 Update: mingw-openexr-3.3.9-1.fc42
- Fedora 42 Update: libpng-1.6.56-1.fc42
- Fedora 42 Update: perl-Devel-Cover-1.44-7.fc42
- Fedora 42 Update: polymake-4.15-3.fc42
- Fedora 42 Update: perl-5.40.4-520.fc42
- Fedora 42 Update: perl-PAR-Packer-1.064-3.fc42
- Fedora 43 Update: python-cairosvg-2.9.0-1.fc43
- Fedora 43 Update: cef-146.0.11^chromium146.0.7680.177-2.fc43
- Fedora 43 Update: pypy-7.3.21-8.fc43
- Fedora 43 Update: composer-2.9.7-1.fc43
- Fedora 43 Update: micropython-1.28.0-1.fc43
- Fedora 43 Update: python3.15-3.15.0~a8-1.fc43
- Fedora 43 Update: moby-engine-29.4.0-1.fc43
- Fedora 43 Update: erlang-26.2.5.19-1.fc43
- Fedora 43 Update: python-flask-httpauth-4.8.1-1.fc43
- Fedora 43 Update: NetworkManager-ssh-1.4.4-1.fc43
- Fedora 43 Update: mingw-openexr-3.3.9-1.fc43
- Fedora 44 Update: plasma-workspace-wallpapers-6.6.4-1.fc44
- Fedora 44 Update: cockpit-360.1-1.fc44
- Fedora 44 Update: xdg-desktop-portal-kde-6.6.4-1.fc44
- Fedora 44 Update: spectacle-6.6.4-1.fc44
- Fedora 44 Update: qqc2-breeze-style-6.6.4-1.fc44
- Fedora 44 Update: plymouth-theme-breeze-6.6.4-1.fc44
- Fedora 44 Update: powerdevil-6.6.4-1.fc44
- Fedora 44 Update: plasma-welcome-6.6.4-1.fc44
- Fedora 44 Update: spacebar-6.6.4-1.fc44
- Fedora 44 Update: plasma-vault-6.6.4-1.fc44
- Fedora 44 Update: sddm-kcm-6.6.4-1.fc44
- Fedora 44 Update: plasma-setup-6.6.4-4.fc44
- Fedora 44 Update: polkit-kde-6.6.4-1.fc44
- Fedora 44 Update: plasma-sdk-6.6.4-1.fc44
- Fedora 44 Update: plymouth-kcm-6.6.4-1.fc44
- Fedora 44 Update: plasma-workspace-x11-6.6.4-1.fc44
- Fedora 42 Update: thunderbird-149.0.1-2.fc42
- Fedora 42 Update: nix-2.31.4-1.fc42
- Fedora 43 Update: skopeo-1.22.2-1.fc43
- Fedora 43 Update: libexif-0.6.26-1.fc43
- Fedora 43 Update: podman-5.8.2-1.fc43
- Fedora 43 Update: buildah-1.43.1-1.fc43
- Fedora 43 Update: nix-2.31.4-1.fc43
- Fedora 44 Update: plasma-pa-6.6.4-1.fc44
- Fedora 44 Update: plasma-workspace-6.6.4-1.fc44
- Fedora 44 Update: plasma-oxygen-6.6.4-1.fc44
- Fedora 44 Update: plasma-thunderbolt-6.6.4-1.fc44
- Fedora 44 Update: plasma-milou-6.6.4-1.fc44
- Fedora 44 Update: plasma-login-manager-6.6.4-1.fc44
- Fedora 44 Update: plasma-systemsettings-6.6.4-1.fc44
- Fedora 44 Update: plasma-systemmonitor-6.6.4-1.fc44
- Fedora 44 Update: plasma-drkonqi-6.6.4-1.fc44
- Fedora 44 Update: plasma-print-manager-6.6.4-1.fc44
- Fedora 44 Update: plasma-nm-6.6.4-1.fc44
- Fedora 44 Update: plasma-discover-6.6.4-1.fc44
- Fedora 44 Update: plasma-dialer-6.6.4-1.fc44
- Fedora 44 Update: plasma-nano-6.6.4-1.fc44
- Fedora 44 Update: plasma-mobile-6.6.4-1.fc44
- Fedora 44 Update: plasma-desktop-6.6.4-1.fc44
- Fedora 44 Update: plasma-breeze-6.6.4-1.fc44
- Fedora 44 Update: plasma-keyboard-6.6.4-1.fc44
- Fedora 44 Update: plasma-activities-stats-6.6.4-1.fc44
- Fedora 44 Update: plasma-integration-6.6.4-1.fc44
- Fedora 44 Update: pam-kwallet-6.6.4-1.fc44
- Fedora 44 Update: plasma-firewall-6.6.4-1.fc44
- Fedora 44 Update: oxygen-sounds-6.6.4-1.fc44
- Fedora 44 Update: libplasma-6.6.4-1.fc44
- Fedora 44 Update: plasma-disks-6.6.4-1.fc44
- Fedora 44 Update: libksysguard-6.6.4-1.fc44
- Fedora 44 Update: plasma-browser-integration-6.6.4-1.fc44
- Fedora 44 Update: plasma-activities-6.6.4-1.fc44
- Fedora 44 Update: kwin-6.6.4-2.fc44
- Fedora 44 Update: kwrited-6.6.4-1.fc44
- Fedora 44 Update: plasma5support-6.6.4-1.fc44
- Fedora 44 Update: ksystemstats-6.6.4-1.fc44
- Fedora 44 Update: kwayland-integration-6.6.4-1.fc44
- Fedora 44 Update: ocean-sound-theme-6.6.4-1.fc44
- Fedora 44 Update: ksshaskpass-6.6.4-1.fc44
- Fedora 44 Update: kscreen-6.6.4-1.fc44
- Fedora 44 Update: libkscreen-6.6.4-1.fc44
- Fedora 44 Update: krdp-6.6.4-1.fc44
- Fedora 44 Update: layer-shell-qt-6.6.4-1.fc44
- Fedora 44 Update: knighttime-6.6.4-1.fc44
- Fedora 44 Update: kwin-x11-6.6.4-1.fc44
- Fedora 44 Update: kwayland-6.6.4-1.fc44
- Fedora 44 Update: kglobalacceld-6.6.4-1.fc44
- Fedora 44 Update: kscreenlocker-6.6.4-1.fc44
- Fedora 44 Update: kf6-sonnet-6.25.0-1.fc44
- Fedora 44 Update: kpipewire-6.6.4-1.fc44
- Fedora 44 Update: kf6-prison-6.25.0-1.fc44
- Fedora 44 Update: kmenuedit-6.6.4-1.fc44
- Fedora 44 Update: kinfocenter-6.6.4-1.fc44
- Fedora 44 Update: kgamma-6.6.4-1.fc44
- Fedora 44 Update: kf6-threadweaver-6.25.0-1.fc44
- Fedora 44 Update: kf6-syntax-highlighting-6.25.0-1.fc44
- Fedora 44 Update: kf6-syndication-6.25.0-1.fc44
- Fedora 44 Update: kf6-kwidgetsaddons-6.25.0-1.fc44
- Fedora 44 Update: kf6-solid-6.25.0-1.fc44
- Fedora 44 Update: kf6-qqc2-desktop-style-6.25.0-1.fc44
- Fedora 44 Update: kf6-kunitconversion-6.25.0-1.fc44
- Fedora 44 Update: kf6-ktexteditor-6.25.0-1.fc44
- Fedora 44 Update: kf6-purpose-6.25.0-1.fc44
- Fedora 44 Update: kf6-networkmanager-qt-6.25.0-1.fc44
- Fedora 44 Update: kf6-kstatusnotifieritem-6.25.0-1.fc44
- Fedora 44 Update: kf6-ksvg-6.25.0-1.fc44
- Fedora 44 Update: kf6-modemmanager-qt-6.25.0-1.fc44
- Fedora 44 Update: kf6-kxmlgui-6.25.0-1.fc44
- Fedora 44 Update: kf6-kwindowsystem-6.25.0-1.fc44
- Fedora 44 Update: kf6-krunner-6.25.0-1.fc44
- Fedora 44 Update: kf6-kwallet-6.25.0-1.fc44
- Fedora 44 Update: kf6-kuserfeedback-6.25.0-1.fc44
- Fedora 44 Update: kf6-ktextwidgets-6.25.0-1.fc44
- Fedora 44 Update: kf6-kplotting-6.25.0-1.fc44
- Fedora 44 Update: kf6-ktexttemplate-6.25.0-1.fc44
- Fedora 44 Update: kf6-kparts-6.25.0-1.fc44
- Fedora 44 Update: kf6-kpeople-6.25.0-1.fc44
- Fedora 44 Update: kf6-knotifyconfig-6.25.0-1.fc44
- Fedora 44 Update: kf6-kservice-6.25.0-1.fc44
- Fedora 44 Update: kf6-knewstuff-6.25.0-1.fc44
- Fedora 44 Update: kf6-kpty-6.25.0-1.fc44
- Fedora 44 Update: kf6-kquickcharts-6.25.0-1.fc44
- Fedora 44 Update: kf6-kitemmodels-6.25.0-1.fc44
- Fedora 44 Update: kf6-kirigami-6.25.0-1.fc44
- Fedora 44 Update: kf6-kio-6.25.0-1.fc44
- Fedora 44 Update: kf6-kimageformats-6.25.0-2.fc44
- Fedora 44 Update: kf6-kiconthemes-6.25.0-1.fc44
- Fedora 44 Update: kf6-kpackage-6.25.0-1.fc44
- Fedora 44 Update: kf6-kholidays-6.25.0-1.fc44
- Fedora 44 Update: kf6-kitemviews-6.25.0-1.fc44
- Fedora 44 Update: kf6-kjobwidgets-6.25.0-1.fc44
- Fedora 44 Update: kf6-kguiaddons-6.25.0-1.fc44
- Fedora 44 Update: kf6-knotifications-6.25.0-1.fc44
- Fedora 44 Update: kf6-kglobalaccel-6.25.0-1.fc44
- Fedora 44 Update: kf6-kdoctools-6.25.0-1.fc44
- Fedora 44 Update: kf6-kfilemetadata-6.25.0-1.fc44
- Fedora 44 Update: kf6-kdnssd-6.25.0-1.fc44
- Fedora 44 Update: kf6-kidletime-6.25.0-1.fc44
- Fedora 44 Update: kf6-kdesu-6.25.0-1.fc44
- Fedora 44 Update: kf6-kded-6.25.0-1.fc44
- Fedora 44 Update: kf6-kdeclarative-6.25.0-1.fc44
- Fedora 44 Update: kf6-ki18n-6.25.0-1.fc44
- Fedora 44 Update: kf6-kdav-6.25.0-1.fc44
- Fedora 44 Update: kf6-kcontacts-6.25.0-1.fc44
- Fedora 44 Update: kf6-kconfigwidgets-6.25.0-1.fc44
- Fedora 44 Update: kf6-kcompletion-6.25.0-1.fc44
- Fedora 44 Update: kf6-kauth-6.25.0-1.fc44
- Fedora 44 Update: kf6-kcalendarcore-6.25.0-1.fc44
- Fedora 44 Update: kf6-kdbusaddons-6.25.0-1.fc44
- Fedora 44 Update: kf6-kcrash-6.25.0-1.fc44
- Fedora 44 Update: kf6-kbookmarks-6.25.0-1.fc44
- Fedora 44 Update: kf6-karchive-6.25.0-1.fc44
- Fedora 44 Update: kf6-kcoreaddons-6.25.0-1.fc44
- Fedora 44 Update: kf6-kapidox-6.25.0-1.fc44
- Fedora 44 Update: kf6-kconfig-6.25.0-1.fc44
- Fedora 44 Update: kf6-breeze-icons-6.25.0-1.fc44
- Fedora 44 Update: kf6-kcolorscheme-6.25.0-1.fc44
- Fedora 44 Update: kf6-kcodecs-6.25.0-1.fc44
- Fedora 44 Update: kdeplasma-addons-6.6.4-1.fc44
- Fedora 44 Update: kf6-kcmutils-6.25.0-1.fc44
- Fedora 44 Update: kde-cli-tools-6.6.4-1.fc44
- Fedora 44 Update: kdecoration-6.6.4-1.fc44
- Fedora 44 Update: grub2-breeze-theme-6.6.4-1.fc44
- Fedora 44 Update: extra-cmake-modules-6.25.0-1.fc44
- Fedora 44 Update: kf6-frameworkintegration-6.25.0-1.fc44
- Fedora 44 Update: breeze-gtk-6.6.4-1.fc44
- Fedora 44 Update: kf6-bluez-qt-6.25.0-1.fc44
- Fedora 44 Update: kf6-baloo-6.25.0-1.fc44
- Fedora 44 Update: kf6-attica-6.25.0-1.fc44
- Fedora 44 Update: kf6-6.25.0-1.fc44
- Fedora 44 Update: kcm_wacomtablet-6.6.4-1.fc44
- Fedora 44 Update: kde-gtk-config-6.6.4-1.fc44
- Fedora 44 Update: kactivitymanagerd-6.6.4-1.fc44
- Fedora 44 Update: flatpak-kcm-6.6.4-1.fc44
- Fedora 44 Update: aurorae-6.6.4-1.fc44
- Fedora 44 Update: bluedevil-6.6.4-1.fc44
- Fedora 44 Update: nix-2.34.5-1.fc44
- Fedora 42 Update: mingw-LibRaw-0.21.5-3.fc42
- Fedora 42 Update: smb4k-4.0.6-1.fc42
- Fedora 42 Update: mac-12.63-1.fc42
- Fedora 42 Update: aqualung-1.2-10.fc42
- Fedora 42 Update: stb-0^20260313git904aa67-2.fc42
- Fedora 42 Update: mbedtls-3.6.6-1.fc42
- Fedora 43 Update: mingw-LibRaw-0.21.5-3.fc43
- Fedora 43 Update: smb4k-4.0.6-1.fc43
- Fedora 43 Update: stb-0^20260313git904aa67-2.fc43
- Fedora 43 Update: usd-25.08-20.fc43
- Fedora 43 Update: aqualung-1.2-12.fc43
- Fedora 43 Update: mac-12.63-1.fc43
- Fedora 42 Update: curl-8.11.1-8.fc42
- Fedora 43 Update: python3.12-3.12.13-3.fc43
Gentoo Linux
Gentoo Linux recently published two security advisories to patch critical vulnerabilities in DTrace and FUSE. Attackers could exploit these weaknesses to run arbitrary code on compromised systems. The first advisory focuses on a flaw within the dtprobed component that allows specially crafted USDT provider names to trigger unauthorized file creation. System administrators should install these patches immediately to prevent potential security breaches.
- [ GLSA 202604-04 ] DTrace: Arbitrary file creation via dtprobed
- [ GLSA 202604-03 ] FUSE: Multiple Vulnerabilities
Oracle Linux
Oracle Linux administrators across versions seven through ten must install a fresh wave of security patches and bug fixes. These updates target foundational software including the Unbreakable Enterprise Kernel, Node, Libarchive, FreeRDP, and Grafana to close known exploitation paths. A particularly dangerous flaw in the Cockpit management tool enables unauthenticated remote code execution on version ten systems, so immediate remediation is essential. Delaying this installation leaves enterprise networks exposed to serious security risks that could compromise critical infrastructure.
- ELSA-2026-7383 Critical: Oracle Linux 10 cockpit: Unauthenticated remote code execution due to SSH command-line argument injection
- ELSA-2026-7011 Important: Oracle Linux 8 grafana security update
- ELSA-2026-7915 Important: Oracle Linux 9 bind9.18 security update
- ELSA-2026-6923 Important: Oracle Linux 9 nginx:1.24 security update
- ELBA-2026-8097 Oracle Linux 8 device-mapper-multipath bug fix and enhancement update
- ELSA-2026-6917 Important: Oracle Linux 8 thunderbird security update
- ELSA-2026-7670 Important: Oracle Linux 8 nodejs:24 security update
- ELSA-2026-50184 Important: Oracle Linux 9 Unbreakable Enterprise kernel security update
- ELBA-2026-6816 Oracle Linux 10 libguestfs bug fix and enhancement update
- ELSA-2026-6632 Moderate: Oracle Linux 10 kernel security update
- ELSA-2026-7342 Important: Oracle Linux 10 kea security update
- ELSA-2026-7002 Important: Oracle Linux 9 nginx security update
- ELBA-2026-8101 Oracle Linux 8 microcode_ctl bug fix and enhancement update
- ELSA-2026-7711 Important: Oracle Linux 10 vim security update
- ELBA-2026-6839 Oracle Linux 9 systemd bug fix and enhancement update
- ELBA-2026-6824 Oracle Linux 10 ipset bug fix and enhancement update
- ELBA-2026-6571-1 Oracle Linux 8 kernel bug fix update
- ELSA-2026-7679 Important: Oracle Linux 9 perl-XML-Parser security update
- ELSA-2026-6915 Important: Oracle Linux 8 vim security update
- ELSA-2026-6766 Important: Oracle Linux 9 python3.9 security update
- ELSA-2026-7302 Important: Oracle Linux 9 nodejs:22 security update
- ELSA-2026-50184 Important: Unbreakable Enterprise kernel security update
- ELBA-2026-50188 Oracle Linux 9 tpm2-tools bug fix update
- ELBA-2026-6819 Oracle Linux 10 cloud-init bug fix and enhancement update
- ELSA-2026-8075 Important: Oracle Linux 9 bind security update
- ELSA-2026-7667 Important: Oracle Linux 8 nghttp2 security update
- ELBA-2026-50185 Oracle Linux 8 util-linux bug fix update
- ELSA-2026-7680 Important: Oracle Linux 10 perl-XML-Parser security update
- ELEA-2026-6834 Oracle Linux 9 proj bug fix and enhancement update
- ELSA-2026-8155 Important: Oracle Linux 8 bind9.16 security update
- ELSA-2026-7343 Important: Oracle Linux 9 nginx:1.26 security update
- ELSA-2026-8259 Important: Oracle Linux 9 vim security update
- ELSA-2026-5233 Moderate: Oracle Linux 7 grub2 security update
- ELSA-2026-8052 Important: Oracle Linux 8 firefox security update
- ELSA-2026-7080 Important: Oracle Linux 10 nodejs22 security update
- ELBA-2026-6836 Oracle Linux 9 cifs-utils bug fix and enhancement update
- ELSA-2026-7081 Moderate: Oracle Linux 10 libtiff security update
- ELSA-2026-7005 Important: Oracle Linux 10 git-lfs security update
- ELSA-2026-7675 Important: Oracle Linux 10 nodejs24 security update
- ELSA-2026-7671 Important: Oracle Linux 9 firefox security update
- ELSA-2026-6949 Important: Oracle Linux 8 go-toolset:ol8 security update
- ELSA-2026-6907 Important: Oracle Linux 8 nginx:1.24 security update
- ELBA-2026-50189 Oracle Linux 9 oracle-ovirt-release-45-el9 bug fix update
- ELSA-2026-7123 Important: Oracle Linux 8 nodejs:22 security update
- ELSA-2026-7259 Important: Oracle Linux 9 git-lfs security update
- ELBA-2026-6835 Oracle Linux 9 libvirt bug fix and enhancement update
- ELSA-2026-7009 Important: Oracle Linux 8 grafana-pcp security update
- ELSA-2026-7681 Important: Oracle Linux 8 perl-XML-Parser security update
- ELSA-2026-6571 Moderate: Oracle Linux 8 kernel security update
- ELBA-2026-50233 Oracle Linux 9 Unbreakable Enterprise kernel bug fix update
- ELSA-2026-50232 Important: Unbreakable Enterprise kernel security update
- ELSA-2026-8492 Important: Oracle Linux 10 libarchive security update
- ELSA-2026-8458 Important: Oracle Linux 10 freerdp security update
- OLAMSA-2026-0007 Critical: Oracle Linux 9 ol-automation-manager security update
- OLAMSA-2026-0008 Critical: Oracle Linux 8 ol-automation-manager security update
- ELSA-2026-8352 Important: Oracle Linux 8 bind security update
- ELBA-2026-8100 Oracle Linux 8 sed bug fix and enhancement update
- ELSA-2026-7668 Important: Oracle Linux 9 nghttp2 security update
- ELBA-2026-6833 Oracle Linux 9 dnsmasq bug fix and enhancement update
- ELBA-2026-6838 Oracle Linux 9 NetworkManager bug fix and enhancement update
- ELSA-2026-7682 Important: Oracle Linux 10 openexr security update
- ELSA-2026-7350 Important: Oracle Linux 9 nodejs:24 security update
- ELSA-2026-7384 Critical: Oracle Linux 9 cockpit: Unauthenticated remote code execution due to SSH command-line argument injection
- ELSA-2026-6570 Moderate: Oracle Linux 9 kernel security update
- ELBA-2026-6252 Oracle Linux 8 scap-security-guide bug fix and enhancement update
- ELBA-2026-50183 Oracle Linux 9 pcp bug fix update
- ELBA-2026-8104 Oracle Linux 8 nvme-cli bug fix and enhancement update
- ELBA-2026-50187 Oracle Linux 7 systemd bug fix update
- ELSA-2026-7666 Important: Oracle Linux 10 nghttp2 security update
- ELSA-2026-8119 Important: Oracle Linux 10 squid security update
- ELBA-2026-8095 Oracle Linux 8 nss bug fix and enhancement update
- ELSA-2026-7677 Important: Oracle Linux 8 fontforge security update
- ELSA-2026-7672 Important: Oracle Linux 10 firefox security update
- ELSA-2026-7896 Important: Oracle Linux 9 nodejs:20 security update
- ELSA-2026-6918 Important: Oracle Linux 8 freerdp security update
- ELSA-2026-6817 Important: Oracle Linux 10 capstone security update
- ELSA-2026-7992 Important: Oracle Linux 10 golang-github-openprinting-ipp-usb security update
Qubes OS
Qubes OS recently published security bulletin one hundred eleven to address a critical authentication flaw in their desktop environment. The vulnerability specifically affects version four point three of the xfce4 screensaver tool and opens a brief window where input can skip the lock screen entirely. Attackers could exploit this gap during display transitions or activation phases to access underlying applications directly without proper credentials. A patched software release is now available to close this security hole and restore standard login procedures.
Red Hat Enterprise Linux
Red Hat Product Security recently rolled out a series of security patches for RHEL versions 7 through 10. These updates target vulnerabilities in widely used software like Firefox, NodeJS, GStreamer, and Go across both standard and extended support environments. Most advisories carry an important rating but administrators should prioritize the critical patch released for the RHC package. System managers need to apply these fixes quickly to keep their enterprise Linux deployments secure.
- RHSA-2026:7670: Important: nodejs:24 security update
- RHSA-2026:7674: Important: rhc security update
- RHSA-2026:7668: Important: nghttp2 security update
- RHSA-2026:7673: Important: gstreamer1-plugins-bad-free, gstreamer1-plugins-base, and gstreamer1-plugins-good security update
- RHSA-2026:7671: Important: firefox security update
- RHSA-2026:7675: Important: nodejs24 security update
- RHSA-2026:7678: Important: openexr security update
- RHSA-2026:7667: Important: nghttp2 security update
- RHSA-2026:7676: Important: rhc security update
- Gstreamer, Firefox, Go, and more updates for RHEL
- RHSA-2026:7992: Important: golang-github-openprinting-ipp-usb security update
- RHSA-2026:8052: Important: firefox security update
- RHSA-2026:7983: Important: nodejs:22 security update
- RHSA-2026:8096: Moderate: perl:5.32 security update
- RHSA-2026:8093: Moderate: pcs security update
- RHSA-2026:8119: Important: squid security update
- RHSA-2026:8075: Important: bind security update
- RHSA-2026:8155: Important: bind9.16 security update
- RHSA-2026:8159: Important: Red Hat Build of Apache Camel 4.14 for Quarkus 3.27 update is now available (RHBQ 3.27.3.GA)
- RHSA-2026:7109: Important: Red Hat build of Quarkus 3.20.6 release and security update
- RHSA-2026:7380: Important: Red Hat build of Quarkus 3.27.3 release and security update
- RHSA-2026:8290: Important: thunderbird security update
- RHSA-2026:8284: Important: thunderbird security update
- RHSA-2026:8289: Important: thunderbird security update
- RHSA-2026:8286: Important: thunderbird security update
- RHSA-2026:8288: Important: thunderbird security update
- RHSA-2026:8285: Important: thunderbird security update
- RHSA-2026:8314: Important: delve security update
- RHSA-2026:8312: Important: bind security update
- RHSA-2026:8287: Important: thunderbird security update
- RHSA-2026:8259: Important: vim security update
- RHSA-2026:8324: Important: rhc security update
- RHSA-2026:8322: Critical: rhc security update
- RHSA-2026:8352: Important: bind security update
- RHSA-2026:8342: Moderate: kernel security update
- RHSA-2026:8339: Important: nodejs:20 security update
- RHSA-2026:8325: Important: buildah, crun, podman, runc, and skopeo security update
- RHSA-2026:8317: Important: squid:4 security update
- RHSA-2026:8315: Important: thunderbird security update
- RHSA-2026:8311: Important: perl-YAML-Syck security update
- RHSA-2026:7243: Important: OpenShift Container Platform 4.19.28 bug fix and security update
- RHSA-2026:8427: Important: firefox security update
- RHSA-2026:8469: Important: .NET 8.0 security update
- RHSA-2026:8468: Important: .NET 8.0 security update
- RHSA-2026:8472: Important: .NET 9.0 security update
- RHSA-2026:8470: Important: .NET 8.0 security update
- RHSA-2026:8459: Important: thunderbird security update
- RHSA-2026:8458: Important: freerdp security update
- RHSA-2026:8456: Important: osbuild-composer security update
- RHSA-2026:8434: Important: rhc security update
- RHSA-2026:7238: Moderate: OpenShift Container Platform 4.13.65 packages and security update
- RHSA-2026:7239: Important: OpenShift Container Platform 4.13.65 bug fix and security update
- RHSA-2026:8492: Important: libarchive security update
- RHSA-2026:8474: Important: .NET 9.0 security update
- RHSA-2026:8471: Important: .NET 10.0 security update
- RHSA-2026:8610: Important: perl-XML-Parser security update
- RHSA-2026:8608: Important: perl-XML-Parser security update
- RHSA-2026:8609: Important: perl-XML-Parser security update
- RHSA-2026:8578: Important: perl-XML-Parser security update
- RHSA-2026:8577: Important: perl-XML-Parser security update
- RHSA-2026:8548: Important: nghttp2 security update
- RHSA-2026:8547: Important: nghttp2 security update
- RHSA-2026:8545: Important: nghttp2 security update
- RHSA-2026:8546: Important: nghttp2 security update
- RHSA-2026:8538: Important: nghttp2 security update
- RHSA-2026:8540: Important: nghttp2 security update
- RHSA-2026:8539: Important: nghttp2 security update
- RHSA-2026:8541: Important: nghttp2 security update
- RHSA-2026:8534: Important: libarchive security update
- RHSA-2026:8517: Important: libarchive security update
- RHSA-2026:8521: Important: libarchive security update
- RHSA-2026:8510: Important: libarchive security update
- RHSA-2026:8509: Important: Red Hat AMQ Broker 7.14.0 release and security update
- RHSA-2026:8473: Important: .NET 10.0 security update
- RHSA-2026:8475: Important: .NET 9.0 security update
- RHSA-2026:8467: Important: .NET 10.0 security update
- RHSA-2026:8457: Important: freerdp security update
Rocky Linux
Rocky Linux administrators managing versions eight through ten need to install multiple security patches right away to close known vulnerabilities in their systems. Critical updates target foundational tools like the kernel, while important fixes address widely used packages including NodeJS, Firefox, Vim, and BIND. Some of these advisories only carry moderate severity ratings, but ignoring them entirely could still cause unexpected instability across your infrastructure. You should prioritize applying these changes immediately to keep both development workstations and production servers secure against emerging threats.
- RLSA-2026:7080: Important: nodejs22 security update
- RLSA-2026:6632: Moderate: kernel security update
- RLSA-2026:7670: Important: nodejs:24 security update
- RLSA-2026:7896: Important: nodejs:20 security update
- RLSA-2026:7677: Important: fontforge security update
- RLSA-2026:7681: Important: perl-XML-Parser security update
- RLSA-2026:7670: Important: nodejs:24 security update
- RLSA-2026:8096: Moderate: perl:5.32 security update
- RLSA-2023:7025: Moderate: ruby:2.5 security update
- RLSA-2026:7992: Important: golang-github-openprinting-ipp-usb security update
- RLSA-2026:7711: Important: vim security update
- RLSA-2026:8119: Important: squid security update
- RLSA-2026:7666: Important: nghttp2 security update
- RLSA-2026:7680: Important: perl-XML-Parser security update
- RLSA-2026:7675: Important: nodejs24 security update
- RLSA-2026:7672: Important: firefox security update
- RLSA-2026:7668: Important: nghttp2 security update
- RLSA-2026:7671: Important: firefox security update
- RLSA-2026:7915: Important: bind9.18 security update
- RLSA-2026:8075: Important: bind security update
- RLSA-2026:7679: Important: perl-XML-Parser security update
- RLSA-2026:8155: Important: bind9.16 security update
- RLSA-2026:7896: Important: nodejs:20 security update
- RLSA-2026:8339: Important: nodejs:20 security update
- RLSA-2026:8317: Important: squid:4 security update
- RLSA-2026:8259: Important: vim security update
- RLSA-2026:8093: Moderate: pcs security update
- RLSA-2026:8052: Important: firefox security update
- RLSA-2026:7667: Important: nghttp2 security update
- RLSA-2026:8312: Important: bind security update
- RLSA-2026:7682: Important: openexr security update
- RLSA-2026:8492: Important: libarchive security update
- RLSA-2026:8472: Important: .NET 9.0 security update
- RLSA-2026:8470: Important: .NET 8.0 security update
- RLSA-2026:8458: Important: freerdp security update
- RLSA-2026:8467: Important: .NET 10.0 security update
- RLSA-2026:8473: Important: .NET 10.0 security update
- RLSA-2026:8475: Important: .NET 9.0 security update
- RLSA-2026:8468: Important: .NET 8.0 security update
- RLSA-2026:8534: Important: libarchive security update
- RLSA-2026:8352: Important: bind security update
- RLSA-2026:8339: Important: nodejs:20 security update
- RLSA-2026:8457: Important: freerdp security update
- RLSA-2026:8474: Important: .NET 9.0 security update
- RLSA-2026:8510: Important: libarchive security update
- RLSA-2026:8469: Important: .NET 8.0 security update
- RLSA-2026:8471: Important: .NET 10.0 security update
- RLSA-2026:8459: Important: thunderbird security update
Slackware Linux
Slackware has rolled out urgent security patches for several key packages across its 15.0 and current release branches. The updates target libarchive, Xorg-server, libexif, libxml2, CUPS, and TigerVNC to fix a range of dangerous flaws. Administrators will find these builds addressing critical issues such as heap buffer overflows, use-after-free bugs, type confusion errors, and weak certificate validation. System owners should apply these fixes right away to keep their environments secure against potential exploits.
- libarchive (SSA:2026-103-01)
- xorg-server (SSA:2026-104-02)
- libexif (SSA:2026-104-01)
- libxml2 (SSA:2026-106-01)
- cups (SSA:2026-107-01)
- tigervnc (SSA:2026-108-01)
SUSE Linux
SUSE and openSUSE have rolled out a massive wave of security advisories targeting critical vulnerabilities across their Linux distributions. These urgent patches cover essential software like the kernel, Chromium browser, Python libraries, sudo, and container tools such as Podman. Many of the fixes address dangerous flaws including memory corruption issues, privilege escalation risks, and unauthorized access vectors that could compromise system integrity. System administrators should prioritize installing these updates right away to keep their production environments secure against active threats.
- openSUSE-SU-2026:0124-1: important: Security update for chromium
- openSUSE-SU-2026:0121-1: moderate: Security update for python-Flask-HTTPAuth
- openSUSE-SU-2026:0122-1: moderate: Security update for python-Flask-HTTPAuth
- openSUSE-SU-2026:10532-1: moderate: helm3-3.20.2-1.1 on GA media
- openSUSE-SU-2026:10530-1: moderate: chromedriver-147.0.7727.55-1.1 on GA media
- openSUSE-SU-2026:10533-1: moderate: libopenssl-3-devel-3.5.3-4.1 on GA media
- SUSE-SU-2026:1261-1: important: Security update for the Linux Kernel (Live Patch 17 for SUSE Linux Enterprise 15 SP6)
- SUSE-SU-2026:1258-1: important: Security update for the Linux Kernel (Live Patch 35 for SUSE Linux Enterprise 15 SP5)
- SUSE-SU-2026:1259-1: important: Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise 15 SP6)
- SUSE-SU-2026:1263-1: important: Security update for the Linux Kernel (Live Patch 25 for SUSE Linux Enterprise 15 SP5)
- SUSE-SU-2026:1265-1: important: Security update for the Linux Kernel (Live Patch 46 for SUSE Linux Enterprise 15 SP4)
- SUSE-SU-2026:1266-1: important: Security update for the Linux Kernel (Live Patch 20 for SUSE Linux Enterprise 15 SP6)
- SUSE-SU-2026:1268-1: important: Security update for the Linux Kernel (Live Patch 38 for SUSE Linux Enterprise 15 SP4)
- SUSE-SU-2026:1270-1: important: Security update for the Linux Kernel (Live Patch 33 for SUSE Linux Enterprise 15 SP5)
- SUSE-SU-2026:1269-1: important: Security update for the Linux Kernel (Live Patch 37 for SUSE Linux Enterprise 15 SP4)
- SUSE-SU-2026:1271-1: important: Security update for the Linux Kernel (Live Patch 14 for SUSE Linux Enterprise 15 SP6)
- SUSE-SU-2026:1280-1: important: Security update for the Linux Kernel (Live Patch 41 for SUSE Linux Enterprise 15 SP4)
- SUSE-SU-2026:1272-1: important: Security update for the Linux Kernel (Live Patch 18 for SUSE Linux Enterprise 15 SP6)
- SUSE-SU-2026:1274-1: important: Security update for the Linux Kernel (Live Patch 19 for SUSE Linux Enterprise 15 SP6)
- SUSE-SU-2026:1283-1: important: Security update for the Linux Kernel (Live Patch 13 for SUSE Linux Enterprise 15 SP6)
- SUSE-SU-2026:1281-1: important: Security update for the Linux Kernel (Live Patch 42 for SUSE Linux Enterprise 15 SP4)
- SUSE-SU-2026:1290-1: important: Security update for openssl-1_1
- SUSE-SU-2026:1292-1: important: Security update for python312
- SUSE-SU-2026:1291-1: important: Security update for openssl-1_0_0
- SUSE-SU-2026:1296-1: important: Security update for python39
- openSUSE-SU-2026:10537-1: moderate: python311-biopython-1.87-1.1 on GA media
- openSUSE-SU-2026:10536-1: moderate: libcap-devel-2.78-1.1 on GA media
- SUSE-SU-2026:1300-1: important: Security update for GraphicsMagick
- SUSE-SU-2026:1302-1: important: Security update for tigervnc
- SUSE-SU-2026:1303-1: important: Security update for tigervnc
- SUSE-SU-2026:1306-1: moderate: Security update for openvswitch
- SUSE-SU-2026:1309-1: important: Security update for sudo
- SUSE-SU-2026:1308-1: important: Security update for sudo
- SUSE-SU-2026:1310-1: moderate: Security update for libssh
- SUSE-SU-2026:1312-1: important: Security update for bind
- SUSE-SU-2026:1314-1: important: Security update for ignition
- openSUSE-SU-2026:10539-1: moderate: oci-cli-3.76.2-1.1 on GA media
- openSUSE-SU-2026:10538-1: moderate: helm-4.1.4-2.1 on GA media
- SUSE-SU-2026:1325-1: moderate: Security update for clamav
- SUSE-SU-2026:1333-1: important: Security update for xorg-x11-server
- SUSE-SU-2026:1329-1: important: Security update for xwayland
- SUSE-SU-2026:1331-1: important: Security update for xorg-x11-server
- SUSE-SU-2026:1335-1: important: Security update for xorg-x11-server
- SUSE-SU-2026:1338-1: moderate: Security update for giflib
- SUSE-SU-2026:1337-1: moderate: Security update for rust1.92
- SUSE-SU-2026:1343-1: moderate: Security update for Mesa
- SUSE-SU-2026:1342-1: important: Security update for the Linux Kernel
- openSUSE-SU-2026:10549-1: moderate: tomcat11-11.0.21-1.1 on GA media
- openSUSE-SU-2026:10548-1: moderate: tomcat10-10.1.54-1.1 on GA media
- openSUSE-SU-2026:10547-1: moderate: tomcat-9.0.117-1.1 on GA media
- openSUSE-SU-2026:10546-1: moderate: python311-rfc3161-client-1.0.6-1.1 on GA media
- openSUSE-SU-2026:10542-1: moderate: goshs-2.0.0-1.1 on GA media
- openSUSE-SU-2026:10545-1: moderate: python311-aiohttp-3.13.5-3.1 on GA media
- openSUSE-SU-2026:10544-1: moderate: log4j-2.20.0-2.1 on GA media
- openSUSE-SU-2026:10540-1: moderate: Botan-3.11.1-1.1 on GA media
- openSUSE-SU-2026:10543-1: moderate: kubo-0.40.1-1.1 on GA media
- openSUSE-SU-2026:10541-1: moderate: flatpak-1.16.6-1.1 on GA media
- SUSE-SU-2026:1349-1: important: Security update for python311
- SUSE-SU-2026:1353-1: important: Security update for netty, netty-tcnative
- SUSE-SU-2026:1350-1: important: Security update for nghttp2
- SUSE-SU-2026:1356-1: moderate: Security update for nfs-utils
- SUSE-SU-2026:1363-1: important: Security update for nodejs20
- SUSE-SU-2026:1364-1: important: Security update for webkit2gtk3
- SUSE-SU-2026:1359-1: important: Security update for sudo
- SUSE-SU-2026:1368-1: important: Security update for libpng16
- SUSE-SU-2026:1366-1: important: Security update for bind
- SUSE-SU-2026:1371-1: important: Security update for nodejs20
- SUSE-SU-2026:1369-1: moderate: Security update for glibc
- SUSE-SU-2026:1376-1: important: Security update for python310
- SUSE-SU-2026:1416-1: low: Security update for python-pyOpenSSL
- SUSE-SU-2026:1415-1: moderate: Security update for rust1.93
- SUSE-SU-2026:1411-1: important: Security update for terraform-provider-local, terraform-provider-random, terraform-provider-tls
- openSUSE-SU-2026:0130-1: important: Security update for python-jwcrypto
- SUSE-SU-2026:1394-1: important: Security update for corosync
- SUSE-SU-2026:1388-1: moderate: Security update for libtpms
- SUSE-SU-2026:1389-1: important: Security update for python-PyJWT
- SUSE-SU-2026:1396-1: important: Security update for plexus-utils
- SUSE-SU-2026:1395-1: important: Security update for azure-storage-azcopy
- openSUSE-SU-2026:0129-1: important: Security update for python-jwcrypto
- openSUSE-SU-2026:10554-1: moderate: python314-3.14.4-1.1 on GA media
- openSUSE-SU-2026:10550-1: moderate: apache-pdfbox-2.0.36-1.1 on GA media
- openSUSE-SU-2026:10555-1: moderate: libsdb2_4_2-6.1.4-1.1 on GA media
- SUSE-SU-2026:1418-1: low: Security update for iproute2
- SUSE-SU-2026:1421-1: moderate: Security update for python-CairoSVG
- SUSE-SU-2026:1422-1: moderate: Security update for smc-tools
- SUSE-SU-2026:1436-1: moderate: Security update for python-ecdsa
- SUSE-SU-2026:1440-1: moderate: Security update for openvswitch3
- SUSE-SU-2026:1441-1: moderate: Security update for avahi
- SUSE-SU-2026:1443-1: moderate: Security update for NetworkManager
- SUSE-SU-2026:1423-1: important: Security update for podman
- SUSE-SU-2026:1424-1: moderate: Security update for polkit
- SUSE-SU-2026:1429-1: moderate: Security update for openssl-3
- SUSE-SU-2026:1432-1: important: Security update for libcap
- SUSE-SU-2026:1428-1: important: Security update for bind
- SUSE-SU-2026:1427-1: moderate: Security update for NetworkManager
- openSUSE-SU-2026:10565-1: moderate: libraw-devel-0.22.1-1.1 on GA media
- openSUSE-SU-2026:10560-1: moderate: blender-5.1-5.1.1-1.1 on GA media
- openSUSE-SU-2026:10567-1: moderate: python311-Django-5.2.13-1.1 on GA media
- openSUSE-SU-2026:10562-1: moderate: flannel-0.28.4-1.1 on GA media
- openSUSE-SU-2026:10566-1: moderate: liblog4cxx-devel-1.7.0-2.1 on GA media
- openSUSE-SU-2026:10559-1: moderate: ImageMagick-7.1.2.19-1.1 on GA media
- openSUSE-SU-2026:10558-1: moderate: GraphicsMagick-1.3.46-5.1 on GA media
- openSUSE-SU-2026:10564-1: moderate: libpng16-16-1.6.57-1.1 on GA media
- openSUSE-SU-2026:10563-1: moderate: leancrypto-devel-1.7.2-1.1 on GA media
- openSUSE-SU-2026:10568-1: moderate: opam-2.5.1-1.1 on GA media
Ubuntu Linux
Ubuntu has rolled out a wave of critical security patches targeting dozens of widely used packages and kernel variants. These updates address severe flaws in essential tools like Vim, Rust, Redis, Polkit, and FRRouting that could otherwise let attackers execute arbitrary code or crash systems. The Linux kernel receives particular attention with fixes spanning Azure, GCP, NVIDIA, and FIPS environments to patch dangerous vulnerabilities in drivers and networking stacks. Administrators should install these updates immediately to prevent unauthorized access and maintain overall system stability across all supported releases.
- [USN-8166-1] RetroArch vulnerability
- [USN-8171-1] Vim vulnerabilities
- [USN-8163-2] Linux kernel (Azure) vulnerabilities
- [USN-8148-6] Linux kernel (Azure) vulnerabilities
- [USN-8149-3] Linux kernel (Azure) vulnerabilities
- [USN-8172-1] kvmtool vulnerabilities
- [USN-8168-1] Rust vulnerability
- [LSN-0119-1] Linux kernel vulnerability
- [USN-8167-1] xdg-dbus-proxy vulnerability
- [USN-8170-1] Corosync vulnerabilities
- [USN-8169-1] Redis, Lua vulnerabilities
- [USN-8174-1] XML::Parser vulnerabilities
- [USN-8173-1] polkit vulnerabilities
- [USN-8138-2] tar-rs vulnerability
- [USN-8168-2] Rust vulnerability
- [USN-8175-1] FRR vulnerability
- [USN-8145-5] Linux kernel (Azure) vulnerabilities
- [USN-8177-1] Linux kernel vulnerabilities
- [USN-8176-1] .NET vulnerabilities
- [USN-8180-1] Linux kernel vulnerabilities
- [USN-8179-1] Linux kernel vulnerabilities
- [USN-8182-1] Rack vulnerabilities
- [USN-8181-1] ESAPI vulnerabilities
- [USN-8148-7] Linux kernel (NVIDIA) vulnerabilities
- [USN-8178-1] oFono vulnerabilities
- [USN-8188-1] Linux kernel (HWE) vulnerabilities
- [USN-8187-1] Linux kernel (NVIDIA) vulnerabilities
- [USN-8186-1] Linux kernel (Real-time) vulnerabilities
- [USN-8180-2] Linux kernel (FIPS) vulnerabilities
- [USN-8185-1] Linux kernel (NVIDIA) vulnerabilities
- [USN-8179-2] Linux kernel (FIPS) vulnerabilities
- [USN-8184-1] Linux kernel (Real-time) vulnerabilities
- [USN-8183-1] Linux kernel (GCP) vulnerabilities
- [USN-8177-2] Linux kernel (Real-time) vulnerabilities
How to upgrade packages
This quick overview shows exactly what commands you need to run so the latest security patches and bug fixes actually make it onto your system without hunting down individual .deb or .rpm files.
Debian/Ubuntu (apt)
The first thing to do is refresh the local package index; running sudo apt update contacts all configured repositories and pulls in the newest lists of available versions. Skipping this step leaves the system blind to any recent uploads, which explains why “upgrade” sometimes claims there’s nothing to do even after a security advisory has been published. Once the index is current, invoke sudo apt upgrade -y; the -y flag answers every prompt automatically so the process doesn’t pause for user input. This command upgrades all installed packages that have newer versions in the repositories while preserving configuration files.
sudo apt update sudo apt upgrade -y
Fedora/RedHat/Rocky/Alma/Oracle (dnf or yum)
On modern Fedora and recent Red Hat derivatives, dnf is the package manager; older RHEL releases still rely on yum. Begin with a check‑update operation—sudo dnf check-update or sudo yum check-update—to see exactly which packages are awaiting an upgrade. This preview step can be useful for spotting unexpected kernel bumps before they land. To actually apply the updates, run sudo dnf upgrade -y (or sudo yum update if you prefer the older tool). The upgrade command pulls down the new binaries and runs any necessary post‑install scripts, such as rebuilding initramfs when a kernel changes.
sudo dnf check-update sudo dnf upgrade -y
or on older releases
sudo yum check-update sudo yum update
SUSE (zypper)
SUSE’s command line front‑end is called zypper. First execute sudo zypper refresh so that the metadata for all enabled repos gets updated; without this, zypper will happily report “No updates available” even though newer packages sit on the mirror. After a fresh refresh, issue sudo zypper update -y; this upgrades every package to the latest version in the configured repositories and automatically handles service restarts when required.
sudo zypper refresh sudo zypper update -y
Slackware (slackpkg and pkgtool)
Slackware doesn’t have a single unified updater, but the official way to pull updates is through slackpkg. Start with sudo slackpkg update to download the newest package list from the chosen mirror. Then run sudo slackpkg upgrade-all; this command walks through each installed package and replaces it with the most recent build available in the official repository. For users who prefer a more granular approach, specifying a package name after upgrade limits the operation to that single item. When dealing with community‑maintained repositories, pkgtool takes over: a combined sudo pkgtool update && sudo pkgtool upgrade will sync and apply updates from the mirrors listed in /etc/slackpkg/mirrors.
sudo slackpkg update sudo slackpkg upgrade-all
Gentoo Linux
Updating Gentoo Linux is more involved than binary distributions because it's a source-based system with highly customizable packages.
sudo emerge --sync sudo emerge -avuDN @world
Keep those systems patched, and watch the logs for any signs of exploitation attempts on Cockpit.