This week's Linux security roundup delivers critical patches across nearly every major distribution, targeting widely used tools like ImageMagick, web browsers, PackageKit, and the core kernel. Administrators should prioritize these updates immediately because several fixes address memory corruption, privilege escalation risks, and sandbox bypasses that attackers actively exploit. High-priority releases also secure remote management platforms like Grafana while resolving dangerous race conditions in system package managers.
Weekly Linux Security Updates: Critical Fixes for ImageMagick, Kernels, and Browsers
This week's batch of linux security updates delivers a massive wave of patches across major distributions. Administrators running Debian, RHEL, or Fedora have urgent work ahead as critical flaws in image processing libraries, browsers, and core system utilities get addressed. The fixes target memory corruption issues, sandbox bypasses, and privilege escalation vectors that attackers are actively exploiting.
AlmaLinux 8 Through 10 Addresses Memory Corruption and Kernel Leaks
AlmaLinux rolled out broad patches for versions eight through ten to fix memory corruption flaws and improper parsing routines in essential components. The kernel updates resolve storage driver leaks that often cause systems to hang or lose data under heavy load, which is a common headache for admins managing busy servers. FreeRDP, Wireshark, Thunderbird, and OSBuild Composer also receive corrections, ensuring remote desktop sessions and network analysis tools stay secure. Version nine administrators must apply specific fixes for IPv6 URL handling alongside the kernel improvements to prevent traffic scheduling bugs from disrupting operations.
Debian Users Must Patch ImageMagick and Browser Sandboxes Immediately
Debian security teams pushed critical patches targeting serious flaws in widely used software packages across the distribution. The updates hit image processing libraries like Pillow and ImageMagick hard, closing vulnerabilities that allow attackers to run malicious code or bypass sandbox protections when handling corrupted files. System administrators managing LTS environments should install these fixes right away because unpatched image handlers are a favorite target for web-based exploits. Browsers including Firefox ESR, Chromium, and Thunderbird also get secured, while utilities like ntfs-3g and xdg-dbus-proxy receive updates to plug local privilege escalation risks.
Fedora 42 to 44 Updates Fix Sudo Flaws and PackageKit Race Conditions
Fedora Linux versions 42 through 44 received multiple batches of security updates targeting dozens of packages. The patches address critical flaws in Python, CUPS, Sudo, Firefox, and Nginx that could lead to remote code execution or unauthorized root access. A targeted fix for PackageKit resolves a dangerous race condition that allows unprivileged users to interfere with system package management during the update window. Users should install these releases immediately because race conditions in package managers often result in file corruption or privilege escalation if left unpatched.
Oracle Linux 7-10 Requires Rebuilds for go-rpm-macros and Kernel Fixes
Oracle Linux administrators need to apply a broad wave of advisories covering versions seven through ten, with special attention required for the Unbreakable Enterprise Kernel. Teams managing releases nine and ten must update go-rpm-macros to fix a Go compiler flaw that forces a full package rebuild, which is tedious but necessary to close the security gap. The maintenance push also closes serious gaps in ImageMagick, FreeRDP, and OpenEXR across the entire supported lineup. .NET updates and Scap-Security-Guide fixes round out the release for enterprise environments relying on Oracle's long-term support.
Red Hat Enterprise Linux Patches Grafana, libarchive, and Core Kernels in Latest Linux Security Updates
Red Hat delivered a steady stream of critical security patches for Enterprise Linux platforms spanning versions eight through ten. The updates touch nearly every major software category available for enterprise deployment, including fixes for libarchive, OpenEXR, Grafana, Python modules, and the core kernel. Grafana administrators should prioritize this update because exposed dashboards without current patches are frequent targets for data exfiltration attacks. System owners must deploy these changes quickly to keep networks safe from known exploits that could compromise sensitive enterprise data.
Rocky Linux 8-10 Updates Mirror RHEL with Kernel and Browser Fixes
Rocky Linux administrators need to install several urgent security patches across versions eight through ten to address vulnerabilities in widely used tools. The updates fix flaws in go-rpm-macros, delve, giflib, OpenEXR, Thunderbird, FreeRDP, Wireshark, and WebKit2GTK3. System owners running version eight should prioritize critical kernel upgrades for both standard and real-time builds to prevent storage driver leaks and traffic scheduling bugs from disrupting operations. Ignoring these fixes leaves networks open to moderate or critical exploits that could compromise sensitive data stored on Rocky Linux servers.
Slackware 15 Gets Firefox and Thunderbird Security Patches
The Slackware Linux Security Team pushed fresh updates to patch security holes in the stable fifteen release line. Firefox, Thunderbird, and libXpm all received fixes that apply directly to the current distribution, ensuring email clients and web browsers stay protected against known exploits. Administrators should roll these packages out quickly since unpatched versions remain vulnerable to remote code execution risks. Regular users will stay safe until the next major platform release arrives, but server admins need to act now.
SUSE Linux Fixes Critical Botan, Chromium, and Kernel Live Patches
SUSE pushed multiple batches of security patches across their distributions, covering everything from moderate issues to critical flaws in widely used tools. The updates target the kernel, Python, ImageMagick, Flatpak, and OpenSSL, with attackers potentially exploiting buffer overflows or authentication bypasses if administrators ignore them. Security teams should prioritize the Botan update on any SUSE box handling sensitive traffic because crypto library vulnerabilities compromise TLS connections. Critical fixes for Chromium, rclone, and cacti also appear in this round, alongside kernel live patches that allow administrators to apply security updates without rebooting production systems.
Ubuntu Patches PackageKit Privilege Escalation and Cloud Kernels
Ubuntu rolled out critical security patches to fix dangerous flaws across several widely used system libraries and cloud kernels. The updates target integer overflows in RapidJSON alongside local privilege escalation risks found in PackageKit, which allows attackers to gain root access on vulnerable systems. Specialized kernel builds for major cloud providers like Azure and Oracle, as well as Raspberry Pi devices, receive memory management error fixes that prevent denial of service attacks. GStreamer plugins also get secured against memory errors, ensuring media processing pipelines stay robust against malformed input.

A Closer Look at Recent Security Updates
Below is a comprehensive breakdown of the latest security patches released for AlmaLinux, Debian GNU/Linux, Fedora Linux, Red Hat Enterprise Linux, Rocky Linux, Slackware Linux, SUSE Linux, and Ubuntu Linux.
AlmaLinux
AlmaLinux has rolled out a broad wave of security patches across versions eight through ten to address critical vulnerabilities in essential system components. These updates fix memory corruption flaws and improper parsing routines within packages like the Linux kernel, FreeRDP, Wireshark, Thunderbird, and OSBuild Composer. Administrators managing version nine will also need to apply specific corrections for IPv6 URL handling alongside kernel improvements that resolve storage driver leaks and traffic scheduling bugs.
- ALSA-2026:8840: go-rpm-macros security update (Important)
- ALSA-2026:8842: delve security update (Important)
- ALSA-2026:8458: freerdp security update (Important)
- ALSA-2026:8858: giflib security update (Important)
- ALSA-2026:8470: .NET 8.0 security update (Important)
- ALSA-2026:8841: go-rpm-macros security update (Important)
- ALSA-2026:8888: openexr security update (Important)
- ALSA-2026:8468: .NET 8.0 security update (Important)
- ALSA-2026:8473: .NET 10.0 security update (Important)
- ALSA-2026:8534: libarchive security update (Important)
- ALSA-2026:8475: .NET 9.0 security update (Important)
- ALSA-2026:8945: freerdp security update (Important)
- ALSA-2026:9135: kernel-rt security update (Important)
- ALSA-2026:9131: kernel security update (Important)
- ALSA-2026:9044: osbuild-composer security update (Important)
- ALSA-2026:8921: kernel security update (Important)
- ALSA-2026:9264: kernel security update (Important)
- ALSA-2026:9666: wireshark security update (Moderate)
- ALSA-2026:9638: thunderbird security update (Important)
- ALSA-2026:9693: java-25-openjdk security update (Important)
- ALSA-2026:9692: webkit2gtk3 security update (Important)
- ALSA-2026:9693: java-25-openjdk security update (Important)
- ALSA-2026:8456: osbuild-composer security update (Important)
- ALSA-2026:9345: thunderbird security update (Important)
Debian GNU/Linux
Debian security teams recently rolled out critical patches for numerous widely used software packages across their distribution. These updates target serious flaws in popular image processing libraries alongside essential web browsers and system utilities. Attackers could easily exploit these weaknesses to run malicious code, trigger sudden application crashes, or bypass important sandbox protections when handling corrupted files. System administrators managing Debian LTS environments should install the fixes right away to keep their networks safe from potential breaches.
- [DSA 6219-1] pillow security update
- [DLA 4539-1] imagemagick security update
- ELA-1657-1 imagemagick security update
- ELA-1687-1 tiff security update
- [DSA 6220-1] simpleeval security update
- ELA-1689-1 ntfs-3g security update
- ELA-1688-1 xdg-dbus-proxy security update
- ELA-1690-1 imagemagick security update
- [DLA 4541-1] opam security update
- [DLA 4540-1] mupdf security update
- [DLA 4542-1] xdg-dbus-proxy security update
- [DLA 4543-1] simpleeval security update
- [DLA 4523-1] python-geopandas security update
- [DLA 4544-1] ntfs-3g security update
- [DSA 6221-1] ntfs-3g security update
- [DSA 6222-1] ngtcp2 security update
- ELA-1691-1 libapache2-mod-auth-openidc security update
- ELA-1692-1 inetutils security update
- ELA-1693-1 packagekit security update
- [DLA 4545-1] packagekit security update
- [DSA 6224-1] xdg-dbus-proxy security update
- [DSA 6223-1] flatpak security update
- [DSA 6225-1] firefox-esr security update
- [DSA 6226-1] packagekit security update
- [DSA 6227-1] strongswan security update
- [DSA 6228-1] cpp-httplib security update
- [DLA 4547-1] gimp security updat
- [DLA 4546-1] firefox-esr security update
- ELA-1694-1 pillow security update
- ELA-1695-1 pillow security update
- [DSA 6230-1] chromium security update
- [DSA 6229-1] thunderbird security update
- [DLA 4548-1] distro-info-data database update
- ELA-1697-1 distro-info-data database update
- ELA-1696-1 imagemagick security update
Fedora Linux
Fedora Linux versions 42, 43, and 44 recently received multiple batches of security updates targeting dozens of widely used packages. The patches address critical flaws in essential software like Python, CUPS, Sudo, Firefox, and Nginx that could otherwise lead to remote code execution or unauthorized root access. While PackageKit gets a targeted fix for a dangerous race condition, other releases simply tighten security across foundational utilities and web servers. Users should install these security releases immediately to protect their systems from known exploits before attackers can take advantage of the unpatched vulnerabilities.
- Fedora 42 Update: python3.12-3.12.13-3.fc42
- Fedora 42 Update: python3.11-3.11.15-4.fc42
- Fedora 42 Update: awstats-8.0-1.fc42
- Fedora 42 Update: incus-6.23-3.fc42
- Fedora 42 Update: python3.15-3.15.0~a8-1.fc42
- Fedora 43 Update: awstats-8.0-2.fc43
- Fedora 43 Update: incus-6.23-3.fc43
- Fedora 43 Update: python-msal-1.36.0-1.fc43
- Fedora 42 Update: cups-2.4.17-1.fc42
- Fedora 42 Update: tinyproxy-1.11.2-7.fc42
- Fedora 42 Update: perl-Net-CIDR-Lite-0.23-1.fc42
- Fedora 42 Update: python-cbor2-5.6.5-8.fc42
- Fedora 42 Update: opkssh-0.13.0-8.fc42
- Fedora 43 Update: sudo-1.9.17-7.p2.fc43
- Fedora 43 Update: pie-1.4.1-1.fc43
- Fedora 43 Update: pgadmin4-9.14-3.fc43
- Fedora 43 Update: python3-docs-3.14.4-1.fc43
- Fedora 43 Update: python3.14-3.14.4-1.fc43
- Fedora 42 Update: chromium-147.0.7727.101-1.fc42
- Fedora 42 Update: pie-1.4.1-1.fc42
- Fedora 42 Update: composer-2.9.7-1.fc42
- Fedora 42 Update: pgadmin4-9.14-3.fc42
- Fedora 42 Update: libcap-2.73-3.fc42
- Fedora 42 Update: rpki-client-9.8-1.fc42
- Fedora 42 Update: xorg-x11-server-21.1.22-1.fc42
- Fedora 42 Update: flatpak-builder-1.4.8-1.fc42
- Fedora 43 Update: rpki-client-9.8-1.fc43
- Fedora 43 Update: minetest-5.15.2-1.fc43
- Fedora 43 Update: xorg-x11-server-21.1.22-1.fc43
- Fedora 43 Update: flatpak-builder-1.4.8-1.fc43
- Fedora 44 Update: PackageKit-1.3.4-3.fc44
- Fedora 44 Update: firefox-150.0-1.fc44
- Fedora 44 Update: nss-3.122.1-1.fc44
- Fedora 44 Update: libexif-0.6.26-1.fc44
- Fedora 44 Update: mingw-python3-3.11.15-2.fc44
- Fedora 44 Update: mapserver-8.6.1-1.fc44
- Fedora 44 Update: mingw-libpng-1.6.56-1.fc44
- Fedora 44 Update: rust-sccache-0.14.0-2.fc44
- Fedora 44 Update: tcpflow-1.6.2-0.1.8d47b53.fc44
- Fedora 44 Update: libgsasl-1.10.0-15.fc44
- Fedora 44 Update: python3.9-3.9.25-7.fc44
- Fedora 44 Update: openbao-2.5.2-1.fc44
- Fedora 44 Update: bind9-next-9.21.20-1.fc44
- Fedora 44 Update: nginx-mod-vts-0.2.4-7.fc44
- Fedora 44 Update: nginx-mod-brotli-1.0.0~rc-7.fc44
- Fedora 44 Update: nginx-mod-fancyindex-0.6.0-2.fc44
- Fedora 44 Update: nginx-1.28.3-1.fc44
- Fedora 44 Update: nginx-mod-naxsi-1.6-15.fc44
- Fedora 44 Update: nginx-mod-modsecurity-1.0.4-8.fc44
- Fedora 44 Update: nginx-mod-headers-more-0.39-7.fc44
- Fedora 44 Update: libarchive-3.8.6-1.fc44
- Fedora 44 Update: bpfman-0.5.4-7.fc44
- Fedora 43 Update: coturn-4.10.0-1.fc43
- Fedora 43 Update: opam-2.5.1-1.fc43
- Fedora 43 Update: tigervnc-1.16.2-2.fc43
- Fedora 42 Update: opam-2.5.1-1.fc42
- Fedora 42 Update: coturn-4.10.0-1.fc42
- Fedora 42 Update: minetest-5.15.2-1.fc42
- Fedora 42 Update: tigervnc-1.16.2-2.fc42
Oracle Linux
Oracle Linux administrators should prioritize applying a broad wave of security advisories covering versions seven through ten. These patches target critical vulnerabilities in foundational components like the Unbreakable Enterprise Kernel alongside essential tools such as .NET and Scap-Security-Guide. Teams managing releases nine and ten must immediately update go-rpm-macros to fix a specific Go compiler flaw that requires a full package rebuild. The overall maintenance push also closes serious security gaps in popular utilities including ImageMagick, FreeRDP, and OpenEXR across the entire supported lineup.
- ELSA-2026-8472 Important: Oracle Linux 10 .NET 9.0 security update
- ELSA-2026-8470 Important: Oracle Linux 10 .NET 8.0 security update
- ELSA-2026-8467 Important: Oracle Linux 10 .NET 10.0 security update
- ELBA-2026-6252 Oracle Linux 10 scap-security-guide bug fix and enhancement update
- ELSA-2026-50232 Important: Oracle Linux 9 Unbreakable Enterprise kernel security update
- ELBA-2026-50233 Oracle Linux 9 Unbreakable Enterprise kernel bug fix update
- ELSA-2026-8510 Important: Oracle Linux 9 libarchive security update
- ELSA-2026-8474 Important: Oracle Linux 9 .NET 9.0 security update
- ELSA-2026-8471 Important: Oracle Linux 9 .NET 10.0 security update
- ELSA-2026-8459 Important: Oracle Linux 9 thunderbird security update
- ELSA-2026-8457 Important: Oracle Linux 9 freerdp security update
- ELBA-2026-50233 Oracle Linux 8 Unbreakable Enterprise kernel bug fix update
- ELSA-2026-50234 Important: Oracle Linux 8 Unbreakable Enterprise kernel security update
- ELSA-2026-50234 Important: Oracle Linux 7 Unbreakable Enterprise kernel security update
- ELSA-2026-6464 Moderate: Oracle Linux 7 python3 security update
- ELSA-2026-6220 Moderate: Oracle Linux 7 389-ds-base security update
- ELSA-2026-5393 Moderate: Oracle Linux 7 python security update
- ELSA-2026-8534 Important: Oracle Linux 8 libarchive security update
- ELSA-2026-8475 Important: Oracle Linux 8 .NET 9.0 security update
- ELSA-2026-8096 Moderate: Oracle Linux 8 perl:5.32 security update
- ELSA-2026-8473 Important: Oracle Linux 8 .NET 10.0 security update
- ELSA-2026-8339 Important: Oracle Linux 8 nodejs:20 security update
- ELSA-2026-8317 Important: Oracle Linux 8 squid:4 security update
- ELSA-2026-50234 Important: Oracle Linux 8 Unbreakable Enterprise kernel security update
- ELSA-2026-8840 Important: Oracle Linux 10 go-rpm-macros security update
- ELSA-2026-8888 Important: Oracle Linux 9 openexr security update
- ELSA-2026-8841 Important: Oracle Linux 9 go-rpm-macros security update
- ELSA-2026-6713 Important: Oracle Linux 7 ImageMagick security update
- ELSA-2026-8861 Important: Oracle Linux 8 giflib security update
- ELSA-2026-8945 Important: Oracle Linux 8 freerdp security update
- ELSA-2026-8863 Important: Oracle Linux 8 OpenEXR security update
- ELBA-2026-50237 Oracle Linux 7 linux-firmware bug fix update
- ELSA-2026-9044 Important: Oracle Linux 9 osbuild-composer security update
- ELSA-2026-8921 Important: Oracle Linux 9 kernel security update
- ELSA-2026-8468 Important: Oracle Linux 8 .NET 8.0 security update
- ELBA-2026-9325 Oracle Linux 9 container-selinux bug fix and enhancement update
- ELBA-2026-8099 Oracle Linux 8 linux-firmware bug fix and enhancement update
- ELBA-2026-50238 Oracle Linux 8 systemd bug fix update
- ELBA-2026-5604 Oracle Linux 9 linux-firmware bug fix and enhancement update
- ELBA-2026-50235 Oracle Linux 8 kexec-tools bug fix update
- ELSA-2026-8859 Important: Oracle Linux 9 giflib security update
- ELSA-2026-8469 Important: Oracle Linux 9 .NET 8.0 security update
- ELBA-2026-9324 Oracle Linux 9 rust-coreos-installer bug fix and enhancement update
- ELSA-2026-8858 Important: Oracle Linux 10 giflib security update
- ELSA-2026-8842 Important: Oracle Linux 10 delve security update
- ELBA-2026-9316 Oracle Linux 10 unbound bug fix and enhancement update
- ELBA-2026-50236 Oracle Linux 10 linux-firmware bug fix update
- ELSA-2026-8456 Important: Oracle Linux 8 osbuild-composer security update
- ELSA-2026-9692 Important: Oracle Linux 9 webkit2gtk3 security update
- ELSA-2026-9264 Important: Oracle Linux 10 kernel security update
- ELSA-2026-8312 Important: Oracle Linux 10 bind security update
- ELSA-2026-9666 Moderate: Oracle Linux 10 wireshark security update
- ELSA-2026-9638 Important: Oracle Linux 10 thunderbird security update
- ELBA-2026-9317 Oracle Linux 10 ipa bug fix and enhancement update
- ELBA-2026-9321 Oracle Linux 10 krb5 bug fix and enhancement update
- ELBA-2026-9326 Oracle Linux 9 ipa bug fix and enhancement update
- ELBA-2026-9131-1 Oracle Linux 8 kernel bug fix update
- ELSA-2026-9345 Important: Oracle Linux 8 thunderbird security update
- ELSA-2026-9131 Important: Oracle Linux 8 kernel security update
Red Hat Enterprise Linux
Red Hat has rolled out a steady stream of critical security patches for its Enterprise Linux platforms spanning versions eight through ten. You will notice that this round of updates touches nearly every major software category available for enterprise deployment. The recent fixes address serious flaws in everyday utilities including libarchive, OpenEXR, Grafana, Python modules, and even the core kernel. System administrators need to deploy these changes quickly to keep their networks safe from potential exploits.
- RHSA-2026:8908: Important: libarchive security update
- RHSA-2026:8862: Important: gstreamer1-plugins-bad-free, gstreamer1-plugins-base, gstreamer1-plugins-good, and gstreamer1-plugins-ugly-free security update
- RHSA-2026:8873: Important: libarchive security update
- RHSA-2026:8872: Important: openexr security update
- RHSA-2026:8883: Important: giflib security update
- RHSA-2026:8874: Important: gstreamer1-plugins-bad-free, gstreamer1-plugins-base, and gstreamer1-plugins-good security update
- RHSA-2026:8887: Important: giflib security update
- RHSA-2026:8860: Important: grafana security update
- RHSA-2026:8871: Important: openexr security update
- RHSA-2026:8863: Important: OpenEXR security update
- RHSA-2026:8864: Important: libarchive security update
- RHSA-2026:8861: Important: giflib security update
- RHSA-2026:8865: Important: libarchive security update
- RHSA-2026:8876: Important: gstreamer1-plugins-bad-free, gstreamer1-plugins-base, and gstreamer1-plugins-good security update
- RHSA-2026:8859: Important: giflib security update
- RHSA-2026:8856: Important: go-rpm-macros security update
- RHSA-2026:8879: Important: grafana security update
- RHSA-2026:8878: Important: grafana-pcp security update
- RHSA-2026:8858: Important: giflib security update
- RHSA-2026:8884: Important: giflib security update
- RHSA-2026:8867: Important: libarchive security update
- RHSA-2026:8855: Important: rhc security update
- RHSA-2026:8851: Important: rhc security update
- RHSA-2026:8849: Important: grafana security update
- RHSA-2026:8852: Important: rhc security update
- RHSA-2026:8853: Important: grafana security update
- RHSA-2026:8841: Important: go-rpm-macros security update
- RHSA-2026:8842: Important: delve security update
- RHSA-2026:8840: Important: go-rpm-macros security update
- RHSA-2026:8866: Important: libarchive security update
- RHSA-2026:8857: Important: gstreamer1-plugins-bad-free, gstreamer1-plugins-base, and gstreamer1-plugins-good security update
- RHSA-2026:8888: Important: openexr security update
- RHSA-2026:8880: Important: squid security update
- RHSA-2026:8870: Important: openexr security update
- RHSA-2026:8882: Important: grafana-pcp security update
- RHSA-2026:8854: Important: gstreamer1-plugins-bad-free, gstreamer1-plugins-base, gstreamer1-plugins-good, and gstreamer1-plugins-ugly-free security update
- RHSA-2026:8868: Important: nghttp2 security update
- RHSA-2026:8848: Important: go-rpm-macros security update
- RHSA-2026:8885: Important: giflib security update
- RHSA-2026:8847: Important: grafana security update
- RHSA-2026:8886: Important: giflib security update
- RHSA-2026:8881: Important: grafana security update
- RHSA-2026:8845: Important: grafana-pcp security update
- RHSA-2026:8877: Important: grafana security update
- RHSA-2026:8869: Important: openexr security update
- RHSA-2026:8875: Important: fontforge security update
- RHSA-2026:8850: Important: thunderbird security update
- RHSA-2026:8937: Important: fontforge security update
- RHSA-2026:8921: Important: kernel security update
- RHSA-2026:8931: Important: grafana-pcp security update
- RHSA-2026:9042: Important: python3.11 security update
- RHSA-2026:9031: Important: python-urllib3 security update
- RHSA-2026:9026: Important: libarchive security update
- RHSA-2026:8945: Important: freerdp security update
- RHSA-2026:8949: Important: grafana-pcp security update
- RHSA-2026:8930: Important: grafana security update
- RHSA-2026:9090: Important: grafana-pcp security update
- RHSA-2026:9131: Important: kernel security update
- RHSA-2026:9112: Moderate: kernel security update
- RHSA-2026:9135: Important: kernel-rt security update
- RHSA-2026:9109: Important: containernetworking-plugins security update
- RHSA-2026:9108: Important: gvisor-tap-vsock security update
- RHSA-2026:9110: Important: perl-XML-Parser security update
- RHSA-2026:9098: Important: skopeo security update
- RHSA-2026:9097: Important: runc security update
- RHSA-2026:9095: Moderate: kernel security update
- RHSA-2026:9094: Important: grafana-pcp security update
- RHSA-2026:9093: Important: grafana-pcp security update
- RHSA-2026:9044: Important: osbuild-composer security update
- RHSA-2026:9043: Important: grafana security update
- RHSA-2026:9246: Important: perl-XML-Parser security update
- RHSA-2026:9220: Important: squid security update
- RHSA-2026:9260: Important: python3.11 security update
- RHSA-2026:9261: Important: python3.9 security update
- RHSA-2026:9259: Important: perl-XML-Parser security update
- RHSA-2026:9264: Important: kernel security update
- RHSA-2026:9262: Important: python3.9 security update
- RHSA-2026:9290: Important: giflib security update
- RHSA-2026:9291: Important: giflib security update
- RHSA-2026:9258: Important: perl-XML-Parser security update
- RHSA-2026:9514: Moderate: kernel security update
- RHSA-2026:9515: Moderate: kernel security update
- RHSA-2026:9512: Moderate: kernel-rt security update
- RHSA-2026:9513: Moderate: kernel security update
- RHSA-2026:9488: Important: gstreamer1-plugins-bad-free, gstreamer1-plugins-base, and gstreamer1-plugins-good security update
- RHSA-2026:9487: Important: gstreamer1-plugins-bad-free, gstreamer1-plugins-base, and gstreamer1-plugins-good security update
- RHSA-2026:9439: Important: git-lfs security update
- RHSA-2026:9447: Important: gstreamer1-plugins-bad-free, gstreamer1-plugins-base, and gstreamer1-plugins-good security update
- RHSA-2026:9446: Important: gstreamer1-plugins-bad-free, gstreamer1-plugins-base, and gstreamer1-plugins-good security update
- RHSA-2026:9434: Important: git-lfs security update
- RHSA-2026:9415: Important: openssh security update
- RHSA-2026:9435: Important: git-lfs security update
- RHSA-2026:9436: Important: git-lfs security update
- RHSA-2026:9386: Important: python3 security update
- RHSA-2026:9387: Important: python3 security update
- RHSA-2026:9354: Important: python3.9 security update
- RHSA-2026:9345: Important: thunderbird security update
- RHSA-2026:9294: Important: giflib security update
- RHSA-2026:9295: Important: giflib security update
- RHSA-2026:9289: Important: python3 security update
- RHSA-2026:9292: Important: giflib security update
- RHSA-2026:9621: Important: python3 security update
- RHSA-2026:9614: Important: python security update
- RHSA-2026:9605: Important: perl-XML-Parser security update
- RHSA-2026:9591: Important: python3.11 security update
- RHSA-2026:9592: Important: libarchive security update
- RHSA-2026:9656: Important: freerdp security update
- RHSA-2026:9695: Important: rhc security update
- RHSA-2026:9692: Important: webkit2gtk3 security update
- RHSA-2026:9666: Moderate: wireshark security update
- RHSA-2026:8423: Important: OpenShift Container Platform 4.18.38 bug fix and security update
- RHSA-2026:9644: Moderate: kernel security update
- RHSA-2026:9643: Moderate: kernel security update
- RHSA-2026:9641: Important: freerdp security update
- RHSA-2026:9640: Important: freerdp security update
- RHSA-2026:9638: Important: thunderbird security update
- RHSA-2026:9836: Moderate: kernel security update
- RHSA-2026:9835: Moderate: kernel-rt security update
- RHSA-2026:9255: Important: OpenJDK 11.0.31 ELS Security Update for Portable Linux Builds
- RHSA-2026:9256: Important: OpenJDK 11.0.31 ELS Security Update for Windows Builds
- RHSA-2026:9745: Important: python3 security update
- RHSA-2026:9711: Important: nodejs:20 security update
- RHSA-2026:9705: Important: python3.11 security update
- RHSA-2026:9254: Important: Java 11 OpenJDK ELS Security Update
- RHSA-2026:9874: Important: nodejs:20 security update
- RHSA-2026:9870: Moderate: kernel security update
- RHSA-2026:9693: Important: java-25-openjdk security update
- RHSA-2026:9682: Important: java-1.8.0-openjdk security update
- RHSA-2026:9732: Important: openssh security update
- RHSA-2026:10091: Important: .NET 8.0 security update
- RHSA-2026:10076: Important: freerdp security update
- RHSA-2026:10085: Important: .NET 9.0 security update
- RHSA-2026:10084: Important: .NET 8.0 security update
- RHSA-2026:10082: Important: .NET 8.0 security update
- RHSA-2026:10083: Important: .NET 9.0 security update
- RHSA-2026:9691: Important: OpenJDK 21.0.11 Security Update for Windows Builds
- RHSA-2026:9694: Important: OpenJDK 25.0.3 Security Update for Portable Linux Builds
- RHSA-2026:9688: Important: OpenJDK 17.0.19 Security Update for Windows Builds
- RHSA-2026:9684: Important: OpenJDK 8u492 Security Update for Portable Linux Builds
- RHSA-2026:9687: Important: OpenJDK 17.0.19 Security Update for Portable Linux Builds
- RHSA-2026:10111: Important: python3.12 security update
- RHSA-2026:10169: Important: rhc-worker-playbook security update
- RHSA-2026:10255: Important: squid security update
- RHSA-2026:10108: Important: kernel security update
- RHSA-2026:10256: Important: squid security update
- RHSA-2026:10257: Important: squid security update
- RHSA-2026:10223: Important: grafana security update
- RHSA-2026:10107: Important: rhc security update
- RHSA-2026:10133: Important: golang-github-openprinting-ipp-usb security update
- RHSA-2026:10101: Important: python3.9 security update
- RHSA-2026:9690: Important: OpenJDK 21.0.11 Security Update for Portable Linux Builds
- RHSA-2026:9685: Important: OpenJDK 8u492 Windows Security Update
- RHSA-2026:10102: Important: python security update
- RHSA-2026:9686: Important: java-17-openjdk security update
- RHSA-2026:10226: Important: grafana security update
- RHSA-2026:9689: Important: java-21-openjdk security update
- RHSA-2026:9683: Important: java-1.8.0-openjdk security update
- RHSA-2026:10135: Important: buildah security update
Rocky Linux
Rocky Linux administrators need to install several urgent security patches across versions eight through ten. These updates fix known vulnerabilities in widely used tools such as go-rpm-macros, delve, giflib, OpenEXR, Thunderbird, FreeRDP, Wireshark, and WebKit2GTK3. System owners running version eight should also prioritize critical kernel upgrades for both standard and real-time builds. Ignoring these security fixes leaves networks open to moderate or critical exploits that could compromise sensitive data.
- RLSA-2026:8840: Important: go-rpm-macros security update
- RLSA-2026:8842: Important: delve security update
- RLSA-2026:8858: Important: giflib security update
- RLSA-2026:8841: Important: go-rpm-macros security update
- RLSA-2026:8859: Important: giflib security update
- RLSA-2026:8888: Important: openexr security update
- RLSA-2026:8863: Important: OpenEXR security update
- RLSA-2026:8861: Important: giflib security update
- RLSA-2026:9345: Important: thunderbird security update
- RLSA-2026:8945: Important: freerdp security update
- RLSA-2026:9638: Important: thunderbird security update
- RLSA-2026:9666: Moderate: wireshark security update
- RLSA-2026:9692: Important: webkit2gtk3 security update
- RLSA-2026:9135: Important: kernel-rt security update
- RLSA-2026:9131: Important: kernel security update
Slackware Linux
The Slackware Linux Security Team just pushed out fresh updates to patch several security holes in the system. Firefox, Thunderbird, and libXpm all received fixes that apply directly to the stable 15 release line. Administrators ought to roll these packages out quickly since unpatched versions remain vulnerable to known exploits. Regular users will stay safe until the next major platform release arrives.
SUSE Linux
SUSE recently pushed out multiple batches of security patches across their Linux distributions. From moderate issues to critical flaws, these updates cover widely used tools like the kernel, Python, ImageMagick, Flatpak, and OpenSSL. Attackers could potentially exploit dangerous weaknesses such as buffer overflows or authentication bypasses if administrators ignore them. Rolling out these fixes quickly will keep your systems protected against a long list of known vulnerabilities.
- openSUSE-SU-2026:0135-1: moderate: Security update for kubo
- openSUSE-SU-2026:10577-1: moderate: skopeo-1.22.1-1.1 on GA media
- openSUSE-SU-2026:10578-1: moderate: tempo-cli-2.10.4-1.1 on GA media
- openSUSE-SU-2026:10575-1: moderate: python311-Pillow-12.2.0-2.1 on GA media
- openSUSE-SU-2026:10573-1: moderate: cpp-httplib-devel-0.42.0-1.1 on GA media
- openSUSE-SU-2026:10571-1: moderate: bouncycastle-1.84-1.1 on GA media
- openSUSE-SU-2026:10570-1: moderate: aardvark-dns-1.17.1-1.1 on GA media
- openSUSE-SU-2026:10576-1: moderate: python311-jwcrypto-1.5.7-2.1 on GA media
- openSUSE-SU-2026:10572-1: moderate: chromedriver-147.0.7727.101-1.1 on GA media
- openSUSE-SU-2026:10574-1: moderate: jetty-annotations-9.4.58-4.1 on GA media
- openSUSE-SU-2026:0138-1: moderate: Security update for python-djangorestframework, python-Django
- SUSE-SU-2026:1464-1: important: Security update for the Linux Kernel (Live Patch 35 for SUSE Linux Enterprise 15 SP5)
- SUSE-SU-2026:1463-1: important: Security update for the Linux Kernel (Live Patch 12 for SUSE Linux Enterprise 15 SP6)
- SUSE-SU-2026:1461-1: low: Security update for jetty-minimal
- SUSE-SU-2026:1481-1: important: Security update for gegl
- SUSE-SU-2026:1480-1: important: Security update for buildah
- openSUSE-SU-2026:10580-1: moderate: python315-3.15.0~a8-2.1 on GA media
- openSUSE-SU-2026:10579-1: moderate: python310-3.10.20-5.1 on GA media
- openSUSE-SU-2026:0142-1: important: Security update for Botan
- openSUSE-SU-2026:0141-1: important: Security update for roundcubemail
- SUSE-SU-2026:1488-1: important: Security update for rekor
- SUSE-SU-2026:1489-1: important: Security update for kubernetes-old
- SUSE-SU-2026:1486-1: important: Security update for cosign
- SUSE-SU-2026:1491-1: important: Security update for buildah
- SUSE-SU-2026:1490-1: important: Security update for kubernetes
- openSUSE-SU-2026:0144-1: important: Security update for roundcubemail
- SUSE-SU-2026:1497-1: important: Security update for ImageMagick
- SUSE-SU-2026:1494-1: important: Security update for rootlesskit
- SUSE-SU-2026:1498-1: important: Security update for glibc-livepatches
- SUSE-SU-2026:1502-1: moderate: Security update for python312
- SUSE-SU-2026:1504-1: moderate: Security update for GraphicsMagick
- SUSE-SU-2026:1531-1: important: Security update for the Linux Kernel (Live Patch 20 for SUSE Linux Enterprise 15 SP6)
- SUSE-SU-2026:1530-1: important: Security update for python311
- SUSE-SU-2026:1527-1: important: Security update for the Linux Kernel (Live Patch 19 for SUSE Linux Enterprise 15 SP6)
- SUSE-SU-2026:1513-1: important: Security update for the Linux Kernel (Live Patch 16 for SUSE Linux Enterprise 15 SP6)
- openSUSE-SU-2026:10582-1: moderate: python311-PyPDF2-2.11.1-9.1 on GA media
- openSUSE-SU-2026:10581-1: moderate: haproxy-3.3.6+git91.af5637e93-1.1 on GA media
- openSUSE-SU-2026:20588-1: critical: Security update for chromium
- openSUSE-SU-2026:20558-1: important: Security update for gdk-pixbuf
- openSUSE-SU-2026:20578-1: important: Security update for python-Django
- openSUSE-SU-2026:20581-1: important: Security update for nebula
- openSUSE-SU-2026:20574-1: important: Security update for libraw
- openSUSE-SU-2026:20560-1: important: Security update for xwayland
- openSUSE-SU-2026:20571-1: important: Security update for go1.26
- openSUSE-SU-2026:20570-1: important: Security update for go1.25
- openSUSE-SU-2026:20579-1: important: Security update for gosec
- openSUSE-SU-2026:20567-1: important: Security update for qemu
- openSUSE-SU-2026:20586-1: important: Security update for roundcubemail
- openSUSE-SU-2026:20572-1: important: Security update for the Linux Kernel
- openSUSE-SU-2026:20552-1: important: Security update for LibVNCServer
- openSUSE-SU-2026:20569-1: moderate: Security update for rust1.94
- openSUSE-SU-2026:20547-1: important: Security update for strongswan
- openSUSE-SU-2026:20544-1: important: Security update for xorg-x11-server
- openSUSE-SU-2026:20556-1: important: Security update for freeipmi
- openSUSE-SU-2026:20536-1: moderate: Security update for GraphicsMagick
- openSUSE-SU-2026:20554-1: important: Security update for dovecot24
- openSUSE-SU-2026:20535-1: important: Security update for plexus-utils
- openSUSE-SU-2026:20540-1: important: Security update for vim
- openSUSE-SU-2026:20532-1: important: Security update for cockpit-subscriptions
- openSUSE-SU-2026:20517-1: important: Security update for python313
- openSUSE-SU-2026:20512-1: moderate: Security update for pcre2
- openSUSE-SU-2026:20528-1: critical: Security update for Botan
- openSUSE-SU-2026:20504-1: important: Security update for cockpit
- openSUSE-SU-2026:20501-1: important: Security update for glibc
- openSUSE-SU-2026:20506-1: important: Security update for python-cryptography
- openSUSE-SU-2026:20519-1: important: Security update for nodejs24
- openSUSE-SU-2026:20502-1: important: Security update for cockpit-podman
- openSUSE-SU-2026:20486-1: important: Security update for MozillaFirefox
- openSUSE-SU-2026:20499-1: moderate: Security update for ovmf
- openSUSE-SU-2026:20495-1: moderate: Security update for util-linux
- openSUSE-SU-2026:20497-1: moderate: Security update for python-gi-docgen
- openSUSE-SU-2026:20479-1: moderate: Security update for clamav
- SUSE-SU-2026:1508-1: important: Security update for podman
- SUSE-SU-2026:1511-1: important: Security update for flatpak
- SUSE-SU-2026:1505-1: important: Security update for the Linux Kernel (Live Patch 14 for SUSE Linux Enterprise 15 SP6)
- SUSE-SU-2026:1509-1: important: Security update for nodejs22
- openSUSE-SU-2026:20590-1: moderate: Security update for gnome-remote-desktop
- openSUSE-SU-2026:20598-1: moderate: Security update for python-PyPDF2
- SUSE-SU-2026:1541-1: important: Security update for flatpak
- SUSE-SU-2026:1540-1: important: Security update for podman
- SUSE-SU-2026:1539-1: important: Security update for gdk-pixbuf
- SUSE-SU-2026:1544-1: moderate: Security update for python-python-multipart
- SUSE-SU-2026:1548-1: important: Security update for kea
- SUSE-SU-2026:1550-1: moderate: Security update for openssl-1_1
- openSUSE-SU-2026:10593-1: moderate: openCryptoki-3.26.0-6.1 on GA media
- openSUSE-SU-2026:10591-1: moderate: kissfft-131.2.0-2.1 on GA media
- openSUSE-SU-2026:10585-1: moderate: GraphicsMagick-1.3.46-6.1 on GA media
- SUSE-SU-2026:1555-1: important: Security update for libraw
- SUSE-SU-2026:1556-1: important: Security update for libraw
- SUSE-SU-2026:1558-1: important: Security update for tomcat11
- openSUSE-SU-2026:20609-1: important: Security update for google-guest-agent
- openSUSE-SU-2026:20607-1: important: Security update for erlang
- openSUSE-SU-2026:20612-1: important: Security update for tomcat10
- openSUSE-SU-2026:20611-1: important: Security update for tomcat
- openSUSE-SU-2026:20606-1: important: Security update for ImageMagick
- openSUSE-SU-2026:20605-1: important: Security update for openexr
- openSUSE-SU-2026:20603-1: important: Security update for ignition
- openSUSE-SU-2026:20601-1: moderate: Security update for giflib
- SUSE-SU-2026:1562-1: moderate: Security update for openssl-1_1
- SUSE-SU-2026:1563-1: important: Security update for the Linux Kernel
- SUSE-SU-2026:1565-1: moderate: Security update for libssh
- SUSE-SU-2026:1560-1: important: Security update for the Linux Kernel (Live Patch 32 for SUSE Linux Enterprise 15 SP5)
- openSUSE-SU-2026:0145-1: moderate: Security update for ocaml-patch, opam
- openSUSE-SU-2026:0147-1: moderate: Security update for tor
- openSUSE-SU-2026:10599-1: moderate: cacti-1.2.30+git306.82d5aef5-1.1 on GA media
- openSUSE-SU-2026:10600-1: moderate: csync2-2.0+git.1600444747.83b3644-3.1 on GA media
- openSUSE-SU-2026:10598-1: moderate: libtree-sitter0_26-0.26.8-1.1 on GA media
- openSUSE-SU-2026:0151-1: critical: Security update for rclone
- openSUSE-SU-2026:0150-1: important: Security update for flannel
- openSUSE-SU-2026:0149-1: important: Security update for flannel
- openSUSE-SU-2026:0148-1: critical: Security update for cacti, cacti-spine
- SUSE-SU-2026:1568-1: moderate: Security update for haproxy
- SUSE-SU-2026:1574-1: important: Security update for the Linux Kernel
- SUSE-SU-2026:1577-1: important: Security update for openssl-1_1
- SUSE-SU-2026:1576-1: important: Security update for gdk-pixbuf
- SUSE-SU-2026:1578-1: important: Security update for the Linux Kernel (Live Patch 38 for SUSE Linux Enterprise 15 SP4)
- SUSE-SU-2026:1583-1: important: Security update for the Linux Kernel (Live Patch 17 for SUSE Linux Enterprise 15 SP6)
- SUSE-SU-2026:1584-1: important: Security update for the Linux Kernel (Live Patch 47 for SUSE Linux Enterprise 15 SP4)
- SUSE-SU-2026:1600-1: important: Security update for flatpak
- SUSE-SU-2026:1602-1: moderate: Security update for libpng16
- SUSE-SU-2026:1605-1: moderate: Security update for openssl-3
- SUSE-SU-2026:1607-1: important: Security update for vim
- SUSE-SU-2026:1592-1: important: Security update for the Linux Kernel (Live Patch 48 for SUSE Linux Enterprise 15 SP4)
- openSUSE-SU-2026:20618-1: moderate: Security update for haproxy
- openSUSE-SU-2026:20617-1: important: Security update for python-Pillow
- openSUSE-SU-2026:20619-1: important: Security update for coredns
- openSUSE-SU-2026:10607-1: moderate: golang-github-prometheus-prometheus-3.11.2-1.1 on GA media
- openSUSE-SU-2026:10608-1: moderate: libXpm-devel-3.5.18-2.1 on GA media
- openSUSE-SU-2026:10606-1: moderate: frr-10.5.1-3.1 on GA media
- SUSE-SU-2026:1597-1: important: Security update for ImageMagick
- SUSE-SU-2026:1599-1: important: Security update for librsvg
- SUSE-SU-2026:1619-1: moderate: Security update for PackageKit
- SUSE-SU-2026:1613-1: important: Security update for the Linux Kernel (Live Patch 11 for SUSE Linux Enterprise 15 SP6)
- SUSE-SU-2026:1611-1: important: Security update for the Linux Kernel (Live Patch 34 for SUSE Linux Enterprise 15 SP5)
- openSUSE-SU-2026:10610-1: moderate: MozillaThunderbird-140.9.1-1.1 on GA media
Ubuntu Linux
Ubuntu recently rolled out critical security patches to fix dangerous flaws across several widely used system libraries. These updates target integer overflows in RapidJSON alongside local privilege escalation risks found in PackageKit. The team also secured specialized kernel builds for major cloud providers and Raspberry Pi devices while addressing memory management errors in GStreamer plugins. System administrators must apply these fixes promptly to prevent malicious exploitation of the identified vulnerabilities across Ubuntu environments.
- [USN-8189-1] RapidJSON vulnerability
- [USN-8191-1] Apache Commons IO vulnerability
- [USN-8192-1] NTFS-3G vulnerabilities
- [USN-8193-1] libcap vulnerability
- [USN-8195-1] PackageKit vulnerability
- [USN-8196-1] strongSwan vulnerabilities
- [USN-8200-2] Linux kernel (FIPS) vulnerabilities
- [USN-8201-1] Linux kernel (Azure) vulnerabilities
- [USN-8200-1] Linux kernel vulnerabilities
- [USN-8180-4] Linux kernel (Azure FIPS) vulnerabilities
- [USN-8180-3] Linux kernel vulnerabilities
- [USN-8204-1] Linux kernel (Raspberry Pi Real-time) vulnerabilities
- [USN-8203-1] Linux kernel (Oracle) vulnerabilities
- [USN-8179-3] Linux kernel vulnerabilities
- [USN-8183-2] Linux kernel vulnerabilities
- [USN-8098-10] Linux kernel (Raspberry Pi) vulnerabilities
- [USN-8190-1] Rack::Session vulnerability
- [USN-8198-1] Tornado vulnerabilities
- [USN-8197-1] Slurm vulnerability
- [USN-8194-1] league/commonmark vulnerabilities
- [USN-8206-1] OpenMPT vulnerability
- [USN-8202-1] jq vulnerabilities
- [USN-8205-1] GStreamer Bad Plugins vulnerabilities
- [USN-8180-5] Linux kernel (IBM) vulnerabilities
How to upgrade packages
This quick overview shows exactly what commands you need to run so the latest security patches and bug fixes actually make it onto your system without hunting down individual .deb or .rpm files.
Debian/Ubuntu (apt)
The first thing to do is refresh the local package index; running sudo apt update contacts all configured repositories and pulls in the newest lists of available versions. Skipping this step leaves the system blind to any recent uploads, which explains why “upgrade” sometimes claims there’s nothing to do even after a security advisory has been published. Once the index is current, invoke sudo apt upgrade -y; the -y flag answers every prompt automatically so the process doesn’t pause for user input. This command upgrades all installed packages that have newer versions in the repositories while preserving configuration files.
sudo apt update sudo apt upgrade -y
Fedora/RedHat/Rocky/Alma/Oracle (dnf or yum)
On modern Fedora and recent Red Hat derivatives, dnf is the package manager; older RHEL releases still rely on yum. Begin with a check‑update operation—sudo dnf check-update or sudo yum check-update—to see exactly which packages are awaiting an upgrade. This preview step can be useful for spotting unexpected kernel bumps before they land. To actually apply the updates, run sudo dnf upgrade -y (or sudo yum update if you prefer the older tool). The upgrade command pulls down the new binaries and runs any necessary post‑install scripts, such as rebuilding initramfs when a kernel changes.
sudo dnf check-update sudo dnf upgrade -y
or on older releases
sudo yum check-update sudo yum update
SUSE (zypper)
SUSE’s command line front‑end is called zypper. First execute sudo zypper refresh so that the metadata for all enabled repos gets updated; without this, zypper will happily report “No updates available” even though newer packages sit on the mirror. After a fresh refresh, issue sudo zypper update -y; this upgrades every package to the latest version in the configured repositories and automatically handles service restarts when required.
sudo zypper refresh sudo zypper update -y
Slackware (slackpkg and pkgtool)
Slackware doesn’t have a single unified updater, but the official way to pull updates is through slackpkg. Start with sudo slackpkg update to download the newest package list from the chosen mirror. Then run sudo slackpkg upgrade-all; this command walks through each installed package and replaces it with the most recent build available in the official repository. For users who prefer a more granular approach, specifying a package name after upgrade limits the operation to that single item. When dealing with community‑maintained repositories, pkgtool takes over: a combined sudo pkgtool update && sudo pkgtool upgrade will sync and apply updates from the mirrors listed in /etc/slackpkg/mirrors.
sudo slackpkg update sudo slackpkg upgrade-all
Keep those systems patched and the coffee brewing.