Major Linux distributions released urgent security patches this week to address critical vulnerabilities in foundational packages like Python, sudo, and the kernel. The updates target dangerous flaws including memory corruption bugs, privilege escalation risks, and remote code execution vectors that could compromise entire networks. Administrators running Red Hat Enterprise Linux, Debian, Ubuntu, Fedora, SUSE, Rocky Linux, AlmaLinux, Oracle Linux, or Slackware must apply these fixes immediately to close active attack surfaces. Delaying installation leaves systems exposed to automated exploits that frequently chain multiple weaknesses into full system takeovers.
Apply Critical Linux Security Updates to Patch Python, Firefox, and Kernel Flaws
This week's wave of Linux security updates targets core system components that attackers love to exploit. Administrators across major distributions need to apply patches for Python, sudo, the kernel, and web browsers immediately. The advisories cover memory corruption bugs in glibc, privilege escalation risks in Sudo, and remote code execution vulnerabilities in Firefox and Chromium. Leaving these systems unpatched opens the door to serious compromises that can lead to data theft or total system takeover.
Why These Patches Matter Now
The focus this cycle is heavily weighted toward memory safety and privilege boundaries. Python updates appear across almost every distribution, which makes sense given how many backend services rely on it. A buffer overflow in a Python library can often be chained with other flaws to gain root access. Sudo remains a high-priority target because a flaw there allows any local user to escalate privileges. Systems frequently break after a bad driver update, leaving admins scrambling to roll back changes, but ignoring sudo patches is asking for trouble. A privilege escalation bug in Sudo can be exploited by anyone with shell access, turning a minor account into a full root compromise.
Distribution-Specific Linux Security Updates and Actions
Red Hat Enterprise Linux and its clones like AlmaLinux, Rocky Linux, and Oracle Linux are receiving massive batches of advisories. RHEL v6 through v10 see fixes for OpenSSH, FreeRDP, and the kernel. The presence of multiple FreeRDP updates suggests a coordinated effort to close remote access vulnerabilities. AlmaLinux and Rocky users should prioritize the sudo and Python patches first. Oracle Linux administrators managing legacy systems need to check Extended Lifecycle Support advisories, as older versions often lag behind in receiving critical fixes.
Debian Bullseye is getting hit with urgent updates for ImageMagick and Thunderbird. The mention of timing discrepancies in cryptographic libraries is concerning because these flaws can leak sensitive data without triggering obvious alarms. Fedora v42 through v44 users must address buffer overflows in glibc and Kerberos issues immediately. These are foundational components, and a failure here can destabilize the entire system or break authentication across an enterprise network.
Ubuntu servers require attention for .NET vulnerabilities and OpenSSH updates. The inclusion of Roundcube Webmail patches indicates that email-related services on these boxes might be exposed. SUSE distributions are addressing heap buffer overflows in Grafana and MariaDB, which suggests monitoring dashboards and databases are under active scrutiny by threat actors. Slackware users should not ignore the proftpd and mpg123 updates, as authentication bypass risks remain a persistent issue for legacy FTP servers.

A Closer Look at Recent Security Updates
Below is a comprehensive breakdown of the latest security patches released for AlmaLinux, Debian GNU/Linux, Fedora Linux, Oracle Linux, Red Hat Enterprise Linux, Rocky Linux, Slackware Linux, SUSE Linux, and Ubuntu Linux.
AlmaLinux
AlmaLinux recently distributed critical security patches for versions 8 through 10 of its operating system. These updates address severe vulnerabilities within essential packages like Python, Firefox, Sudo, Java, and the Linux kernel. The fixes specifically target memory corruption bugs and privilege escalation risks that could expose sensitive information. Organizations running these distributions must apply the changes quickly to prevent potential system compromises.
- ALSA-2026:11077: python3 security update (Important)
- ALSA-2026:10766: firefox security update (Important)
- ALSA-2026:11349: libxml2 security update (Moderate)
- ALSA-2026:11521: sudo security update (Important)
- ALSA-2026:11062: python3.11 security update (Important)
- ALSA-2026:10950: python3.12 security update (Important)
- ALSA-2026:10741: gdk-pixbuf2 security update (Important)
- ALSA-2026:10702: webkit2gtk3 security update (Important)
- ALSA-2026:9686: java-17-openjdk security update (Important)
- ALSA-2026:11635: PackageKit security update (Important)
- ALSA-2026:11413: yggdrasil security update (Important)
- ALSA-2026:10767: firefox security update (Important)
- ALSA-2026:11510: vim security update (Important)
- ALSA-2026:10223: grafana security update (Important)
- ALSA-2026:11389: vim security update (Important)
- ALSA-2026:10713: pcs security update (Important)
- ALSA-2026:11360: LibRaw security update (Important)
- ALSA-2026:11369: xorg-x11-server-Xwayland security update (Important)
- ALSA-2026:11388: xorg-x11-server security update (Important)
- ALSA-2026:10710: pcs security update (Important)
- ALSA-2026:10739: tigervnc security update (Important)
- ALSA-2026:10774: python3.11 security update (Important)
- ALSA-2026:10745: python3.12 security update (Important)
- ALSA-2026:9686: java-17-openjdk security update (Important)
- ALSA-2026:10758: sudo security update (Important)
- ALSA-2026:11412: yggdrasil-worker-package-manager security update (Important)
- ALSA-2026:10949: python3.9 security update (Important)
- ALSA-2026:11352: xorg-x11-server-Xwayland security update (Important)
- ALSA-2026:10757: firefox security update (Important)
- ALSA-2026:10707: gdk-pixbuf2 security update (Important)
- ALSA-2026:9683: java-1.8.0-openjdk security update (Important)
- ALSA-2026:10708: gdk-pixbuf2 security update (Important)
- ALSA-2026:8859: giflib security update (Important)
- ALSA-2026:10135: buildah security update (Important)
- ALSA-2026:9689: java-21-openjdk security update (Important)
- ALSA-2026:8863: OpenEXR security update (Important)
- ALSA-2026:8861: giflib security update (Important)
- ALSA-2026:9689: java-21-openjdk security update (Important)
- ALSA-2026:11692: xorg-x11-server security update (Important)
- ALSA-2026:9683: java-1.8.0-openjdk security update (Important)
- ALSA-2026:11509: vim security update (Important)
- ALSA-2026:11656: xorg-x11-server-Xwayland security update (Important)
- ALSA-2026:9689: java-21-openjdk security update (Important)
- ALSA-2026:10711: python3.12 security update (Important)
- ALSA-2026:11504: PackageKit security update (Important)
- ALSA-2026:10226: grafana security update (Important)
- ALSA-2026:12176: fence-agents security update (Important)
- ALSA-2026:A003: kernel security update (Important)
- ALSA-2026:A002: kernel security update (Important)
- ALSA-2026:A001: kernel security update (Important)
- ALSA-2026:12265: libtiff security update (Important)
- ALSA-2026:12423: libcap security update (Important)
- ALSA-2026:12271: libtiff security update (Important)
- ALSA-2026:12441: libcap security update (Important)
- ALSA-2026:12310: sudo security update (Important)
Debian GNU/Linux
Debian have rolled out a series of urgent security patches targeting dozens of widely used software packages across the Bullseye distribution. These critical updates address severe flaws in applications like Thunderbird, ImageMagick, OpenJDK, and the Linux kernel that could otherwise let malicious actors run arbitrary code or steal sensitive information. Some of the vulnerabilities involve timing discrepancies in cryptographic libraries while others stem from memory management issues that trigger unexpected system crashes or privilege escalation attacks. Administrators managing Debian systems should prioritize installing these fixes right away to prevent potential exploitation across their networks.
- [DLA 4549-1] thunderbird security update
- ELA-1696-1 imagemagick security update
- [DLA 4551-1] mbedtls security update
- ELA-1698-1 libde265 security update
- [DLA 4550-1] libde265 security update
- [DSA 6231-1] openjdk-21 security update
- ELA-1699-1 ffmpeg security update
- [DLA 4552-1] node-tar security update
- [DSA 6232-1] webkit2gtk security update
- [DSA 6235-1] dnsdist security update
- [DSA 6234-1] pdns-recursor security update
- [DSA 6233-1] pdns security update
- [DLA 4553-1] policykit-1 security update
- [DSA 6237-1] openjdk-17
- [DSA 6236-1] firefox-esr security update
- ELA-1702-1 policykit-1 security update
- ELA-1701-1 systemd security update
- ELA-1700-1 systemd security update
- [DLA 4555-1] firefox-esr security update
- [DLA 4554-1] calibre security update
- [DSA 6238-1] linux security update
- [DSA 6239-1] chromium security update
- [DLA 4556-1] dovecot security update
- [DSA 6141-1] python-aiohttp security update
- [DSA 6240-1] imagemagick security update
- [DLA 4558-1] libexif security update
- [DLA 4557-1] pyasn1 security update
- [DSA 6197-3] dovecot regression update
- [DLA 4559-1] imagemagick security update
- [DSA 6243-1] linux security update
- [DSA 6242-1] thunderbird security update
- [DLA 4561-1] linux-6.1 security update
- [DLA 4560-1] linux security update
- [DSA 6244-1] incus security update
Fedora Linux
Fedora has rolled out extensive security patches across versions 42 through 44 to fix serious vulnerabilities in widely used system software. These updates target a broad array of essential packages including Firefox, Chromium, Python, glibc, and Kerberos among many others. Administrators will find the new releases addressing dangerous flaws like memory corruption bugs, buffer overflows, and arbitrary code execution risks. Users should apply these critical fixes immediately to keep their systems protected against potential exploits.
- Fedora 44 Update: gum-0.17.0-3.fc44
- Fedora 42 Update: PackageKit-1.3.4-3.fc42
- Fedora 42 Update: firefox-150.0-1.fc42
- Fedora 42 Update: nss-3.122.1-1.fc42
- Fedora 42 Update: python3.14-3.14.4-2.fc42
- Fedora 42 Update: mingw-python3-3.11.15-4.fc42
- Fedora 42 Update: xrdp-0.10.6-1.fc42
- Fedora 42 Update: libcoap-4.3.5b-1.fc42
- Fedora 42 Update: gum-0.16.1-2.fc42
- Fedora 42 Update: flatpak-1.16.6-1.fc42
- Fedora 42 Update: python3-docs-3.13.13-1.fc42
- Fedora 42 Update: cockpit-357-2.fc42
- Fedora 42 Update: python3.13-3.13.13-1.fc42
- Fedora 43 Update: chromium-147.0.7727.116-1.fc43
- Fedora 43 Update: vim-9.2.390-1.fc43
- Fedora 43 Update: openvpn-2.6.20-1.fc43
- Fedora 43 Update: PackageKit-1.3.4-3.fc43
- Fedora 43 Update: openssl-3.5.4-3.fc43
- Fedora 43 Update: ngtcp2-1.22.1-1.fc43
- Fedora 43 Update: openssh-10.0p1-9.fc43
- Fedora 43 Update: mingw-python3-3.11.15-4.fc43
- Fedora 43 Update: xrdp-0.10.6-1.fc43
- Fedora 43 Update: python3.11-3.11.15-4.fc43
- Fedora 43 Update: libcoap-4.3.5b-1.fc43
- Fedora 44 Update: chromium-147.0.7727.116-1.fc44
- Fedora 44 Update: vim-9.2.390-1.fc44
- Fedora 43 Update: edk2-20260213-4.fc43
- Fedora 42 Update: python3.9-3.9.25-9.fc42
- Fedora 42 Update: lemonldap-ng-2.22.3-1.fc42
- Fedora 42 Update: binaryen-126-1.fc42
- Fedora 42 Update: buildah-1.43.1-1.fc42
- Fedora 42 Update: miniupnpd-2.3.10-1.fc42
- Fedora 42 Update: skopeo-1.22.2-1.fc42
- Fedora 42 Update: xdg-dbus-proxy-0.1.7-1.fc42
- Fedora 42 Update: libexif-0.6.26-1.fc42
- Fedora 42 Update: podman-5.8.2-1.fc42
- Fedora 42 Update: asterisk-18.26.4-1.fc42
- Fedora 43 Update: libgcrypt-1.11.1-4.fc43
- Fedora 43 Update: rust-rpm-sequoia-1.10.2-1.fc43
- Fedora 43 Update: dokuwiki-20250514b-3.fc43
- Fedora 43 Update: python3.9-3.9.25-9.fc43
- Fedora 43 Update: lemonldap-ng-2.22.3-1.fc43
- Fedora 43 Update: miniupnpd-2.3.10-1.fc43
- Fedora 43 Update: binaryen-126-1.fc43
- Fedora 43 Update: asterisk-18.26.4-1.fc43
- Fedora 44 Update: openvpn-2.7.3-1.fc44
- Fedora 44 Update: libgcrypt-1.12.2-1.fc44
- Fedora 44 Update: rust-rpm-sequoia-1.10.2-1.fc44
- Fedora 44 Update: miniupnpd-2.3.10-1.fc44
- Fedora 44 Update: dokuwiki-20250514b-5.fc44
- Fedora 44 Update: python3.9-3.9.25-9.fc44
- Fedora 44 Update: lemonldap-ng-2.22.3-1.fc44
- Fedora 44 Update: asterisk-18.26.4-1.fc44
- Fedora 44 Update: glow-2.1.2-1.fc44
- Fedora 44 Update: python3.6-3.6.15-57.fc44
- Fedora 44 Update: vhs-0.11.0-2.fc44
- Fedora 44 Update: rust-rustls-webpki-0.103.13-1.fc44
- Fedora 44 Update: emacs-30.2-23.fc44
- Fedora 44 Update: jfrog-cli-2.98.0-1.fc44
- Fedora 44 Update: pyp2spec-0.14.1-1.fc44
- Fedora 44 Update: openbao-2.5.3-1.fc44
- Fedora 44 Update: dotnet8.0-8.0.126-1.fc44
- Fedora 44 Update: dotnet9.0-9.0.116-1.fc44
- Fedora 44 Update: dotnet10.0-10.0.106-1.fc44
- Fedora 43 Update: xen-4.20.3-2.fc43
- Fedora 43 Update: glow-2.1.2-1.fc43
- Fedora 43 Update: emacs-30.2-7.fc43
- Fedora 43 Update: rust-rustls-webpki-0.103.13-1.fc43
- Fedora 43 Update: vhs-0.10.0-4.fc43
- Fedora 43 Update: python3.6-3.6.15-57.fc43
- Fedora 43 Update: openbao-2.5.3-1.fc43
- Fedora 43 Update: pyp2spec-0.14.1-1.fc43
- Fedora 43 Update: dotnet9.0-9.0.116-1.fc43
- Fedora 43 Update: dotnet8.0-8.0.126-1.fc43
- Fedora 43 Update: dotnet10.0-10.0.106-1.fc43
- Fedora 42 Update: chromium-147.0.7727.116-1.fc42
- Fedora 42 Update: glow-2.1.2-1.fc42
- Fedora 42 Update: vhs-0.9.0-2.fc42
- Fedora 42 Update: emacs-30.2-2.fc42
- Fedora 42 Update: python3.6-3.6.15-57.fc42
- Fedora 42 Update: rust-rustls-webpki-0.103.13-1.fc42
- Fedora 42 Update: openbao-2.5.3-1.fc42
- Fedora 42 Update: dotnet9.0-9.0.116-1.fc42
- Fedora 42 Update: pyp2spec-0.14.1-1.fc42
- Fedora 42 Update: dotnet8.0-8.0.126-1.fc42
- Fedora 42 Update: dotnet10.0-10.0.106-1.fc42
- Fedora 44 Update: glibc-2.43-4.fc44
- Fedora 44 Update: krb5-1.22.2-4.fc44
- Fedora 44 Update: GitPython-3.1.49-1.fc44
- Fedora 44 Update: xen-4.21.1-2.fc44
- Fedora 44 Update: perl-CryptX-0.088-2.fc44
- Fedora 44 Update: rust-openssl-sys-0.9.114-1.fc44
- Fedora 44 Update: rust-openssl-0.10.78-1.fc44
- Fedora 42 Update: perl-CryptX-0.088-2.fc42
- Fedora 42 Update: rust-openssl-sys-0.9.114-1.fc42
- Fedora 42 Update: openvpn-2.6.20-1.fc42
- Fedora 42 Update: rust-openssl-0.10.78-1.fc42
- Fedora 42 Update: openssh-9.9p1-14.fc42
- Fedora 43 Update: GitPython-3.1.49-1.fc43
- Fedora 43 Update: rust-openssl-sys-0.9.114-1.fc43
- Fedora 43 Update: perl-CryptX-0.088-2.fc43
- Fedora 43 Update: rust-openssl-0.10.78-1.fc43
- Fedora 42 Update: rust-sequoia-git-0.6.0-1.fc42
- Fedora 42 Update: insight-18.0.50.20260306-3.fc42
- Fedora 43 Update: glibc-2.42-12.fc43
- Fedora 43 Update: insight-18.0.50.20260306-3.fc43
- Fedora 43 Update: rust-sequoia-git-0.6.0-1.fc43
- Fedora 43 Update: nss-3.122.1-1.fc43
- Fedora 43 Update: firefox-150.0-1.fc43
- Fedora 44 Update: nano-8.7.1-2.fc44
- Fedora 44 Update: chromium-147.0.7727.137-1.fc44
Oracle Linux
Oracle has issued a wave of critical security advisories for Oracle Linux versions six through ten across multiple processor architectures. These comprehensive patches cover both standard releases and extended lifecycle support options. System administrators will find urgent fixes for widely used development tools including OpenJDK, Grafana, systemd, Go, Python, VIM, and Libtiff. The updates specifically resolve dangerous flaws like memory boundary errors, privilege escalation bugs, and integer overflows that could severely impact system stability.
- ELSA-2026-9686 Important: Oracle Linux 8 java-17-openjdk security update
- ELBA-2026-9743 Oracle Linux 8 systemd bug fix and enhancement update
- ELSA-2026-9686 Important: Oracle Linux 9 java-17-openjdk security update
- ELSA-2026-9693 Important: Oracle Linux 9 java-25-openjdk security update
- ELSA-2026-10223 Important: Oracle Linux 10 grafana security update
- ELSA-2026-10226 Important: Oracle Linux 9 grafana security update
- ELSA-2026-9693 Important: Oracle Linux 10 java-25-openjdk security update
- ELSA-2026-10219 Important: Oracle Linux 9 golang security update
- ELSA-2026-10135 Important: Oracle Linux 9 buildah security update
- ELSA-2026-10217 Important: Oracle Linux 10 golang security update
- ELBA-2026-9327 Oracle Linux 9 microcode_ctl bug fix and enhancement update
- ELSA-2026-9683 Important: Oracle Linux 9 java-1.8.0-openjdk security update
- ELSA-2026-10949 Important: Oracle Linux 9 python3.9 security update
- ELSA-2026-9689 Important: Oracle Linux 9 java-21-openjdk security update
- ELSA-2026-10757 Important: Oracle Linux 9 firefox security update
- ELSA-2026-10745 Important: Oracle Linux 9 python3.12 security update
- ELSA-2026-10739 Important: Oracle Linux 9 tigervnc security update
- ELSA-2026-10708 Important: Oracle Linux 9 gdk-pixbuf2 security update
- ELBA-2026-9328 Oracle Linux 9 krb5 bug fix and enhancement update
- ELSA-2026-9689 Important: Oracle Linux 10 java-21-openjdk security update
- ELSA-2026-10767 Important: Oracle Linux 10 firefox security update
- ELSA-2026-10758 Important: Oracle Linux 10 sudo security update
- ELSA-2026-10711 Important: Oracle Linux 10 python3.12 security update
- ELSA-2026-10707 Important: Oracle Linux 10 gdk-pixbuf2 security update
- ELSA-2026-10774 Important: Oracle Linux 9 python3.11 security update
- ELSA-2026-10741 Important: Oracle Linux 8 gdk-pixbuf2 security update
- ELSA-2026-11077 Important: Oracle Linux 8 python3 security update
- ELSA-2026-9683 Important: Oracle Linux 8 java-1.8.0-openjdk security update
- ELSA-2026-9689 Important: Oracle Linux 8 java-21-openjdk security update
- ELSA-2026-10766 Important: Oracle Linux 8 firefox security update
- ELSA-2026-11062 Important: Oracle Linux 8 python3.11 security update
- ELSA-2026-10950 Important: Oracle Linux 8 python3.12 security update
- ELBA-2026-50242 Oracle Linux 8 mdadm bug fix update
- ELSA-2026-10702 Important: Oracle Linux 8 webkit2gtk3 security update
- ELSA-2026-7032 Important: Oracle Linux 7 libpng12 security update
- ELBA-2026-9320 Oracle Linux 10 microcode_ctl bug fix and enhancement update
- ELSA-2026-11413 Important: Oracle Linux 10 yggdrasil security update
- ELSA-2026-11412 Important: Oracle Linux 10 yggdrasil-worker-package-manager security update
- ELSA-2026-11389 Important: Oracle Linux 10 vim security update
- ELSA-2026-11352 Important: Oracle Linux 10 xorg-x11-server-Xwayland security update
- ELBA-2026-50243 Oracle Linux 9 Unbreakable Enterprise kernel bug fix update
- ELSA-2026-11388 Important: Oracle Linux 9 xorg-x11-server security update
- ELSA-2026-11369 Important: Oracle Linux 9 xorg-x11-server-Xwayland security update
- ELSA-2026-11360 Important: Oracle Linux 9 LibRaw security update
- ELBA-2026-50246 Oracle Linux 9 podman bug fix update
- ELBA-2026-50245 Oracle Linux 9 golang bug fix update
- ELBA-2026-50243 Oracle Linux 9 Unbreakable Enterprise kernel bug fix update
- ELBA-2026-50243 Oracle Linux 8 Unbreakable Enterprise kernel bug fix update
- ELSA-2026-11349 Moderate: Oracle Linux 8 libxml2 security update
- ELSA-2026-10704 Important: Oracle Linux 8 go-toolset:rhel8 security update
- ELSA-2026-6007 Moderate: Oracle Linux 6 Extended Lifecycle Support (ELS) python security update
- ELSA-2026-11712 Important: Oracle Linux 10 grafana security update
- ELSA-2026-11711 Important: Oracle Linux 9 grafana security update
- ELSA-2026-11704 Important: Oracle Linux 9 grafana-pcp security update
- ELSA-2026-11510 Important: Oracle Linux 9 vim security update
- ELSA-2026-11504 Important: Oracle Linux 9 PackageKit security update
- ELSA-2026-11514 Important: Oracle Linux 8 grafana-pcp security update
- ELSA-2026-11692 Important: Oracle Linux 8 xorg-x11-server security update
- ELSA-2026-11507 Important: Oracle Linux 8 grafana security update
- ELSA-2026-11635 Important: Oracle Linux 8 PackageKit security update
- ELSA-2026-11521 Important: Oracle Linux 8 sudo security update
- ELSA-2026-11509 Important: Oracle Linux 8 vim security update
- ELSA-2026-50249 Moderate: dtrace security update
- ELSA-2026-12265 Important: Oracle Linux 10 libtiff security update
- ELSA-2026-11881 Important: Oracle Linux 10 grafana-pcp security update
- ELBA-2026-12270 Oracle Linux 10 edk2 bug fix and enhancement update
- OLAMSA-2026-0010 Important: Oracle Linux 9 ol-automation-manager security update
- OLAMSA-2026-0009 Important: Oracle Linux 8 ol-automation-manager security update
- ELSA-2026-50249 Moderate: Oracle Linux 9 dtrace security update
- ELBA-2026-50247 Oracle Linux 9 e2fsprogs bug fix update
- ELSA-2026-50250 Moderate: Oracle Linux 9 dtrace security update
- ELSA-2026-12441 Important: Oracle Linux 9 libcap security update
- ELSA-2026-12310 Important: Oracle Linux 9 sudo security update
- ELSA-2026-12271 Important: Oracle Linux 9 libtiff security update
- ELSA-2026-50250 Moderate: Oracle Linux 9 dtrace security update
- ELSA-2026-50250 Moderate: Oracle Linux 8 dtrace security update
- ELSA-2026-50251 Moderate: Oracle Linux 8 dtrace security update
- ELSA-2026-12176 Important: Oracle Linux 8 fence-agents security update
- ELSA-2026-11656 Important: Oracle Linux 8 xorg-x11-server-Xwayland security update
- ELSA-2026-50251 Moderate: Oracle Linux 8 dtrace security update
Red Hat Enterprise Linux
Red Hat has released multiple security advisories covering RHEL versions six through ten. These patches address critical flaws in widely used enterprise software and core system libraries. IT teams need to quickly apply updates for high-priority packages including OpenSSH, Python, the Linux kernel, sudo, Vim, FreeRDP, and OpenShift utilities. Prompt installation remains essential to protect production servers from active vulnerabilities.
- RHSA-2026:10703: Important: container-tools:rhel8 security update
- RHSA-2026:10714: Important: openssh security update
- RHSA-2026:10708: Important: gdk-pixbuf2 security update
- RHSA-2026:10711: Important: python3.12 security update
- RHSA-2026:10702: Important: webkit2gtk3 security update
- RHSA-2026:10705: Important: rhc security update
- RHSA-2026:10706: Important: rhc security update
- RHSA-2026:10713: Important: pcs security update
- RHSA-2026:10756: Moderate: kernel-rt security update
- RHSA-2026:10754: Important: RHUI 4.11.4 security update - python-pyOpenSSL
- RHSA-2026:10745: Important: python3.12 security update
- RHSA-2026:10741: Important: gdk-pixbuf2 security update
- RHSA-2026:10739: Important: tigervnc security update
- RHSA-2026:10735: Important: freerdp security update
- RHSA-2026:10734: Important: freerdp security update
- RHSA-2026:10709: Important: freerdp security update
- RHSA-2026:10712: Important: git-lfs security update
- RHSA-2026:10707: Important: gdk-pixbuf2 security update
- RHSA-2026:10710: Important: pcs security update
- RHSA-2026:10701: Important: yggdrasil-worker-package-manager security update
- RHSA-2026:10949: Important: python3.9 security update
- RHSA-2026:10951: Important: freerdp security update
- RHSA-2026:10929: Important: rhc-worker-playbook security update
- RHSA-2026:10774: Important: python3.11 security update
- RHSA-2026:10766: Important: firefox security update
- RHSA-2026:10758: Important: sudo security update
- RHSA-2026:10757: Important: firefox security update
- RHSA-2026:11313: Moderate: kernel security update
- RHSA-2026:11077: Important: python3 security update
- RHSA-2026:11062: Important: python3.11 security update
- RHSA-2026:10996: Important: kernel security update
- RHSA-2026:10950: Important: python3.12 security update
- RHSA-2026:11333: Important: freerdp security update
- RHSA-2026:11336: Important: freerdp security update
- RHSA-2026:11332: Important: freerdp security update
- RHSA-2026:11328: Important: gdk-pixbuf2 security update
- RHSA-2026:11327: Important: gdk-pixbuf2 security update
- RHSA-2026:11326: Important: gdk-pixbuf2 security update
- RHSA-2026:11325: Important: gdk-pixbuf2 security update
- RHSA-2026:11323: Important: freerdp security update
- RHSA-2026:11329: Important: webkit2gtk3 security update
- RHSA-2026:11352: Important: xorg-x11-server-Xwayland security update
- RHSA-2026:11360: Important: LibRaw security update
- RHSA-2026:11375: Important: yggdrasil security update
- RHSA-2026:11371: Important: bind security update
- RHSA-2026:11372: Important: bind security update
- RHSA-2026:11369: Important: xorg-x11-server-Xwayland security update
- RHSA-2026:7885: Moderate: Red Hat OpenStack Services on OpenShift 18.0.18 (golang-github-openstack-k8s-operators-os-diff) security update
- RHSA-2026:11416: Important: grafana security update
- RHSA-2026:11417: Important: grafana security update
- RHSA-2026:11413: Important: yggdrasil security update
- RHSA-2026:11412: Important: yggdrasil-worker-package-manager security update
- RHSA-2026:11389: Important: vim security update
- RHSA-2026:11388: Important: xorg-x11-server security update
- RHSA-2026:11349: Moderate: libxml2 security update
- RHSA-2026:11344: Important: kea security update
- RHSA-2026:11509: Important: vim security update
- RHSA-2026:11521: Important: sudo security update
- RHSA-2026:11516: Important: pcs security update
- RHSA-2026:11510: Important: vim security update
- RHSA-2026:11493: Important: pcs security update
- RHSA-2026:11469: Important: pcs security update
- RHSA-2026:11495: Important: pcs security update
- RHSA-2026:11494: Important: pcs security update
- RHSA-2026:11471: Important: pcs security update
- RHSA-2026:11470: Important: pcs security update
- RHSA-2026:11454: Important: pcs security update
- RHSA-2026:7884: Important: Red Hat OpenStack Services on OpenShift 18.0.18 (openstack-nova) security update
- RHSA-2026:11692: Important: xorg-x11-server security update
- RHSA-2026:11702: Important: ovn25.09 security update
- RHSA-2026:11696: Important: ovn23.06 security update
- RHSA-2026:11694: Important: ovn-2021 security update
- RHSA-2026:11649: Important: freerdp security update
- RHSA-2026:12033: Important: gvisor-tap-vsock security update
- RHSA-2026:12030: Important: buildah security update
- RHSA-2026:12031: Important: runc security update
- RHSA-2026:11901: Important: squid security update
- RHSA-2026:11814: Important: webkit2gtk3 security update
- RHSA-2026:11813: Important: thunderbird security update
- RHSA-2026:11804: Moderate: oci-seccomp-bpf-hook security update
- RHSA-2026:11806: Important: gdk-pixbuf2 security update
- RHSA-2026:11805: Important: firefox security update
- RHSA-2026:11749: Important: buildah security update
- RHSA-2026:11722: Important: python-urllib3 security update
- RHSA-2026:11700: Important: ovn24.03 security update
- RHSA-2026:11701: Important: ovn25.03 security update
- RHSA-2026:11698: Important: ovn23.09 security update
- RHSA-2026:11695: Important: ovn23.06 security update
- RHSA-2026:11656: Important: xorg-x11-server-Xwayland security update
- RHSA-2026:11635: Important: PackageKit security update
- RHSA-2026:11651: Important: freerdp security update
- RHSA-2026:10081: Important: OpenShift Container Platform 4.19.29 bug fix and security update
- RHSA-2026:11504: Important: PackageKit security update
- RHSA-2026:12115: Important: gdk-pixbuf2 security update
- RHSA-2026:12114: Important: gdk-pixbuf2 security update
- RHSA-2026:12061: Important: gdk-pixbuf2 security update
- RHSA-2026:12060: Important: gdk-pixbuf2 security update
- RHSA-2026:10096: Important: OpenShift Container Platform 4.16.60 packages and security update
- RHSA-2026:12265: Important: libtiff security update
- RHSA-2026:10097: Important: OpenShift Container Platform 4.16.60 bug fix and security update
- RHSA-2026:12267: Important: Red Hat JBoss Enterprise Application Platform 7.4.24 security update
- RHSA-2026:12269: Important: Red Hat JBoss Enterprise Application Platform 7.4.24 security update
- RHSA-2026:12062: Important: gdk-pixbuf2 security update
- RHSA-2026:12032: Important: containernetworking-plugins security update
- RHSA-2026:12028: Important: podman security update
- RHSA-2026:12029: Important: skopeo security update
- RHSA-2026:11822: Important: OpenJDK 25.0.3 Security Update for Windows Builds
- RHSA-2026:12441: Important: libcap security update
- RHSA-2026:12359: Important: freerdp security update
- RHSA-2026:12423: Important: libcap security update
- RHSA-2026:12388: Important: freerdp security update
- RHSA-2026:12389: Important: openssh security update
- RHSA-2026:12338: Important: OpenEXR security update
- RHSA-2026:12310: Important: sudo security update
- RHSA-2026:12339: Important: OpenEXR security update
- RHSA-2026:12341: Important: OpenEXR security update
- RHSA-2026:12340: Important: OpenEXR security update
- RHSA-2026:12271: Important: libtiff security update
- RHSA-2026:12194: Moderate: Red Hat JBoss Web Server 6.2.2 release and security update
- RHSA-2026:12195: Moderate: Red Hat JBoss Web Server 6.2.2 release and security update
- RHSA-2026:12285: Important: thunderbird security update
- RHSA-2026:12264: Important: thunderbird security update
- RHSA-2026:12176: Important: fence-agents security update
Rocky Linux
Rocky Linux administrators need to install urgent security patches across their networks right away. These critical updates address vulnerabilities in core system files and popular applications spanning both version eight and nine of the distribution. You will find fixes for widely used packages such as Python, Firefox, sudo, VIM, libtiff, and several X server components. Leaving these systems unpatched invites serious exploitation risks that could compromise sensitive data or disrupt daily operations.
- RLSA-2026:10710: Important: pcs security update
- RLSA-2026:8921: Important: kernel security update
- RLSA-2026:10708: Important: gdk-pixbuf2 security update
- RLSA-2026:10774: Important: python3.11 security update
- RLSA-2026:10226: Important: grafana security update
- RLSA-2026:10949: Important: python3.9 security update
- RLSA-2026:10135: Important: buildah security update
- RLSA-2026:10745: Important: python3.12 security update
- RLSA-2026:9689: Important: java-21-openjdk security update
- RLSA-2026:10739: Important: tigervnc security update
- RLSA-2026:10702: Important: webkit2gtk3 security update
- RLSA-2026:10950: Important: python3.12 security update
- RLSA-2026:10741: Important: gdk-pixbuf2 security update
- RLSA-2026:10707: Important: gdk-pixbuf2 security update
- RLSA-2026:10767: Important: firefox security update
- RLSA-2026:9264: Important: kernel security update
- RLSA-2026:10758: Important: sudo security update
- RLSA-2026:10223: Important: grafana security update
- RLSA-2026:10757: Important: firefox security update
- RLSA-2026:11062: Important: python3.11 security update
- RLSA-2026:11349: Moderate: libxml2 security update
- RLSA-2026:11360: Important: LibRaw security update
- RLSA-2026:11369: Important: xorg-x11-server-Xwayland security update
- RLSA-2026:11510: Important: vim security update
- RLSA-2026:11504: Important: PackageKit security update
- RLSA-2026:11388: Important: xorg-x11-server security update
- RLSA-2026:10766: Important: firefox security update
- RLSA-2026:11692: Important: xorg-x11-server security update
- RLSA-2026:12176: Important: fence-agents security update
- RLSA-2026:11656: Important: xorg-x11-server-Xwayland security update
- RLSA-2026:11635: Important: PackageKit security update
- RLSA-2026:11521: Important: sudo security update
- RLSA-2026:11509: Important: vim security update
- RLSA-2026:12265: Important: libtiff security update
- RLSA-2026:11352: Important: xorg-x11-server-Xwayland security update
- RLSA-2026:11412: Important: yggdrasil-worker-package-manager security update
- RLSA-2026:11413: Important: yggdrasil security update
- RLSA-2026:11389: Important: vim security update
- RLSA-2026:12271: Important: libtiff security update
Slackware Linux
Slackware recently rolled out a batch of security patches for its 15.0 release and current development branch. The updates target serious flaws in several widely used applications, including mpg123, proftpd, Firefox, GnuTLS, Thunderbird, and the Linux kernel itself. Each package received fixes for vulnerabilities that could allow attackers to execute arbitrary code or bypass authentication mechanisms on affected systems. System administrators should apply these patches promptly to keep their installations secure against known exploits.
- mpg123 (SSA:2026-117-01)
- ProFTPD update for Slackware
- mozilla-firefox (SSA:2026-121-01)
- gnutls (SSA:2026-122-02)
- kernel (SSA:2026-122-01)
- mozilla-thunderbird (SSA:2026-122-03)
SUSE Linux
SUSE recently distributed several rounds of security patches across its openSUSE Tumbleweed, Leap, and SLE Backports platforms to address a wide array of software vulnerabilities. The updates target critical flaws in heavily used tools like the Linux Kernel, Chromium, Firefox, MariaDB, and Grafana alongside numerous Python and Java libraries. These advisories resolve dangerous issues such as local privilege escalation, remote code execution, and heap buffer overflows that could easily destabilize production environments. System administrators need to apply these fixes quickly since attackers frequently exploit unpatched weaknesses in widely deployed open source software.
- openSUSE-SU-2026:10615-1: moderate: ovmf-202602-9.1 on GA media
- openSUSE-SU-2026:10617-1: moderate: libminizip1-1.3.1-2.1 on GA media
- openSUSE-SU-2026:10611-1: moderate: freerdp2-2.11.7-8.1 on GA media
- openSUSE-SU-2026:10612-1: moderate: golang-github-prometheus-alertmanager-0.31.1-3.1 on GA media
- openSUSE-SU-2026:10616-1: moderate: python311-Mako-1.3.11-1.1 on GA media
- openSUSE-SU-2026:10613-1: moderate: kyverno-1.17.2-1.1 on GA media
- openSUSE-SU-2026:0152-1: important: Security update for chromium
- openSUSE-SU-2026:0153-1: important: Security update for chromium
- SUSE-SU-2026:1622-1: important: Security update for the Linux Kernel (Live Patch 27 for SUSE Linux Enterprise 15 SP5)
- SUSE-SU-2026:1621-1: important: Security update for the Linux Kernel (Live Patch 30 for SUSE Linux Enterprise 15 SP5)
- openSUSE-SU-2026:0155-1: moderate: Security update for freeciv
- openSUSE-SU-2026:20621-1: important: Security update for MozillaFirefox
- openSUSE-SU-2026:10624-1: moderate: libsystemd0-259.5-1.3 on GA media
- openSUSE-SU-2026:10619-1: moderate: emacs-30.2-8.1 on GA media
- openSUSE-SU-2026:10621-1: moderate: libngtcp2-16-1.22.1-1.1 on GA media
- SUSE-SU-2026:1630-1: important: Security update for the Linux Kernel (Live Patch 26 for SUSE Linux Enterprise 15 SP5)
- SUSE-SU-2026:1632-1: important: Security update for freerdp
- SUSE-SU-2026:1634-1: important: Security update for freerdp
- openSUSE-SU-2026:20629-1: important: Security update for mariadb
- openSUSE-SU-2026:20628-1: moderate: Security update for container-suseconnect
- openSUSE-SU-2026:10628-1: moderate: pocketbase-0.37.3-1.1 on GA media
- SUSE-SU-2026:1645-1: important: Security update for xen
- SUSE-SU-2026:1643-1: important: Security update for the Linux Kernel
- SUSE-SU-2026:1644-1: moderate: Security update for python-requests
- SUSE-SU-2026:1647-1: moderate: Security update for python-requests
- SUSE-SU-2026:1657-1: important: Security update for xen
- SUSE-SU-2026:1658-1: moderate: Security update for openCryptoki
- SUSE-SU-2026:1659-1: moderate: Security update for sed
- openSUSE-SU-2026:10632-1: moderate: dnsdist-2.0.5-1.1 on GA media
- openSUSE-SU-2026:20654-1: critical: Security update for grafana
- openSUSE-SU-2026:20651-1: important: Security update for ntfs-3g_ntfsprogs
- openSUSE-SU-2026:20647-1: moderate: Security update for libssh
- openSUSE-SU-2026:20653-1: critical: Security update for radare2
- openSUSE-SU-2026:20642-1: moderate: Security update for libsodium
- openSUSE-SU-2026:20646-1: important: Security update for PackageKit
- openSUSE-SU-2026:20652-1: important: Security update for openexr
- openSUSE-SU-2026:20645-1: important: Security update for python-Mako
- openSUSE-SU-2026:20650-1: moderate: Security update for python-PyNaCl
- openSUSE-SU-2026:20644-1: important: Security update for python-jwcrypto
- SUSE-SU-2026:1662-1: important: Security update for glibc-livepatches
- openSUSE-SU-2026:10648-1: moderate: python315-3.15.0~a8-3.1 on GA media
- openSUSE-SU-2026:10639-1: moderate: java-25-openjdk-25.0.3.0-1.1 on GA media
- openSUSE-SU-2026:10646-1: moderate: python311-pyOpenSSL-26.1.0-1.1 on GA media
- openSUSE-SU-2026:10642-1: moderate: libmozjs-140-0-140.10.0-1.1 on GA media
- openSUSE-SU-2026:10644-1: moderate: prometheus-postgres_exporter-0.10.1-6.1 on GA media
- openSUSE-SU-2026:10640-1: moderate: libpng12-0-1.2.59-5.1 on GA media
- openSUSE-SU-2026:10641-1: moderate: libixml11-1.18.5-1.1 on GA media
- openSUSE-SU-2026:0161-1: critical: Security update for chromium
- SUSE-SU-2026:1666-1: low: Security update for python-Pygments
- SUSE-SU-2026:1667-1: low: Security update for python-Pygments
- openSUSE-SU-2026:10658-1: moderate: python311-pypdf-6.10.2-2.1 on GA media
- openSUSE-SU-2026:10657-1: moderate: krb5-appl-clients-1.0.3-6.1 on GA media
- openSUSE-SU-2026:10655-1: moderate: google-osconfig-agent-20260330.00-2.1 on GA media
- openSUSE-SU-2026:10652-1: moderate: gvim-9.2.0398-1.1 on GA media
- openSUSE-SU-2026:10656-1: moderate: java-1_8_0-openjdk-1.8.0.492-1.1 on GA media
- openSUSE-SU-2026:10654-1: moderate: google-guest-agent-20260402.00-2.1 on GA media
- openSUSE-SU-2026:10651-1: moderate: trivy-0.70.0-1.1 on GA media
- openSUSE-SU-2026:10649-1: moderate: sed-4.10-1.1 on GA media
- openSUSE-SU-2026:10650-1: moderate: libtiff-devel-32bit-4.7.1-5.1 on GA media
Ubuntu Linux
Ubuntu recently released a series of security notices addressing critical flaws in dozens of widely used software packages. These patches cover everything from the Linux kernel and OpenSSH to various Python libraries and web development tools that previously allowed remote attackers to run arbitrary code. Malformed files or network requests could easily trigger service crashes or expose sensitive data if left unpatched. Server operators need to install these updates right away to close off dangerous attack vectors before they get exploited.
- [USN-8192-2] NTFS-3G vulnerabilities
- [USN-8211-1] Pillow vulnerability
- [USN-8207-1] ClamAV vulnerability
- [USN-8195-2] PackageKit vulnerability
- [USN-8210-1] nginx vulnerabilities
- [USN-8208-1] HAProxy vulnerability
- [USN-8196-2] strongSwan vulnerabilities
- [USN-8209-1] Little CMS vulnerability
- [USN-8199-1] OpenStack Glance vulnerabilities
- [USN-8212-1] authd vulnerability
- [USN-8213-1] Vim vulnerabilities
- [USN-8202-2] jq vulnerabilities
- [USN-8214-1] NLTK vulnerability
- [USN-8190-2] Rack::Session vulnerability
- [USN-8136-2] Dovecot regression
- [USN-8185-2] Linux kernel (Low Latency NVIDIA) vulnerabilities
- [USN-8198-2] Tornado vulnerabilities
- [USN-8217-1] follow-redirects vulnerabilities
- [USN-8219-1] UltraJSON vulnerabilities
- [USN-8216-1] .NET vulnerabilities
- [USN-8215-1] .NET vulnerability
- [USN-8087-3] python-cryptography vulnerability
- [USN-8221-1] wheel vulnerability
- [USN-8195-3] PackageKit vulnerability
- [USN-8222-1] OpenSSH vulnerabilities
- [USN-8224-1] Linux kernel (BlueField) vulnerabilities
- [USN-8223-1] Roundcube Webmail vulnerabilities
- [USN-8225-1] Python marshmallow vulnerabilities
- [USN-8226-2] kmod update
- [USN-8226-1] kmod update
- [USN-8218-1] zuluCrypt vulnerability
How to Apply Linux Security Updates Safely
Applying these patches requires standard package management commands tailored to each distribution. RHEL-based systems typically use dnf update or yum update, while Debian and Ubuntu rely on apt upgrade. SUSE users should run zypper patch to ensure all advisories are addressed correctly. Slackware administrators need to rebuild their system using upgradepkg or slackpkg. After running the commands, a reboot is often necessary for kernel updates to take effect. Checking the package manager logs afterward helps confirm that no dependencies were broken during the process.
Debian/Ubuntu (apt)
The first thing to do is refresh the local package index; running sudo apt update contacts all configured repositories and pulls in the newest lists of available versions. Skipping this step leaves the system blind to any recent uploads, which explains why “upgrade” sometimes claims there’s nothing to do even after a security advisory has been published. Once the index is current, invoke sudo apt upgrade -y; the -y flag answers every prompt automatically so the process doesn’t pause for user input. This command upgrades all installed packages that have newer versions in the repositories while preserving configuration files.
sudo apt update sudo apt upgrade -y
Fedora/RedHat/Rocky/Alma/Oracle (dnf or yum)
On modern Fedora and recent Red Hat derivatives, dnf is the package manager; older RHEL releases still rely on yum. Begin with a check‑update operation—sudo dnf check-update or sudo yum check-update—to see exactly which packages are awaiting an upgrade. This preview step can be useful for spotting unexpected kernel bumps before they land. To actually apply the updates, run sudo dnf upgrade -y (or sudo yum update if you prefer the older tool). The upgrade command pulls down the new binaries and runs any necessary post‑install scripts, such as rebuilding initramfs when a kernel changes.
sudo dnf check-update sudo dnf upgrade -y
or on older releases
sudo yum check-update sudo yum update
SUSE (zypper)
SUSE’s command line front‑end is called zypper. First execute sudo zypper refresh so that the metadata for all enabled repos gets updated; without this, zypper will happily report “No updates available” even though newer packages sit on the mirror. After a fresh refresh, issue sudo zypper update -y; this upgrades every package to the latest version in the configured repositories and automatically handles service restarts when required.
sudo zypper refresh sudo zypper update -y
Slackware (slackpkg and pkgtool)
Slackware doesn’t have a single unified updater, but the official way to pull updates is through slackpkg. Start with sudo slackpkg update to download the newest package list from the chosen mirror. Then run sudo slackpkg upgrade-all; this command walks through each installed package and replaces it with the most recent build available in the official repository. For users who prefer a more granular approach, specifying a package name after upgrade limits the operation to that single item. When dealing with community‑maintained repositories, pkgtool takes over: a combined sudo pkgtool update && sudo pkgtool upgrade will sync and apply updates from the mirrors listed in /etc/slackpkg/mirrors.
sudo slackpkg update sudo slackpkg upgrade-all
Keep an eye on the advisory feeds next week because attackers rarely stop waiting for you to patch.