This week brings a massive wave of critical security patches across major Linux distributions, with urgent fixes targeting sudo privilege escalation risks and the newly flagged CopyFail vulnerability. Administrators managing Red Hat derivatives need to prioritize kernel and OpenSSH updates while verifying boot configurations after installation. Debian and Ubuntu users should carefully apply timezone database refreshes alongside cloud-specific kernel packages to prevent silent script failures or hardware mismatches. Running your distribution's package manager immediately is essential since delaying these installations leaves enterprise networks and edge devices wide open to exploitation.
Linux Security Updates: CopyFail CVE, Sudo Fixes, and Kernel Patches You Need Now
This week's patch pile is heavy enough to make even seasoned sysadmins groan. Critical fixes for sudo, a new vulnerability labeled CopyFail in Rocky Linux, and timezone database updates that can break logging scripts dominate the release cycle. The Red Hat family pushes hard on OpenSSH and kernel patches, while Debian and Ubuntu cover cloud flavors and browser holes. Package managers should be running immediately to close these gaps before attackers exploit them.
CopyFail CVE and Sudo Panic Across Red Hat Distributions
Rocky Linux flagged a vulnerability labeled CopyFail with CVE-2026-31431, which appears to target memory safety issues that could allow unauthorized access or system crashes. RHEL also released multiple advisories updating sudo across enterprise releases. Sudo vulnerabilities frequently escalate into full root compromises within minutes, making these patches non-negotiable for any system handling privileged commands.
AlmaLinux and Oracle Linux joined the fray with broad updates targeting versions 7 through 10. The kernel receives heavy attention alongside OpenSSH and systemd fixes. Oracle Linux included patches for the Unbreakable Enterprise Kernel, so administrators running UEK must verify boot configurations after installation to avoid boot failures. RHEL also updated .NET versions 8.0 and 9.0, plus LibRaw and image-builder tools.
The volume of corosync and fence-agents updates suggests high-availability clusters are under scrutiny. Skipping these patches leaves clustered workloads exposed to serious exploits.
Debian Timezone Refreshes and Ubuntu Cloud Kernel Flavors
Debian administrators must install tzdata updates alongside fixes for OpenJDK, ImageMagick, Apache2, and the Linux kernel. The timezone database refresh for 2026 is a routine maintenance task that often causes headaches when cron jobs or logging scripts assume static offsets.
A common failure mode involves backup scripts failing silently because a timezone update shifts the UTC alignment unexpectedly. Ubuntu covers all bases with kernel updates for Azure, GCP, Raspberry Pi, and Xilinx flavors. Systems running on edge devices or cloud instances require specific kernel packages that match their hardware abstraction layers. Applying generic updates without checking the flavor can break boot processes on specialized hardware. Both distros also patched Thunderbird and Firefox variants, so desktop environments need attention alongside server workloads.
Fedora 42 to 44 Developer Tools and Rust Sequoia
Fedora pushes Python 3.14 and Rust Sequoia for versions 43 and 44, signaling a clear cue for developers to test build pipelines before deployment. The distro also updated Chromium, NodeJS, Squid, and PowerDNS across the supported releases. Fedora 42 through 44 kernel updates cover versions 6.19 and 7.0, addressing memory safety flaws that could compromise entire networks. The inclusion of forgejo-runner and nextcloud patches indicates self-hosted services on Fedora require immediate attention. Python-tornado and pyOpenSSL fixes round out a developer-heavy release cycle that balances bleeding-edge tools with critical security hardening.
SUSE Live Patches and Slackware Manual Verification
SUSE released updates for openSUSE Tumbleweed, Leap 15, and enterprise systems while offering live kernel patches for SLES 15 SP4 through SP6. These live patches allow administrators to apply critical security fixes without rebooting production servers, preserving uptime for sensitive environments. The advisory covers Xen, curl, Java libraries, and Python frameworks alongside routine system utilities.
Slackware kept the release simple with stable and development builds targeting httpd, php, Firefox, Thunderbird, and the main kernel. Since Slackware lacks automated package managers like apt or dnf, manual verification of these advisories is required before applying patches to avoid dependency conflicts on minimalist systems.

Latest Security Patches by Distribution
Here’s a complete breakdown of recent security updates for AlmaLinux, Debian GNU/Linux, Fedora Linux, Oracle Linux, Red Hat Enterprise Linux, Rocky Linux, Slackware Linux, SUSE Linux, and Ubuntu Linux.
AlmaLinux
AlmaLinux has released a broad set of security patches for versions 8 through 10 of its operating system. These advisories target essential tools like the Linux kernel, Thunderbird, OpenSSH, and systemd while plugging critical vulnerabilities that could compromise entire networks. Without these fixes, attackers might exploit memory safety flaws or steal sensitive cookie data to gain unauthorized access. System administrators should prioritize installing the updates immediately to maintain a secure computing environment.
- ALSA-2026:12285: thunderbird security update (Important)
- ALSA-2026:13381: openssh security update (Important)
- ALSA-2026:13380: openssh security update (Important)
- ALSA-2026:13285: libcap security update (Important)
- ALSA-2026:13383: openssh security update (Important)
- ALSA-2026:13578: kernel-rt security update (Important)
- ALSA-2026:13537: thunderbird security update (Important)
- ALSA-2026:13414: tigervnc security update (Important)
- ALSA-2026:13577: kernel security update (Important)
- ALSA-2026:13284: LibRaw security update (Important)
- ALSA-2026:13677: systemd security update (Moderate)
- ALSA-2026:13671: image-builder security update (Important)
- ALSA-2026:13830: dovecot security update (Important)
- ALSA-2026:3839: image-builder security update (Important)
- ALSA-2026:13670: python-tornado security update (Moderate)
- ALSA-2026:13657: corosync security update (Moderate)
- ALSA-2026:13902: resource-agents security update (Important)
- ALSA-2026:13651: systemd security update (Moderate)
- ALSA-2026:3840: image-builder security update (Important)
- ALSA-2026:1838: image-builder security update (Moderate)
- ALSA-2026:13916: fence-agents security update (Important)
- ALSA-2026:13642: image-builder security update (Important)
- ALSA-2026:13515: freeipmi security update (Moderate)
- ALSA-2026:13641: python-tornado security update (Moderate)
- ALSA-2026:13643: osbuild-composer security update (Important)
- ALSA-2026:13498: dovecot security update (Important)
- ALSA-2026:13565: kernel security update (Important)
- ALSA-2026:13566: kernel security update (Important)
- ALSA-2026:13917: fence-agents security update (Important)
- ALSA-2026:13857: dovecot security update (Important)
- ALSA-2026:13978: libsoup security update (Moderate)
- ALSA-2026:14200: git-lfs security update (Important)
- ALSA-2026:14087: libsoup security update (Moderate)
- ALSA-2026:14929: mingw-libtiff security update (Important)
- ALSA-2026:A007: kernel-rt security update (Important)
- ALSA-2026:A004: kernel security update (Important)
- ALSA-2026:A006: kernel security update (Important)
- ALSA-2026:A005: kernel security update (Important)
- ALSA-2026:13673: corosync security update (Moderate)
- ALSA-2026:14819: freeipmi security update (Moderate)
Debian GNU/Linux
Debian administrators need to install a fresh wave of security patches that target dozens of widely used packages across the operating system. These urgent updates fix critical flaws in essential tools like OpenJDK, ImageMagick, Apache2, and the Linux kernel, which could otherwise allow attackers to execute arbitrary code or crash systems entirely. Additional advisories cover important applications such as Thunderbird and LXD alongside newer versions of PHP and Firefox ESR, since those libraries contain dangerous memory leaks that trigger infinite loops. Beyond pure security fixes, the release cycle includes routine maintenance updates like refreshed timezone databases that adjust regional timekeeping rules for 2026.
- [DSA 6246-1] openjdk-25 security update
- [DSA 6245-1] imagemagick security update
- ELA-1706-1 imagemagick security update
- ELA-1705-1 linux-6.1 security update
- ELA-1704-1 linux-5.10 security update
- [DLA 4562-1] thunderbird security update
- [DSA 6247-1] lxd security update
- [DLA 4563-1] libarchive security update
- [DLA 4564-1] pyjwt security update
- ELA-1707-1 pyjwt security update
- [DLA 4566-1] openjdk-11 security update
- [DLA 4565-1] openjdk-17 security update
- ELA-1708-1 openjdk-11 security update
- [DSA 6248-1] apache2 security update
- [DSA 6249-1] wireshark security update
- [DLA 4567-1] lrzip security update
- ELA-1710-1 imagemagick security update
- ELA-1712-1 libdatetime-timezone-perl new timezone database
- ELA-1711-1 tzdata new timezone database
- [DLA 4570-1] libdatetime-timezone-perl new timezone database
- [DLA 4569-1] tzdata new timezone database
- [DSA 6252-1] prosody security update
- [DSA 6251-1] libreoffice security update
- [DSA 6250-1] chromium security update
- [DLA 4568-1] lcms2 security update
- [DLA 4571-1] apache2 security update
- [DSA 6257-1] postorius security update
- [DSA 6256-1] php8.4 security update
- [DSA 6255-1] php8.2 security update
- [DLA 4572-1] linux security update
- [DSA 6254-1] firefox-esr security update
- [DSA 6253-1] linux security update
- ELA-1713-1 linux-5.10 security update
- ELA-1709-1 lcms2 security update
- ELA-1715-1 linux-6.1 security update
- ELA-1714-1 openjdk-8 security update
- [DLA 4575-1] firefox-esr security update
- [DLA 4574-1] linux-6.1 security update
- [DSA 6259-1] pyjwt security update
- [DLA 4573-1] libpng1.6 security update
- [DSA 6258-1] linux security update
Fedora Linux
Fedora users running versions 42 through 44 must prioritize installing a wave of urgent security patches released this week. These critical updates target dangerous vulnerabilities lurking in dozens of widely used packages that power everyday computing tasks. Administrators will find fixes covering everything from the Chromium browser and Python development environment to essential networking tools like Squid and PowerDNS alongside core system libraries such as OpenSSL and the Linux kernel. Delaying these installations leaves systems exposed to serious exploits so immediate action is strongly recommended across all affected releases.
- Fedora 42 Update: chromium-147.0.7727.137-1.fc42
- Fedora 43 Update: python3.14-3.14.4-2.fc43
- Fedora 43 Update: nodejs20-20.20.2-3.fc43
- Fedora 43 Update: chromium-147.0.7727.137-1.fc43
- Fedora 44 Update: uriparser-1.0.1-1.fc44
- Fedora 44 Update: rust-sequoia-git-0.6.0-1.fc44
- Fedora 44 Update: insight-18.0.50.20260306-3.fc44
- Fedora 44 Update: nodejs20-20.20.2-3.fc44
- Fedora 44 Update: pyOpenSSL-26.1.0-1.fc44
- Fedora 44 Update: squid-7.5-1.fc44
- Fedora 44 Update: pdns-5.0.4-1.fc44
- Fedora 43 Update: krb5-1.22.2-4.fc43
- Fedora 43 Update: pyOpenSSL-26.1.0-1.fc43
- Fedora 43 Update: forgejo-runner-12.7.3-2.fc43
- Fedora 43 Update: squid-7.5-1.fc43
- Fedora 43 Update: pdns-5.0.4-1.fc43
- Fedora 42 Update: pdns-5.0.4-1.fc42
- Fedora 42 Update: vim-9.2.390-1.fc42
- Fedora 42 Update: xorg-x11-server-Xwayland-24.1.11-1.fc42
- Fedora 43 Update: gnutls-3.8.13-1.fc43
- Fedora 43 Update: nano-8.5-3.fc43
- Fedora 43 Update: dovecot-2.4.3-2.fc43
- Fedora 44 Update: gh-2.92.0-1.fc44
- Fedora 44 Update: dovecot-2.4.3-2.fc44
- Fedora 42 Update: perl-Starman-0.4018-1.fc42
- Fedora 42 Update: openssl-3.2.6-4.fc42
- Fedora 43 Update: perl-Starman-0.4018-1.fc43
- Fedora 44 Update: perl-Starman-0.4018-1.fc44
- Fedora 43 Update: proftpd-1.3.9a-1.fc43
- Fedora 43 Update: kernel-7.0.4-100.fc43
- Fedora 43 Update: nodejs22-22.22.2-2.fc43
- Fedora 42 Update: kernel-6.19.14-101.fc42
- Fedora 42 Update: proftpd-1.3.9a-1.fc42
- Fedora 44 Update: gnutls-3.8.13-1.fc44
- Fedora 44 Update: kernel-7.0.4-200.fc44
- Fedora 44 Update: proftpd-1.3.9a-1.fc44
- Fedora 44 Update: nodejs22-22.22.2-3.fc44
- Fedora 44 Update: SDL3_image-3.4.4-1.fc44
- Fedora 42 Update: nextcloud-33.0.3-1.fc42
- Fedora 42 Update: dotnet10.0-10.0.107-1.fc42
- Fedora 42 Update: exim-4.99.2-1.fc42
- Fedora 42 Update: prosody-13.0.5-1.fc42
- Fedora 43 Update: exim-4.99.2-1.fc43
- Fedora 43 Update: prosody-13.0.5-1.fc43
- Fedora 44 Update: python-pulp-glue-0.37.0-5.fc44
- Fedora 44 Update: python-requests-2.33.1-1.fc44
- Fedora 44 Update: nextcloud-33.0.3-1.fc44
- Fedora 44 Update: dotnet10.0-10.0.107-1.fc44
- Fedora 44 Update: rclone-1.74.0-2.fc44
- Fedora 44 Update: exim-4.99.2-1.fc44
- Fedora 44 Update: prosody-13.0.5-1.fc44
Oracle Linux
Oracle Linux administrators should prioritize installing recent security patches that span versions seven through ten of the distribution. These updates target serious flaws in foundational components like the kernel, systemd, and OpenSSH that could allow attackers to crash systems or gain unauthorized access. Several packages also received stability improvements and were rebuilt using modern frameworks to close lingering cryptographic vulnerabilities. System administrators need to apply these fixes promptly to maintain a secure and reliable computing environment.
- ELSA-2026-50255 Important: Oracle Linux 7 Unbreakable Enterprise kernel security update: Copy Fail
- ELSA-2026-50255 Important: Oracle Linux 8 Unbreakable Enterprise kernel security update: Copy Fail
- ELSA-2026-50255 Important: Oracle Linux 8 Unbreakable Enterprise kernel security update: Copy Fail
- ELSA-2026-50253 Important: Oracle Linux 8 Unbreakable Enterprise kernel security update: Copy Fail
- ELSA-2026-50253 Important: Oracle Linux 9 Unbreakable Enterprise kernel security update: Copy Fail
- ELSA-2026-50253 Important: Oracle Linux 9 Unbreakable Enterprise kernel security update: Copy Fail
- ELSA-2026-50254 Important: Oracle Linux 9 Unbreakable Enterprise kernel security update: Copy Fail
- ELSA-2026-50254 Important: Unbreakable Enterprise kernel security update: Copy Fail
- ELSA-2026-12423 Important: Oracle Linux 10 libcap security update
- ELSA-2026-12285 Important: Oracle Linux 10 thunderbird security update
- ELSA-2026-13916 Important: Oracle Linux 10 fence-agents security update
- ELSA-2026-13651 Moderate: Oracle Linux 10 systemd security update
- ELSA-2026-13643 Important: Oracle Linux 10 osbuild-composer security update
- ELSA-2026-13642 Important: Oracle Linux 10 image-builder security update
- ELSA-2026-13566 Important: Oracle Linux 10 kernel security update
- ELSA-2026-13641 Moderate: Oracle Linux 10 python-tornado security update
- ELSA-2026-13498 Important: Oracle Linux 10 dovecot security update
- ELBA-2026-13648 Oracle Linux 10 util-linux bug fix and enhancement update
- ELSA-2026-13380 Important: Oracle Linux 10 openssh security update
- ELBA-2026-13653 Oracle Linux 10 samba bug fix and enhancement update
- ELBA-2026-13647 Oracle Linux 10 libguestfs bug fix and enhancement update
- ELSA-2026-13515 Moderate: Oracle Linux 10 freeipmi security update
- ELBA-2026-13652 Oracle Linux 10 libdnf bug fix and enhancement update
- ELBA-2026-13646 Oracle Linux 10 virt-v2v bug fix and enhancement update
- ELBA-2026-13645 Oracle Linux 10 passt bug fix and enhancement update
- ELBA-2026-50252 Oracle Linux 10 oracle-indexhtml bug fix update
- ELSA-2026-13857 Important: Oracle Linux 9 dovecot security update
- ELSA-2026-13677 Moderate: Oracle Linux 9 systemd security update
- ELSA-2026-13978 Moderate: Oracle Linux 9 libsoup security update
- ELBA-2026-13678 Oracle Linux 9 samba bug fix and enhancement update
- ELSA-2026-13671 Important: Oracle Linux 9 image-builder security update
- ELSA-2026-13381 Important: Oracle Linux 9 openssh security update
- ELSA-2026-13917 Important: Oracle Linux 9 fence-agents security update
- ELSA-2026-13670 Moderate: Oracle Linux 9 python-tornado security update
- ELSA-2026-13565 Important: Oracle Linux 9 kernel security update
- ELBA-2026-13674 Oracle Linux 9 keylime bug fix and enhancement update
- ELSA-2026-13577 Important: Oracle Linux 8 kernel security update
- ELSA-2026-13830 Important: Oracle Linux 8 dovecot security update
- ELSA-2026-13383 Important: Oracle Linux 8 openssh security update
- ELSA-2026-13285 Important: Oracle Linux 8 libcap security update
- ELSA-2026-13537 Important: Oracle Linux 8 thunderbird security update
- ELSA-2026-13284 Important: Oracle Linux 8 LibRaw security update
- ELSA-2026-13414 Important: Oracle Linux 8 tigervnc security update
- ELBA-2026-13659 Oracle Linux 8 device-mapper-multipath bug fix and enhancement update
- ELBA-2026-13662 Oracle Linux 8 dbus bug fix and enhancement update
- ELBA-2026-13660 Oracle Linux 8 rng-tools bug fix and enhancement update
- ELBA-2026-13658 Oracle Linux 8 krb5 bug fix and enhancement update
- ELBA-2026-13656 Oracle Linux 8 lapack bug fix and enhancement update
- ELBA-2026-13655 Oracle Linux 8 ksh bug fix and enhancement update
- ELBA-2026-50248 Oracle Linux 8 cloud-init bug fix update
- ELSA-2026-9614 Important: Oracle Linux 7 python security update
- ELSA-2026-9745 Important: Oracle Linux 7 python3 security update
- ELSA-2026-14200 Important: Oracle Linux 9 git-lfs security update
- ELBA-2026-13577-1 Oracle Linux 8 kernel bug fix update
- ELSA-2026-14087 Moderate: Oracle Linux 8 libsoup security update
- ELSA-2026-8578 Important: Oracle Linux 7 perl-XML-Parser security update
- ELBA-2026-14789 Oracle Linux 10 iptables bug fix and enhancement update
- ELSA-2026-14790 Moderate: Oracle Linux 10 libpng security update
- ELSA-2026-14819 Moderate: Oracle Linux 9 freeipmi security update
- ELSA-2026-14791 Moderate: Oracle Linux 9 libpng security update
- ELSA-2026-13673 Moderate: Oracle Linux 9 corosync security update
- ELSA-2026-14929 Important: Oracle Linux 8 mingw-libtiff security update
- ELBA-2026-13663 Oracle Linux 8 glibc bug fix and enhancement update
- ELBA-2026-50256 Oracle Linux 8 lvm2 bug fix update
- ELSA-2026-7673 Important: Oracle Linux 7 gstreamer1-plugins-bad-free, gstreamer1-plugins-base, and gstreamer1-plugins-good security update
Red Hat Enterprise Linux
Red Hat recently pushed out a fresh wave of security advisories for its RHEL distribution. These updates tackle serious flaws in widely used software like the Linux kernel, Firefox, OpenSSH, and .NET across several enterprise releases. You will also notice targeted improvements for specialized platforms such as OpenShift alongside standard system libraries. Every patch blends critical vulnerability fixes with everyday maintenance to keep your infrastructure running smoothly.
- RHSA-2026:13282: Important: .NET 9.0 security update
- RHSA-2026:13284: Important: LibRaw security update
- RHSA-2026:13285: Important: libcap security update
- RHSA-2026:13283: Important: .NET 8.0 security update
- RHSA-2026:13280: Important: .NET 9.0 security update
- RHSA-2026:13281: Important: .NET 8.0 security update
- RHSA-2026:13414: Important: tigervnc security update
- RHSA-2026:13412: Important: thunderbird security update
- RHSA-2026:13383: Important: openssh security update
- RHSA-2026:13380: Important: openssh security update
- RHSA-2026:13342: Important: thunderbird security update
- RHSA-2026:13515: Moderate: freeipmi security update
- RHSA-2026:13508: Important: Red Hat Ansible Automation Platform 2.6 Product Security and Bug Fix Update
- RHSA-2026:13533: Important: thunderbird security update
- RHSA-2026:11720: Important: Red Hat build of Quarkus 3.20.6.SP1 security update
- RHSA-2026:13571: Critical: Streams for Apache Kafka 3.2.0 release and security update
- RHSA-2026:13566: Important: kernel security update
- RHSA-2026:13565: Important: kernel security update
- RHSA-2026:13537: Important: thunderbird security update
- RHSA-2026:13512: Important: Red Hat Ansible Automation Platform 2.5 Product Security and Bug Fix Update
- RHSA-2026:13498: Important: dovecot security update
- RHSA-2026:13381: Important: openssh security update
- RHSA-2026:13582: Important: firefox security update
- RHSA-2026:13577: Important: kernel security update
- RHSA-2026:13578: Important: kernel-rt security update
- RHSA-2026:13857: Important: dovecot security update
- RHSA-2026:13860: Important: LibRaw security update
- RHSA-2026:13854: Important: LibRaw security update
- RHSA-2026:13839: Important: nginx security update
- RHSA-2026:13845: Important: webkit2gtk3 security update
- RHSA-2026:13812: Important: updated RHEL-8 based Middleware Containers container images
- RHSA-2026:13830: Important: dovecot security update
- RHSA-2026:13750: Important: openssh security update
- RHSA-2026:13692: Important: python3.11 security update
- RHSA-2026:13680: Important: nginx security update
- RHSA-2026:13673: Moderate: corosync security update
- RHSA-2026:13682: Important: firefox security update
- RHSA-2026:13664: Important: kernel security update
- RHSA-2026:13665: Important: firefox security update
- RHSA-2026:13734: Important: kernel security update
- RHSA-2026:13731: Important: sudo security update
- RHSA-2026:13693: Important: .NET 8.0 security update
- RHSA-2026:13677: Moderate: systemd security update
- RHSA-2026:13672: Important: fence-agents security update
- RHSA-2026:13671: Important: image-builder security update
- RHSA-2026:13670: Moderate: python-tornado security update
- RHSA-2026:13683: Important: firefox security update
- RHSA-2026:13657: Moderate: corosync security update
- RHSA-2026:13681: Important: kernel security update
- RHSA-2026:13644: Moderate: corosync security update
- RHSA-2026:13651: Moderate: systemd security update
- RHSA-2026:13643: Important: osbuild-composer security update
- RHSA-2026:13642: Important: image-builder security update
- RHSA-2026:13641: Moderate: python-tornado security update
- RHSA-2026:13634: Important: nginx security update
- RHSA-2026:13631: Important: Red Hat Build of Apache Camel 4.14 for Quarkus 3.27 update is now available (RHBQ 3.27.3.SP1)
- RHSA-2026:13600: Important: firefox security update
- RHSA-2026:13583: Important: firefox security update
- RHSA-2026:13596: Important: firefox security update
- RHSA-2026:11721: Important: Red Hat build of Quarkus 3.27.3.SP1 security update
- RHSA-2026:13902: Important: resource-agents security update
- RHSA-2026:13889: Important: sudo security update
- RHSA-2026:13895: Important: sudo security update
- RHSA-2026:13888: Important: sudo security update
- RHSA-2026:13891: Important: sudo security update
- RHSA-2026:13896: Important: sudo security update
- RHSA-2026:13892: Important: sudo security update
- RHSA-2026:13887: Important: kernel security update
- RHSA-2026:13870: Important: LibRaw security update
- RHSA-2026:13868: Important: LibRaw security update
- RHSA-2026:13867: Important: rh-podman-desktop security update
- RHSA-2026:13922: Important: firefox security update
- RHSA-2026:13917: Important: fence-agents security update
- RHSA-2026:13811: Important: OpenShift Container Platform 4.21.14 bug fix and security update
- RHSA-2026:13977: Important: firefox security update
- RHSA-2026:13936: Important: kernel security update
- RHSA-2026:13923: Moderate: capstone security update
- RHSA-2026:13916: Important: fence-agents security update
- RHSA-2026:14303: Important: thunderbird security update
- RHSA-2026:14276: Important: Red Hat AMQ Broker 7.12.7 release and security update
- RHSA-2026:14272: Important: Red Hat AMQ Broker 7.13.5 release and security update
- RHSA-2026:14230: Important: kernel security update
- RHSA-2026:14224: Important: LibRaw security update
- RHSA-2026:14213: Moderate: corosync security update
- RHSA-2026:14212: Moderate: corosync security update
- RHSA-2026:14216: Moderate: corosync security update
- RHSA-2026:14214: Moderate: corosync security update
- RHSA-2026:14215: Moderate: corosync security update
- RHSA-2026:14205: Moderate: corosync security update
- RHSA-2026:14200: Important: git-lfs security update
- RHSA-2026:14437: Important: sudo security update
- RHSA-2026:14339: Important: kernel security update
- RHSA-2026:14391: Important: Red Hat build of Cryostat security update
- RHSA-2026:13727: Important: OpenShift Container Platform 4.18.40 bug fix and security update
- RHSA-2026:14301: Important: kernel-rt security update
- RHSA-2026:14228: Important: sudo security update
- RHSA-2026:14223: Important: thunderbird security update
- RHSA-2026:14210: Moderate: corosync security update
- RHSA-2026:14211: Moderate: corosync security update
- RHSA-2026:14673: Important: LibRaw security update
- RHSA-2026:14656: Important: python3.12 security update
- RHSA-2026:14652: Important: python3.11 security update
- RHSA-2026:14929: Important: mingw-libtiff security update
- RHSA-2026:14924: Important: openssh security update
- RHSA-2026:14112: Important: OpenShift Container Platform 4.13.66 bug fix and security update
- RHSA-2026:14925: Important: kernel security update
- RHSA-2026:14926: Important: kernel update
- RHSA-2026:14836: Important: nginx security update
- RHSA-2026:14858: Moderate: libxml2 security update
- RHSA-2026:14868: Important: buildah security update
- RHSA-2026:14874: Important: Satellite 6.16.8 Async Update
- RHSA-2026:14873: Important: Satellite 6.17.8 Async Update
- RHSA-2026:14869: Important: kernel-rt security update
- RHSA-2026:13885: Important: OpenShift Container Platform 4.17.53 bug fix and security update
- RHSA-2026:14823: Important: kernel security update
- RHSA-2026:14835: Important: Satellite 6.18.5 Async Update
- RHSA-2026:14832: Moderate: libxml2 security update
- RHSA-2026:13729: Important: OpenShift Container Platform 4.16.61 bug fix and security update
- RHSA-2026:14791: Moderate: libpng security update
- RHSA-2026:14819: Moderate: freeipmi security update
- RHSA-2026:14659: Important: webkit2gtk3 security update
- RHSA-2026:14653: Important: python3.11 security update
- RHSA-2026:14655: Important: LibRaw security update
- RHSA-2026:14790: Moderate: libpng security update
- RHSA-2026:12273: Moderate: OpenShift Container Platform 4.12.88 packages and security update
- RHSA-2026:12274: Important: OpenShift Container Platform 4.12.88 bug fix and security update
- RHSA-2026:14097: Important: OpenShift Container Platform 4.12.89 bug fix and security update
Rocky Linux
Rocky Linux administrators must quickly install a series of critical security patches across versions eight through ten. These updates target widely used system libraries and utilities, including libcap, sudo, corosync, and the Linux kernel itself. Several of the fixes address severe vulnerabilities that could allow unprivileged users to escalate privileges or gain unauthorized root access. Delaying these installations leaves systems exposed to serious exploits, so prompt action is essential for maintaining a secure environment.
- RLSA-2026:12423: Important: libcap security update
- RLSA-2026:12310: Important: sudo security update
- RLSA-2026:12441: Important: libcap security update
- RLSA-2026:13673: Moderate: corosync security update
- RLSA-2026:13672: Important: fence-agents security update
- RLSA-2026:13670: Moderate: python-tornado security update
- RLSA-2026:13284: Important: LibRaw security update
- RLSA-2026:13657: Moderate: corosync security update
- RLSA-2026:13285: Important: libcap security update
- RLSA-2026:13383: Important: openssh security update
- RLSA-2026:13641: Moderate: python-tornado security update
- RLSA-2026:13644: Moderate: corosync security update
- RLSA-2026:13566: Important: kernel security update
- RLSA-2026:13498: Important: dovecot security update
- RLSA-2026:11712: Important: grafana security update
- RLSA-2026:13515: Moderate: freeipmi security update
- RLSA-2026:11881: Important: grafana-pcp security update
- RLSA-2026:10217: Important: golang security update
- RLSA-2026:11711: Important: grafana security update
- RLSA-2026:13565: Important: kernel security update
- RLSA-2026:10219: Important: golang security update
- RLSA-2026:11704: Important: grafana-pcp security update
- RLSA-2026:13578: Important: kernel-rt security update
- RLSA-2026:11507: Important: grafana security update
- RLSA-2026:10704: Important: go-toolset:rhel8 security update
- RLSA-2026:11514: Important: grafana-pcp security update
- RLSA-2026:13577: Important: kernel security update
- RLSA-2026:13902: Important: resource-agents security update
- RLSA-2026:13537: Important: thunderbird security update
- RLSA-2026:13414: Important: tigervnc security update
- RLSA-2026:13830: Important: dovecot security update
- RLSA-2026:14087: Moderate: libsoup security update
- RLSA-2026:13916: Important: fence-agents security update
- RLSA-2026:12285: Important: thunderbird security update
- RLSA-2026:13978: Moderate: libsoup security update
- RLSA-2026:13857: Important: dovecot security update
- RLSA-2026:13917: Important: fence-agents security update
- RLSA-2026:14200: Important: git-lfs security update
- CopyFail (CVE-2026-31431): Patches Now Available for Rocky Linux
Slackware Linux
The Slackware Linux Security Team recently rolled out a series of critical security patches for users running either the stable or development versions of the operating system. These updates target several widely used applications and core components, including Apache HTTPd, Hunspell, Firefox, PHP, Thunderbird, and the main kernel. Each package has been carefully modified to close known vulnerabilities that could otherwise leave systems exposed to malicious attacks. Administrators should prioritize installing these upgrades as soon as possible to maintain a secure computing environment.
- httpd (SSA:2026-124-01)
- hunspell (SSA:2026-125-01)
- mozilla-firefox (SSA:2026-127-02)
- php (SSA:2026-127-03)
- libgpg-error (SSA:2026-127-01)
- kernel (SSA:2026-128-01)
- mozilla-thunderbird (SSA:2026-128-02)
SUSE Linux
SUSE recently pushed out multiple rounds of security patches for its openSUSE Tumbleweed, Leap 15, and enterprise Linux systems. Many of these updates address severe memory corruption bugs and remote execution risks that could compromise entire networks. You will find fixes covering widely used software like Xen, curl, Python frameworks, Java libraries, and web browsers alongside routine system utilities. IT teams need to apply these releases quickly before attackers can exploit the unpatched weaknesses.
- openSUSE-SU-2026:10660-1: moderate: xen-4.21.1_04-1.1 on GA media
- openSUSE-SU-2026:20657-1: important: Security update for freerdp
- openSUSE-SU-2026:20662-1: moderate: Security update for hauler
- openSUSE-SU-2026:20664-1: important: Security update for MozillaThunderbird
- openSUSE-SU-2026:20659-1: moderate: Security update for libspectre
- openSUSE-SU-2026:20655-1: moderate: Security update for helm
- openSUSE-SU-2026:20658-1: moderate: Security update for himmelblau
- SUSE-SU-2026:1671-2: important: Security update for the Linux Kernel
- openSUSE-SU-2026:0163-1: important: Security update for trivy
- SUSE-SU-2026:1692-1: moderate: Security update for xen
- openSUSE-SU-2026:10676-1: moderate: golang-github-prometheus-prometheus-3.11.3-1.1 on GA media
- openSUSE-SU-2026:10675-1: moderate: dpkg-1.22.22-1.1 on GA media
- openSUSE-SU-2026:10674-1: moderate: curl-8.20.0-1.1 on GA media
- openSUSE-SU-2026:10673-1: moderate: coredns-1.14.3-1.1 on GA media
- openSUSE-SU-2026:10670-1: moderate: avahi-0.8-43.1 on GA media
- openSUSE-SU-2026:10677-1: moderate: grafana-11.6.14+security01-2.1 on GA media
- openSUSE-SU-2026:10671-1: moderate: bubblewrap-0.11.2-1.1 on GA media
- openSUSE-SU-2026:10668-1: moderate: MozillaFirefox-150.0.1-1.1 on GA media
- openSUSE-SU-2026:10669-1: moderate: alloy-1.16.0-2.1 on GA media
- openSUSE-SU-2026:10672-1: moderate: cmctl-2.5.0-1.1 on GA media
- SUSE-SU-2026:1700-1: important: Security update for PackageKit
- SUSE-SU-2026:1705-1: important: Security update for java-21-openjdk
- openSUSE-SU-2026:10685-1: moderate: libthrift-0_23_0-0.23.0-1.1 on GA media
- openSUSE-SU-2026:10683-1: moderate: skim-4.6.1-1.1 on GA media
- openSUSE-SU-2026:10682-1: moderate: rclone-1.74.0-1.1 on GA media
- openSUSE-SU-2026:10687-1: moderate: MozillaThunderbird-140.10.1-1.1 on GA media
- openSUSE-SU-2026:10681-1: moderate: python311-social-auth-core-4.8.7-1.1 on GA media
- openSUSE-SU-2026:10678-1: moderate: liblxc-devel-7.0.0-1.1 on GA media
- SUSE-SU-2026:1715-1: important: Security update for python3
- SUSE-SU-2026:1711-1: moderate: Security update for openssl-3
- SUSE-SU-2026:1714-1: important: Security update for erlang
- SUSE-SU-2026:1723-1: moderate: Security update for openCryptoki
- SUSE-SU-2026:1717-1: important: Security update for curl
- SUSE-SU-2026:1718-1: important: Security update for the Linux Kernel (Live Patch 40 for SUSE Linux Enterprise 15 SP4)
- SUSE-SU-2026:1753-1: important: Security update for 389-ds
- SUSE-SU-2026:1755-1: important: Security update for freeipmi
- SUSE-SU-2026:1744-1: moderate: Security update for python-pytest
- SUSE-SU-2026:1732-1: important: Security update for java-17-openjdk
- SUSE-SU-2026:1740-1: moderate: Security update for python-Django
- SUSE-SU-2026:1749-1: moderate: Security update for webkit2gtk3
- SUSE-SU-2026:1750-1: important: Security update for librsvg
- SUSE-SU-2026:1735-1: important: Security update for the Linux Kernel (Live Patch 20 for SUSE Linux Enterprise 15 SP6)
- SUSE-SU-2026:1728-1: important: Security update for the Linux Kernel (Live Patch 17 for SUSE Linux Enterprise 15 SP6)
- SUSE-SU-2026:1736-1: important: Security update for the Linux Kernel (Live Patch 22 for SUSE Linux Enterprise 15 SP6)
- SUSE-SU-2026:1733-1: important: Security update for the Linux Kernel (Live Patch 30 for SUSE Linux Enterprise 15 SP5)
- openSUSE-SU-2026:10691-1: moderate: gnutls-3.8.13-1.1 on GA media
- openSUSE-SU-2026:10690-1: moderate: cri-tools-1.36.0-1.1 on GA media
- openSUSE-SU-2026:10696-1: moderate: nix-2.34.7-1.1 on GA media
- openSUSE-SU-2026:10692-1: moderate: grafana-11.6.14+security01-3.1 on GA media
- openSUSE-SU-2026:10694-1: moderate: libmariadbd-devel-11.8.6-1.1 on GA media
- openSUSE-SU-2026:10695-1: moderate: mutt-2.3.2-1.1 on GA media
- openSUSE-SU-2026:10689-1: moderate: chromedriver-148.0.7778.96-1.1 on GA media
- openSUSE-SU-2026:10688-1: moderate: cf-cli-8.18.3+git.0.83ce51d9c-1.1 on GA media
- openSUSE-SU-2026:10697-1: moderate: traefik-3.6.15-1.1 on GA media
- openSUSE-SU-2026:20699-1: moderate: Security update for openCryptoki
- openSUSE-SU-2026:20704-1: moderate: Security update for python-Django
- openSUSE-SU-2026:20697-1: low: Security update for cairo
- openSUSE-SU-2026:20692-1: moderate: Security update for python-pytest
- openSUSE-SU-2026:20688-1: moderate: Security update for Mesa
- openSUSE-SU-2026:20685-1: important: Security update for wireshark
- SUSE-SU-2026:1776-1: important: Security update for the Linux Kernel (Live Patch 11 for SUSE Linux Enterprise 15 SP6)
- SUSE-SU-2026:1761-1: important: Security update for nginx
- SUSE-SU-2026:1768-1: important: Security update for the Linux Kernel (Live Patch 41 for SUSE Linux Enterprise 15 SP4)
- SUSE-SU-2026:1771-1: important: Security update for the Linux Kernel (Live Patch 12 for SUSE Linux Enterprise 15 SP6)
- SUSE-SU-2026:1770-1: important: Security update for the Linux Kernel (Live Patch 34 for SUSE Linux Enterprise 15 SP5)
- openSUSE-SU-2026:10707-1: moderate: postfix-3.11.2-1.1 on GA media
- openSUSE-SU-2026:10706-1: moderate: podman-5.8.2-1.1 on GA media
- openSUSE-SU-2026:10705-1: moderate: libpcp-devel-6.3.8-1.1 on GA media
- openSUSE-SU-2026:10704-1: moderate: micropython-1.28.0-2.1 on GA media
- openSUSE-SU-2026:10715-1: moderate: libtree-sitter0_26-0.26.8-2.1 on GA media
- openSUSE-SU-2026:10716-1: moderate: copacetic-0.14.0-1.1 on GA media
- openSUSE-SU-2026:10711-1: moderate: redis-8.6.3-1.1 on GA media
- openSUSE-SU-2026:10717-1: moderate: libexif-devel-0.6.26-1.1 on GA media
- openSUSE-SU-2026:10712-1: moderate: semaphore-2.18.1-1.1 on GA media
- openSUSE-SU-2026:10708-1: moderate: python311-Django4-4.2.30-2.1 on GA media
Ubuntu Linux
Ubuntu recently deployed critical security patches across its supported distributions to fix serious vulnerabilities in widely used software. These emergency updates target essential packages like curl, Apache, nghttp2, and the Linux kernel itself. Attackers could exploit these flaws to steal credentials or crash systems remotely. The comprehensive fixes span multiple operating system versions and include specialized cloud builds alongside standard desktop releases.
- [USN-8227-1] curl vulnerabilities
- [USN-8228-1] Exim vulnerabilities
- [USN-8229-1] sed vulnerability
- [USN-8233-1] nghttp2 vulnerability
- [USN-8232-1] Django vulnerabilities
- [USN-8234-1] Mako vulnerability
- [USN-8230-1] Docker vulnerabilities
- [USN-8237-1] WebKitGTK vulnerabilities
- [USN-8238-1] EditorConfig vulnerability
- [USN-8231-1] Dynaconf vulnerability
- [USN-8239-1] Apache HTTP Server vulnerabilities
- [USN-8233-2] nghttp2 vulnerability
- [USN-8240-1] Swish-e vulnerabilities
- [USN-8236-1] Slurm vulnerabilities
- [USN-8245-1] Linux kernel vulnerabilities
- [USN-8244-1] Linux kernel vulnerabilities
- [USN-8241-1] Coin3D vulnerabilities
- [USN-8243-1] Linux kernel (Azure) vulnerabilities
- [USN-8235-1] ITK vulnerabilities
- [USN-8179-4] Linux kernel (GCP) vulnerabilities
- [USN-8250-1] Little CMS vulnerability
- [USN-8249-1] dpkg vulnerability
- [USN-8251-1] libpng vulnerabilities
- [USN-8248-1] NASM vulnerabilities
- [USN-8247-1] OWSLib vulnerability
- [USN-8242-2] PostfixAdmin vulnerability
- [USN-8242-1] CiviCRM vulnerability
- [USN-8246-1] Vim vulnerabilities
- [USN-8220-1] HtmlUnit vulnerability
- [USN-8256-1] opam vulnerability
- [USN-8259-1] OpenEXR vulnerabilities
- [USN-8261-1] Linux kernel (Xilinx) vulnerabilities
- [USN-8260-1] Linux kernel (Azure FIPS) vulnerabilities
- [USN-8258-1] Linux kernel (Azure) vulnerabilities
- [USN-8257-1] Linux kernel (Raspberry Pi) vulnerabilities
- [USN-8255-1] Linux kernel vulnerabilities
- [USN-8252-1] OpenJPEG vulnerability
- [USN-8253-1] Postfix vulnerability
- [USN-8254-1] Linux kernel vulnerabilities
- [USN-8262-1] Lua vulnerability
- [USN-8248-2] NASM regression
Keep Your Linux System Secure: Safely Applying Critical Updates
Applying these patches requires distribution-specific package management commands. RHEL-based systems typically use dnf update or yum update, while Debian and Ubuntu rely on apt upgrade. SUSE users should run zypper patch to properly address all security advisories, and Slackware administrators can manage updates with upgradepkg or slackpkg. After executing the commands, a reboot is usually necessary for kernel changes to take effect. Finally, review your package manager’s logs to verify that all patches installed successfully and no dependencies were disrupted.
Debian/Ubuntu (apt)
The first thing to do is refresh the local package index; running sudo apt update contacts all configured repositories and pulls in the newest lists of available versions. Skipping this step leaves the system blind to any recent uploads, which explains why “upgrade” sometimes claims there’s nothing to do even after a security advisory has been published. Once the index is current, invoke sudo apt upgrade -y; the -y flag answers every prompt automatically so the process doesn’t pause for user input. This command upgrades all installed packages that have newer versions in the repositories while preserving configuration files.
sudo apt update sudo apt upgrade -y
Fedora/RedHat/Rocky/Alma/Oracle (dnf or yum)
On modern Fedora and recent Red Hat derivatives, dnf is the package manager; older RHEL releases still rely on yum. Begin with a check‑update operation—sudo dnf check-update or sudo yum check-update—to see exactly which packages are awaiting an upgrade. This preview step can be useful for spotting unexpected kernel bumps before they land. To actually apply the updates, run sudo dnf upgrade -y (or sudo yum update if you prefer the older tool). The upgrade command pulls down the new binaries and runs any necessary post‑install scripts, such as rebuilding initramfs when a kernel changes.
sudo dnf check-update sudo dnf upgrade -y
or on older releases
sudo yum check-update sudo yum update
SUSE (zypper)
SUSE’s command line front‑end is called zypper. First execute sudo zypper refresh so that the metadata for all enabled repos gets updated; without this, zypper will happily report “No updates available” even though newer packages sit on the mirror. After a fresh refresh, issue sudo zypper update -y; this upgrades every package to the latest version in the configured repositories and automatically handles service restarts when required.
sudo zypper refresh sudo zypper update -y
Slackware (slackpkg and pkgtool)
Slackware doesn’t have a single unified updater, but the official way to pull updates is through slackpkg. Start with sudo slackpkg update to download the newest package list from the chosen mirror. Then run sudo slackpkg upgrade-all; this command walks through each installed package and replaces it with the most recent build available in the official repository. For users who prefer a more granular approach, specifying a package name after upgrade limits the operation to that single item. When dealing with community‑maintained repositories, pkgtool takes over: a combined sudo pkgtool update && sudo pkgtool upgrade will sync and apply updates from the mirrors listed in /etc/slackpkg/mirrors.
sudo slackpkg update sudo slackpkg upgrade-all
Patching never makes for a fun afternoon, but skipping this week's updates leaves too many doors open for malicious actors. Check sudo versions, verify timezone settings on Debian servers, and ensure those cloud kernels match the hardware profile. Stay safe out there.