This week brings a wave of critical security updates across major Linux distributions that demand immediate attention from system administrators. The patch cycle targets severe vulnerabilities in the Linux kernel, networking modules like Dirty Frag, and widely used software such as Nginx, ImageMagick, and FreeRDP. Attackers could exploit these unpatched flaws to bypass authentication mechanisms, execute remote code, or leak sensitive data through crafted input files. Administrators should prioritize applying these distribution-specific fixes using their native package managers and schedule necessary reboots to fully secure production environments.
This Week's Linux Security Updates: Kernel Fixes, Dirty Frag, and Web Stack Patches
This week's Linux security updates demand immediate attention across multiple distributions. The patch cycle targets critical flaws in the kernel, web servers like Nginx, and widely used graphics libraries such as ImageMagick and LibTIFF. Distributions from Debian to Fedora are addressing vulnerabilities that could allow remote code execution, authentication bypasses, or data leakage through crafted input files. System administrators should prioritize these patches to prevent exploitation of known weaknesses in production environments.
Critical Kernel and Hardware Vulnerabilities Require Action
Hardware-level flaws affecting virtualization and kernel networking modules appear prominently this week. Qubes OS addresses three significant security bulletin items targeting underlying processor vulnerabilities. The updates fix a floating point divider state sampling issue, an AMD CPU opcode cache corruption flaw that could break sandbox boundaries, and an Intel chip vulnerability capable of leaking sensitive information from isolated workspaces. These fixes are essential for maintaining the integrity of virtualized environments where isolation is the primary defense mechanism.
Oracle Linux highlights the Dirty Frag vulnerability in its Unbreakable Enterprise kernel releases for versions seven through ten. The patches correct improper packet fragment handling within the rxrpc and xfrm esp networking modules, eliminating dangerous race conditions that could compromise enterprise deployments. Ubuntu also releases kernel updates covering specific hardware configurations, including Raspberry Pi boards, NVIDIA Tegra systems, and cloud instances running on AWS and Azure. Server admins managing Debian environments should note that delayed patching has historically allowed attackers to bypass authentication mechanisms or steal confidential files through memory errors in the Linux kernel. Testing these kernel updates in a staging environment before deployment remains a non-negotiable practice for production stability.
Web Servers and Remote Access Tools Need Immediate Patches
Nginx takes a heavy hit across multiple distributions this cycle. Red Hat Enterprise Linux marks several nginx advisories as critical, affecting versions 1.24 and 1.26 alongside the main package. Debian and SUSE also push urgent fixes for the web server, which often serves as the front line for public-facing applications. FreeRDP receives updates in AlmaLinux, Oracle Linux, RHEL, and Rocky Linux to address flaws that could allow attackers to run malicious code or force applications to crash by feeding crafted input files.
Email and remote access tools also require attention. Thunderbird gets patched across Debian, Fedora, Oracle, RHEL, and Rocky Linux. Debian administrators must apply updates for Exim4 immediately, as the mail transfer agent appears in multiple advisories with severity ratings that warrant urgent action. SUSE pushes critical security updates for Tor, which could otherwise expose users to traffic analysis or connection failures. OpenSSH sees updates in both Debian and RHEL environments, closing potential authentication bypasses that could grant unauthorized access to systems.
Image Processing Libraries Hit Hard Across Distributions
Graphics libraries appear on the hit list repeatedly this week, suggesting a coordinated wave of vulnerability disclosures affecting image handling code. ImageMagick receives updates in Ubuntu and SUSE advisories. GIMP, LibTIFF, LibPNG, and openexr are updated across AlmaLinux, Oracle Linux, RHEL, and Rocky Linux. These libraries process images daily on everything from desktop workstations to automated server pipelines. Leaving them unpatched invites exploitation through malicious image files that trigger buffer overflows or memory leaks. System managers should review their software stacks for any dependencies on these packages and apply the fixes without delay.
Distribution-Specific Updates to Review
Debian administrators face a massive batch of critical security patches across stable and oldstable releases. The updates cover essential infrastructure tools including Python, Apache2, PostgreSQL, Rails, p7zip, dnsmasq, nghttp2, pyasn1, ffmpeg, nodejs, firewalld, php7.4, openjpeg2, and chromium. Fedora 42 through 44 receive a heavy update cycle targeting PHP, Firefox, Chromium, Nextcloud, rclone, SDL3_image, nss, httpd, python-django5, nix, GitPython, krb5, xen, rust-sequoia packages, nano, expat, and podman-sequoia. The Rust ecosystem sees significant attention with multiple sequoia-related updates addressing cryptographic operations.
SUSE and openSUSE push a laundry list of updates including valkey, Java OpenJ9 versions 8 through 25, go1.25 and go1.26, python311-Django, glibc, frr, firefox-esr, php-composer2, libmodsecurity3, mcphost, krb5, thunderbird, assimp-devel, python-jupyterlab, trivy, raylib, python-Mako, NetworkManager, dnsmasq, python39, Mesa, python-Pillow, ffmpeg-4 and ffmpeg-7, amazon-ssm-agent, syncthing, regclient, tekton-cli, ImageMagick, perl-libwww-perl, and keylime-config. Several SUSE kernel updates require a full machine restart to fully resolve the underlying flaws. Slackware users operating version 15.0 or the rolling current branch must install fresh expat, kernel, and dnsmasq updates right away. The expat fix removes quadratic runtime complexity from XML attribute collision checks, which prevents denial-of-service attacks via malicious XML documents.

Latest Security Patches by Distribution
Here’s a complete breakdown of recent security updates for AlmaLinux, Debian GNU/Linux, Fedora Linux, Oracle Linux, Qubes OS, Red Hat Enterprise Linux, Rocky Linux, Slackware Linux, SUSE Linux, and Ubuntu Linux.
AlmaLinux
AlmaLinux has rolled out several batches of security updates targeting versions eight through ten across its distribution. These patches address critical flaws in widely used tools like the Linux kernel, GIMP, FreeRDP, and various graphics libraries. Attackers could potentially exploit these vulnerabilities to run malicious code or force applications to crash by feeding them crafted input files. The comprehensive fixes span numerous operating system releases and cover both core utilities and specialized software packages.
- ALSA-2026:15888: openexr security update (Important)
- ALSA-2026:15968: libsoup3 security update (Moderate)
- ALSA-2026:15971: glib2 security update (Moderate)
- ALSA-2026:16019: freerdp security update (Moderate)
- ALSA-2026:15953: glib2 security update (Moderate)
- ALSA-2026:14790: libpng security update (Moderate)
- ALSA-2026:15969: glib2 security update (Moderate)
- ALSA-2026:16014: freerdp security update (Moderate)
- ALSA-2026:13644: corosync security update (Moderate)
- ALSA-2026:14791: libpng security update (Moderate)
- ALSA-2026:15892: thunderbird security update (Important)
- ALSA-2026:15887: openexr security update (Important)
- ALSA-2026:16875: git-lfs security update (Important)
- ALSA-2026:16799: krb5 security update (Important)
- ALSA-2026:16252: jq security update (Important)
- ALSA-2026:16196: kernel-rt security update (Important)
- ALSA-2026:16055: libtiff security update (Important)
- ALSA-2026:17075: yggdrasil security update (Important)
- ALSA-2026:16484: gimp security update (Important)
- ALSA-2026:16693: jq security update (Important)
- ALSA-2026:A008: kernel security update (Important)
- ALSA-2026:A010: kernel security update (Important)
- ALSA-2026:16692: jq security update (Important)
- ALSA-2026:A009: kernel security update (Important)
- ALSA-2026:16482: freerdp security update (Moderate)
- ALSA-2026:16195: kernel security update (Important)
- ALSA-2026:17533: gimp:2.8 security update (Important)
- ALSA-2026:17481: rsync security update (Important)
Debian GNU/Linux
Debian administrators need to apply a massive batch of critical security patches across both stable and oldstable releases right away. These updates fix severe flaws that could let attackers bypass authentication mechanisms, run malicious code remotely, crash systems through memory errors, or steal confidential files. The affected software covers essential infrastructure tools like the Linux kernel, OpenSSH, Python, Nginx, Apache2, PostgreSQL, and Thunderbird alongside numerous supporting libraries. Delaying these installations leaves servers dangerously exposed to active exploitation attempts.
- [DSA 6261-1] corosync security update
- [DSA 6260-1] tor security update
- [DSA 6263-1] libpng1.6 security update
- [DSA 6262-1] lcms2 security update
- [DSA 6264-1] dnsmasq security update
- [DLA 4579-1] python-authlib security update
- [DLA 4578-1] rails security update
- [DLA 4577-1] p7zip-rar security update
- [DLA 4576-1] p7zip security update
- ELA-1716-1 rails security update
- [DLA 4580-1] exim4 security update
- [DSA 6265-1] exim4 security update
- [DLA 4581-1] nghttp2 security update
- ELA-1717-1 pyasn1 security update
- [DSA 6267-1] thunderbird security update
- [DSA 6266-1] nghttp2 security update
- [DSA 6271-1] gsasl security update
- [DSA 6270-1] postgresql-17 security update
- [DSA 6269-1] postgresql-15 security update
- [DLA 4582-1] thunderbird security update
- [DSA 6268-1] ffmpeg security update
- [DSA 6272-1] nodejs security update
- [ERRATUM] [DLA 4571-1] apache2 security update
- [DLA 4583-1] python3.9 security update
- [DLA 4584-1] openssh security update
- [DSA 6273-1] chromium security update
- [DLA 4585-1] firewalld security update
- [DSA 6275-1] linux security update
- [DSA 6274-1] linux security update
- [DLA 4586-1] php7.4 security update
- [DSA 6277-1] openjpeg2 security update
- [DSA 6276-1] ffmpeg security update
- ELA-1719-1 apache2 security update
- [DLA 4587-1] linux security update
- [DSA 6278-1] nginx security update
Fedora Linux
Fedora 42 through 44 just received a heavy batch of critical security patches across their official repositories. These updates target dozens of core packages including the Linux kernel, PHP, Firefox, Chromium, Nextcloud, and several development tools. Attackers could easily exploit those unpatched flaws to steal private data or run malicious code on vulnerable machines. You really should apply these fixes as soon as possible to keep your systems safe from known exploits.
- Fedora 43 Update: dotnet10.0-10.0.107-1.fc43
- Fedora 43 Update: SDL3_image-3.4.4-1.fc43
- Fedora 43 Update: nextcloud-33.0.3-1.fc43
- Fedora 43 Update: rclone-1.74.0-2.fc43
- Fedora 44 Update: php-8.5.6-1.fc44
- Fedora 43 Update: nss-3.122.2-1.fc43
- Fedora 43 Update: chromium-148.0.7778.96-1.fc43
- Fedora 43 Update: firefox-150.0.1-1.fc43
- Fedora 42 Update: nss-3.122.2-1.fc42
- Fedora 42 Update: firefox-150.0.1-1.fc42
- Fedora 44 Update: firefox-150.0.1-1.fc44
- Fedora 44 Update: nss-3.122.2-1.fc44
- Fedora 44 Update: httpd-2.4.67-1.fc44
- Fedora 42 Update: kernel-6.19.14-102.fc42
- Fedora 42 Update: python-django5-5.2.14-1.fc42
- Fedora 42 Update: php-8.4.21-1.fc42
- Fedora 42 Update: nix-2.31.5-1.fc42
- Fedora 42 Update: GitPython-3.1.50-1.fc42
- Fedora 42 Update: krb5-1.21.3-7.fc42
- Fedora 42 Update: xen-4.19.5-2.fc42
- Fedora 43 Update: kernel-headers-7.0.6-100.fc43
- Fedora 43 Update: kernel-7.0.6-100.fc43
- Fedora 43 Update: python-click-8.1.7-12.fc43
- Fedora 43 Update: nix-2.31.5-1.fc43
- Fedora 44 Update: kernel-7.0.6-200.fc44
- Fedora 44 Update: kernel-headers-7.0.6-200.fc44
- Fedora 44 Update: firefox-150.0.3-1.fc44
- Fedora 44 Update: freerdp-3.26.0-4.fc44
- Fedora 44 Update: nix-2.34.7-2.fc44
- Fedora 42 Update: nodejs20-20.20.2-4.fc42
- Fedora 42 Update: nano-8.3-4.fc42
- Fedora 44 Update: chromium-148.0.7778.96-1.fc44
- Fedora 44 Update: SDL2_image-2.8.12-1.fc44
- Fedora 43 Update: kernel-7.0.7-100.fc43
- Fedora 43 Update: firefox-150.0.3-1.fc43
- Fedora 43 Update: freerdp-3.26.0-4.fc43
- Fedora 43 Update: GitPython-3.1.50-1.fc43
- Fedora 43 Update: php-8.4.21-1.fc43
- Fedora 44 Update: kernel-7.0.7-200.fc44
- Fedora 44 Update: expat-2.8.1-1.fc44
- Fedora 44 Update: rust-sequoia-sqv-1.3.0-6.fc44
- Fedora 44 Update: rust-sequoia-octopus-librnp-1.11.1-6.fc44
- Fedora 44 Update: rust-sequoia-keystore-server-0.2.0-7.fc44
- Fedora 44 Update: rust-podman-sequoia-0.3.2-2.fc44
- Fedora 44 Update: rust-sequoia-sq-1.3.1-11.fc44
- Fedora 44 Update: rust-sequoia-openpgp-2.3.0-1.fc44
- Fedora 44 Update: rust-sequoia-sop-0.37.3-3.fc44
- Fedora 44 Update: rust-sequoia-chameleon-gnupg-0.13.1-12.fc44
- Fedora 44 Update: rust-sequoia-git-0.6.0-2.fc44
- Fedora 44 Update: rust-rpm-sequoia-1.10.2-2.fc44
- Fedora 44 Update: GitPython-3.1.50-1.fc44
- Fedora 42 Update: kernel-6.19.14-104.fc42
- Fedora 42 Update: nginx-mod-modsecurity-1.0.4-10.fc42
- Fedora 42 Update: nginx-mod-naxsi-1.6-17.fc42
- Fedora 42 Update: nginx-mod-vts-0.2.4-9.fc42
- Fedora 42 Update: nginx-1.30.1-1.fc42
- Fedora 42 Update: nginx-mod-brotli-1.0.0~rc-9.fc42
- Fedora 42 Update: nginx-mod-fancyindex-0.6.0-4.fc42
- Fedora 42 Update: nginx-mod-headers-more-0.39-9.fc42
- Fedora 42 Update: chromium-148.0.7778.96-1.fc42
- Fedora 42 Update: uriparser-1.0.1-1.fc42
- Fedora 42 Update: firefox-150.0.3-1.fc42
- Fedora 43 Update: kernel-7.0.8-100.fc43
- Fedora 43 Update: nginx-mod-vts-0.2.4-9.fc43
- Fedora 43 Update: nginx-1.30.1-1.fc43
- Fedora 43 Update: nginx-mod-modsecurity-1.0.4-10.fc43
- Fedora 43 Update: nginx-mod-fancyindex-0.6.0-4.fc43
- Fedora 43 Update: nginx-mod-naxsi-1.6-17.fc43
- Fedora 43 Update: nginx-mod-brotli-1.0.0~rc-9.fc43
- Fedora 43 Update: nginx-mod-headers-more-0.39-9.fc43
- Fedora 44 Update: nginx-mod-js-challenge-0^20230517.gitda6852d-7.fc44
- Fedora 44 Update: kernel-7.0.8-200.fc44
- Fedora 44 Update: nginx-mod-vts-0.2.4-9.fc44
- Fedora 44 Update: nginx-mod-headers-more-0.39-9.fc44
- Fedora 44 Update: nginx-mod-naxsi-1.6-17.fc44
- Fedora 44 Update: nginx-1.30.1-1.fc44
- Fedora 44 Update: nginx-mod-modsecurity-1.0.4-10.fc44
- Fedora 44 Update: nginx-mod-fancyindex-0.6.0-4.fc44
- Fedora 44 Update: nginx-mod-brotli-1.0.0~rc-9.fc44
- Fedora 44 Update: rsync-3.4.1-7.fc44
- Fedora 44 Update: dnsmasq-2.92rel2-9.fc44
- Fedora 44 Update: perl-Net-CIDR-Lite-0.24-1.fc44
- Fedora 44 Update: pypy-7.3.22-2.fc44
- Fedora 44 Update: libgit2_1.8-1.8.5-1.fc44
- Fedora 44 Update: yelp-49.1-1.fc44
- Fedora 44 Update: python-jupytext-1.19.1-4.fc44
- Fedora 42 Update: libgit2_1.8-1.8.5-1.fc42
- Fedora 42 Update: python-jupytext-1.19.1-4.fc42
- Fedora 43 Update: pypy-7.3.22-2.fc43
- Fedora 43 Update: yelp-49.1-1.fc43
- Fedora 43 Update: libgit2_1.8-1.8.5-1.fc43
- Fedora 43 Update: python-jupytext-1.19.1-4.fc43
Oracle Linux
Oracle Linux has deployed a series of critical security patches across versions seven through ten to harden its Unbreakable Enterprise kernel. The initial update focuses on resolving the Dirty Frag flaw by correcting improper packet fragment handling within the rxrpc and xfrm esp networking modules. A subsequent release expands the scope with fixes for Git-LFS, Coresync, and various kernel utilities that address buffer overflows and memory leaks. Together, these advisories eliminate dangerous race conditions and significantly reduce the attack surface for enterprise deployments.
- ELSA-2026-50259 Important: Oracle Linux 9 Unbreakable Enterprise kernel security update: Dirty Frag
- ELSA-2026-50257 Important: Oracle Linux 9 Unbreakable Enterprise kernel security update: Dirty Frag
- ELSA-2026-50257 Important: Oracle Linux 8 Unbreakable Enterprise kernel security update: Dirty Frag
- ELSA-2026-50258 Important: Oracle Linux 8 Unbreakable Enterprise kernel security update: Dirty Frag
- ELSA-2026-50257 Important: Oracle Linux 9 Unbreakable Enterprise kernel security update: Dirty Frag
- ELSA-2026-50258 Important: Oracle Linux 7 Unbreakable Enterprise kernel security update: Dirty Frag
- ELSA-2026-50258 Important: Oracle Linux 8 Unbreakable Enterprise kernel security update: Dirty Frag
- ELSA-2026-50259 Important: Unbreakable Enterprise kernel security update: Dirty Frag
- ELSA-2026-16875 Important: Oracle Linux 8 git-lfs security update
- ELSA-2026-50270 Important: Oracle Linux 9 Unbreakable Enterprise kernel security update
- ELSA-2026-50262 Important: Oracle Linux 7 Unbreakable Enterprise kernel security update
- ELBA-2026-16271 Oracle Linux 8 rust-toolset:rhel8 bug fix and enhancement update
- ELSA-2026-13657 Moderate: Oracle Linux 8 corosync security update
- ELSA-2026-50262 Important: Oracle Linux 8 Unbreakable Enterprise kernel security update
- ELSA-2026-15953 Moderate: Oracle Linux 8 glib2 security update
- ELSA-2026-50260 Important: Oracle Linux 9 Unbreakable Enterprise kernel security update
- ELSA-2026-50261 Important: Oracle Linux 9 Unbreakable Enterprise kernel security update
- ELBA-2026-16298 Oracle Linux 8 gcc-toolset-15-gcc bug fix and enhancement update
- ELSA-2026-50271 Important: Oracle Linux 9 Unbreakable Enterprise kernel security update
- ELSA-2026-16019 Moderate: Oracle Linux 8 freerdp security update
- ELSA-2026-50270 Important: Unbreakable Enterprise kernel security update
- ELBA-2026-50155 Oracle Linux 8 oVirt 4.5 ovirt-log-collector bug fix update
- ELSA-2026-50260 Important: Unbreakable Enterprise kernel security update
- ELSA-2026-50271 Important: Oracle Linux 8 Unbreakable Enterprise kernel security update
- ELSA-2026-50261 Important: Oracle Linux 8 Unbreakable Enterprise kernel security update
- ELSA-2026-16799 Important: Oracle Linux 8 krb5 security update
- ELSA-2026-16252 Important: Oracle Linux 8 jq security update
- ELSA-2026-16055 Important: Oracle Linux 8 libtiff security update
- ELBA-2026-16257 Oracle Linux 8 llvm-toolset:rhel8 bug fix and enhancement update
- ELSA-2026-50262 Important: Oracle Linux 8 Unbreakable Enterprise kernel security update
- ELBA-2026-50268 Oracle Linux 8 delve bug fix update
- ELBA-2026-50267 Oracle Linux 8 Module container-tools:ol8 update
- ELBA-2026-50265 Oracle Linux 8 mdadm bug fix update
- ELSA-2026-16693 Important: Oracle Linux 9 jq security update
- ELSA-2026-16484 Important: Oracle Linux 9 gimp security update
- ELSA-2026-15971 Moderate: Oracle Linux 9 glib2 security update
- ELSA-2026-16482 Moderate: Oracle Linux 9 freerdp security update
- ELSA-2026-16206 Important: Oracle Linux 9 kernel security update
- ELSA-2026-15892 Important: Oracle Linux 9 thunderbird security update
- ELSA-2026-15887 Important: Oracle Linux 9 openexr security update
- ELBA-2026-6252 Oracle Linux 9 scap-security-guide bug fix and enhancement update
- ELSA-2026-50271 Important: Oracle Linux 9 Unbreakable Enterprise kernel security update
- ELSA-2026-50261 Important: Oracle Linux 9 Unbreakable Enterprise kernel security update
- ELSA-2026-15969 Moderate: Oracle Linux 10 glib2 security update
- ELSA-2026-17075 Important: Oracle Linux 10 yggdrasil security update
- ELSA-2026-16014 Moderate: Oracle Linux 10 freerdp security update
- ELSA-2026-16692 Important: Oracle Linux 10 jq security update
- ELSA-2026-15968 Moderate: Oracle Linux 10 libsoup3 security update
- ELSA-2026-16062 Important: Oracle Linux 10 kernel security update
- ELSA-2026-15888 Important: Oracle Linux 10 openexr security update
- ELBA-2026-50190 Oracle Linux 10 oracle-ai-database-preinstall-26ai bug fix update
- ELSA-2026-13644 Moderate: Oracle Linux 10 corosync security update
Qubes OS
Qubes OS recently rolled out a batch of critical security patches designed to shield virtual machines from underlying hardware flaws. The first bulletin fixes a floating point divider state sampling issue that could allow attackers to peek into otherwise secure environments. Another update addresses a serious AMD processor bug capable of breaking sandbox boundaries and handing full kernel access to malicious code. Meanwhile, developers issued separate warnings about an Intel chip vulnerability that might quietly leak sensitive information from isolated workspaces on affected hardware.
- QSB-112: Floating Point Divider State Sampling (XSA-488)
- QSB-113: AMD CPU Opcode Cache corruption (XSA-490)
- QSB-114: Intel CPU data exposure vulnerability
Red Hat Enterprise Linux
Red Hat has published a series of urgent security advisories for RHEL systems spanning multiple versions and specialized service channels. These updates address critical vulnerabilities in widely used applications like Thunderbird, OpenSSH, nginx, and the core Linux kernel itself. System administrators managing environments with Podman, OpenShift, or various image processing libraries should install these patches without delay. Failing to apply these fixes promptly could expose enterprise networks to serious security risks that compromise overall system integrity.
- RHSA-2026:15924: Important: LibRaw security update
- RHSA-2026:15925: Important: LibRaw security update
- RHSA-2026:15892: Important: thunderbird security update
- RHSA-2026:15893: Important: openssh security update
- RHSA-2026:15890: Important: bind security update
- RHSA-2026:15891: Important: openssh security update
- RHSA-2026:15887: Important: openexr security update
- RHSA-2026:15889: Important: thunderbird security update
- RHSA-2026:15883: Important: kernel security update
- RHSA-2026:15940: Moderate: oci-seccomp-bpf-hook security update
- RHSA-2026:15941: Moderate: skopeo security update
- RHSA-2026:15980: Important: rhc security update
- RHSA-2026:15978: Important: kpatch-patch-5_14_0-611_36_1 and kpatch-patch-5_14_0-611_9_1 security update
- RHSA-2026:15971: Moderate: glib2 security update
- RHSA-2026:15976: Important: kpatch-patch-4_18_0-553_109_1, kpatch-patch-4_18_0-553_40_1, kpatch-patch-4_18_0-553_53_1, kpatch-patch-4_18_0-553_72_1, and kpatch-patch-4_18_0-553_85_1 secu ...
- RHSA-2026:15967: Moderate: libxml2 security update
- RHSA-2026:15945: Important: nginx:1.24 security update
- RHSA-2026:12071: Important: OpenShift Container Platform 4.18.39 bug fix and security update
- RHSA-2026:15942: Important: nginx security update
- RHSA-2026:15926: Important: LibRaw security update
- RHSA-2026:16111: Important: kpatch-patch-4_18_0-372_137_1, kpatch-patch-4_18_0-372_145_1, kpatch-patch-4_18_0-372_158_1, kpatch-patch-4_18_0-372_170_1, and kpatch-patch-4_18_0-372_181_1 ...
- RHSA-2026:16100: Important: kernel security update
- RHSA-2026:16101: Important: host-metering security update
- RHSA-2026:16102: Important: buildah security update
- RHSA-2026:15969: Moderate: glib2 security update
- RHSA-2026:16062: Important: kernel security update
- RHSA-2026:15968: Moderate: libsoup3 security update
- RHSA-2026:15888: Important: openexr security update
- RHSA-2026:16055: Important: libtiff security update
- RHSA-2026:16059: Important: openssh security update
- RHSA-2026:16060: Important: bind security update
- RHSA-2026:16063: Important: kpatch-patch-5_14_0-427_100_1, kpatch-patch-5_14_0-427_106_1, kpatch-patch-5_14_0-427_113_1, kpatch-patch-5_14_0-427_55_1, kpatch-patch-5_14_0-427_68_2, and k ...
- RHSA-2026:16061: Important: kernel security update
- RHSA-2026:16064: Important: bind security update
- RHSA-2026:16056: Important: webkit2gtk3 security update
- RHSA-2026:16021: Important: golang security update
- RHSA-2026:16019: Moderate: freerdp security update
- RHSA-2026:16024: Important: golang security update
- RHSA-2026:16014: Moderate: freerdp security update
- RHSA-2026:16018: Important: kpatch-patch-5_14_0-570_17_1, kpatch-patch-5_14_0-570_39_1, kpatch-patch-5_14_0-570_66_1, and kpatch-patch-5_14_0-570_94_1 security update
- RHSA-2026:15966: Important: nginx:1.26 security update
- RHSA-2026:15953: Moderate: glib2 security update
- RHSA-2026:15943: Important: nginx:1.24 security update
- RHSA-2026:16204: Important: kernel security update
- RHSA-2026:16202: Important: kernel security update
- RHSA-2026:16195: Important: kernel security update
- RHSA-2026:16201: Important: kernel security update
- RHSA-2026:16203: Important: kernel-rt security update
- RHSA-2026:16196: Important: kernel-rt security update
- RHSA-2026:16252: Important: jq security update
- RHSA-2026:16254: Important: kernel-rt security update
- RHSA-2026:16206: Important: kernel security update
- RHSA-2026:16210: Important: kpatch-patch-4_18_0-477_107_1, kpatch-patch-4_18_0-477_120_1, kpatch-patch-4_18_0-477_124_1, kpatch-patch-4_18_0-477_130_1, kpatch-patch-4_18_0-477_89_1, and ...
- RHSA-2026:16208: Important: kpatch-patch-5_14_0-284_104_1, kpatch-patch-5_14_0-284_117_1, kpatch-patch-5_14_0-284_134_1, kpatch-patch-5_14_0-284_148_1, and kpatch-patch-5_14_0-284_158_1 ...
- RHSA-2026:16209: Important: kpatch-patch-5_14_0-70_124_1, kpatch-patch-5_14_0-70_132_1, kpatch-patch-5_14_0-70_144_1, kpatch-patch-5_14_0-70_155_1, and kpatch-patch-5_14_0-70_167_1 secur ...
- RHSA-2026:16701: Important: container-tools:rhel8 security update
- RHSA-2026:16694: Important: go-toolset:rhel8 security update
- RHSA-2026:16702: Important: podman security update
- RHSA-2026:16697: Important: go-toolset:rhel8 security update
- RHSA-2026:16698: Important: go-toolset:rhel8 security update
- RHSA-2026:16693: Important: jq security update
- RHSA-2026:16692: Important: jq security update
- RHSA-2026:16699: Important: python3.12 security update
- RHSA-2026:16695: Important: webkit2gtk3 security update
- RHSA-2026:16696: Important: skopeo security update
- RHSA-2026:16161: Important: OpenShift Container Platform 4.19.31 bug fix and security update
- RHSA-2026:16160: Important: OpenShift Container Platform 4.18.41 bug fix and security update
- RHSA-2026:16482: Moderate: freerdp security update
- RHSA-2026:16312: Important: kernel security update
- RHSA-2026:16484: Important: gimp security update
- RHSA-2026:16483: Moderate: freerdp security update
- RHSA-2026:16498: Important: golang security update
- RHSA-2026:16485: Moderate: freerdp security update
- RHSA-2026:16494: Important: golang security update
- RHSA-2026:16497: Important: golang security update
- RHSA-2026:16314: Important: kernel security update
- RHSA-2026:16328: Important: kernel security update
- RHSA-2026:16155: Important: OpenShift Container Platform 4.21.15 bug fix and security update
- RHSA-2026:16799: Important: krb5 security update
- RHSA-2026:16814: Moderate: freerdp security update
- RHSA-2026:16777: Moderate: freerdp security update
- RHSA-2026:16171: Important: OpenShift Container Platform 4.16.62 bug fix and security update
- RHSA-2026:16875: Important: git-lfs security update
- RHSA-2026:16865: Moderate: freerdp security update
- RHSA-2026:16866: Moderate: freerdp security update
- RHSA-2026:14773: Important: OpenShift Container Platform 4.15.64 bug fix and security update
- RHSA-2026:15087: Important: OpenShift Container Platform 4.14.65 bug fix and security update
- RHSA-2026:17040: Important: podman security update
- RHSA-2026:17083: Important: fence-agents security update
- RHSA-2026:17075: Important: yggdrasil security update
- RHSA-2026:17287: Important: podman security update
- RHSA-2026:16157: Important: OpenShift Container Platform 4.20.22 bug fix and security update
- RHSA-2026:17084: Important: gvisor-tap-vsock security update
- RHSA-2026:17567: Moderate: libpng security update
- RHSA-2026:17561: Important: PackageKit security update
- RHSA-2026:17558: Important: PackageKit security update
- RHSA-2026:17533: Important: gimp:2.8 security update
- RHSA-2026:17524: Moderate: libpng security update
- RHSA-2026:16180: Important: OpenShift Container Platform 4.12.90 bug fix and security update
- RHSA-2026:17525: Important: python3.12 security update
- RHSA-2026:17481: Important: rsync security update
- RHSA-2026:17482: Moderate: libsoup3 security update
- RHSA-2026:17477: Important: firefox security update
- RHSA-2026:17603: Moderate: libpng security update
- RHSA-2026:17602: Important: dovecot security update
- RHSA-2026:17688: Important: firefox security update
- RHSA-2026:17689: Important: firefox security update
- RHSA-2026:17687: Important: firefox security update
- RHSA-2026:17690: Important: firefox security update
- RHSA-2026:17686: Moderate: osbuild-composer security update
- RHSA-2026:17685: Moderate: libpng security update
- RHSA-2026:17660: Important: openexr security update
- RHSA-2026:17658: Important: openexr update
- RHSA-2026:17659: Important: openexr security update
- RHSA-2026:17656: Important: openexr security update
- RHSA-2026:17642: Moderate: libpng security update
- RHSA-2026:17626: Important: dovecot security update
- RHSA-2026:17628: Important: dovecot security update
- RHSA-2026:17625: Important: dovecot security update
- RHSA-2026:16176: Important: OpenShift Container Platform 4.14.66 bug fix and security update
- RHSA-2026:17630: Important: dovecot security update
- RHSA-2026:17619: Important: python3 security update
- RHSA-2026:17618: Moderate: ImageMagick security update
- RHSA-2026:17560: Important: PackageKit security update
- RHSA-2026:17753: Critical: nginx:1.26 security update
- RHSA-2026:17752: Critical: nginx:1.24 security update
- RHSA-2026:17751: Critical: nginx security update
- RHSA-2026:17795: Critical: kernel security update
- RHSA-2026:17793: Critical: nginx:1.24 security update
- RHSA-2026:17790: Critical: nginx security update
- RHSA-2026:17791: Critical: nginx security update
- RHSA-2026:17792: Critical: nginx security update
- RHSA-2026:17794: Critical: nginx security update
Rocky Linux
Rocky Linux administrators must quickly deploy a series of new security patches across versions eight through ten to close several critical vulnerabilities. The updates target essential software packages including LibTIFF, LibPNG, FreeRDP, Glib2, and the main system kernel, while also fixing flaws in tools like jq, GIMP, rsync, and Yggdrasil. Each release addresses specific security weaknesses that could otherwise leave systems exposed to exploitation or instability. System managers should review the official errata documentation carefully before applying these updates to ensure a smooth deployment process.
- RLSA-2026:14929: Important: mingw-libtiff security update
- RLSA-2026:14790: Moderate: libpng security update
- RLSA-2026:14791: Moderate: libpng security update
- RLSA-2026:14819: Moderate: freeipmi security update
- RLSA-2026:16019: Moderate: freerdp security update
- RLSA-2026:16055: Important: libtiff security update
- RLSA-2026:15953: Moderate: glib2 security update
- RLSA-2026:15968: Moderate: libsoup3 security update
- RLSA-2026:15969: Moderate: glib2 security update
- RLSA-2026:15888: Important: openexr security update
- RLSA-2026:16014: Moderate: freerdp security update
- RLSA-2026:15887: Important: openexr security update
- RLSA-2026:15971: Moderate: glib2 security update
- RLSA-2026:15892: Important: thunderbird security update
- RLSA-2026:16692: Important: jq security update
- RLSA-2026:16062: Important: kernel security update
- RLSA-2026:16693: Important: jq security update
- RLSA-2026:16206: Important: kernel security update
- RLSA-2026:16484: Important: gimp security update
- RLSA-2026:16482: Moderate: freerdp security update
- RLSA-2026:16196: Important: kernel-rt security update
- RLSA-2026:16252: Important: jq security update
- RLSA-2026:17533: Important: gimp:2.8 security update
- RLSA-2026:16875: Important: git-lfs security update
- RLSA-2026:16195: Important: kernel security update
- RLSA-2026:16799: Important: krb5 security update
- RLSA-2026:17481: Important: rsync security update
- RLSA-2026:17075: Important: yggdrasil security update
Slackware Linux
Slackware recently deployed a batch of urgent security patches across its core software stack. The expat package now includes a critical fix that removes quadratic runtime complexity from XML attribute collision checks. Users operating either the stable 15.0 release or the rolling current branch must also install fresh kernel and dnsmasq updates right away. These coordinated upgrades effectively seal multiple exploitable vulnerabilities before attackers can weaponize them against unpatched systems.
SUSE Linux
SUSE and openSUSE recently pushed out multiple security patches across their Tumbleweed and enterprise Linux distributions. These updates tackle known vulnerabilities in a broad range of system utilities and popular software packages. System administrators must install fixes for essential tools like the Linux kernel, Tor, Java OpenJ9, FFmpeg, and several Perl libraries to block potential exploits. The most critical changes even demand a full machine restart before the underlying flaws are completely resolved.
- openSUSE-SU-2026:20709-1: critical: Security update for tor
- openSUSE-SU-2026:10719-1: moderate: valkey-9.0.4-1.1 on GA media
- openSUSE-SU-2026:10727-1: moderate: java-21-openj9-21.0.11.0-1.1 on GA media
- openSUSE-SU-2026:10726-1: moderate: java-1_8_0-openj9-1.8.0.492-1.1 on GA media
- openSUSE-SU-2026:10724-1: moderate: java-11-openj9-11.0.31.0-1.1 on GA media
- openSUSE-SU-2026:10723-1: moderate: go1.25-1.25.10-1.1 on GA media
- openSUSE-SU-2026:10718-1: moderate: python311-Django-5.2.14-1.1 on GA media
- openSUSE-SU-2026:10722-1: moderate: glibc-2.43-2.1 on GA media
- openSUSE-SU-2026:10721-1: moderate: frr-10.6.1-1.1 on GA media
- openSUSE-SU-2026:10725-1: moderate: java-17-openj9-17.0.19.0-1.1 on GA media
- openSUSE-SU-2026:10720-1: moderate: firefox-esr-140.10.2-1.1 on GA media
- SUSE-SU-2026:1787-1: important: Security update for the Linux Kernel (Live Patch 18 for SUSE Linux Enterprise 15 SP6)
- SUSE-SU-2026:1784-1: important: Security update for php-composer2
- SUSE-SU-2026:1793-1: important: Security update for the Linux Kernel (Live Patch 13 for SUSE Linux Enterprise 15 SP6)
- SUSE-SU-2026:1802-1: important: Security update for the Linux Kernel (Live Patch 21 for SUSE Linux Enterprise 15 SP6)
- SUSE-SU-2026:1801-1: important: Security update for the Linux Kernel (Live Patch 19 for SUSE Linux Enterprise 15 SP6)
- SUSE-SU-2026:1798-1: important: Security update for the Linux Kernel (Live Patch 32 for SUSE Linux Enterprise 15 SP5)
- SUSE-SU-2026:1804-1: important: Security update for the Linux Kernel (Live Patch 33 for SUSE Linux Enterprise 15 SP5)
- openSUSE-SU-2026:10732-1: moderate: libmodsecurity3-3.0.15-1.1 on GA media
- openSUSE-SU-2026:10728-1: moderate: java-25-openj9-25.0.3.0-1.1 on GA media
- openSUSE-SU-2026:10731-1: moderate: mcphost-0.34.0-1.1 on GA media
- openSUSE-SU-2026:10729-1: moderate: krb5-1.22.2-3.1 on GA media
- openSUSE-SU-2026:10741-1: moderate: go1.26-1.26.3-1.1 on GA media
- openSUSE-SU-2026:10742-1: moderate: libQt6Svg6-6.11.0-2.1 on GA media
- openSUSE-SU-2026:10738-1: moderate: MozillaThunderbird-140.10.2-1.1 on GA media
- openSUSE-SU-2026:10739-1: moderate: assimp-devel-6.0.5-2.1 on GA media
- openSUSE-SU-2026:0165-1: important: Security update for python-jupyterlab
- openSUSE-SU-2026:0164-1: critical: Security update for tor
- openSUSE-SU-2026:20720-1: moderate: Security update for trivy
- openSUSE-SU-2026:20717-1: important: Security update for raylib
- SUSE-SU-2026:1819-1: important: Security update for python-Mako
- SUSE-SU-2026:1821-1: moderate: Security update for NetworkManager
- SUSE-SU-2026:1827-1: important: Security update for dnsmasq
- SUSE-SU-2026:1818-1: important: Security update for python39
- SUSE-SU-2026:1816-1: moderate: Security update for krb5
- SUSE-SU-2026:1835-1: moderate: Security update for Mesa
- SUSE-SU-2026:1839-1: moderate: Security update for Mesa
- SUSE-SU-2026:1840-1: important: Security update for the Linux Kernel
- openSUSE-SU-2026:10748-1: moderate: jupyter-jupyterlab-4.5.7-1.1 on GA media
- openSUSE-SU-2026:10752-1: moderate: OpenImageIO-3.1.13.1-2.1 on GA media
- openSUSE-SU-2026:10751-1: moderate: libvinylapi3-9.0.0-1.1 on GA media
- SUSE-SU-2026:1840-2: important: Security update for the Linux Kernel
- SUSE-SU-2026:1842-1: important: Security update for python-Pillow
- SUSE-SU-2026:1857-1: important: Security update for the Linux Kernel
- openSUSE-SU-2026:10759-1: moderate: python-Twisted-doc-26.4.0-1.1 on GA media
- openSUSE-SU-2026:10767-1: moderate: ffmpeg-4-4.4.6-12.1 on GA media
- openSUSE-SU-2026:10765-1: moderate: amazon-ssm-agent-3.3.4268.0-2.1 on GA media
- openSUSE-SU-2026:10760-1: moderate: python311-click-8.3.3-2.1 on GA media
- openSUSE-SU-2026:10766-1: moderate: dovecot24-2.4.4-1.1 on GA media
- openSUSE-SU-2026:10762-1: moderate: rclone-1.74.1-1.1 on GA media
- openSUSE-SU-2026:10758-1: moderate: python311-GitPython-3.1.49-1.1 on GA media
- openSUSE-SU-2026:10764-1: moderate: syncthing-2.1.0-1.1 on GA media
- openSUSE-SU-2026:10763-1: moderate: regclient-0.11.4-1.1 on GA media
- SUSE-SU-2026:1870-1: important: Security update for mozjs115
- openSUSE-SU-2026:20726-1: moderate: Security update for ffmpeg-4
- openSUSE-SU-2026:20730-1: critical: Security update for apptainer
- openSUSE-SU-2026:20723-1: important: Security update for kdenlive
- openSUSE-SU-2026:10775-1: moderate: rsync-3.4.1-5.1 on GA media
- openSUSE-SU-2026:10776-1: moderate: tekton-cli-0.45.0-1.1 on GA media
- openSUSE-SU-2026:10777-1: moderate: ImageMagick-7.1.2.22-1.1 on GA media
- openSUSE-SU-2026:10774-1: moderate: perl-Text-CSV_XS-1.620.0-1.1 on GA media
- openSUSE-SU-2026:10772-1: moderate: libIex-3_4-33-3.4.11-1.1 on GA media
- openSUSE-SU-2026:10769-1: moderate: flux2-cli-2.8.7-1.1 on GA media
- openSUSE-SU-2026:10770-1: moderate: glibc-2.43-3.1 on GA media
- openSUSE-SU-2026:10768-1: moderate: ffmpeg-7-7.1.3-3.1 on GA media
- openSUSE-SU-2026:10773-1: moderate: perl-CryptX-0.89.0-1.1 on GA media
- openSUSE-SU-2026:0167-1: moderate: Security update for gosec
- SUSE-SU-2026:1872-1: moderate: Security update for firewalld
- SUSE-SU-2026:1871-1: moderate: Security update for openvswitch
- SUSE-SU-2026:1873-1: important: Security update for the Linux Kernel (Live Patch 12 for SUSE Linux Enterprise 15 SP7)
- openSUSE-SU-2026:10781-1: moderate: perl-libwww-perl-6.830.0-1.1 on GA media
- openSUSE-SU-2026:10779-1: moderate: keylime-config-7.14.2-1.1 on GA media
- openSUSE-SU-2026:10780-1: moderate: perl-Net-CIDR-Lite-0.240.0-1.1 on GA media
Ubuntu Linux
Ubuntu recently issued multiple security advisories to patch critical vulnerabilities across its Linux kernel and several popular applications. The kernel patches focus on specific hardware setups like Raspberry Pi boards and NVIDIA Tegra systems while also covering major cloud environments such as AWS and Azure. Separate warnings highlight dangerous flaws in ImageMagick, Exim, Dnsmasq, Nginx, and Avahi that could let attackers crash servers or run malicious code through crafted files or network traffic. System administrators need to apply these fixes immediately to keep their Ubuntu deployments secure from remote exploitation.
- [USN-8200-3] Linux kernel (Raspberry Pi) vulnerabilities
- [USN-8265-1] Linux kernel (NVIDIA Tegra) vulnerabilities
- [USN-8267-1] Linux kernel vulnerabilities
- [USN-8266-1] Linux kernel vulnerabilities
- [USN-8255-2] Linux kernel (Azure) vulnerabilities
- [USN-8254-2] Linux kernel (NVIDIA) vulnerabilities
- [USN-8180-6] Linux kernel (Raspberry Pi) vulnerabilities
- [USN-8263-1] ImageMagick vulnerabilities
- [USN-8270-1] Exim vulnerability
- [USN-8268-1] Dnsmasq vulnerabilities
- [USN-8271-1] nginx vulnerability
- [USN-8269-1] Avahi vulnerabilities
Keep Your Linux System Secure: Safely Applying Critical Updates
Applying these patches requires distribution-specific package management commands. RHEL-based systems typically use dnf update or yum update, while Debian and Ubuntu rely on apt upgrade. SUSE users should run zypper patch to properly address all security advisories, and Slackware administrators can manage updates with upgradepkg or slackpkg. After executing the commands, a reboot is usually necessary for kernel changes to take effect. Finally, review your package manager’s logs to verify that all patches installed successfully and no dependencies were disrupted.
Debian/Ubuntu (apt)
The first thing to do is refresh the local package index; running sudo apt update contacts all configured repositories and pulls in the newest lists of available versions. Skipping this step leaves the system blind to any recent uploads, which explains why “upgrade” sometimes claims there’s nothing to do even after a security advisory has been published. Once the index is current, invoke sudo apt upgrade -y; the -y flag answers every prompt automatically so the process doesn’t pause for user input. This command upgrades all installed packages that have newer versions in the repositories while preserving configuration files.
sudo apt update sudo apt upgrade -y
Fedora/RedHat/Rocky/Alma/Oracle (dnf or yum)
On modern Fedora and recent Red Hat derivatives, dnf is the package manager; older RHEL releases still rely on yum. Begin with a check‑update operation—sudo dnf check-update or sudo yum check-update—to see exactly which packages are awaiting an upgrade. This preview step can be useful for spotting unexpected kernel bumps before they land. To actually apply the updates, run sudo dnf upgrade -y (or sudo yum update if you prefer the older tool). The upgrade command pulls down the new binaries and runs any necessary post‑install scripts, such as rebuilding initramfs when a kernel changes.
sudo dnf check-update sudo dnf upgrade -y
or on older releases
sudo yum check-update sudo yum update
SUSE (zypper)
SUSE’s command line front‑end is called zypper. First execute sudo zypper refresh so that the metadata for all enabled repos gets updated; without this, zypper will happily report “No updates available” even though newer packages sit on the mirror. After a fresh refresh, issue sudo zypper update -y; this upgrades every package to the latest version in the configured repositories and automatically handles service restarts when required.
sudo zypper refresh sudo zypper update -y
Slackware (slackpkg and pkgtool)
Slackware doesn’t have a single unified updater, but the official way to pull updates is through slackpkg. Start with sudo slackpkg update to download the newest package list from the chosen mirror. Then run sudo slackpkg upgrade-all; this command walks through each installed package and replaces it with the most recent build available in the official repository. For users who prefer a more granular approach, specifying a package name after upgrade limits the operation to that single item. When dealing with community‑maintained repositories, pkgtool takes over: a combined sudo pkgtool update && sudo pkgtool upgrade will sync and apply updates from the mirrors listed in /etc/slackpkg/mirrors.
sudo slackpkg update sudo slackpkg upgrade-all
Keep those systems patched and stay safe out there.