This week’s security roundup delivers critical patches across every major Linux distribution, with Nginx, Ruby, OpenSSH, and the core kernel taking the hardest hits. Several advisories flag unauthenticated remote code execution flaws in management interfaces like Cockpit, alongside privilege escalation risks in bind and rsync that could hand attackers full system control without a password. Desktop users running Ubuntu or Slackware also need to grab updates for Firefox, Thunderbird, and specialized cloud kernels before those vulnerabilities get weaponized by automated scanners. Administrators should run their standard package manager commands immediately, schedule a quick reboot if the kernel changed, and verify critical services afterward to catch any unexpected regressions.
Critical Linux Security Updates Hit Nginx, Ruby, and Kernels Across All Major Distros
A fresh wave of Linux security updates has landed across all major distributions this week. This roundup covers critical patches for AlmaLinux, Debian, Fedora, Oracle Linux, RHEL, Rocky Linux, Slackware, SUSE, and Ubuntu. The fixes address dangerous vulnerabilities in Nginx, Ruby, the core kernel, and several web stack components that could allow attackers to execute unauthorized code or steal elevated privileges. System administrators and desktop users should apply these updates immediately to close known exploitation paths before malicious actors can take advantage of them.
What is broken in this week's Linux security updates?
Nginx is getting hammered with critical fixes across almost every distribution, so if you serve web traffic, this is priority number one. Ruby also received important and critical patches that could let attackers run arbitrary code on affected machines. The kernel updates are standard but necessary, with Fedora specifically noting memory corruption errors that need squashing.
Network admins have seen the consequences of leaving management interfaces exposed when a critical unauthenticated remote code execution vulnerability appears in tools like Cockpit. A single SSH command-line argument injection flaw can hand an attacker full control over the server without any credentials. It is common to see sysadmins expose port 9090 on public IPs thinking it is safe because it is just for internal management, and that mistake just got a lot more expensive with this week's Rocky Linux advisory.
Slackware users need to grab updates for bind and rsync immediately. Those packages contain severe flaws including local privilege escalation, memory disclosure, unbounded recursion loops, and dangerous symlink race conditions. If you run any DNS services or rely on rsync for backups, ignoring these patches is asking for trouble.
Distro-specific patch details and recommendations
AlmaLinux users running versions eight through ten need to install patches for the kernel, Nginx, Ruby, and libpng right away. These updates fix loopholes that could allow unauthorized code execution or privilege escalation. Run your standard package manager update command as soon as possible to get these fixes in place.
Debian is pushing urgent updates for a massive list of packages including PHP, Redis, OpenSSH, Firefox ESR, Chromium, Apache, and BIND. The breadth of this release means almost every service on a typical Debian server needs attention. Prioritize the critical advisories for OpenSSH and Nginx to prevent remote exploitation attempts.
Fedora distributions four through four are receiving a huge batch of fixes targeting Rust libraries, MySQL, Chromium, and the kernel. Attackers could exploit injection attacks and broken cryptographic routines in these unpatched versions. Fedora users should apply these releases immediately to keep systems secure against remote exploitation attempts.
Oracle Linux versions seven through ten cover similar ground with critical updates for Ruby, Nginx, rsync, BIND, giflib, and the kernel. The advisories span both x86_64 and aarch64 architectures. IT teams managing Oracle infrastructure should prioritize installing these fixes to protect enterprise environments from serious risks.
Red Hat Enterprise Linux users must prioritize advisories covering Glibc, jq, Ruby, PackageKit, and multiple kernel variants. Several patches carry Important or Critical ratings that could leave enterprise environments exposed. The comprehensive releases fix flaws across web servers and development tools like jq, so verify your JSON parsing scripts after updating to catch any potential regressions.
Rocky Linux mirrors many of these fixes while also flagging a critical Cockpit vulnerability due to an SSH command-line argument injection. PackageKit and Cockpit received necessary corrections to prevent system exploitation. Review the CVSS scores in the advisories to prioritize which servers require overnight maintenance versus standard patching windows.
Slackware requires immediate attention for Thunderbird, Firefox, haveged, bind, and rsync packages across version 15.0 and its development branch. The bind and rsync fixes tackle severe flaws including local privilege escalation and symlink race conditions. Install these patches right away to close security gaps that could leave systems exposed to unauthorized access.
SUSE and openSUSE are addressing flaws in PHP8, ImageMagick, Chromium, OpenSSH, Apache, and the kernel alongside standard updates. Attackers could potentially exploit these weaknesses to execute remote code or steal sensitive data. SUSE users should also check for live patch availability if they cannot afford downtime during the maintenance window.
Ubuntu is distributing patches for specialized kernels including NVIDIA Tegra, Xilinx ZynqMP, Intel IoTG Real-time, Oracle, Low Latency, FIPS, and GCP variants along with desktop tools. The updates cover GStreamer, Unbound, GnuTLS, OpenVPN, jq, Bubblewrap, XDG Desktop Portal, PostgreSQL, BIND, libarchive, Evince, and Path-to-Regexp. Ubuntu users should apply these fixes to protect both standard releases and specialized cloud or hardware configurations.

Latest Security Patches by Distribution
Here’s a complete breakdown of recent security updates:
AlmaLinux
AlmaLinux recently pushed out a batch of critical security patches for versions eight through ten of its operating system. These updates fix dangerous loopholes in essential software like the Linux kernel, Nginx, Ruby, and libpng. Malicious actors could use these specific flaws to execute unauthorized code or steal elevated privileges on affected machines. System administrators should install the updates right away to keep their networks secure.
- ALSA-2026:18028: libpng security update (Moderate)
- ALSA-2026:18029: nginx security update (Critical)
- ALSA-2026:16206: kernel security update (Important)
- ALSA-2026:18065: ruby security update (Important)
- ALSA-2026:18063: nginx security update (Critical)
- ALSA-2026:18039: ruby security update (Important)
- ALSA-2026:18030: ruby:3.3 security update (Important)
- ALSA-2026:18064: libpng security update (Moderate)
- ALSA-2026:18041: nginx:1.24 security update (Critical)
- ALSA-2026:19666: kernel security update (Important)
- ALSA-2026:19664: kernel-rt security update (Important)
- ALSA-2026:19559: libsndfile security update (Important)
- ALSA-2026:19588: firefox security update (Important)
Debian GNU/Linux
Debian has rolled out urgent security patches for a long list of widely used software packages. The latest advisories cover critical updates for PHP, Redis, OpenSSH, Nginx, Apache, Firefox ESR, and Chromium among many others. These fixes address dangerous vulnerabilities that could let attackers escalate privileges, leak sensitive information, or run malicious code on your systems. You should install these updates immediately to stop serious breaches before they happen.
- ELA-1723-1 php7.0 security update
- ELA-1722-1 php7.3 security update
- [DSA 6279-1] redis security update
- ELA-1720-1 openssh security update
- ELA-1721-1 openssh security update
- ELA-1726-1 linux-5.10 security update
- ELA-1725-1 libpng1.6 security update
- ELA-1724-1 libpng1.6 security update
- ELA-1727-1 linux-6.1 security update
- [DLA 4589-1] nginx security update
- [DLA 4590-1] erlang security update
- [DSA 62801] netatalk security update
- [DLA 4588-1] linux-6.1 security update
- ELA-1728-1 apache2 security update
- [DSA 6281-1] gnutls28 security update
- [DSA 6282-1] rsync security update
- [DLA 4592-1] firefox-esr security update
- [DSA 6285-1] bind9 security update
- [DSA 6284-1] pdns security update
- [DSA 6283-1] firefox-esr security update
- [DLA 4591-1] rsync security update
- ELA-1718-1 python-gevent security update (by )
- [DSA 6286-1] evince security update
- ELA-1730-1 openjpeg2 security update
- ELA-1729-1 openjpeg2 security update
- [DLA 4593-1] openjpeg2 security update
- [DSA 6290-1] nss security update
- [DSA 6289-1] openvpn security update
- [DSA 6288-1] thunderbird security update
- [DSA 6287-1] chromium security update
- [DLA 4594-1] thunderbird security update
- [DLA 4595-1] gnutls28 security update
- [DSA 6294-1] libgcrypt20 security update
- [DLA 4597-1] atril security update
- [DSA 6293-1] krb5 security update
- [DSA 6292-1] haveged security update
- [DLA 4596-1] evince security update
- [DSA 6291-1] haproxy security update
- ELA-1731-1 evince security update
- [DSA 6295-1] linux security update
Fedora Linux
Fedora Linux versions 42 through 44 are receiving a massive batch of critical security patches designed to close dozens of dangerous software vulnerabilities. These updates hit nearly every major system component, including the Linux kernel, Chromium browser, Rust libraries, MySQL databases, and essential web server modules. Attackers could easily exploit unpatched flaws that span memory corruption errors, injection attacks, and broken cryptographic routines. You really should prioritize installing these releases right away to keep your systems secure against remote exploitation attempts.
- Fedora 42 Update: pgbouncer-1.25.2-1.fc42
- Fedora 42 Update: coturn-4.11.0-1.fc42
- Fedora 42 Update: valkey-8.0.9-1.fc42
- Fedora 42 Update: apptainer-1.5.0-1.fc42
- Fedora 42 Update: uv-0.11.11-1.fc42
- Fedora 42 Update: rust-astral-tokio-tar-0.6.1-1.fc42
- Fedora 42 Update: python-uv-build-0.11.11-1.fc42
- Fedora 43 Update: pgbouncer-1.25.2-1.fc43
- Fedora 43 Update: coturn-4.11.0-1.fc43
- Fedora 43 Update: valkey-8.1.7-1.fc43
- Fedora 43 Update: uv-0.11.11-1.fc43
- Fedora 43 Update: apptainer-1.5.0-1.fc43
- Fedora 43 Update: rust-astral-tokio-tar-0.6.1-1.fc43
- Fedora 43 Update: python-uv-build-0.11.11-1.fc43
- Fedora 44 Update: chromium-148.0.7778.167-1.fc44
- Fedora 44 Update: pgbouncer-1.25.2-1.fc44
- Fedora 44 Update: open-amp-2026.04.0-1.fc44
- Fedora 44 Update: libmetal-2026.04.0-2.fc44
- Fedora 44 Update: coturn-4.11.0-1.fc44
- Fedora 44 Update: valkey-9.0.4-1.fc44
- Fedora 44 Update: apptainer-1.5.0-1.fc44
- Fedora 44 Update: uv-0.11.11-1.fc44
- Fedora 44 Update: python-uv-build-0.11.11-1.fc44
- Fedora 44 Update: rust-astral-tokio-tar-0.6.1-1.fc44
- Fedora 42 Update: SDL2_image-2.8.12-1.fc42
- Fedora 43 Update: mod_md-2.6.11-2.fc43
- Fedora 43 Update: SDL2_image-2.8.12-1.fc43
- Fedora 44 Update: mod_md-2.6.11-2.fc44
- Fedora 43 Update: rust-rpki-0.18.6-4.fc43
- Fedora 43 Update: kernel-7.0.9-102.fc43
- Fedora 43 Update: keylime-agent-rust-0.2.9-2.fc43
- Fedora 43 Update: rust-cargo-vendor-filterer-0.5.18-5.fc43
- Fedora 43 Update: rust-oo7-cli-0.4.3-5.fc43
- Fedora 43 Update: rust-ingredients-0.2.2-4.fc43
- Fedora 43 Update: rust-tealdeer-1.7.3-2.fc43
- Fedora 43 Update: rust-sevctl-0.6.2-7.fc43
- Fedora 43 Update: perl-Net-CIDR-Lite-0.24-1.fc43
- Fedora 44 Update: kernel-7.0.9-202.fc44
- Fedora 44 Update: python-urllib3-2.7.0-1.fc44
- Fedora 44 Update: rust-rpki-0.18.6-4.fc44
- Fedora 44 Update: keylime-agent-rust-0.2.9-2.fc44
- Fedora 44 Update: rust-cargo-vendor-filterer-0.5.18-5.fc44
- Fedora 44 Update: rust-oo7-cli-0.4.3-5.fc44
- Fedora 44 Update: rust-ingredients-0.2.2-4.fc44
- Fedora 44 Update: rust-tealdeer-1.7.3-2.fc44
- Fedora 44 Update: rust-sevctl-0.6.2-7.fc44
- Fedora 44 Update: python-pysam-0.24.0-1.fc44
- Fedora 43 Update: dnsmasq-2.92rel2-2.fc43
- Fedora 42 Update: kernel-6.19.14-106.fc42
- Fedora 42 Update: kernel-6.19.14-107.fc42
- Fedora 42 Update: mysql8.0-8.0.46-1.fc42
- Fedora 42 Update: mysql8.4-8.4.9-1.fc42
- Fedora 43 Update: kernel-7.0.9-104.fc43
- Fedora 43 Update: evince-48.1-2.fc43
- Fedora 43 Update: nss-3.123.1-1.fc43
- Fedora 43 Update: firefox-151.0-2.fc43
- Fedora 43 Update: python-django5-5.2.14-1.fc43
- Fedora 43 Update: rsync-3.4.1-6.fc43
- Fedora 43 Update: erlang-cowlib-2.16.1-1.fc43
- Fedora 43 Update: mysql8.0-8.0.46-1.fc43
- Fedora 43 Update: proftpd-1.3.9a-2.fc43
- Fedora 43 Update: python-dotenv-1.2.2-1.fc43
- Fedora 43 Update: mingw-expat-2.8.1-1.fc43
- Fedora 43 Update: pgadmin4-9.15-1.fc43
- Fedora 43 Update: expat-2.8.1-1.fc43
- Fedora 43 Update: mysql8.4-8.4.9-1.fc43
- Fedora 43 Update: rustup-1.29.0-4.fc43
- Fedora 43 Update: opencryptoki-3.26.0-3.fc43
- Fedora 43 Update: rust-nu-0.99.1-17.fc43
- Fedora 44 Update: firefox-151.0-2.fc44
- Fedora 44 Update: evince-48.1-5.fc44
- Fedora 44 Update: kernel-7.0.9-204.fc44
- Fedora 44 Update: python-django5-5.2.14-1.fc44
- Fedora 44 Update: python-django6-6.0.5-1.fc44
- Fedora 44 Update: strongswan-6.0.6-2.fc44
- Fedora 44 Update: erlang-cowlib-2.16.1-1.fc44
- Fedora 44 Update: mysql8.0-8.0.46-1.fc44
- Fedora 44 Update: proftpd-1.3.9a-2.fc44
- Fedora 44 Update: python-dotenv-1.2.2-1.fc44
- Fedora 44 Update: mingw-expat-2.8.1-1.fc44
- Fedora 44 Update: pgadmin4-9.15-1.fc44
- Fedora 44 Update: mysql8.4-8.4.9-1.fc44
- Fedora 44 Update: rust-nu-0.99.1-17.fc44
- Fedora 44 Update: rustup-1.29.0-4.fc44
- Fedora 44 Update: opencryptoki-3.26.0-3.fc44
- Fedora 43 Update: kernel-7.0.9-105.fc43
- Fedora 44 Update: kernel-7.0.9-205.fc44
- Fedora 44 Update: cockpit-362-1.fc44
- Fedora 44 Update: linux-firmware-20260519-1.fc44
- Fedora 44 Update: chromium-148.0.7778.178-1.fc44
- Fedora 44 Update: dotnet8.0-8.0.127-1.fc44
- Fedora 44 Update: perl-Apache-Session-Browseable-1.3.19-1.fc44
- Fedora 44 Update: dotnet10.0-10.0.108-1.fc44
- Fedora 44 Update: dotnet9.0-9.0.117-1.fc44
- Fedora 44 Update: docker-buildkit-0.30.0-1.fc44
- Fedora 44 Update: docker-buildx-0.34.0-1.fc44
- Fedora 44 Update: python3.15-3.15.0~b1-1.fc44
- Fedora 44 Update: pie-1.4.4-1.fc44
- Fedora 44 Update: composer-2.9.8-1.fc44
- Fedora 42 Update: evince-48.1-2.fc42
- Fedora 43 Update: python-requests-2.33.1-1.fc43
- Fedora 43 Update: python-pulp-glue-0.37.0-5.fc43
- Fedora 43 Update: httpd-2.4.67-1.fc43
- Fedora 42 Update: dotnet8.0-8.0.127-1.fc42
- Fedora 42 Update: kernel-6.19.14-108.fc42
- Fedora 42 Update: dotnet9.0-9.0.117-1.fc42
- Fedora 42 Update: dotnet10.0-10.0.108-1.fc42
- Fedora 42 Update: docker-buildkit-0.30.0-1.fc42
- Fedora 42 Update: docker-buildx-0.34.0-1.fc42
- Fedora 42 Update: python3.15-3.15.0~b1-1.fc42
- Fedora 42 Update: nss-3.123.1-1.fc42
- Fedora 42 Update: firefox-151.0-2.fc42
- Fedora 43 Update: dotnet8.0-8.0.127-1.fc43
- Fedora 43 Update: perl-Apache-Session-Browseable-1.3.19-1.fc43
- Fedora 43 Update: dotnet10.0-10.0.108-1.fc43
- Fedora 43 Update: dotnet9.0-9.0.117-1.fc43
- Fedora 43 Update: docker-buildkit-0.30.0-1.fc43
- Fedora 43 Update: docker-buildx-0.34.0-1.fc43
- Fedora 43 Update: python3.15-3.15.0~b1-1.fc43
- Fedora 43 Update: pie-1.4.4-1.fc43
- Fedora 43 Update: composer-2.9.8-1.fc43
Oracle Linux
Oracle Linux versions 7 through 10 just received a major wave of security patches targeting critical vulnerabilities across multiple software packages. These updates focus heavily on widely used tools like Ruby, Nginx, rsync, and the core kernel to stop attackers from executing arbitrary code or crashing systems. The advisories cover both x86_64 and aarch64 architectures while addressing flaws in libraries such as libpng, giflib, and BIND that could otherwise expose enterprise environments to serious risks. IT teams managing these Oracle systems should prioritize installing the fixes immediately to keep their infrastructure secure against known exploits.
- ELSA-2026-18028 Moderate: Oracle Linux 9 libpng security update
- ELSA-2026-18064 Moderate: Oracle Linux 10 libpng security update
- ELBA-2026-50272 Oracle Linux 10 rhn-client-tools bug fix update
- ELSA-2026-18065 Important: Oracle Linux 10 ruby security update
- ELBA-2026-50274 Oracle Linux 8 systemd bug fix update
- OLAMSA-2026-0011 Low: Oracle Linux 8 ol-automation-manager security update
- ELSA-2026-17481 Important: Oracle Linux 8 rsync security update
- ELBA-2026-50269 Oracle Linux 8 satellite-5-client:1.0 bug fix update
- ELSA-2026-8883 Important: Oracle Linux 7 giflib security update
- ELSA-2026-11371 Important: Oracle Linux 7 bind security update
- ELSA-2026-17533 Important: Oracle Linux 8 gimp:2.8 security update
- ELSA-2026-6617 Important: Oracle Linux 7 vim security update
- ELBA-2026-16195-1 Oracle Linux 8 kernel bug fix update
- ELSA-2026-16195 Important: Oracle Linux 8 kernel security update
- ELSA-2026-18030 Important: Oracle Linux 9 ruby:3.3 security update
- ELSA-2026-18063 Critical: Oracle Linux 10 nginx security update
- ELSA-2026-18039 Important: Oracle Linux 9 ruby security update
- ELSA-2026-18029 Critical: Oracle Linux 9 nginx security update
- ELSA-2026-18041 Critical: Oracle Linux 8 nginx:1.24 security update
- ELBA-2026-50277 Oracle Linux 8 oracle-ovirt-release-45-el8 bug fix update
- ELBA-2026-50276 Oracle Linux 8 cloud-init bug fix update
- ELSA-2026-8880 Important: Oracle Linux 7 squid security update
- ELSA-2026-50279 Important: Unbreakable Enterprise kernel security update
- ELBA-2026-9321 Oracle Linux 10 krb5 bug fix and enhancement update
- ELSA-2026-50280 Important: Oracle Linux 9 Unbreakable Enterprise kernel security update
- OLAMSA-2026-0012 Critical: Oracle Linux 8 ol-automation-manager security update
- ELSA-2026-50280 Important: Oracle Linux 9 Unbreakable Enterprise kernel security update
- OLAMSA-2026-0013 Critical: Oracle Linux 9 ol-automation-manager security update
- ELSA-2026-50279 Important: Oracle Linux 9 Unbreakable Enterprise kernel security update
- ELSA-2026-50280 Important: Oracle Linux 8 Unbreakable Enterprise kernel security update
- ELSA-2026-50281 Important: Oracle Linux 8 Unbreakable Enterprise kernel security update
- ELSA-2026-19559 Important: Oracle Linux 8 libsndfile security update
- ELSA-2026-50281 Important: Oracle Linux 8 Unbreakable Enterprise kernel security update
- ELSA-2026-50281 Important: Oracle Linux 7 Unbreakable Enterprise kernel security update
- ELSA-2026-12114 Important: Oracle Linux 7 gdk-pixbuf2 security update
Red Hat Enterprise Linux
Red Hat recently issued multiple security advisories targeting RHEL versions seven through ten to address critical vulnerabilities in essential infrastructure packages. System administrators should prioritize these updates immediately since several patches carry Important or Critical ratings that could leave enterprise environments exposed. The comprehensive releases fix flaws across a wide variety of software including the Linux kernel, Glibc, web servers, and development tools like jq and Ruby. These coordinated updates span multiple enterprise tracks and deliver necessary protections for both core system libraries and external applications.
- RHSA-2026:18024: Important: PackageKit security update
- RHSA-2026:18040: Important: jq security update
- RHSA-2026:18059: Important: Red Hat JBoss Enterprise Application Platform 8.1.6 security update
- RHSA-2026:18048: Important: jq security update
- RHSA-2026:18044: Important: jq security update
- RHSA-2026:18046: Important: jq security update
- RHSA-2026:18045: Important: jq security update
- RHSA-2026:18028: Moderate: libpng security update
- RHSA-2026:18025: Important: kpatch-patch-5_14_0-570_17_1, kpatch-patch-5_14_0-570_39_1, kpatch-patch-5_14_0-570_66_1, and kpatch-patch-5_14_0-570_94_1 security update
- RHSA-2026:18030: Important: ruby:3.3 security update
- RHSA-2026:18029: Critical: nginx security update
- RHSA-2026:18063: Critical: nginx security update
- RHSA-2026:18065: Important: ruby security update
- RHSA-2026:18043: Important: jq security update
- RHSA-2026:18064: Moderate: libpng security update
- RHSA-2026:18053: Important: dovecot security update
- RHSA-2026:18031: Important: PackageKit security update
- RHSA-2026:18047: Important: jq security update
- RHSA-2026:18039: Important: ruby security update
- RHSA-2026:18054: Important: Red Hat JBoss Enterprise Application Platform 8.1.6 security update
- RHSA-2026:18055: Important: Red Hat JBoss Enterprise Application Platform 8.1.6 security update
- RHSA-2026:18042: Important: jq security update
- RHSA-2026:18041: Critical: nginx:1.24 security update
- RHSA-2026:18036: Important: PackageKit security update
- RHSA-2026:18032: Important: grafana security update
- RHSA-2026:18027: Important: grafana-pcp security update
- RHSA-2026:18344: Moderate: mingw-glib2 security update
- RHSA-2026:19061: Moderate: glibc security update
- RHSA-2026:18748: Moderate: libvirt security update
- RHSA-2026:18868: Important: linux-sgx security update
- RHSA-2026:18931: Moderate: unbound security update
- RHSA-2026:18786: Important: bind security update
- RHSA-2026:18824: Moderate: luksmeta security update
- RHSA-2026:18957: Moderate: python3.11 security update
- RHSA-2026:18772: Moderate: qemu-kvm security update
- RHSA-2026:19068: Moderate: systemd security update
- RHSA-2026:18916: Important: tomcat security update
- RHSA-2026:19067: Important: sudo security update
- RHSA-2026:18597: Low: NetworkManager security update
- RHSA-2026:19073: Important: vim security update
- RHSA-2026:19066: Moderate: openssl security update
- RHSA-2026:18958: Moderate: python3.12 security update
- RHSA-2026:19043: Moderate: corosync security update
- RHSA-2026:19069: Important: openssh security update
- RHSA-2026:18913: Important: containernetworking-plugins security update
- RHSA-2026:19064: Important: python3.12 security update
- RHSA-2026:19021: Moderate: galera and mariadb11.8 security update
- RHSA-2026:19053: Moderate: freeipmi security update
- RHSA-2026:19019: Important: python3.14 security update
- RHSA-2026:19010: Important: postgresql16 security update
- RHSA-2026:18587: Moderate: kernel security update
- RHSA-2026:19033: Important: freerdp security update
- RHSA-2026:19032: Important: buildah security update
- RHSA-2026:19009: Important: postgresql18 security update
- RHSA-2026:18722: Important: podman security update
- RHSA-2026:19034: Moderate: python-tornado security update
- RHSA-2026:19054: Important: tomcat security update
- RHSA-2026:19022: Important: golang security update
- RHSA-2026:19020: Moderate: crun security update
- RHSA-2026:19042: Low: python-jwcrypto security update
- RHSA-2026:19017: Important: podman security update
- RHSA-2026:19049: Important: golang-github-openprinting-ipp-usb security update
- RHSA-2026:18599: Moderate: p11-kit security update
- RHSA-2026:19013: Moderate: delve security update
- RHSA-2026:19024: Important: gstreamer1-plugins-bad-free, gstreamer1-plugins-base, gstreamer1-plugins-good, and gstreamer1-plugins-ugly-free security update
- RHSA-2026:19055: Important: rhc security update
- RHSA-2026:19027: Important: grafana security update
- RHSA-2026:19041: Important: firefox security update
- RHSA-2026:19026: Important: grafana-pcp security update
- RHSA-2026:19008: Important: pcs security update
- RHSA-2026:19031: Important: skopeo security update
- RHSA-2026:18683: Moderate: libssh security update
- RHSA-2026:18693: Moderate: python3.9 security update
- RHSA-2026:18465: Important: edk2 security update
- RHSA-2026:18139: Moderate: glibc security update
- RHSA-2026:18421: Moderate: luksmeta security update
- RHSA-2026:18705: Moderate: mingw-glib2 security update
- RHSA-2026:18289: Important: podman security update
- RHSA-2026:18537: Important: tomcat security update
- RHSA-2026:18479: Important: qemu-kvm security update
- RHSA-2026:18326: Moderate: libvirt security update
- RHSA-2026:18480: Important: linux-sgx security update
- RHSA-2026:18556: Moderate: unbound security update
- RHSA-2026:18320: Moderate: edk2 security update
- RHSA-2026:18160: Moderate: libssh security update
- RHSA-2026:18143: Moderate: p11-kit security update
- RHSA-2026:18142: Low: NetworkManager security update
- RHSA-2026:18134: Moderate: kernel security update
- RHSA-2026:18162: Moderate: iputils security update
- RHSA-2026:18536: Important: tomcat9 security update
- RHSA-2026:18153: Moderate: systemd security update
- RHSA-2026:19135: Important: opentelemetry-collector security update
- RHSA-2026:19139: Important: go-fdo-client security update
- RHSA-2026:19523: Moderate: glib2 security update
- RHSA-2026:19457: Moderate: glib2 security update
- RHSA-2026:19458: Important: libcap security update
- RHSA-2026:19521: Important: kernel security update
- RHSA-2026:19475: Important: osbuild-composer security update
- RHSA-2026:19462: Important: thunderbird security update
- RHSA-2026:19464: Important: firefox security update
- RHSA-2026:19466: Important: thunderbird security update
- RHSA-2026:19467: Important: thunderbird security update
- RHSA-2026:19468: Important: thunderbird security update
- RHSA-2026:19460: Moderate: glib2 security update
- RHSA-2026:19452: Moderate: glib2 security update
- RHSA-2026:19456: Important: libcap security update
- RHSA-2026:19454: Important: PackageKit security update
- RHSA-2026:19465: Important: thunderbird security update
- RHSA-2026:19455: Important: dovecot security update
- RHSA-2026:19453: Important: dovecot security update
- RHSA-2026:19459: Moderate: glib2 security update
- RHSA-2026:19450: Important: yggdrasil security update
- RHSA-2026:19365: Important: jq security update
- RHSA-2026:19361: Moderate: glib2 security update
- RHSA-2026:19357: Important: krb5 security update
- RHSA-2026:19346: Important: libcap security update
- RHSA-2026:19368: Important: rsync security update
- RHSA-2026:19366: Important: python-markdown security update
- RHSA-2026:19363: Important: libtiff security update
- RHSA-2026:19374: Critical: nginx security update
- RHSA-2026:19355: Important: fence-agents security update
- RHSA-2026:19372: Critical: nginx:1.26 security update
- RHSA-2026:19342: Important: tigervnc security update
- RHSA-2026:19352: Important: grafana security update
- RHSA-2026:19371: Critical: nginx:1.24 security update
- RHSA-2026:19349: Important: freerdp security update
- RHSA-2026:19367: Important: giflib update
- RHSA-2026:19364: Important: dovecot security update
- RHSA-2026:19354: Important: PackageKit security update
- RHSA-2026:19343: Important: xorg-x11-server security update
- RHSA-2026:19358: Moderate: freerdp security update
- RHSA-2026:19348: Important: thunderbird security update
- RHSA-2026:19351: Important: grafana-pcp security update
- RHSA-2026:19344: Important: xorg-x11-server-Xwayland security update
- RHSA-2026:19359: Important: openexr security update
- RHSA-2026:19373: Important: dnsmasq security update
- RHSA-2026:19369: Important: rhc security update
- RHSA-2026:19345: Important: LibRaw security update
- RHSA-2026:19370: Important: firefox security update
- RHSA-2026:19356: Moderate: libsoup security update
- RHSA-2026:19350: Important: git-lfs security update
- RHSA-2026:19362: Important: gimp security update
- RHSA-2026:19353: Important: opentelemetry-collector security update
- RHSA-2026:19225: Important: kernel security update
- RHSA-2026:19216: Important: python3.9 security update
- RHSA-2026:19213: Moderate: systemd security update
- RHSA-2026:19218: Moderate: openssl security update
- RHSA-2026:19220: Important: sudo security update
- RHSA-2026:19219: Important: openssh security update
- RHSA-2026:19224: Important: vim security update
- RHSA-2026:19182: Moderate: mariadb:11.8 security update
- RHSA-2026:19208: Moderate: freeipmi security update
- RHSA-2026:19210: Important: gdk-pixbuf2 security update
- RHSA-2026:19176: Important: python3.14 security update
- RHSA-2026:19187: Moderate: compat-openssl11 security update
- RHSA-2026:19177: Important: python3.12 security update
- RHSA-2026:19181: Important: golang security update
- RHSA-2026:19167: Important: pcs security update
- RHSA-2026:19184: Important: grafana-pcp security update
- RHSA-2026:19185: Important: grafana security update
- RHSA-2026:19200: Moderate: corosync security update
- RHSA-2026:19173: Important: podman security update
- RHSA-2026:19186: Important: buildah security update
- RHSA-2026:19189: Moderate: python-tornado security update
- RHSA-2026:19175: Important: python3.11 security update
- RHSA-2026:19197: Low: python-jwcrypto security update
- RHSA-2026:19180: Important: gstreamer1-plugins-bad-free, gstreamer1-plugins-base, gstreamer1-plugins-good, and gstreamer1-plugins-ugly-free security update
- RHSA-2026:19207: Important: rhc security update
- RHSA-2026:19206: Important: webkit2gtk3 security update
- RHSA-2026:19178: Moderate: crun security update
- RHSA-2026:19201: Important: firefox security update
- RHSA-2026:19148: Moderate: glib2 security update
- RHSA-2026:19145: Important: krb5 security update
- RHSA-2026:19155: Important: python-markdown security update
- RHSA-2026:19130: Important: libcap security update
- RHSA-2026:19152: Important: rsync security update
- RHSA-2026:19151: Important: jq security update
- RHSA-2026:19150: Important: libtiff security update
- RHSA-2026:19154: Important: giflib security update
- RHSA-2026:19127: Important: gdk-pixbuf2 security update
- RHSA-2026:19153: Important: thunderbird security update
- RHSA-2026:19138: Important: fence-agents security update
- RHSA-2026:19142: Moderate: freerdp security update
- RHSA-2026:19146: Important: openexr security update
- RHSA-2026:19159: Critical: nginx security update
- RHSA-2026:19132: Important: rhc-worker-playbook security update
- RHSA-2026:19133: Important: git-lfs security update
- RHSA-2026:19144: Important: golang-github-openprinting-ipp-usb security update
- RHSA-2026:19149: Important: dovecot security update
- RHSA-2026:19141: Important: PackageKit security update
- RHSA-2026:19126: Important: yggdrasil security update
- RHSA-2026:19125: Important: xorg-x11-server-Xwayland security update
- RHSA-2026:19143: Moderate: libsoup3 security update
- RHSA-2026:19134: Important: grafana security update
- RHSA-2026:19158: Important: dnsmasq security update
- RHSA-2026:19128: Important: yggdrasil-worker-package-manager security update
- RHSA-2026:19157: Important: firefox security update
- RHSA-2026:19160: Important: firefox security update
- RHSA-2026:19156: Important: rhc security update
- RHSA-2026:19136: Important: grafana-pcp security update
- RHSA-2026:19131: Important: thunderbird security update
- RHSA-2026:19137: Important: go-fdo-server security update
- RHSA-2026:19074: Important: kernel security update
- RHSA-2026:19540: Important: kernel security update
- RHSA-2026:19839: Important: grafana-pcp security update
- RHSA-2026:19875: Important: kernel-rt security update
- RHSA-2026:19835: Critical: Red Hat Build of Apache Camel 4.14 for Quarkus 3.27 update is now available (RHBQ 3.27.3.SP2)
- RHSA-2026:19811: Moderate: freerdp security update
- RHSA-2026:19750: Important: osbuild-composer security update
- RHSA-2026:19722: Important: git-lfs security update
- RHSA-2026:19720: Important: opentelemetry-collector security update
- RHSA-2026:19721: Important: opentelemetry-collector security update
- RHSA-2026:19719: Important: opentelemetry-collector security update
- RHSA-2026:19715: Important: git-lfs security update
- RHSA-2026:19714: Important: rhc-worker-playbook security update
- RHSA-2026:19711: Important: kernel-rt security update
- RHSA-2026:19705: Important: kernel security update
- RHSA-2026:19704: Important: firefox security update
- RHSA-2026:19702: Important: libtiff security update
- RHSA-2026:19568: Important: kernel security update
- RHSA-2026:17595: Important: OpenShift Container Platform 4.17.54 packages and security update
- RHSA-2026:19666: Important: kernel security update
- RHSA-2026:17596: Important: OpenShift Container Platform 4.17.54 bug fix and security update
- RHSA-2026:19659: Important: libtiff security update
- RHSA-2026:19610: Important: libsndfile security update
- RHSA-2026:19664: Important: kernel-rt security update
- RHSA-2026:19655: Important: firefox security update
- RHSA-2026:19569: Important: kernel security update
- RHSA-2026:19098: Important: Red Hat build of Quarkus 3.27.3.SP2 security update
- RHSA-2026:19604: Important: libtiff security update
- RHSA-2026:19589: Important: python security update
- RHSA-2026:19590: Important: python3 security update
- RHSA-2026:19588: Important: firefox security update
- RHSA-2026:19574: Important: kpatch-patch-4_18_0-553_109_1, kpatch-patch-4_18_0-553_40_1, kpatch-patch-4_18_0-553_53_1, kpatch-patch-4_18_0-553_72_1, and kpatch-patch-4_18_0-553_85_1 secu ...
- RHSA-2026:19576: Important: python3.9 security update
- RHSA-2026:19596: Important: Red Hat build of Keycloak 26.4.12 Security Update
- RHSA-2026:19595: Important: Red Hat build of Keycloak 26.2.16 Images Security Update
- RHSA-2026:19575: Important: kpatch-patch-5_14_0-70_124_1, kpatch-patch-5_14_0-70_132_1, kpatch-patch-5_14_0-70_144_1, kpatch-patch-5_14_0-70_155_1, and kpatch-patch-5_14_0-70_167_1 secur ...
- RHSA-2026:19657: Important: libtiff security update
- RHSA-2026:19634: Important: container-tools:rhel8 security update
- RHSA-2026:18068: Important: Red Hat build of MicroShift 4.18.42 security update
- RHSA-2026:19609: Important: libtiff security update
- RHSA-2026:19608: Important: libtiff security update
- RHSA-2026:19601: Important: PackageKit security update
- RHSA-2026:17446: Important: OpenShift Container Platform 4.18.42 packages and security update
- RHSA-2026:19585: Important: libtiff security update
- RHSA-2026:19586: Important: libtiff security update
- RHSA-2026:19597: Important: Red Hat build of Keycloak 26.4.12 Images Security Update
- RHSA-2026:19594: Important: Red Hat build of Keycloak 26.2.16 Security Update
- RHSA-2026:19587: Important: openexr security update
- RHSA-2026:19577: Important: kpatch-patch-5_14_0-427_100_1, kpatch-patch-5_14_0-427_113_1, kpatch-patch-5_14_0-427_55_1, kpatch-patch-5_14_0-427_68_2, and kpatch-patch-5_14_0-427_84_1 sec ...
- RHSA-2026:19573: Important: kpatch-patch-5_14_0-284_104_1, kpatch-patch-5_14_0-284_117_1, kpatch-patch-5_14_0-284_134_1, kpatch-patch-5_14_0-284_148_1, and kpatch-patch-5_14_0-284_158_1 ...
- RHSA-2026:19572: Important: kpatch-patch-4_18_0-477_107_1, kpatch-patch-4_18_0-477_120_1, kpatch-patch-4_18_0-477_130_1, kpatch-patch-4_18_0-477_89_1, and kpatch-patch-4_18_0-477_97_1 se ...
- RHSA-2026:19570: Important: python3.9 security update
- RHSA-2026:19567: Moderate: glib2 security update
- RHSA-2026:19566: Moderate: glib2 security update
- RHSA-2026:19565: Moderate: glib2 security update
- RHSA-2026:19549: Important: python3 security update
- RHSA-2026:19550: Important: golang-github-openprinting-ipp-usb security update
- RHSA-2026:19542: Important: firefox security update
- RHSA-2026:19535: Important: webkit2gtk3 security update
- RHSA-2026:19524: Moderate: glib2 security update
- RHSA-2026:19469: Important: thunderbird security update
- RHSA-2026:19463: Important: thunderbird security update
- RHSA-2026:19461: Important: thunderbird security update
- RHSA-2026:19564: Important: kpatch-patch-4_18_0-372_137_1, kpatch-patch-4_18_0-372_145_1, kpatch-patch-4_18_0-372_158_1, kpatch-patch-4_18_0-372_170_1, and kpatch-patch-4_18_0-372_181_1 ...
- RHSA-2026:19571: Important: python3.9 security update
- RHSA-2026:19559: Important: libsndfile security update
- RHSA-2026:19560: Important: libsndfile security update
- RHSA-2026:20051: Important: kernel security update
- RHSA-2026:20130: Important: kernel security update
- RHSA-2026:20054: Important: kernel security update
- RHSA-2026:20299: Important: kernel security update
- RHSA-2026:20129: Important: kernel security update
Rocky Linux
Rocky Linux administrators must quickly deploy a series of security patches across versions eight, nine, and ten to close several critical vulnerabilities. The most urgent fixes target essential services like Nginx and Ruby, while other important updates address the main kernel, Firefox browser, and various supporting libraries such as LibPNG and OpenEXR. PackageKit and Cockpit also received necessary corrections to prevent potential system exploitation, though some advisories only carry moderate severity ratings. IT teams should review the attached CVSS scores immediately to prioritize which servers require overnight maintenance versus standard patching windows.
- RLSA-2026:18030: Important: ruby:3.3 security update
- RLSA-2026:18041: Critical: nginx:1.24 security update
- RLSA-2026:18064: Moderate: libpng security update
- RLSA-2026:18063: Critical: nginx security update
- RLSA-2026:18065: Important: ruby security update
- RLSA-2026:18039: Important: ruby security update
- RLSA-2026:18028: Moderate: libpng security update
- RLSA-2026:18030: Important: ruby:3.3 security update
- RLSA-2026:19184: Important: grafana-pcp security update
- RLSA-2026:19346: Important: libcap security update
- RLSA-2026:19345: Important: LibRaw security update
- RLSA-2026:19185: Important: grafana security update
- RLSA-2026:19208: Moderate: freeipmi security update
- RLSA-2026:19201: Important: firefox security update
- RLSA-2026:19178: Moderate: crun security update
- RLSA-2026:19210: Important: gdk-pixbuf2 security update
- RLSA-2026:19354: Important: PackageKit security update
- RLSA-2026:19359: Important: openexr security update
- RXSA-2026:3488: Moderate: kernel security update
- RXSA-2025:4341: Important: kernel security update
- RXSA-2026:13565: Important: kernel security update
- RXSA-2026:13577: Important: kernel security update
- RLSA-2026:4649: Moderate: grub2 security update
- RLSA-2026:13643: Important: osbuild-composer security update
- RLSA-2026:9693: Important: java-25-openjdk security update
- RLSA-2026:13642: Important: image-builder security update
- RLSA-2026:4162: Moderate: mysql8.4 security update
- RLSA-2026:3840: Important: image-builder security update
- RLSA-2026:6463: Important: openssh security update
- RLSA-2026:13380: Important: openssh security update
- RLSA-2026:1838: Moderate: image-builder security update
- RLSA-2026:13651: Moderate: systemd security update
- RLSA-2026:1837: Moderate: osbuild-composer security update
- RLSA-2025:20126: Moderate: openssh security update
- RLSA-2025:21015: Moderate: vim security update
- RLSA-2025:23479: Moderate: openssh security update
- RLSA-2026:3752: Important: osbuild-composer security update
- RLSA-2026:7383: Critical: cockpit: Unauthenticated remote code execution due to SSH command-line argument injection
- RLSA-2026:19664: Important: kernel-rt security update
- RLSA-2026:19588: Important: firefox security update
- RLSA-2026:19666: Important: kernel security update
Slackware Linux
The Slackware Linux Security Team just released urgent patches for Thunderbird, Firefox, and haveged across version 15.0 and its development branch. These updates close several security gaps that could leave systems exposed to unauthorized access. Server administrators must also install the newly issued fixes for bind and rsync right away. That second batch tackles severe flaws including local privilege escalation, memory disclosure, unbounded recursion loops, and dangerous symlink race conditions.
- mozilla-thunderbird (SSA:2026-139-03)
- mozilla-firefox (SSA:2026-139-02)
- haveged (SSA:2026-139-01)
- bind (SSA:2026-141-01)
- rsync (SSA:2026-141-02)
SUSE Linux
SUSE and openSUSE have rolled out a series of urgent security patches across their Linux distributions to fix critical vulnerabilities in widely used software. The updates target dozens of high-risk flaws in essential packages like the Linux kernel, Apache, Chromium, PHP, OpenSSH, and ImageMagick. Attackers could potentially exploit these weaknesses to execute remote code, crash systems, or steal sensitive data without proper protection. System administrators should prioritize installing these releases right away to keep their environments secure.
- openSUSE-SU-2026:10793-1: moderate: kernel-devel-7.0.7-1.1 on GA media
- openSUSE-SU-2026:10784-1: moderate: apache-commons-configuration2-2.15.0-1.1 on GA media
- openSUSE-SU-2026:10792-1: moderate: java-25-openj9-25.0.3.0-2.1 on GA media
- openSUSE-SU-2026:10789-1: moderate: java-17-openj9-17.0.19.0-2.1 on GA media
- openSUSE-SU-2026:10788-1: moderate: java-11-openj9-11.0.31.0-2.1 on GA media
- openSUSE-SU-2026:10785-1: moderate: apache2-2.4.67-1.1 on GA media
- openSUSE-SU-2026:10790-1: moderate: java-1_8_0-openj9-1.8.0.492-2.1 on GA media
- openSUSE-SU-2026:10786-1: moderate: chromedriver-148.0.7778.167-2.1 on GA media
- openSUSE-SU-2026:10787-1: moderate: expat-2.8.1-1.1 on GA media
- openSUSE-SU-2026:10791-1: moderate: java-21-openj9-21.0.11.0-2.1 on GA media
- SUSE-SU-2026:1967-1: important: Security update for tiff
- SUSE-SU-2026:1970-1: important: Security update for php-composer2
- SUSE-SU-2026:1960-1: important: Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise 15 SP7)
- SUSE-SU-2026:1876-1: important: Security update for openssh
- SUSE-SU-2026:1885-1: important: Security update for the Linux Kernel (Live Patch 72 for SUSE Linux Enterprise 12 SP5)
- SUSE-SU-2026:1878-1: important: Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise 15 SP6)
- SUSE-SU-2026:1899-1: important: Security update for the Linux Kernel
- SUSE-SU-2026:1875-1: important: Security update for the Linux Kernel (Live Patch 28 for SUSE Linux Enterprise 15 SP5)
- SUSE-SU-2026:1877-1: important: Security update for the Linux Kernel (Live Patch 35 for SUSE Linux Enterprise 15 SP5)
- SUSE-SU-2026:1880-1: important: Security update for the Linux Kernel (Live Patch 67 for SUSE Linux Enterprise 12 SP5)
- SUSE-SU-2026:1896-1: important: Security update for the Linux Kernel (Live Patch 5 for SUSE Linux Enterprise 15 SP7)
- SUSE-SU-2026:1908-1: important: Security update for the Linux Kernel
- SUSE-SU-2026:1905-1: important: Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise 15 SP7)
- SUSE-SU-2026:1909-1: important: Security update for the Linux Kernel
- SUSE-SU-2026:1907-1: important: Security update for the Linux Kernel
- SUSE-SU-2026:1906-1: important: Security update for the Linux Kernel (Live Patch 40 for SUSE Linux Enterprise 15 SP4)
- openSUSE-SU-2026:10796-1: moderate: nginx-1.31.0-1.1 on GA media
- openSUSE-SU-2026:10798-1: moderate: python311-urllib3-2.7.0-1.1 on GA media
- openSUSE-SU-2026:10800-1: moderate: xen-4.21.1_06-1.1 on GA media
- openSUSE-SU-2026:0169-1: important: Security update for cacti
- SUSE-SU-2026:1939-1: important: Security update for PackageKit
- SUSE-SU-2026:1934-1: important: Security update for dnsmasq
- SUSE-SU-2026:1931-1: important: Security update for podman
- SUSE-SU-2026:1933-1: moderate: Security update for xen
- SUSE-SU-2026:1940-1: important: Security update for curl
- SUSE-SU-2026:1943-1: important: Security update for postgresql17
- SUSE-SU-2026:1941-1: moderate: Security update for sed
- SUSE-SU-2026:1948-1: important: Security update for cups-filters
- SUSE-SU-2026:1947-1: important: Security update for python310
- SUSE-SU-2026:1944-1: important: Security update for postgresql18
- SUSE-SU-2026:1950-1: important: Security update for valkey
- SUSE-SU-2026:1956-1: important: Security update for mozjs78
- SUSE-SU-2026:1953-1: important: Security update for nginx
- SUSE-SU-2026:1917-1: important: Security update for the Linux Kernel (Live Patch 74 for SUSE Linux Enterprise 12 SP5)
- SUSE-SU-2026:1994-1: important: Security update for the Linux Kernel (Live Patch 69 for SUSE Linux Enterprise 12 SP5)
- SUSE-SU-2026:1980-1: important: Security update for cloud-init
- SUSE-SU-2026:1957-1: critical: Security update for php8
- SUSE-SU-2026:1962-1: moderate: Security update for util-linux
- SUSE-SU-2026:1961-1: important: Security update for python-python-multipart
- SUSE-SU-2026:1964-1: important: Security update for rmt-server
- SUSE-SU-2026:1997-1: important: Security update for the Linux Kernel (Live Patch 31 for SUSE Linux Enterprise 15 SP5)
- openSUSE-SU-2026:20762-1: important: Security update for go1.26
- openSUSE-SU-2026:20763-1: important: Security update for go1.25
- openSUSE-SU-2026:20764-1: important: Security update for glibc
- openSUSE-SU-2026:20759-1: moderate: Security update for emacs
- openSUSE-SU-2026:20753-1: important: Security update for agama
- openSUSE-SU-2026:20761-1: important: Security update for google-guest-agent
- openSUSE-SU-2026:20758-1: important: Security update for the Linux Kernel
- openSUSE-SU-2026:20757-1: important: Security update for openssh
- openSUSE-SU-2026:20750-1: moderate: Security update for ibus-rime, librime
- openSUSE-SU-2026:20755-1: important: Security update for openexr
- openSUSE-SU-2026:20754-1: important: Security update for rsync
- openSUSE-SU-2026:20752-1: important: Security update for alloy
- openSUSE-SU-2026:20749-1: important: Security update for tree-sitter
- openSUSE-SU-2026:20745-1: critical: Security update for php8
- openSUSE-SU-2026:20747-1: important: Security update for ImageMagick
- openSUSE-SU-2026:20743-1: important: Security update for the Linux Kernel
- openSUSE-SU-2026:20742-1: moderate: Security update for ongres-scram, ongres-stringprep, plexus-testing, maven, maven-doxia, mojo-parent, sisu
- openSUSE-SU-2026:20737-1: moderate: Security update for python-lxml
- openSUSE-SU-2026:20748-1: important: Security update for dnsmasq
- openSUSE-SU-2026:20741-1: moderate: Security update for MozillaFirefox
- openSUSE-SU-2026:10805-1: moderate: perl-HTTP-Tiny-0.094-1.1 on GA media
- openSUSE-SU-2026:10808-1: moderate: postgresql16-16.14-1.1 on GA media
- openSUSE-SU-2026:10806-1: moderate: postgresql14-14.23-1.1 on GA media
- openSUSE-SU-2026:10810-1: moderate: traefik-3.6.17-1.1 on GA media
- openSUSE-SU-2026:10804-1: moderate: openssh-10.3p1-4.1 on GA media
- SUSE-SU-2026:1999-1: important: Security update for postgresql15
- SUSE-SU-2026:2003-1: moderate: Security update for GraphicsMagick
- SUSE-SU-2026:2001-1: important: Security update for postgresql16
- SUSE-SU-2026:2004-1: important: Security update for python-Pillow
- SUSE-SU-2026:2008-1: important: Security update for haveged
- SUSE-SU-2026:2010-1: important: Security update for erlang26
- SUSE-SU-2026:2009-1: important: Security update for haveged
- openSUSE-SU-2026:0171-1: important: Security update for git-bug
- openSUSE-SU-2026:0170-1: important: Security update for perl-CryptX
- SUSE-SU-2026:2020-1: important: Security update for ImageMagick
- SUSE-SU-2026:2022-1: important: Security update for ImageMagick
- SUSE-SU-2026:2024-1: important: Security update for openssh
- SUSE-SU-2026:2030-1: important: Security update for buildah
- SUSE-SU-2026:2029-1: moderate: Security update for vim
- SUSE-SU-2026:2032-1: important: Security update for distribution
- SUSE-SU-2026:2028-1: important: Security update for postgresql-jdbc
- SUSE-SU-2026:2034-1: important: Security update for buildah
- openSUSE-SU-2026:10812-1: moderate: distribution-registry-3.1.1-1.1 on GA media
- openSUSE-SU-2026:10816-1: moderate: libpainter0-0.9.27-2.1 on GA media
- openSUSE-SU-2026:10815-1: moderate: libsdb2_4_2-6.1.4-2.1 on GA media
- openSUSE-SU-2026:10814-1: moderate: helm-4.2.0-1.1 on GA media
- openSUSE-SU-2026:10813-1: moderate: firefox-esr-140.11.0-1.1 on GA media
- openSUSE-SU-2026:0174-1: important: Security update for cpp-httplib
- SUSE-SU-2026:2038-1: important: Security update for rsync
- SUSE-SU-2026:2037-1: critical: Security update for php8
- openSUSE-SU-2026:20769-1: important: Security update for mozjs115
- openSUSE-SU-2026:10821-1: moderate: dnsmasq-2.92rel2-1.1 on GA media
- openSUSE-SU-2026:10817-1: moderate: GraphicsMagick-1.3.46-7.1 on GA media
- openSUSE-SU-2026:0175-1: critical: Security update for chromium
- SUSE-SU-2026:2043-1: important: Security update for rekor
- SUSE-SU-2026:2044-1: important: Security update for rootlesskit
- openSUSE-SU-2026:10828-1: moderate: libecpg6-18.4-1.1 on GA media
- openSUSE-SU-2026:10827-1: moderate: oci-cli-3.83.0-1.1 on GA media
- openSUSE-SU-2026:0176-1: important: Security update for cockpit
- openSUSE-SU-2026:20775-1: critical: Security update for chromium
- openSUSE-SU-2026:10837-1: moderate: python311-impacket-0.13.1-1.1 on GA media
Ubuntu Linux
Ubuntu recently released multiple batches of security updates to address critical vulnerabilities across its operating system. These patches focus heavily on the Linux kernel while also fixing flaws in widely used tools like databases, DNS resolvers, and media frameworks. The notices close dangerous loopholes that could otherwise allow attackers to crash services or execute malicious code on affected machines. Coverage extends beyond standard desktop releases to include specialized kernels built for major cloud providers and enterprise hardware configurations.
- [USN-8273-1] Linux kernel vulnerabilities
- [USN-8275-1] Linux kernel (Xilinx ZynqMP) vulnerabilities
- [USN-8255-3] Linux kernel vulnerabilities
- [USN-8254-3] Linux kernel (NVIDIA Tegra) vulnerabilities
- [USN-8274-1] Linux kernel vulnerabilities
- [USN-8280-1] Linux kernel vulnerabilities
- [USN-8279-1] Linux kernel vulnerabilities
- [USN-8281-1] Linux kernel vulnerabilities
- [USN-8277-1] Linux kernel vulnerabilities
- [USN-8278-1] Linux kernel vulnerabilities
- [USN-8276-1] Highlight.js vulnerability
- [USN-8272-1] Smarty vulnerability
- [USN-8285-1] GStreamer Good Plugins vulnerability
- [USN-8282-1] Unbound vulnerabilities
- [USN-8284-1] GnuTLS vulnerabilities
- [USN-8286-1] OpenVPN vulnerabilities
- [USN-8283-1] rsync vulnerabilities
- [USN-8289-1] Linux kernel (NVIDIA) vulnerabilities
- [USN-8202-3] jq regression
- [USN-8291-1] Linux kernel (Intel IoTG Real-time) vulnerabilities
- [USN-8288-1] Bubblewrap vulnerability
- [USN-8287-1] XDG Desktop Portal vulnerability
- [USN-8294-1] PostgreSQL vulnerabilities
- [USN-8293-1] Bind vulnerabilities
- [USN-8292-1] libarchive vulnerabilities
- [USN-8296-1] Linux kernel (FIPS) vulnerabilities
- [USN-8277-2] Linux kernel (Oracle) vulnerabilities
- [USN-8291-2] Linux kernel (Low Latency) vulnerabilities
- [USN-8295-1] Evince vulnerability
- [USN-8290-1] Path-to-Regexp vulnerability
- [USN-8279-2] Linux kernel (GCP) vulnerabilities
- [USN-8281-2] Linux kernel (Azure) vulnerabilities
- [USN-8297-1] Linux kernel (GCP) vulnerabilities
- [USN-8280-2] Linux kernel (Azure)vulnerabilities
How to apply these Linux security updates safely
Before running any update commands, check which services are currently active on your system. If Nginx or Apache is handling live traffic, schedule a brief maintenance window or use rolling restarts to minimize downtime during the patching process. Desktop users can usually apply these fixes by opening a terminal and running the standard package manager command for their distribution followed by an upgrade flag. A reboot will be necessary if the kernel received updates to ensure the new security modules load correctly.
Power users who rely on command-line tools like jq should verify the patch level after installation. Regression bugs can occasionally break scripts that depend on specific JSON parsing behavior, so a quick test run is worth the few minutes it takes. If you use PackageKit or other GUI package managers and prefer to skip them because they sometimes hang or try to install junk, do not let that stop you from running the command-line equivalent to get these critical patches applied.
Applying these patches requires distribution-specific package management commands. RHEL-based systems typically use dnf update or yum update, while Debian and Ubuntu rely on apt upgrade. SUSE users should run zypper patch to properly address all security advisories, and Slackware administrators can manage updates with upgradepkg or slackpkg. After executing the commands, a reboot is usually necessary for kernel changes to take effect. Finally, review your package manager’s logs to verify that all patches installed successfully and no dependencies were disrupted.
Debian/Ubuntu (apt)
The first thing to do is refresh the local package index; running sudo apt update contacts all configured repositories and pulls in the newest lists of available versions. Skipping this step leaves the system blind to any recent uploads, which explains why “upgrade” sometimes claims there’s nothing to do even after a security advisory has been published. Once the index is current, invoke sudo apt upgrade -y; the -y flag answers every prompt automatically so the process doesn’t pause for user input. This command upgrades all installed packages that have newer versions in the repositories while preserving configuration files.
sudo apt update sudo apt upgrade -y
Fedora/RedHat/Rocky/Alma/Oracle (dnf or yum)
On modern Fedora and recent Red Hat derivatives, dnf is the package manager; older RHEL releases still rely on yum. Begin with a check‑update operation—sudo dnf check-update or sudo yum check-update—to see exactly which packages are awaiting an upgrade. This preview step can be useful for spotting unexpected kernel bumps before they land. To actually apply the updates, run sudo dnf upgrade -y (or sudo yum update if you prefer the older tool). The upgrade command pulls down the new binaries and runs any necessary post‑install scripts, such as rebuilding initramfs when a kernel changes.
sudo dnf check-update sudo dnf upgrade -y
or on older releases
sudo yum check-update sudo yum update
SUSE (zypper)
SUSE’s command line front‑end is called zypper. First execute sudo zypper refresh so that the metadata for all enabled repos gets updated; without this, zypper will happily report “No updates available” even though newer packages sit on the mirror. After a fresh refresh, issue sudo zypper update -y; this upgrades every package to the latest version in the configured repositories and automatically handles service restarts when required.
sudo zypper refresh sudo zypper update -y
Slackware (slackpkg and pkgtool)
Slackware doesn’t have a single unified updater, but the official way to pull updates is through slackpkg. Start with sudo slackpkg update to download the newest package list from the chosen mirror. Then run sudo slackpkg upgrade-all; this command walks through each installed package and replaces it with the most recent build available in the official repository. For users who prefer a more granular approach, specifying a package name after upgrade limits the operation to that single item. When dealing with community‑maintained repositories, pkgtool takes over: a combined sudo pkgtool update && sudo pkgtool upgrade will sync and apply updates from the mirrors listed in /etc/slackpkg/mirrors.
sudo slackpkg update sudo slackpkg upgrade-all
Get those updates running and check your logs tomorrow morning. It is much easier to apply patches proactively than to troubleshoot a compromised server after an incident report lands in your inbox. Stay safe out there.