Security 10953 Published by

This week’s security roundup delivers critical patches across every major Linux distribution, with Nginx, Ruby, OpenSSH, and the core kernel taking the hardest hits. Several advisories flag unauthenticated remote code execution flaws in management interfaces like Cockpit, alongside privilege escalation risks in bind and rsync that could hand attackers full system control without a password. Desktop users running Ubuntu or Slackware also need to grab updates for Firefox, Thunderbird, and specialized cloud kernels before those vulnerabilities get weaponized by automated scanners. Administrators should run their standard package manager commands immediately, schedule a quick reboot if the kernel changed, and verify critical services afterward to catch any unexpected regressions.





Critical Linux Security Updates Hit Nginx, Ruby, and Kernels Across All Major Distros

A fresh wave of Linux security updates has landed across all major distributions this week. This roundup covers critical patches for AlmaLinux, Debian, Fedora, Oracle Linux, RHEL, Rocky Linux, Slackware, SUSE, and Ubuntu. The fixes address dangerous vulnerabilities in Nginx, Ruby, the core kernel, and several web stack components that could allow attackers to execute unauthorized code or steal elevated privileges. System administrators and desktop users should apply these updates immediately to close known exploitation paths before malicious actors can take advantage of them.

What is broken in this week's Linux security updates?

Nginx is getting hammered with critical fixes across almost every distribution, so if you serve web traffic, this is priority number one. Ruby also received important and critical patches that could let attackers run arbitrary code on affected machines. The kernel updates are standard but necessary, with Fedora specifically noting memory corruption errors that need squashing.

Network admins have seen the consequences of leaving management interfaces exposed when a critical unauthenticated remote code execution vulnerability appears in tools like Cockpit. A single SSH command-line argument injection flaw can hand an attacker full control over the server without any credentials. It is common to see sysadmins expose port 9090 on public IPs thinking it is safe because it is just for internal management, and that mistake just got a lot more expensive with this week's Rocky Linux advisory.

Slackware users need to grab updates for bind and rsync immediately. Those packages contain severe flaws including local privilege escalation, memory disclosure, unbounded recursion loops, and dangerous symlink race conditions. If you run any DNS services or rely on rsync for backups, ignoring these patches is asking for trouble.

Distro-specific patch details and recommendations

AlmaLinux users running versions eight through ten need to install patches for the kernel, Nginx, Ruby, and libpng right away. These updates fix loopholes that could allow unauthorized code execution or privilege escalation. Run your standard package manager update command as soon as possible to get these fixes in place.

Debian is pushing urgent updates for a massive list of packages including PHP, Redis, OpenSSH, Firefox ESR, Chromium, Apache, and BIND. The breadth of this release means almost every service on a typical Debian server needs attention. Prioritize the critical advisories for OpenSSH and Nginx to prevent remote exploitation attempts.

Fedora distributions four through four are receiving a huge batch of fixes targeting Rust libraries, MySQL, Chromium, and the kernel. Attackers could exploit injection attacks and broken cryptographic routines in these unpatched versions. Fedora users should apply these releases immediately to keep systems secure against remote exploitation attempts.

Oracle Linux versions seven through ten cover similar ground with critical updates for Ruby, Nginx, rsync, BIND, giflib, and the kernel. The advisories span both x86_64 and aarch64 architectures. IT teams managing Oracle infrastructure should prioritize installing these fixes to protect enterprise environments from serious risks.

Red Hat Enterprise Linux users must prioritize advisories covering Glibc, jq, Ruby, PackageKit, and multiple kernel variants. Several patches carry Important or Critical ratings that could leave enterprise environments exposed. The comprehensive releases fix flaws across web servers and development tools like jq, so verify your JSON parsing scripts after updating to catch any potential regressions.

Rocky Linux mirrors many of these fixes while also flagging a critical Cockpit vulnerability due to an SSH command-line argument injection. PackageKit and Cockpit received necessary corrections to prevent system exploitation. Review the CVSS scores in the advisories to prioritize which servers require overnight maintenance versus standard patching windows.

Slackware requires immediate attention for Thunderbird, Firefox, haveged, bind, and rsync packages across version 15.0 and its development branch. The bind and rsync fixes tackle severe flaws including local privilege escalation and symlink race conditions. Install these patches right away to close security gaps that could leave systems exposed to unauthorized access.

SUSE and openSUSE are addressing flaws in PHP8, ImageMagick, Chromium, OpenSSH, Apache, and the kernel alongside standard updates. Attackers could potentially exploit these weaknesses to execute remote code or steal sensitive data. SUSE users should also check for live patch availability if they cannot afford downtime during the maintenance window.

Ubuntu is distributing patches for specialized kernels including NVIDIA Tegra, Xilinx ZynqMP, Intel IoTG Real-time, Oracle, Low Latency, FIPS, and GCP variants along with desktop tools. The updates cover GStreamer, Unbound, GnuTLS, OpenVPN, jq, Bubblewrap, XDG Desktop Portal, PostgreSQL, BIND, libarchive, Evince, and Path-to-Regexp. Ubuntu users should apply these fixes to protect both standard releases and specialized cloud or hardware configurations.

Tuxrepair

Latest Security Patches by Distribution

Here’s a complete breakdown of recent security updates:

AlmaLinux

AlmaLinux recently pushed out a batch of critical security patches for versions eight through ten of its operating system. These updates fix dangerous loopholes in essential software like the Linux kernel, Nginx, Ruby, and libpng. Malicious actors could use these specific flaws to execute unauthorized code or steal elevated privileges on affected machines. System administrators should install the updates right away to keep their networks secure.

Debian GNU/Linux

Debian has rolled out urgent security patches for a long list of widely used software packages. The latest advisories cover critical updates for PHP, Redis, OpenSSH, Nginx, Apache, Firefox ESR, and Chromium among many others. These fixes address dangerous vulnerabilities that could let attackers escalate privileges, leak sensitive information, or run malicious code on your systems. You should install these updates immediately to stop serious breaches before they happen.

Fedora Linux

Fedora Linux versions 42 through 44 are receiving a massive batch of critical security patches designed to close dozens of dangerous software vulnerabilities. These updates hit nearly every major system component, including the Linux kernel, Chromium browser, Rust libraries, MySQL databases, and essential web server modules. Attackers could easily exploit unpatched flaws that span memory corruption errors, injection attacks, and broken cryptographic routines. You really should prioritize installing these releases right away to keep your systems secure against remote exploitation attempts.

Oracle Linux

Oracle Linux versions 7 through 10 just received a major wave of security patches targeting critical vulnerabilities across multiple software packages. These updates focus heavily on widely used tools like Ruby, Nginx, rsync, and the core kernel to stop attackers from executing arbitrary code or crashing systems. The advisories cover both x86_64 and aarch64 architectures while addressing flaws in libraries such as libpng, giflib, and BIND that could otherwise expose enterprise environments to serious risks. IT teams managing these Oracle systems should prioritize installing the fixes immediately to keep their infrastructure secure against known exploits.

Red Hat Enterprise Linux

Red Hat recently issued multiple security advisories targeting RHEL versions seven through ten to address critical vulnerabilities in essential infrastructure packages. System administrators should prioritize these updates immediately since several patches carry Important or Critical ratings that could leave enterprise environments exposed. The comprehensive releases fix flaws across a wide variety of software including the Linux kernel, Glibc, web servers, and development tools like jq and Ruby. These coordinated updates span multiple enterprise tracks and deliver necessary protections for both core system libraries and external applications.

Rocky Linux

Rocky Linux administrators must quickly deploy a series of security patches across versions eight, nine, and ten to close several critical vulnerabilities. The most urgent fixes target essential services like Nginx and Ruby, while other important updates address the main kernel, Firefox browser, and various supporting libraries such as LibPNG and OpenEXR. PackageKit and Cockpit also received necessary corrections to prevent potential system exploitation, though some advisories only carry moderate severity ratings. IT teams should review the attached CVSS scores immediately to prioritize which servers require overnight maintenance versus standard patching windows.

Slackware Linux

The Slackware Linux Security Team just released urgent patches for Thunderbird, Firefox, and haveged across version 15.0 and its development branch. These updates close several security gaps that could leave systems exposed to unauthorized access. Server administrators must also install the newly issued fixes for bind and rsync right away. That second batch tackles severe flaws including local privilege escalation, memory disclosure, unbounded recursion loops, and dangerous symlink race conditions.

SUSE Linux

SUSE and openSUSE have rolled out a series of urgent security patches across their Linux distributions to fix critical vulnerabilities in widely used software. The updates target dozens of high-risk flaws in essential packages like the Linux kernel, Apache, Chromium, PHP, OpenSSH, and ImageMagick. Attackers could potentially exploit these weaknesses to execute remote code, crash systems, or steal sensitive data without proper protection. System administrators should prioritize installing these releases right away to keep their environments secure.

Ubuntu Linux

Ubuntu recently released multiple batches of security updates to address critical vulnerabilities across its operating system. These patches focus heavily on the Linux kernel while also fixing flaws in widely used tools like databases, DNS resolvers, and media frameworks. The notices close dangerous loopholes that could otherwise allow attackers to crash services or execute malicious code on affected machines. Coverage extends beyond standard desktop releases to include specialized kernels built for major cloud providers and enterprise hardware configurations.

How to apply these Linux security updates safely

Before running any update commands, check which services are currently active on your system. If Nginx or Apache is handling live traffic, schedule a brief maintenance window or use rolling restarts to minimize downtime during the patching process. Desktop users can usually apply these fixes by opening a terminal and running the standard package manager command for their distribution followed by an upgrade flag. A reboot will be necessary if the kernel received updates to ensure the new security modules load correctly.

Power users who rely on command-line tools like jq should verify the patch level after installation. Regression bugs can occasionally break scripts that depend on specific JSON parsing behavior, so a quick test run is worth the few minutes it takes. If you use PackageKit or other GUI package managers and prefer to skip them because they sometimes hang or try to install junk, do not let that stop you from running the command-line equivalent to get these critical patches applied.

Applying these patches requires distribution-specific package management commands. RHEL-based systems typically use dnf update or yum update, while Debian and Ubuntu rely on apt upgrade. SUSE users should run zypper patch to properly address all security advisories, and Slackware administrators can manage updates with upgradepkg or slackpkg. After executing the commands, a reboot is usually necessary for kernel changes to take effect. Finally, review your package manager’s logs to verify that all patches installed successfully and no dependencies were disrupted.

Debian/Ubuntu (apt)

The first thing to do is refresh the local package index; running sudo apt update contacts all configured repositories and pulls in the newest lists of available versions. Skipping this step leaves the system blind to any recent uploads, which explains why “upgrade” sometimes claims there’s nothing to do even after a security advisory has been published. Once the index is current, invoke sudo apt upgrade -y; the -y flag answers every prompt automatically so the process doesn’t pause for user input. This command upgrades all installed packages that have newer versions in the repositories while preserving configuration files.

sudo apt update
sudo apt upgrade -y

Fedora/RedHat/Rocky/Alma/Oracle (dnf or yum)

On modern Fedora and recent Red Hat derivatives, dnf is the package manager; older RHEL releases still rely on yum. Begin with a check‑update operation—sudo dnf check-update or sudo yum check-update—to see exactly which packages are awaiting an upgrade. This preview step can be useful for spotting unexpected kernel bumps before they land. To actually apply the updates, run sudo dnf upgrade -y (or sudo yum update if you prefer the older tool). The upgrade command pulls down the new binaries and runs any necessary post‑install scripts, such as rebuilding initramfs when a kernel changes.

sudo dnf check-update
sudo dnf upgrade -y

or on older releases

sudo yum check-update
sudo yum update

SUSE (zypper)

SUSE’s command line front‑end is called zypper. First execute sudo zypper refresh so that the metadata for all enabled repos gets updated; without this, zypper will happily report “No updates available” even though newer packages sit on the mirror. After a fresh refresh, issue sudo zypper update -y; this upgrades every package to the latest version in the configured repositories and automatically handles service restarts when required.

sudo zypper refresh
sudo zypper update -y

Slackware (slackpkg and pkgtool)

Slackware doesn’t have a single unified updater, but the official way to pull updates is through slackpkg. Start with sudo slackpkg update to download the newest package list from the chosen mirror. Then run sudo slackpkg upgrade-all; this command walks through each installed package and replaces it with the most recent build available in the official repository. For users who prefer a more granular approach, specifying a package name after upgrade limits the operation to that single item. When dealing with community‑maintained repositories, pkgtool takes over: a combined sudo pkgtool update && sudo pkgtool upgrade will sync and apply updates from the mirrors listed in /etc/slackpkg/mirrors.

sudo slackpkg update
sudo slackpkg upgrade-all

Get those updates running and check your logs tomorrow morning. It is much easier to apply patches proactively than to troubleshoot a compromised server after an incident report lands in your inbox. Stay safe out there.