Several major Linux distributions, including AlmaLinux, Debian, Fedora, Oracle Linux, Red Hat Enterprise Linux, Rocky Linux, Slackware, and Ubuntu, have released security updates to address various vulnerabilities. These updates include fixes for Go, Golang, Node.js, Python-Django, Wireshark, LibPNG, GnuTLS, Roundcube, Ceph, Nova, ca-certificates, Chromium, Pillow, GEGL, and other packages, resolving issues such as denial-of-service attacks, crashes, infinite loops, HTML sanitization problems, buffer overflows, code execution vulnerabilities, and potential exploitation of vulnerabilities. The updates are available for various versions of each distribution, including kernel updates, to ensure users' systems remain secure and up-to-date. Users should install these updates as soon as possible to prevent their systems from being compromised by attackers exploiting the identified vulnerabilities.
Linux Security Roundup for Week 7, 2026
A summary of the past week's security patches is provided below, addressing critical issues in major Linux platforms:
AlmaLinux
AlmaLinux has released several important security updates to address various vulnerabilities. These updates include fixes for Go, Golang, and Node.js, which resolve issues like excessive CPU consumption, memory exhaustion, code smuggling, and unexpected session resumption. Additionally, updates have been released for GIMP, EDK2, Glibc, PHP, and Grafana, with the latter two specifically addressing Denial of Service attacks and cross-dashboard privilege escalation on AlmaLinux 9 and 10 respectively. These security updates are available for users to download and install to ensure their systems remain secure and up-to-date.
- ALSA-2026:2708: go-toolset:rhel8 security update (Important)
- ALSA-2026:2709: golang security update (Important)
- ALSA-2026:2707: gimp security update (Important)
- ALSA-2026:2706: golang security update (Important)
- ALSA-2026:2719: gnupg2 security update (Important)
- ALSA-2026:2781: nodejs:24 security update (Important)
- ALSA-2026:2776: edk2 security update (Moderate)
- ALSA-2026:2786: glibc security update (Moderate)
- ALSA-2026:2799: php security update (Moderate)
- ALSA-2026:2920: grafana security update (Important)
- ALSA-2026:2914: grafana security update (Important)
Debian GNU/Linux
Debian has released several important security updates to address various vulnerabilities, including fixes for Python-Django, Wireshark, and LibPNG. These updates resolve issues such as denial-of-service attacks, crashes, and infinite loops, as well as problems with HTML sanitization and buffer overflows. Other affected packages include GnuTLS, Roundcube, Ceph, Nova, ca-certificates, Chromium, Pillow, and GEGL, which have been patched to prevent information disclosure or code execution. The updates are available for Debian versions 9, 10, and 12, as well as for the LTS/ELTS branch, to ensure users' systems remain secure and up-to-date.
- [DSA 6136-1] python-django security update
- ELA-1646-1 wireshark security update
- [DLA 4479-1] wireshark security update
- ELA-1647-1 libpng1.6 security update
- [DLA 4480-1] roundcube security update
- [DLA 4481-1] libpng1.6 security update
- [DLA 4482-1] ceph security update
- [DSA 6137-1] roundcube security update
- [DSA 6138-1] libpng1.6 security update
- [DSA 6140-1] gnutls28 security update
- [DSA 6139-1] gimp security update
- [DSA 6141-1] linux security update
- [DLA 4483-1] gimp security update
- ELA-1648-1 python-django security update
- [DLA 4484-1] python-django security update
- [DSA 6145-1] nova security update
- [DSA 6143-1] libvpx security update
- [DSA 6142-1] gegl security update
- [DSA 6144-1] inetutils security update
- ELA-1649-1 gimp security update
- [DLA 4486-1] nova security update
- [DLA 4485-1] ca-certificates CA certificates update
- [DSA 6146-1] chromium security update
- [DSA 6147-1] pillow security update
- [DLA 4487-1] gegl security update
- ELA-1650-1 gegl security update
Fedora Linux
Fedora has released several important security updates to address various vulnerabilities, including fixes for GnuTLS, VIM, P11-Kit, and MinGW. These updates resolve issues such as denial-of-service attacks, buffer overflows, and excessive resource consumption during certificate verification. Other affected packages include GnuPG2, Rsync, LibPNG, Thunderbird, Python, Roundcube, Microcode, Mupdf, Rust, UV, and mupdf, which have been patched to prevent code execution or exploitation of vulnerabilities. The updates are available for Fedora versions 42 and 43 to ensure users' systems remain secure and up-to-date.
- Fedora 42 Update: vim-9.1.2146-1.fc42
- Fedora 42 Update: p11-kit-0.26.2-1.fc42
- Fedora 42 Update: gnutls-3.8.11-3.fc42
- Fedora 42 Update: gnupg2-2.4.9-2.fc42
- Fedora 43 Update: rsync-3.4.1-5.fc43
- Fedora 43 Update: libpng-1.6.55-1.fc43
- Fedora 43 Update: mingw-libpng-1.6.55-1.fc43
- Fedora 43 Update: mingw-libsoup-2.74.3-17.fc43
- Fedora 43 Update: thunderbird-147.0-2.fc43
- Fedora 43 Update: python-pillow-11.3.0-7.fc43
- Fedora 43 Update: vim-9.1.2146-1.fc43
- Fedora 43 Update: mingw-python3-3.11.14-7.fc43
- Fedora 43 Update: pgadmin4-9.12-1.fc43
- Fedora 42 Update: thunderbird-147.0-6.fc42
- Fedora 42 Update: pgadmin4-9.12-1.fc42
- Fedora 42 Update: mingw-libsoup-2.74.3-17.fc42
- Fedora 42 Update: libssh-0.11.4-1.fc42
- Fedora 42 Update: libpng-1.6.55-1.fc42
- Fedora 42 Update: mingw-python3-3.11.14-7.fc42
- Fedora 42 Update: freerdp-3.22.0-1.fc42
- Fedora 42 Update: fvwm3-1.1.4-4.fc42
- Fedora 43 Update: fvwm3-1.1.4-4.fc43
- Fedora 42 Update: microcode_ctl-2.1-70.1.fc42
- Fedora 42 Update: python3.14-3.14.3-1.fc42
- Fedora 42 Update: roundcubemail-1.6.13-1.fc42
- Fedora 42 Update: python-azure-core-1.38.0-2.fc42
- Fedora 42 Update: azure-cli-2.68.0-2.fc42
- Fedora 43 Update: chromium-145.0.7632.75-1.fc43
- Fedora 43 Update: microcode_ctl-2.1-71.1.fc43
- Fedora 43 Update: python-azure-core-1.38.0-2.fc43
- Fedora 43 Update: roundcubemail-1.6.13-1.fc43
- Fedora 43 Update: azure-cli-2.81.0-2.fc43
- Fedora 42 Update: mingw-libpng-1.6.55-1.fc42
- Fedora 42 Update: mupdf-1.26.3-5.fc42
- Fedora 42 Update: rust-ambient-id-0.0.10-1.fc42
- Fedora 42 Update: uv-0.10.2-1.fc42
- Fedora 42 Update: python-uv-build-0.10.2-1.fc42
- Fedora 42 Update: python-pyasn1-0.6.2-1.fc42
- Fedora 43 Update: python3.13-3.13.12-1.fc43
- Fedora 43 Update: python-pyasn1-0.6.2-1.fc43
Oracle Linux
Oracle has released several important security updates to address various vulnerabilities on Oracle Linux, including kernel updates that fix multiple issues. These updates also resolve issues with GnuPG2, Go, PHP, NodeJS, and other packages, which have been patched to prevent code execution or exploitation of vulnerabilities. Other affected packages include Unbreakable Enterprise kernel, glibc, edk2, and more, which are available for Oracle Linux 9 to ensure users' systems remain secure and up-to-date. The updates address CVEs and other security issues, providing a secure environment for users on the Oracle Linux platform.<&p>
- ELSA-2026-2721 Moderate: Oracle Linux 10 kernel security update
- ELSA-2026-2719 Important: Oracle Linux 10 gnupg2 security update
- ELSA-2026-2708 Important: Oracle Linux 8 go-toolset:ol8 security update
- ELSA-2026-2706 Important: Oracle Linux 10 golang security update
- ELSA-2026-2709 Important: Oracle Linux 9 golang security update
- ELSA-2026-2707 Important: Oracle Linux 9 gimp security update
- ELBA-2026-50096 Oracle Linux 9 smartmontools bug fix update
- ELSA-2026-2627 Moderate: Oracle Linux 8 gcc-toolset-14-binutils security update
- ELBA-2026-2424 Oracle Linux 8 virt:ol and virt-devel:ol bug fix and enhancement update
- ELSA-2026-1720 Moderate: Oracle Linux 7 openssl security update
- ELSA-2026-50113 Important: Oracle Linux 9 Unbreakable Enterprise kernel security update
- ELSA-2026-2799 Moderate: Oracle Linux 9 php security update
- ELSA-2026-2786 Moderate: Oracle Linux 9 glibc security update
- ELSA-2026-2781 Important: Oracle Linux 9 nodejs:24 security update
- ELSA-2026-2776 Moderate: Oracle Linux 9 edk2 security update
- ELSA-2026-2722 Moderate: Oracle Linux 9 kernel security update
- ELBA-2026-2791 Oracle Linux 9 libdnf bug fix and enhancement update
- ELBA-2026-2790 Oracle Linux 9 opencryptoki bug fix and enhancement update
- ELBA-2026-2788 Oracle Linux 9 samba bug fix and enhancement update
- ELBA-2026-2787 Oracle Linux 9 nftables bug fix and enhancement update
- ELBA-2026-2785 Oracle Linux 9 libvirt bug fix and enhancement update
- ELBA-2026-2784 Oracle Linux 9 mesa bug fix and enhancement update
- ELSA-2026-50113 Important: Oracle Linux 9 Unbreakable Enterprise kernel security update
- ELBA-2026-2780 Oracle Linux 9 redis:7 bug fix and enhancement update
- ELBA-2026-2777 Oracle Linux 9 qemu-kvm bug fix and enhancement update
- ELSA-2026-50113 Important: Oracle Linux 8 Unbreakable Enterprise kernel security update
- ELSA-2026-2720 Moderate: Oracle Linux 8 kernel security update
Red Hat Enterprise Linux
Red Hat has released several important security updates to address various vulnerabilities on Red Hat Enterprise Linux (RHEL) systems, including fixes for Python-Urllib3, PKI-Deps, and Resource-Agents. These updates also resolve issues with FreeRDP, NodeJS, GlibC, Munge, OpenShift Container Platform, gimp, freerdp, and grafana, among others, which have been patched to prevent code execution or exploitation of vulnerabilities. The updates are available for various versions of RHEL, including 8, and address CVEs and other security issues, providing a secure environment for users on the RHEL platform. Users should install these updates as soon as possible to ensure their systems remain secure and up-to-date.
- RHSA-2026:2728: Important: python-urllib3 security update
- RHSA-2026:2724: Important: pki-deps:10.6 security update
- RHSA-2026:2718: Important: python-urllib3 security update
- RHSA-2026:2717: Important: python-urllib3 security update
- RHSA-2026:2725: Important: pki-deps:10.6 security update
- RHSA-2026:2712: Important: resource-agents security update
- RHSA-2026:2711: Important: Red Hat Ceph Storage 8.1 security and bug fix update
- RHSA-2026:2710: Important: python3.12-wheel security update
- RHSA-2026:2708: Important: go-toolset:rhel8 security update
- RHSA-2026:2707: Important: gimp security update
- RHSA-2026:2706: Important: golang security update
- RHSA-2026:2722: Moderate: kernel security update
- RHSA-2026:2720: Moderate: kernel security update
- RHSA-2026:2736: Important: freerdp security update
- RHSA-2026:2721: Moderate: kernel security update
- RHSA-2026:2726: Important: pki-deps:10.6 security update
- RHSA-2026:2714: Important: freerdp security update
- RHSA-2026:2723: Important: python-urllib3 security update
- RHSA-2026:2713: Moderate: python3 security update
- RHSA-2026:2709: Important: golang security update
- RHSA-2026:2687: Moderate: osbuild-composer security update
- RHSA-2026:2688: Moderate: osbuild-composer security update
- RHSA-2026:2753: Important: gnupg2 security update
- RHSA-2026:2760: Important: Satellite 6.18.3 Async Update
- RHSA-2026:2758: Important: resource-agents security update
- RHSA-2026:2764: Important: Satellite 6.17.6.3 Async Update
- RHSA-2026:2761: Moderate: kernel security update
- RHSA-2026:2759: Moderate: kernel security update
- RHSA-2026:2719: Important: gnupg2 security update
- RHSA-2026:2768: Important: nodejs:20 security update
- RHSA-2026:2766: Moderate: kernel security update
- RHSA-2026:2769: Important: Red Hat Ceph Storage 7.1 security and bug fix updates
- RHSA-2026:2765: Important: Satellite 6.16.6.1 Async Update
- RHSA-2026:2763: Moderate: wireshark security update
- RHSA-2026:2770: Important: freerdp security update
- RHSA-2026:2767: Important: nodejs:20 security update
- RHSA-2026:2786: Moderate: glibc security update
- RHSA-2026:2783: Important: nodejs:20 security update
- RHSA-2026:2817: Important: pcs security update
- RHSA-2026:2819: Important: pcs security update
- RHSA-2026:2816: Important: pcs security update
- RHSA-2026:2818: Important: pcs security update
- RHSA-2026:2799: Moderate: php security update
- RHSA-2026:2781: Important: nodejs:24 security update
- RHSA-2026:2782: Important: nodejs:22 security update
- RHSA-2026:2776: Moderate: edk2 security update
- RHSA-2026:2771: Low: edk2 security update
- RHSA-2026:2823: Important: Updated discovery-cli release RPM versions 2.4.3
- RHSA-2026:2824: Important: freerdp security update
- RHSA-2026:2821: Moderate: kernel-rt security update
- RHSA-2026:2864: Important: nodejs:22 security update
- RHSA-2026:2866: Important: python3.12-wheel security update
- RHSA-2026:2865: Important: python-wheel security update
- RHSA-2026:2918: Important: munge security update
- RHSA-2026:2914: Important: grafana security update
- RHSA-2026:2658: Moderate: OpenShift Container Platform 4.16.57 packages and security update
- RHSA-2026:2911: Important: python-s3transfer security update
- RHSA-2026:2899: Important: nodejs22 security update
- RHSA-2026:2670: Moderate: OpenShift Container Platform 4.17.49 packages and security update
- RHSA-2026:2671: Important: OpenShift Container Platform 4.17.49 bug fix and security update
- RHSA-2026:2633: Important: OpenShift Container Platform 4.19.24 bug fix and security update
- RHSA-2026:2969: Important: gimp security update
- RHSA-2026:2954: Important: munge security update
- RHSA-2026:2953: Important: gimp security update
- RHSA-2026:2952: Important: freerdp security update
- RHSA-2026:2950: Important: gimp security update
- RHSA-2026:2949: Important: munge security update
- RHSA-2026:2930: Important: gimp security update
- RHSA-2026:2934: Important: munge security update
- RHSA-2026:2659: Important: OpenShift Container Platform 4.16.57 bug fix and security update
- RHSA-2026:2923: Important: munge security update
- RHSA-2026:2920: Important: grafana security update
- RHSA-2026:3010: Important: munge security update
- RHSA-2026:3013: Important: munge security update
- RHSA-2026:3012: Important: munge security update
- RHSA-2026:3011: Important: munge security update
Rocky Linux
Rocky Linux has released several important security updates to address various vulnerabilities, including kernel updates available for versions 8, 9, and 10. These updates also resolve issues with Go, Python, GCC, NodeJS, and GIMP, which have been patched to prevent code execution or exploitation of vulnerabilities. The updates are available for Rocky Linux 9 and 10, addressing moderate- and Important-level vulnerabilities, providing a secure environment for users on the Rocky Linux platform. Users should install these updates as soon as possible to ensure their systems remain secure and up-to-date.
- RLSA-2026:2282: Moderate: kernel security update
- RLSA-2026:2212: Moderate: kernel security update
- RLSA-2026:2264: Moderate: kernel security update
- RLSA-2026:2706: Important: golang security update
- RLSA-2026:2709: Important: golang security update
- RLSA-2023:7034: Moderate: python39:3.9 and python39-devel:3.9 security update
- RLSA-2023:7050: Moderate: python38:3.8 and python38-devel:3.8 security update
- RLSA-2026:2627: Moderate: gcc-toolset-14-binutils security update
- RLSA-2026:2708: Important: go-toolset:rhel8 security update
- RLSA-2026:2783: Important: nodejs:20 security update
- RLSA-2026:2782: Important: nodejs:22 security update
- RLSA-2026:2707: Important: gimp security update
- RLSA-2026:2781: Important: nodejs:24 security update
Slackware Linux
Slackware has released important security updates to address vulnerabilities in Mozilla Firefox and Thunderbird, which have been fixed with new packages available for versions 15.0 and -current. Additionally, updates are also available for Lrzip and LibSSH to patch security issues, including a heap buffer overflow in libvpx. The updated packages can be downloaded from the official Slackware FTP servers or mirror sites near you, along with MD5 signatures for verification. Users should install these updates as soon as possible to ensure their systems remain secure and up-to-date.
- mozilla-firefox (SSA:2026-047-03)
- mozilla-thunderbird (SSA:2026-047-04)
- lrzip (SSA:2026-047-02)
- libssh (SSA:2026-047-01)
SUSE Linux
openSUSE has released several important security updates to address vulnerabilities in various packages, including Go, openCryptoki, Python, Kernel, Protobuf, Libnvidia-Container, Chromium, NodeJS, Kubernetes, and others. These updates fix critical issues, such as heap buffer overflows and potential code execution vulnerabilities, which could be exploited by attackers. The list of updates also includes patches for Live Patch 43 and Live Patch 44 for SUSE Linux Enterprise 15 SP4, as well as fixes for other packages like nodejs22, python311-pip, kubernetes, and more. Users should install these updates as soon as possible to ensure their systems remain secure and up-to-date.
- openSUSE-SU-2026:20233-1: moderate: Security update for openCryptoki
- openSUSE-SU-2026:20220-1: critical: Security update for go1.24
- openSUSE-SU-2026:10206-1: moderate: python314-3.14.3-1.1 on GA media
- openSUSE-SU-2026:10204-1: moderate: openjfx-17.0.18.0-1.1 on GA media
- openSUSE-SU-2026:10201-1: moderate: chromedriver-145.0.7632.45-1.1 on GA media
- openSUSE-SU-2026:10205-1: moderate: python311-cryptography-46.0.5-1.1 on GA media
- openSUSE-SU-2026:10202-1: moderate: himmelblau-2.3.5+git0.9dd526c-1.1 on GA media
- SUSE-SU-2026:0526-1: important: Security update for the Linux Kernel (Live Patch 35 for SUSE Linux Enterprise 15 SP4)
- SUSE-SU-2026:0517-1: moderate: Security update for protobuf
- SUSE-SU-2026:0528-1: important: Security update for the Linux Kernel (Live Patch 24 for SUSE Linux Enterprise 15 SP5)
- SUSE-SU-2026:0533-1: important: Security update for the Linux Kernel (Live Patch 45 for SUSE Linux Enterprise 15 SP4)
- SUSE-SU-2026:0535-1: important: Security update for the Linux Kernel (Live Patch 28 for SUSE Linux Enterprise 15 SP5)
- SUSE-SU-2026:0542-1: important: Security update for the Linux Kernel (Live Patch 30 for SUSE Linux Enterprise 15 SP5)
- SUSE-SU-2026:0544-1: important: Security update for the Linux Kernel (Live Patch 31 for SUSE Linux Enterprise 15 SP5)
- SUSE-SU-2026:0543-1: important: Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise 15 SP6)
- SUSE-SU-2026:0546-1: important: Security update for the Linux Kernel (Live Patch 13 for SUSE Linux Enterprise 15 SP6)
- SUSE-SU-2026:0539-1: important: Security update for the Linux Kernel (Live Patch 29 for SUSE Linux Enterprise 15 SP5)
- SUSE-SU-2026:0548-1: important: Security update for the Linux Kernel (Live Patch 12 for SUSE Linux Enterprise 15 SP6)
- SUSE-SU-2026:0550-1: important: Security update for the Linux Kernel (Live Patch 14 for SUSE Linux Enterprise 15 SP6)
- SUSE-SU-2026:0551-1: important: Security update for the Linux Kernel (Live Patch 16 for SUSE Linux Enterprise 15 SP6)
- SUSE-SU-2026:0558-1: important: Security update for libnvidia-container
- SUSE-SU-2026:0554-1: important: Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 15 SP7)
- openSUSE-SU-2026:0053-1: important: Security update for chromium
- openSUSE-SU-2026:0052-1: important: Security update for chromium
- SUSE-SU-2026:0563-1: moderate: Security update for protobuf
- SUSE-SU-2026:0565-1: important: Security update for the Linux Kernel (Live Patch 43 for SUSE Linux Enterprise 15 SP4)
- SUSE-SU-2026:0566-1: important: Security update for the Linux Kernel (Live Patch 44 for SUSE Linux Enterprise 15 SP4)
- openSUSE-SU-2026:20236-1: important: Security update for nodejs22
- openSUSE-SU-2026:10210-1: moderate: python311-pip-26.0.1-1.1 on GA media
- openSUSE-SU-2026:10207-1: moderate: frr-10.2.1-4.1 on GA media
- openSUSE-SU-2026:10209-1: moderate: libsoup-2_4-1-2.74.3-16.1 on GA media
- SUSE-SU-2026:0568-1: moderate: Security update for libxml2
- SUSE-SU-2026:0569-1: moderate: Security update for openCryptoki
- SUSE-SU-2026:0570-1: moderate: Security update for libxml2
- SUSE-SU-2026:0572-1: important: Security update for kubernetes
- SUSE-SU-2026:0573-1: important: Security update for kubernetes-old
- SUSE-SU-2026:0574-1: important: Security update for libsoup2
- SUSE-SU-2026:0575-1: low: Security update for libpcap
- SUSE-SU-2026:0576-1: moderate: Security update for abseil-cpp
- openSUSE-SU-2026:20239-1: critical: Security update for golang-github-prometheus-prometheus
- openSUSE-SU-2026:10217-1: moderate: traefik-3.6.8-1.1 on GA media
- openSUSE-SU-2026:10214-1: moderate: mupdf-1.27.1-1.1 on GA media
- openSUSE-SU-2026:10216-1: moderate: python311-asgiref-3.11.1-1.1 on GA media
- openSUSE-SU-2026:10213-1: moderate: libxml2-16-2.14.5-4.1 on GA media
- openSUSE-SU-2026:10211-1: moderate: azure-cli-core-2.83.0-2.1 on GA media
- SUSE-SU-2026:0577-1: moderate: Security update for avahi
- openSUSE-SU-2026:0057-1: important: Security update for python-nltk
- openSUSE-SU-2026:0056-1: important: Security update for python-nltk
- openSUSE-SU-2026:10220-1: moderate: istioctl-1.28.4-1.1 on GA media
- openSUSE-SU-2026:10224-1: moderate: rclone-1.73.1-1.1 on GA media
- openSUSE-SU-2026:10219-1: moderate: dnsdist-2.0.2-1.1 on GA media
- openSUSE-SU-2026:10221-1: moderate: python311-3.11.14-4.1 on GA media
- openSUSE-SU-2026:10223-1: moderate: python313-3.13.12-1.1 on GA media
- openSUSE-SU-2026:10218-1: moderate: MozillaThunderbird-140.7.2-1.1 on GA media
- SUSE-SU-2026:0580-1: moderate: Security update for apptainer
- SUSE-SU-2026:0579-1: important: Security update for libsoup
- openSUSE-SU-2026:10225-1: moderate: MozillaFirefox-147.0.4-1.1 on GA media
- openSUSE-SU-2026:10229-1: moderate: ucode-intel-20260210-1.1 on GA media
- openSUSE-SU-2026:10226-1: moderate: python311-nltk-3.9.1-3.1 on GA media
- SUSE-SU-2026:0582-1: important: Security update for snpguest
- SUSE-SU-2026:0590-1: important: Security update for python
- SUSE-SU-2026:0592-1: important: Security update for vexctl
- openSUSE-SU-2026:20258-1: important: Security update for chromium
- openSUSE-SU-2026:20251-1: important: Security update for cockpit-repos
Ubuntu Linux
Ubuntu has released several important security updates to address vulnerabilities in various packages, including AIOHTTP, FreeRDP, Expat, .NET, alsa-lib, and GnuTLS. These updates also resolve issues with the Linux kernel, such as improper initialization of CPU cache memory and potential data leakage due to processor flaws (CVE-2024-36331, CVE-2025-21884), which could be exploited by attackers. Additionally, patches have been released for other packages like Pillow, FRR, Nova, Trafic Server, LibSSH, Inetutils, and Linux kernel flavors such as Low Latency, Intel IoTG, Azure, and HWE kernels. Users should install these updates as soon as possible to ensure their systems remain secure and up-to-date.
- [USN-8032-1] AIOHTTP vulnerabilities
- [USN-8042-1] FreeRDP vulnerabilities
- [USN-8022-2] Expat vulnerabilities
- [USN-8025-2] .NET vulnerability
- [USN-8044-1] alsa-lib vulnerability
- [USN-8043-1] GnuTLS vulnerabilities
- [USN-8029-2] Linux kernel vulnerabilities
- [USN-8033-5] Linux kernel vulnerabilities
- [USN-8028-4] Linux kernel (FIPS) vulnerabilities
- [USN-8028-3] Linux kernel (Real-time) vulnerabilities
- [USN-8047-1] Pillow vulnerability
- [USN-8046-1] FRR vulnerabilities
- [USN-8033-6] Linux kernel (NVIDIA) vulnerabilities
- [USN-8028-5] Linux kernel vulnerabilities
- [USN-8048-1] Linux kernel (OEM) vulnerabilities
- [USN-8034-2] Linux kernel (NVIDIA Tegra IGX) vulnerabilities
- [USN-8049-1] Nova vulnerability
- [USN-8031-2] Linux kernel (GCP FIPS) vulnerabilities
- [USN-8050-1] Apache Traffic Server vulnerability
- [USN-8051-1] libssh vulnerabilities
- [USN-7992-2] Inetutils vulnerability
- [USN-8033-7] Linux kernel vulnerabilities
- [USN-8052-1] Linux kernel (Low Latency) vulnerabilities
- [USN-8031-3] Linux kernel vulnerabilities
- [USN-8028-6] Linux kernel (HWE) vulnerabilities
- [USN-8028-7] Linux kernel (Low Latency NVIDIA) vulnerabilities
- [USN-8053-1] libvpx vulnerability
- [USN-8033-8] Linux kernel (Intel IoTG) vulnerabilities
- [USN-7990-5] Linux kernel (Azure) vulnerabilities
- [USN-8015-5] Linux kernel vulnerabilities
How to upgrade packages
This quick overview shows exactly what commands you need to run so the latest security patches and bug fixes actually make it onto your system without hunting down individual .deb or .rpm files.
Debian/Ubuntu (apt)
The first thing to do is refresh the local package index; running sudo apt update contacts all configured repositories and pulls in the newest lists of available versions. Skipping this step leaves the system blind to any recent uploads, which explains why “upgrade” sometimes claims there’s nothing to do even after a security advisory has been published. Once the index is current, invoke sudo apt upgrade -y; the -y flag answers every prompt automatically so the process doesn’t pause for user input. This command upgrades all installed packages that have newer versions in the repositories while preserving configuration files.
sudo apt update sudo apt upgrade -y
Fedora/RedHat/Rocky/Alma/Oracle (dnf or yum)
On modern Fedora and recent Red Hat derivatives, dnf is the package manager; older RHEL releases still rely on yum. Begin with a check‑update operation—sudo dnf check-update or sudo yum check-update—to see exactly which packages are awaiting an upgrade. This preview step can be useful for spotting unexpected kernel bumps before they land. To actually apply the updates, run sudo dnf upgrade -y (or sudo yum update if you prefer the older tool). The upgrade command pulls down the new binaries and runs any necessary post‑install scripts, such as rebuilding initramfs when a kernel changes.
sudo dnf check-update sudo dnf upgrade -y
or on older releases
sudo yum check-update sudo yum update
SUSE (zypper)
SUSE’s command line front‑end is called zypper. First execute sudo zypper refresh so that the metadata for all enabled repos gets updated; without this, zypper will happily report “No updates available” even though newer packages sit on the mirror. After a fresh refresh, issue sudo zypper update -y; this upgrades every package to the latest version in the configured repositories and automatically handles service restarts when required.
sudo zypper refresh sudo zypper update -y
Slackware (slackpkg and pkgtool)
Slackware doesn’t have a single unified updater, but the official way to pull updates is through slackpkg. Start with sudo slackpkg update to download the newest package list from the chosen mirror. Then run sudo slackpkg upgrade-all; this command walks through each installed package and replaces it with the most recent build available in the official repository. For users who prefer a more granular approach, specifying a package name after upgrade limits the operation to that single item. When dealing with community‑maintained repositories, pkgtool takes over: a combined sudo pkgtool update && sudo pkgtool upgrade will sync and apply updates from the mirrors listed in /etc/slackpkg/mirrors.
sudo slackpkg update sudo slackpkg upgrade-all