Security 10931 Published by

Several Linux distributions have released security updates to address vulnerabilities in various packages, including OpenSSL and kernel patches for AlmaLinux, Debian GNU/Linux, Fedora Linux, Oracle Linux, Red Hat Enterprise Linux, Rocky Linux, Slackware Linux, SUSE Linux, and Ubuntu Linux. The updates include fixes for common issues such as denial-of-service attacks, code execution, and SQL injection, and aim to improve the security of the operating system by addressing potential risks and vulnerabilities. Specific updates have been released for packages like FreeRDP, Grafana-PCP, kernel, munge, libpng15, glib2.0, and OpenSSL, among others. The security teams behind each Linux distribution have worked to address multiple vulnerabilities and bugs in various software components to ensure the stability and security of their operating systems.





Linux Security Roundup for Week 9, 2026

A summary of the past week's security patches is provided below, addressing critical issues in major Linux platforms:

AlmaLinux

The AlmaLinux Security team has issued several security updates to address vulnerabilities in various packages. These updates include OpenSSL and kernel-rt patches that are classified as moderate. The team also released updates for kernel, munge, and grafana software which were important due to their potential impact on system security. Additionally, the team addressed multiple vulnerabilities in FreeRDP, Grafana, Firefox, and other packages.

Debian GNU/Linux

Debian GNU/Linux has seen several security updates to address vulnerabilities in various packages. These updates include patches for modsecurity-crs and libvx to prevent attackers from bypassing web application firewalls. Other notable updates are for glib2.0, which fixed four vulnerabilities that could lead to denial of service or code execution, as well as OpenSSL and GnuTLS libraries to address multiple security issues. Additionally, Debian has released updates for various other packages such as NSS, Python-Django, Chromium, Orthanc, Thunderbird, and Python-Tornado to fix several security vulnerabilities.

Fedora Linux

Fedora has seen numerous security updates to address vulnerabilities in various packages. These updates include patches for MuPDF, Zathura-PDF-MuPDF, and Python-PyMuPDF to fix a Denial of Service (DoS) vulnerability. Additionally, Fedora 43 has received updates for yt-dlp and chromium to address security issues, as well as updates for Firefox, Opentofu, Vim, and other packages to patch multiple vulnerabilities. The Fedora team has also released several updates for NSS, Python, and other packages to fix SQL injection and denial-of-service attacks.

Oracle Linux

Oracle Linux has released several security updates to address vulnerabilities in various packages. These updates include patches for FreeRDP, Kernel, Grafana-PCP, and other packages to fix multiple security issues. Additionally, the team has released updates for 389-ds-base, ipset, numpy, buildah, podman, samba, pacemaker, containernetworking-plugins, skopeo, runc, glibc, Firefox, python-pyasn1, valkey, and container tools to address various vulnerabilities and bugs. The Oracle Linux Security Advisory team has also released updates for MinGW-fontconfig to patch security issues.

Red Hat Enterprise Linux

Several security updates are available for Red Hat Enterprise Linux to address various vulnerabilities. These updates include patches for munge, freerdp, libpng15, and grafana-pcp, as well as other packages like protobuf and ImageMagick. In addition to these, kernel security updates have been released for multiple versions of the operating system, including Red Hat Enterprise Linux 10 and 9. The updates also include fixes for opentelemetry-collector, skopeo, firefox, podman, buildah, runc, and kernel among other packages.

Rocky Linux

Several security updates are available for Rocky Linux to address various vulnerabilities. These updates include patches for protobuf, grafana-pcp, golang-github-openprinting-ipp-usb, gnupg2, and other packages, which provide fixes for common issues and protect against potential exploits. Multiple security updates have also been released for Rocky Linux 8, including a critical update for container-tools modules such as cockpit-podman, aardvark-dns, and conmon. Additionally, important security updates are available for Rocky Linux 10 with the valkey package and for Rocky Linux 9 with libpng and python-pyasn1 packages.

Slackware Linux

Slackware has released new packages to fix security issues in Firefox for Slackware 15.0 and the -current branch. The updated packages can be found on the Slackware FTP server or through additional mirror sites listed on the project's website. Mozilla also issued an update for Thunderbird, addressing security concerns with new packages available for both Slackware 15.0 and -current versions. Additionally, two security updates have been released for Telnet and Gvfs, including a fix for a vulnerability that can allow remote attackers to execute code on the server running telnetd.

SUSE Linux

Several security updates have been released for various packages on openSUSE Tumbleweed, including a chromedriver package update to fix three vulnerabilities. Additionally, libpng16 received an update to address a heap buffer overflow vulnerability. Other updates included patches for libpng12, python310, and kernel fixes in SUSE Linux. These updates aim to improve the security of the operating system by addressing potential risks and vulnerabilities.

Ubuntu Linux

Ubuntu has released several security notices to address vulnerabilities in various packages, including DjVuLibre, U-Boot, Evolution Data Server, and GIMP. Additionally, kernel updates were released on February 24, 2026, to fix issues affecting different architectures and platforms. Multiple other security fixes have been made for packages such as curl, Ceph, Protocol Buffers, MongoDB, rlottie, Authlib, Linux kernel, and Rack. A specific issue was also identified in Git that affected Ubuntu 22.04 LTS and 20.04 LTS due to a regression introduced by USN-5376-4.

How to upgrade packages

This quick overview shows exactly what commands you need to run so the latest security patches and bug fixes actually make it onto your system without hunting down individual .deb or .rpm files.

Debian/Ubuntu (apt)

The first thing to do is refresh the local package index; running sudo apt update contacts all configured repositories and pulls in the newest lists of available versions. Skipping this step leaves the system blind to any recent uploads, which explains why “upgrade” sometimes claims there’s nothing to do even after a security advisory has been published. Once the index is current, invoke sudo apt upgrade -y; the -y flag answers every prompt automatically so the process doesn’t pause for user input. This command upgrades all installed packages that have newer versions in the repositories while preserving configuration files.

sudo apt update
sudo apt upgrade -y
Fedora/RedHat/Rocky/Alma/Oracle (dnf or yum)

On modern Fedora and recent Red Hat derivatives, dnf is the package manager; older RHEL releases still rely on yum. Begin with a check‑update operation—sudo dnf check-update or sudo yum check-update—to see exactly which packages are awaiting an upgrade. This preview step can be useful for spotting unexpected kernel bumps before they land. To actually apply the updates, run sudo dnf upgrade -y (or sudo yum update if you prefer the older tool). The upgrade command pulls down the new binaries and runs any necessary post‑install scripts, such as rebuilding initramfs when a kernel changes.

sudo dnf check-update
sudo dnf upgrade -y

or on older releases

sudo yum check-update
sudo yum update
SUSE (zypper)

SUSE’s command line front‑end is called zypper. First execute sudo zypper refresh so that the metadata for all enabled repos gets updated; without this, zypper will happily report “No updates available” even though newer packages sit on the mirror. After a fresh refresh, issue sudo zypper update -y; this upgrades every package to the latest version in the configured repositories and automatically handles service restarts when required.

sudo zypper refresh
sudo zypper update -y
Slackware (slackpkg and pkgtool)

Slackware doesn’t have a single unified updater, but the official way to pull updates is through slackpkg. Start with sudo slackpkg update to download the newest package list from the chosen mirror. Then run sudo slackpkg upgrade-all; this command walks through each installed package and replaces it with the most recent build available in the official repository. For users who prefer a more granular approach, specifying a package name after upgrade limits the operation to that single item. When dealing with community‑maintained repositories, pkgtool takes over: a combined sudo pkgtool update && sudo pkgtool upgrade will sync and apply updates from the mirrors listed in /etc/slackpkg/mirrors.

sudo slackpkg update
sudo slackpkg upgrade-all
Tuxrepair