How to Apply Critical Security Patches on Linux: A Step-by-Step Guide

By

Introduction

Keeping your Linux system secure requires regularly applying security updates. Distributions like AlmaLinux, Debian, Fedora, SUSE, and Ubuntu release patches for vulnerabilities in core packages—such as freerdp, glib2, libsoup3, openexr, dnsmasq, p7zip, p7zip-rar, python-authlib, rails, chromium, firefox, httpd, nss, java-25-openj9, krb5, libmodsecurity3, mcphost, imagemagick, and multiple linux kernels. This guide will walk you through checking, reviewing, and installing these updates safely.

How to Apply Critical Security Patches on Linux: A Step-by-Step Guide
Source: lwn.net

What You Need

Step-by-Step Instructions

Step 1: Refresh Your Package Metadata

Start by updating the list of available packages. This ensures you see the latest security patches.

Step 2: Review Available Security Updates

List packages that have updates, focusing on security advisories.

Step 3: Apply the Updates

Install all pending security updates. Use the following commands:

Step 4: Reboot After Kernel Updates

If you installed a new kernel (common with linux-aws, linux-azure, linux-gcp, linux-nvidia, etc.), reboot to activate it.

  1. Verify the new kernel is installed: uname -r (check version before rebooting).
  2. Reboot: sudo reboot or sudo systemctl reboot.

Step 5: Confirm Installation

After reboot (or if no reboot required), verify the updates took effect.

Compare versions with the advisory from your distro's security page.

Tips for Smooth Updates

Tags:

Related Articles

Recommended

Discover More

WebAssembly JSPI Overhaul: New API Streamlines Promise Handling in Chrome M126How the EU Is Defending Its Economy Against Fossil-Fuel Price Shocks Triggered by the Iran WarMastering Asynchronous Node.js: From Callbacks to PromisesHow to Implement Gradient-Based Long-Horizon Planning with World Models Using GRASPWeb Protection Evolves: Why 'Bot vs. Human' No Longer Matters for Security