How to Apply Critical Security Patches on Linux: A Step-by-Step Guide

By

Introduction

Keeping your Linux system secure requires regularly applying security updates. Distributions like AlmaLinux, Debian, Fedora, SUSE, and Ubuntu release patches for vulnerabilities in core packages—such as freerdp, glib2, libsoup3, openexr, dnsmasq, p7zip, p7zip-rar, python-authlib, rails, chromium, firefox, httpd, nss, java-25-openj9, krb5, libmodsecurity3, mcphost, imagemagick, and multiple linux kernels. This guide will walk you through checking, reviewing, and installing these updates safely.

How to Apply Critical Security Patches on Linux: A Step-by-Step Guide
Source: lwn.net

What You Need

Step-by-Step Instructions

Step 1: Refresh Your Package Metadata

Start by updating the list of available packages. This ensures you see the latest security patches.

Step 2: Review Available Security Updates

List packages that have updates, focusing on security advisories.

Step 3: Apply the Updates

Install all pending security updates. Use the following commands:

Step 4: Reboot After Kernel Updates

If you installed a new kernel (common with linux-aws, linux-azure, linux-gcp, linux-nvidia, etc.), reboot to activate it.

  1. Verify the new kernel is installed: uname -r (check version before rebooting).
  2. Reboot: sudo reboot or sudo systemctl reboot.

Step 5: Confirm Installation

After reboot (or if no reboot required), verify the updates took effect.

Compare versions with the advisory from your distro's security page.

Tips for Smooth Updates

Tags:

Related Articles

Recommended

Discover More

Samsung Joins the Trillion-Dollar Club as Apple Explores Chip Supply OptionsHow to Build an AI Skill for Diagnosing Flaky TestsPinpointing the Culprit: Automated Failure Attribution in Multi-Agent LLM SystemsExploring AI's Role in Accessibility: Opportunities and CautionsIranian Cyber Assault Cripples US Critical Infrastructure: PLCs Targeted in Coordinated Attack