How to Apply Critical Security Patches on Linux: A Step-by-Step Guide

By ✦ min read

Introduction

Keeping your Linux system secure requires regularly applying security updates. Distributions like AlmaLinux, Debian, Fedora, SUSE, and Ubuntu release patches for vulnerabilities in core packages—such as freerdp, glib2, libsoup3, openexr, dnsmasq, p7zip, p7zip-rar, python-authlib, rails, chromium, firefox, httpd, nss, java-25-openj9, krb5, libmodsecurity3, mcphost, imagemagick, and multiple linux kernels. This guide will walk you through checking, reviewing, and installing these updates safely.

How to Apply Critical Security Patches on Linux: A Step-by-Step Guide
Source: lwn.net

What You Need

Step-by-Step Instructions

Step 1: Refresh Your Package Metadata

Start by updating the list of available packages. This ensures you see the latest security patches.

Step 2: Review Available Security Updates

List packages that have updates, focusing on security advisories.

Step 3: Apply the Updates

Install all pending security updates. Use the following commands:

Step 4: Reboot After Kernel Updates

If you installed a new kernel (common with linux-aws, linux-azure, linux-gcp, linux-nvidia, etc.), reboot to activate it.

  1. Verify the new kernel is installed: uname -r (check version before rebooting).
  2. Reboot: sudo reboot or sudo systemctl reboot.

Step 5: Confirm Installation

After reboot (or if no reboot required), verify the updates took effect.

Compare versions with the advisory from your distro's security page.

Tips for Smooth Updates

Tags:

Recommended

Discover More

How to Navigate AI Job Interviews Without Getting BlindsidedUnlocking the Frozen Past: DNA Reveals Four More Franklin Expedition CrewSecuring Autonomous AI Agents on Kubernetes: A Practical Q&A GuideThe Great Fedora GNOME Bug Debate: 6 Key InsightsFedora Releases Sealed Bootable Container Images for Atomic Desktops – Enhanced Security with Verified Boot Chain