How to Apply Critical Security Patches on Linux: A Step-by-Step Guide

By

Introduction

Keeping your Linux system secure requires regularly applying security updates. Distributions like AlmaLinux, Debian, Fedora, SUSE, and Ubuntu release patches for vulnerabilities in core packages—such as freerdp, glib2, libsoup3, openexr, dnsmasq, p7zip, p7zip-rar, python-authlib, rails, chromium, firefox, httpd, nss, java-25-openj9, krb5, libmodsecurity3, mcphost, imagemagick, and multiple linux kernels. This guide will walk you through checking, reviewing, and installing these updates safely.

How to Apply Critical Security Patches on Linux: A Step-by-Step Guide
Source: lwn.net

What You Need

Step-by-Step Instructions

Step 1: Refresh Your Package Metadata

Start by updating the list of available packages. This ensures you see the latest security patches.

Step 2: Review Available Security Updates

List packages that have updates, focusing on security advisories.

Step 3: Apply the Updates

Install all pending security updates. Use the following commands:

Step 4: Reboot After Kernel Updates

If you installed a new kernel (common with linux-aws, linux-azure, linux-gcp, linux-nvidia, etc.), reboot to activate it.

  1. Verify the new kernel is installed: uname -r (check version before rebooting).
  2. Reboot: sudo reboot or sudo systemctl reboot.

Step 5: Confirm Installation

After reboot (or if no reboot required), verify the updates took effect.

Compare versions with the advisory from your distro's security page.

Tips for Smooth Updates

Related Articles

Recommended

Discover More

Weekly Cyber Threat Digest: Key Incidents and Vulnerabilities (April 27)Enhancing Deployment Reliability at GitHub: Using eBPF to Break Circular DependenciesNorth Korea-Linked Hackers Hijack Axios JavaScript Library in Sophisticated Supply Chain AttackWhen Containers Changed Everything: The 500,000-Year-Old Tool That Shaped Humanity5 Key Takeaways from Apple's Growing F1 Presence in Miami