How to Apply Critical Security Patches on Linux: A Step-by-Step Guide

By • min read

Introduction

Keeping your Linux system secure requires regularly applying security updates. Distributions like AlmaLinux, Debian, Fedora, SUSE, and Ubuntu release patches for vulnerabilities in core packages—such as freerdp, glib2, libsoup3, openexr, dnsmasq, p7zip, p7zip-rar, python-authlib, rails, chromium, firefox, httpd, nss, java-25-openj9, krb5, libmodsecurity3, mcphost, imagemagick, and multiple linux kernels. This guide will walk you through checking, reviewing, and installing these updates safely.

How to Apply Critical Security Patches on Linux: A Step-by-Step Guide
Source: lwn.net

What You Need

Step-by-Step Instructions

Step 1: Refresh Your Package Metadata

Start by updating the list of available packages. This ensures you see the latest security patches.

Step 2: Review Available Security Updates

List packages that have updates, focusing on security advisories.

Step 3: Apply the Updates

Install all pending security updates. Use the following commands:

Step 4: Reboot After Kernel Updates

If you installed a new kernel (common with linux-aws, linux-azure, linux-gcp, linux-nvidia, etc.), reboot to activate it.

  1. Verify the new kernel is installed: uname -r (check version before rebooting).
  2. Reboot: sudo reboot or sudo systemctl reboot.

Step 5: Confirm Installation

After reboot (or if no reboot required), verify the updates took effect.

Compare versions with the advisory from your distro's security page.

Tips for Smooth Updates

Recommended

Discover More

Diablo 4: Lord of Hatred Expansion Ending Explained and What Comes NextMicrosoft Defender False Positive Tags Legitimate DigiCert Root Certificates as TrojanThe AI Regulation Proxy War: Chris Larsen's $3.5M Gamble in New York's Congressional RaceDamaged RTX 5090 GPUs Sold at Half Price by French Retailer—Risk vs. Reward for DIY RepairsWhy New Linux File-Systems Face Higher Hurdles: Q&A on Kernel Guidelines