Product
Last Report

Click here to browse the Windows compatibility database

Click here to browse the Linux compatibility database

Click here to browse the macOS compatibility database

Date: 2026-04-14 07:32 | Last update:



2026-04-14

Ubuntu 7049 Published by Philipp Esselbach 0

Ubuntu Linux has issued several security updates aimed at resolving critical vulnerabilities across multiple packages. Critical fixes are required for the Linux kernel used in Azure environments alongside popular tools like Vim and Rust. Users must also patch RetroArch, kvmtool, xdg-dbus-proxy, and Corosync to prevent potential exploitation of these flaws.

[USN-8166-1] RetroArch vulnerability
[USN-8171-1] Vim vulnerabilities
[USN-8163-2] Linux kernel (Azure) vulnerabilities
[USN-8148-6] Linux kernel (Azure) vulnerabilities
[USN-8149-3] Linux kernel (Azure) vulnerabilities
[USN-8172-1] kvmtool vulnerabilities
[USN-8168-1] Rust vulnerability
[LSN-0119-1] Linux kernel vulnerability
[USN-8167-1] xdg-dbus-proxy vulnerability
[USN-8170-1] Corosync vulnerabilities

SUSE 5618 Published by Philipp Esselbach 0

SUSE released multiple important security advisories for their Linux operating system. Most of these updates focus on the Linux Kernel and are delivered as Live Patches for Service Packs ranging from version four to six. Users must also apply separate critical fixes targeting OpenSSL, Python versions, and GraphicsMagick to maintain system integrity. A few moderate severity notices are listed specifically for openSUSE distribution media regarding specific packages like biopython and libcap development files.

SUSE-SU-2026:1261-1: important: Security update for the Linux Kernel (Live Patch 17 for SUSE Linux Enterprise 15 SP6)
SUSE-SU-2026:1258-1: important: Security update for the Linux Kernel (Live Patch 35 for SUSE Linux Enterprise 15 SP5)
SUSE-SU-2026:1259-1: important: Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise 15 SP6)
SUSE-SU-2026:1263-1: important: Security update for the Linux Kernel (Live Patch 25 for SUSE Linux Enterprise 15 SP5)
SUSE-SU-2026:1265-1: important: Security update for the Linux Kernel (Live Patch 46 for SUSE Linux Enterprise 15 SP4)
SUSE-SU-2026:1266-1: important: Security update for the Linux Kernel (Live Patch 20 for SUSE Linux Enterprise 15 SP6)
SUSE-SU-2026:1268-1: important: Security update for the Linux Kernel (Live Patch 38 for SUSE Linux Enterprise 15 SP4)
SUSE-SU-2026:1270-1: important: Security update for the Linux Kernel (Live Patch 33 for SUSE Linux Enterprise 15 SP5)
SUSE-SU-2026:1269-1: important: Security update for the Linux Kernel (Live Patch 37 for SUSE Linux Enterprise 15 SP4)
SUSE-SU-2026:1271-1: important: Security update for the Linux Kernel (Live Patch 14 for SUSE Linux Enterprise 15 SP6)
SUSE-SU-2026:1280-1: important: Security update for the Linux Kernel (Live Patch 41 for SUSE Linux Enterprise 15 SP4)
SUSE-SU-2026:1272-1: important: Security update for the Linux Kernel (Live Patch 18 for SUSE Linux Enterprise 15 SP6)
SUSE-SU-2026:1274-1: important: Security update for the Linux Kernel (Live Patch 19 for SUSE Linux Enterprise 15 SP6)
SUSE-SU-2026:1283-1: important: Security update for the Linux Kernel (Live Patch 13 for SUSE Linux Enterprise 15 SP6)
SUSE-SU-2026:1281-1: important: Security update for the Linux Kernel (Live Patch 42 for SUSE Linux Enterprise 15 SP4)
SUSE-SU-2026:1290-1: important: Security update for openssl-1_1
SUSE-SU-2026:1292-1: important: Security update for python312
SUSE-SU-2026:1291-1: important: Security update for openssl-1_0_0
SUSE-SU-2026:1296-1: important: Security update for python39
openSUSE-SU-2026:10537-1: moderate: python311-biopython-1.87-1.1 on GA media
openSUSE-SU-2026:10536-1: moderate: libcap-devel-2.78-1.1 on GA media
SUSE-SU-2026:1300-1: important: Security update for GraphicsMagick

Slackware 1246 Published by Philipp Esselbach 0

Slackware users need to update libarchive to version 3.8.7 because new security packages have just arrived for the 15.0 release and current branch. The release addresses critical vulnerabilities like heap buffer overflows on 32-bit systems found within the CAB and iso9660 modules. You can grab the updated files from the OSU Open Source Lab or find additional mirrors near you via the main website. Simply run upgradepkg as root after downloading to ensure your system remains secure against potential exploits.

libarchive (SSA:2026-103-01)

Rocky Linux 888 Published by Philipp Esselbach 0

Rocky Linux administrators should install two important security patches for their Node.js environments immediately. One patch covers version 24 on system eight while impacting modules like nodejs-nodemon and packaging tools. Users on the newer platform also need a separate update for version twenty of the software though. Detailed severity ratings for these vulnerabilities are available through the Common Vulnerability Scoring System linked to each CVE list item.

RLSA-2026:7670: Important: nodejs:24 security update
RLSA-2026:7896: Important: nodejs:20 security update

Red Hat 9388 Published by Philipp Esselbach 0

Red Hat Product Security has released important updates for numerous packages including Firefox, golang, and vim across multiple RHEL versions. These advisories cover extended support environments ranging from Enterprise Linux 8 to the latest version 10 releases. Detailed severity ratings are available through Common Vulnerability Scoring System links found within each reference section of the notices, providing a base score for every single vulnerability listed in the advisory. Administrators should prioritize applying these patches immediately to mitigate identified vulnerabilities and maintain system integrity throughout their infrastructure.

RHSA-2026:7850: Important: gstreamer-plugins-base and gstreamer-plugins-good security update
RHSA-2026:7837: Important: firefox security update
RHSA-2026:7845: Important: firefox security update
RHSA-2026:7834: Important: golang security update
RHSA-2026:7843: Important: firefox security update
RHSA-2026:7842: Important: firefox security update
RHSA-2026:7841: Important: firefox security update
RHSA-2026:7839: Important: firefox security update
RHSA-2026:7840: Important: firefox security update
RHSA-2026:7711: Important: vim security update
RHSA-2026:7679: Important: perl-XML-Parser security update
RHSA-2026:7681: Important: perl-XML-Parser security update
RHSA-2026:7682: Important: openexr security update
RHSA-2026:7665: Important: rhc security update
RHSA-2026:7677: Important: fontforge security update
RHSA-2026:7680: Important: perl-XML-Parser security update
RHSA-2026:7672: Important: firefox security update
RHSA-2026:7669: Important: rhc security update
RHSA-2026:7666: Important: nghttp2 security update
RHSA-2026:7854: Important: podman security update
RHSA-2026:7858: Important: firefox security update
RHSA-2026:7838: Important: firefox security update
RHSA-2026:7833: Important: golang security update
RHSA-2026:7876: Important: go-toolset:rhel8 security update
RHSA-2026:7877: Important: go-toolset:rhel8 security update
RHSA-2026:7878: Important: go-toolset:rhel8 security update
RHSA-2026:7942: Important: HawtIO 4.3.1 for Red Hat build of Apache Camel 4 Release and security update.
RHSA-2026:7915: Important: bind9.18 security update
RHSA-2026:7896: Important: nodejs:20 security update
RHSA-2026:7883: Important: golang security update
RHSA-2026:7879: Important: go-toolset:rhel8 security update

Fedora Linux 9311 Published by Philipp Esselbach 0

Security updates for Fedora Linux have been released covering versions 42 through 44 with a heavy focus on version 44. The distribution covers updates for web browsers, system libraries, and various image processing tools. Specific applications such as Chromium and RawTherapee are among the many items requiring immediate attention from administrators.

Fedora 42 Update: webkitgtk-2.52.1-1.fc42
Fedora 43 Update: flatpak-1.16.6-1.fc43
Fedora 43 Update: python-cryptography-46.0.7-1.fc43
Fedora 43 Update: chromium-147.0.7727.55-1.fc43
Fedora 43 Update: webkitgtk-2.52.1-1.fc43
Fedora 44 Update: siril-1.4.2-3.fc44
Fedora 44 Update: vips-8.18.0-6.fc44
Fedora 44 Update: flatpak-1.17.6-1.fc44
Fedora 44 Update: swayimg-5.1-2.fc44
Fedora 44 Update: OpenImageIO2.5-2.5.19.1-10.fc44
Fedora 44 Update: luminance-hdr-2.6.1.1-89.fc44
Fedora 44 Update: LibRaw-0.22.1-1.fc44
Fedora 44 Update: kf6-kimageformats-6.24.0-3.fc44
Fedora 44 Update: shotwell-33~alpha-9.fc44
Fedora 44 Update: gthumb-3.12.10-7.fc44
Fedora 44 Update: ImageMagick-7.1.2.13-2.fc44
Fedora 44 Update: rawtherapee-5.12-8.fc44
Fedora 44 Update: kf5-kimageformats-5.116.0-8.fc44
Fedora 44 Update: photoqt-5.2-3.fc44
Fedora 44 Update: kf5-libkdcraw-23.08.5-7.fc44
Fedora 44 Update: freeimage-3.19.0-0.31.svn1909.fc44
Fedora 44 Update: OpenImageIO-3.1.12.0-2.fc44
Fedora 44 Update: nomacs-3.22.0-5.fc44
Fedora 44 Update: libpasraw-1.3.0-22.fc44
Fedora 44 Update: libkdcraw-26.03.80-2.fc44
Fedora 44 Update: kstars-3.8.0-6.fc44
Fedora 44 Update: elementary-photos-8.0.1-6.fc44
Fedora 44 Update: efl-1.28.1-6.fc44
Fedora 44 Update: dtk6gui-6.7.32-5.fc44
Fedora 44 Update: dtkgui-5.7.30-4.fc44
Fedora 44 Update: geeqie-2.7-2.fc44
Fedora 44 Update: gegl04-0.4.70-2.fc44
Fedora 44 Update: entangle-3.0-17.fc44
Fedora 44 Update: deepin-image-viewer-5.8.2-21.fc44

Debian 10861 Published by Philipp Esselbach 0

Debian issued three security advisories covering critical flaws found within bind9, xdg-dbus-proxy, and gst-plugins-bad1.0 software packages. For BIND resolvers performing DNSSEC validation, a vulnerability exists where malicious zones trigger excessive CPU usage unless users upgrade to version 1:9.16.50-1~deb11u5. The xdg-dbus-proxy update resolves a parsing error that previously allowed attackers to bypass eavesdrop restrictions and leak data. Finally GStreamer users need to update gst-plugins-bad1.0 because malformed media files could lead to denial of service or arbitrary code execution vulnerabilities.

Debian GNU/Linux 11 (Bullseye) LTS:
[DLA 4529-1] bind9 security update
[DLA 4530-1] gst-plugins-bad1.0 security update

Debian GNU/Linux 13 (Trixie):
[DSA 6209-1] xdg-dbus-proxy security update

2026-04-13

Reviews 52610 Published by Philipp Esselbach 0

Funky Kit reviewed the MSI GeForce RTX 5090 Lightning Z as an extreme flagship graphics card available in only 1300 limited units. Input devices took center stage this week with APH Networks testing the Epomaker Luma100 for office desks while Tom's Hardware evaluated budget versus premium models. A networking report from NikKTech highlighted the EnGenius ECW520 as a practical Wi-Fi access point that balances speed with low power consumption. This roundup covers top tier gaming components and essential tools for daily work routines.

Graphics Cards: MSI GeForce RTX 5090 32G LIGHTNING Z Graphics Card Review
Input: Epomaker Luma100 Review, Keychron Q6 Ultra 8K Review: 660 hours of battery life at 8 KHz, HyperX Eve 1800 Review: Not worth $50
Networking: EnGenius ECW520 Cloud Managed WiFi 7 AP Review

Software 44276 Published by Philipp Esselbach 0

Flowblade 2.24.1 arrives to stop your mouse wheel from scrolling backward while you try to cut footage. The update also corrects display scaling issues that were making preview windows look wrong on high-resolution screens. A minor typo in the application menu gets cleaned up alongside these larger fixes for stability. It is a solid patch that keeps the editor usable without adding unnecessary bloat.

Software 44276 Published by Philipp Esselbach 0

The Application Manager for AppImages just hit version 10.1 with a serious push toward autonomy and less manual overhead for anyone managing portable software. A new custom PATH now caches essential binaries like appimagetool locally so the tool stops wasting bandwidth repeatedly downloading them during install or conversion tasks. Updates to option -t and portable2appimage support also streamline handling of GitHub archives that violate standard distribution rules while adding an upgrade alias for convenience. The application count now stands at over 3,019 items with new games and tools added while removing software from slow or obsolete domains.

Linux 3336 Published by Philipp Esselbach 0

Linus Torvalds has officially tagged the final version of Linux Kernel 7.0 after seven release candidates focused on squashing bugs rather than adding features. This update relies heavily on automated tools finding corner cases, which seems to be becoming the new normal for quality control in the development cycle. Users can expect critical patches for networking drivers and laptop hardware quirks that address memory leaks and race conditions without needing manual workarounds.

SUSE 5618 Published by Philipp Esselbach 0

openSUSE has issued multiple security advisories addressing critical flaws within chromium, helm3, and various Python libraries. One major update fixes more than one hundred sixty issues in the chromium browser including dangerous memory corruption bugs found in the V8 engine and WebRTC modules. Additionally, moderate severity patches exist for Flask-HTTPAuth and OpenSSL libraries on Tumbleweed and SLE-based backports to resolve specific validation errors. Administrators should apply these updates using YaST online_update or zypper patch commands to ensure their systems remain protected against the listed exploits.

openSUSE-SU-2026:0124-1: important: Security update for chromium
openSUSE-SU-2026:0121-1: moderate: Security update for python-Flask-HTTPAuth
openSUSE-SU-2026:0122-1: moderate: Security update for python-Flask-HTTPAuth
openSUSE-SU-2026:10532-1: moderate: helm3-3.20.2-1.1 on GA media
openSUSE-SU-2026:10530-1: moderate: chromedriver-147.0.7727.55-1.1 on GA media
openSUSE-SU-2026:10533-1: moderate: libopenssl-3-devel-3.5.3-4.1 on GA media

Rocky Linux 888 Published by Philipp Esselbach 0

Two security updates have been released for Rocky Linux 10 to address critical vulnerabilities affecting system stability. An Important fix is required for the nodejs22 package, but the kernel update carries a lower Moderate rating in this cycle. You can access detailed CVSS base scores directly from the official CVE list for every single vulnerability mentioned in these notices.

RLSA-2026:7080: Important: nodejs22 security update
RLSA-2026:6632: Moderate: kernel security update

Red Hat 9388 Published by Philipp Esselbach 0

Red Hat Product Security has rated several new advisories as having an important security impact for various Linux distributions. Updates are available now for nodejs, firefox, and gstreamer plugins across RHEL versions seven through ten. You should check the CVSS details linked within each notice for specific risk ratings before updating systems immediately. If you need more information regarding these errata, you can access it directly via the Red Hat access portal links provided in the original notices.

RHSA-2026:7670: Important: nodejs:24 security update
RHSA-2026:7674: Important: rhc security update
RHSA-2026:7668: Important: nghttp2 security update
RHSA-2026:7673: Important: gstreamer1-plugins-bad-free, gstreamer1-plugins-base, and gstreamer1-plugins-good security update
RHSA-2026:7671: Important: firefox security update
RHSA-2026:7675: Important: nodejs24 security update
RHSA-2026:7678: Important: openexr security update
RHSA-2026:7667: Important: nghttp2 security update
RHSA-2026:7676: Important: rhc security update

Fedora Linux 9311 Published by Philipp Esselbach 0

Fedora has released multiple security updates for versions 42 and 43 to address critical vulnerabilities found across various software packages. Fixes include patches for libcap, libpng, and vim which resolve issues ranging from memory corruption to potential denial of service attacks. Users are urged to apply the updates immediately. Installation is handled via the standard dnf upgrade command using the advisory identifiers provided within each notification message for verification purposes.

Fedora 43 Update: libcap-2.76-4.fc43
Fedora 43 Update: libpng-1.6.56-1.fc43
Fedora 43 Update: trivy-0.69.3-1.fc43
Fedora 43 Update: pdns-recursor-5.2.8-1.fc43
Fedora 42 Update: pdns-recursor-5.2.8-1.fc42
Fedora 42 Update: vim-9.2.280-1.fc42
Fedora 42 Update: polkit-126-3.fc42.2
Fedora 42 Update: mupdf-1.26.3-6.fc42
Fedora 42 Update: trafficserver-10.1.2-1.fc42
Fedora 42 Update: corosync-3.1.9-4.fc42
Fedora 42 Update: mingw-exiv2-0.28.8-1.fc42
Fedora 42 Update: libmicrohttpd-1.0.3-1.fc42
Fedora 42 Update: yarnpkg-1.22.22-18.fc42
Fedora 43 Update: mupdf-1.27.1-10.fc43
Fedora 43 Update: trafficserver-10.1.2-1.fc43
Fedora 43 Update: yarnpkg-1.22.22-18.fc43
Fedora 43 Update: mingw-exiv2-0.28.8-1.fc43
Fedora 43 Update: libmicrohttpd-1.0.3-1.fc43

Debian 10861 Published by Philipp Esselbach 0

Recent Debian security advisories highlight critical updates for MediaWiki, Flatpak, and FFmpeg that address multiple vulnerabilities discovered in these tools. While the MediaWiki patch fixes issues regarding information disclosure and permission checks across oldstable and stable distributions, Flatpak requires an upgrade to prevent sandbox escapes or arbitrary host deletions. The most extensive list of flaws appears within the FFmpeg advisory, which covers buffer overflows and integer errors capable of triggering denial of service attacks remotely. System administrators are strongly urged to apply these specific package versions immediately to maintain security posture against disclosed exploits.

Debian GNU/Linux 10 (Buster) ELTS:
ELA-1681-1 ffmpeg security update

Debian GNU/Linux 12 (Bookworm) and 13 (Trixie):
[DSA 6208-1] mediawiki security update

Debian GNU/Linux 13 (Trixie):
[DSA 6207-1] flatpak security update

[ Archive ]