Product
Last Report

Click here to browse the Windows compatibility database

Click here to browse the Linux compatibility database

Click here to browse the macOS compatibility database

Date: 2026-05-13 10:05 | Last update:



2026-05-13

Reviews 52636 Published by Philipp Esselbach 0

Today's reviews roundup bring several new gadgets that bring distinct advantages to different workflows. The GEEKOM A7 Max handles office tasks efficiently but struggles with heavier gaming because its limited memory configuration restricts graphics performance, while Dell countered with a surprisingly fast XPS 16 model that pairs an elegant thin chassis with a brilliant OLED screen. Gamers seeking better peripherals should look into the GuliKit TT PRO and MAX controllers since they deliver precise tracking and extensive customization options across multiple platforms. Enterprise storage also saw major improvements as Memblaze introduced a QLC drive capable of exceeding three million random read operations per second.

Computers: GEEKOM A7 Max Review, Dell XPS 16 (2026) Review: Thin, Elegant And Surprisingly Fast
Input: GuliKit TT PRO and TT MAX review: precise control with real customization
Storage: Memblaze PBlaze 7 7A40 Ocean 61.44TB Enterprise SSD Review - Oceans of QLC at 3.3 million IOPS

Ubuntu 7084 Published by Philipp Esselbach 0

Ubuntu released two security updates to address critical flaws in ImageMagick and Exim across several supported distributions. The first notice covers multiple versions of the image processing library, warning that specially crafted pictures could trick the software into running malicious code or crashing entirely. Meanwhile, mail server admins running Ubuntu 22.04 through 26.04 need to patch a parsing flaw that lets attackers crash the service or execute arbitrary commands. Both issues resolve through routine package updates, so system administrators should apply the latest security patches as soon as possible to keep their infrastructure secure.

[USN-8263-1] ImageMagick vulnerabilities
[USN-8270-1] Exim vulnerability

SUSE 5645 Published by Philipp Esselbach 0

OpenSUSE recently released a set of security updates for its Tumbleweed distribution that address multiple flaws across several important packages. The patches specifically target the Go programming environment, the Qt6 SVG rendering library, Mozilla Thunderbird, and the assimp development toolkit. Several of these issues carry CVSS scores near or above 7.5, creating serious risks like remote code execution or service disruption if left unpatched. IT teams should prioritize installing these fixes to protect their systems from the newly disclosed exploits.

openSUSE-SU-2026:10741-1: moderate: go1.26-1.26.3-1.1 on GA media
openSUSE-SU-2026:10742-1: moderate: libQt6Svg6-6.11.0-2.1 on GA media
openSUSE-SU-2026:10738-1: moderate: MozillaThunderbird-140.10.2-1.1 on GA media
openSUSE-SU-2026:10739-1: moderate: assimp-devel-6.0.5-2.1 on GA media

Slackware 1259 Published by Philipp Esselbach 0

Slackware has released updated expat packages to address a critical security flaw in versions 15.0 and current development releases. The vulnerability stems from quadratic runtime complexity during attribute name collision checks, which attackers could exploit through moderately sized crafted XML files. Compressed XML payloads can make this denial of service threat even more efficient to execute. Administrators should download the patched binaries from official mirrors and apply them using standard upgrade procedures to secure their systems.

expat (SSA:2026-132-01)

Red Hat 9411 Published by Philipp Esselbach 0

Red Hat recently published numerous security advisories for RHEL versions eight through ten, covering specialized release channels such as SAP Solutions and Extended Update Support. These patches address vulnerabilities in core components like the kernel, container tools, Go toolset, Python, OpenShift, plus several standalone applications including jq, gimp, freerdp, skopeo, and podman. The majority of the updates carry an Important severity rating based on CVSS metrics, while a few freerdp releases sit at Moderate levels. IT teams ought to examine the referenced CVE details carefully before rolling out these changes to avoid unexpected disruptions.

RHSA-2026:16204: Important: kernel security update
RHSA-2026:16202: Important: kernel security update
RHSA-2026:16195: Important: kernel security update
RHSA-2026:16201: Important: kernel security update
RHSA-2026:16203: Important: kernel-rt security update
RHSA-2026:16196: Important: kernel-rt security update
RHSA-2026:16252: Important: jq security update
RHSA-2026:16254: Important: kernel-rt security update
RHSA-2026:16206: Important: kernel security update
RHSA-2026:16210: Important: kpatch-patch-4_18_0-477_107_1, kpatch-patch-4_18_0-477_120_1, kpatch-patch-4_18_0-477_124_1, kpatch-patch-4_18_0-477_130_1, kpatch-patch-4_18_0-477_89_1, and ...
RHSA-2026:16208: Important: kpatch-patch-5_14_0-284_104_1, kpatch-patch-5_14_0-284_117_1, kpatch-patch-5_14_0-284_134_1, kpatch-patch-5_14_0-284_148_1, and kpatch-patch-5_14_0-284_158_1 ...
RHSA-2026:16209: Important: kpatch-patch-5_14_0-70_124_1, kpatch-patch-5_14_0-70_132_1, kpatch-patch-5_14_0-70_144_1, kpatch-patch-5_14_0-70_155_1, and kpatch-patch-5_14_0-70_167_1 secur ...
RHSA-2026:16701: Important: container-tools:rhel8 security update
RHSA-2026:16694: Important: go-toolset:rhel8 security update
RHSA-2026:16702: Important: podman security update
RHSA-2026:16697: Important: go-toolset:rhel8 security update
RHSA-2026:16698: Important: go-toolset:rhel8 security update
RHSA-2026:16693: Important: jq security update
RHSA-2026:16692: Important: jq security update
RHSA-2026:16699: Important: python3.12 security update
RHSA-2026:16695: Important: webkit2gtk3 security update
RHSA-2026:16696: Important: skopeo security update
RHSA-2026:16161: Important: OpenShift Container Platform 4.19.31 bug fix and security update
RHSA-2026:16160: Important: OpenShift Container Platform 4.18.41 bug fix and security update
RHSA-2026:16482: Moderate: freerdp security update
RHSA-2026:16312: Important: kernel security update
RHSA-2026:16484: Important: gimp security update
RHSA-2026:16483: Moderate: freerdp security update
RHSA-2026:16498: Important: golang security update
RHSA-2026:16485: Moderate: freerdp security update
RHSA-2026:16494: Important: golang security update
RHSA-2026:16497: Important: golang security update
RHSA-2026:16314: Important: kernel security update
RHSA-2026:16328: Important: kernel security update

Debian 10904 Published by Philipp Esselbach 0

Debian issued two separate security advisories that address serious flaws within the exim4 mail transport agent. Attackers could exploit these weaknesses to run malicious code remotely, crash systems through denial of service attacks, or steal confidential information. Official patches are now available for Debian GNU/Linux 11 (Bullseye) LTS, 12 (Bookworm), and 13 (Trixie), with specific version numbers listed for each distribution. System owners must upgrade their packages immediately to close these dangerous security gaps before attackers can cause damage.

[DLA 4580-1] exim4 security update
[DSA 6265-1] exim4 security update
2026-05-12

Software 44368 Published by Philipp Esselbach 0

Samba 4.24.2 drops a stable update that finally plugs a GlusterFS memory leak draining RAM on persistent SMB2 connections. The release patches CVE-2026-40170, fixes the Windows Offline Files permission errors that break laptop sync, and repairs winbindd crashes that have been tripping up domain controllers. Administrators should pull the update through their package manager or compile it manually after testing in a staging environment. Keeping the server patched stops those predictable memory spikes and keeps client sync workflows from falling apart.

KDE 1725 Published by Philipp Esselbach 0

KDE Plasma 6.6.5 finally patches the compositor and display quirks that usually make Linux desktops feel unfinished. The update stabilizes window management on multi-GPU setups, fixes monitor scaling conflicts with HDR, and cleans up launcher behavior so menus actually respond correctly. Users should back up their configuration files before installing through standard package managers since the compositor changes sometimes overwrite saved monitor profiles during the first login. It is a quiet but necessary release that removes enough rough edges to make daily desktop work noticeably smoother without demanding workflow adjustments.

Reviews 52636 Published by Philipp Esselbach 0

Creative Sound Blaster Audigy FX Pro gets a thorough teardown alongside direct performance measurements against integrated audio during idle tasks and gaming sessions. Meanwhile Noctua pushes its NH-D15 G2 chromax.black air cooler into a market now dominated by 360mm liquid cooling solutions that typically run cooler. Gamers will appreciate the TCL 27R944K display since it pairs Mini LED brightness with highly responsive frame rates for competitive play. The collection also rounds out with budget friendly gear like the lightweight Sharkoon SKILLER SGM70W mouse before finishing on the ASUS ROG Strix X870E-A motherboard that balances modern connectivity against more affordable competitor boards.

Audio: Creative Sound Blaster Audigy FX Pro Review
Cooling: Noctua NH-D15 G2 chromax.black Review: Air vs 360mm AIO on Intel and AMD
Displays: TCL 27R944K 165 Hz gaming monitor review: Mini LED with high brightness and high performance
Headphones: OneOdio Studio Max 2 Wireless DJ Headphones review: 45mm drivers with Ultra-low Latency
Input: Sharkoon SKILLER SGM70W Review
Motherboards: ASUS ROG Strix X870E-A Gaming Wi-Fi 7 Neo Review

Tails 89 Published by Philipp Esselbach 0

Tails just pushed version 7.7.3 as an emergency patch because Dirty Frag lets local apps slip past sandbox limits and grab root access. The release also bundles newer Tor Browser, Tor client, Thunderbird, and firmware updates to close other holes that could quietly leak identity data. Since this live system wipes its own partitions on reboot, you will need to flash a fresh USB drive or swap the virtual disk image to actually get the fix in place. Skipping this update leaves your anonymity setup wide open to exploit chains, so grab the new ISO and keep those circuits clean.

SparkyLinux 92 Published by Philipp Esselbach 0

Sparky Linux 8.3 drops as a routine quarterly refresh built on Debian 13 Trixie, swapping in newer kernels and polishing up KDE Plasma, Xfce, LXQt, MATE, and Openbox for smoother daily use. Core apps like LibreOffice, Firefox ESR, and Thunderbird get their own updates so users do not have to wait months for basic productivity tools to catch up. Anyone running an older Sparky 8 install can just run the standard package manager commands instead of wasting time flashing a fresh ISO or risking broken configs. The build covers both amd64 and ARM64 machines with secure boot ready out of the box, making it a low stress upgrade for anyone who prefers stable systems over constant reinstallation headaches.

Software 44368 Published by Philipp Esselbach 0

Godot 4.7 beta 2 has arrived with over one hundred regression fixes aimed at stabilizing the engine after the first beta release. Key improvements include patching a critical resource loading race condition, refining HDR support for Wayland systems, and removing experimental warnings from Android Gradle builds. Developers should also note deprecated GDExtension casting methods that now require safer alternatives, alongside minor editor tweaks like undo functionality for 3D camera navigation. The team is actively asking testers to report any fresh issues as seventy-four contributors continue polishing the engine ahead of the stable launch.

Debian 10904 Ubuntu 7084 Published by Philipp Esselbach 0

The latest XanMod kernel releases bring targeted performance tweaks to Debian and Ubuntu systems, focusing on sustained responsiveness during heavy workloads rather than raw benchmark scores. Users get optimized memory management through Google's multigenerational LRU framework, faster network stacks with BBRv3 congestion control, and dedicated drivers for AMD 3D V-Cache and Steam Deck hardware. The build also ships a real-time PREEMPT_RT variant alongside standard desktop optimizations, making it a solid drop-in replacement for power users who want smoother multitasking. Installation is straightforward through the official APT repository, though users should double-check compatibility with proprietary drivers like NVIDIA or VirtualBox before rebooting since those modules often lag behind new kernel versions.

Debian 10904 Ubuntu 7084 Arch Linux 959 Published by Philipp Esselbach 0

Liquorix Linux Kernel 7.0-6 trades standard power-saving compromises for aggressive desktop tuning that keeps gaming and audio workflows noticeably snappier. The build shrinks the CPU scheduler timeslice to two milliseconds and lowers frequency scaling thresholds so the processor actually ramps clocks when an application demands it. Disk I/O now defaults to kyber or bfq schedulers while split lock mitigation shuts off by default, since those features usually just throttle performance without offering real security benefits on modern hardware. Debian and Ubuntu users can grab the update through a single official script that drops straight into their package manager with easy rollback options if the new tuning causes hiccups.

Software 44368 Published by Philipp Esselbach 0

PgBouncer 1.25.2 drops four security patches that stop malformed authentication packets from crashing the connection pooler and locks down an admin command that previously let anyone kill active database sessions. The update also plugs a null pointer crash triggered by legacy error responses and cleans up confusing documentation for pool sizing and TLS cipher settings. Database teams should upgrade right away since those SCRAM vulnerabilities can be exploited remotely without any valid credentials. A quick audit of the admin_users configuration file will keep session termination locked down to trusted operators before rolling out the patch to production clusters.

Software 44368 Published by Philipp Esselbach 0

The latest pgAdmin 4 release slams shut eight security holes that previously let attackers escalate privileges or run commands on your host machine. Docker setups finally get proper user ID handling, and the Debian installer stops breaking when standard system paths sit outside the default search directory. BigAnimal cloud provisioning gets deprecated as the team drops legacy integrations to focus on core stability. The prior build also finally tames the AI assistant with working context memory, custom LLM endpoints, and a geometry viewer that actually refreshes instead of showing stale data.

Ubuntu 7084 Published by Philipp Esselbach 0

Ubuntu released several security notices to patch critical flaws across multiple Linux kernel variants. These updates target specific hardware and cloud environments such as Raspberry Pi devices, NVIDIA Tegra systems, and major platforms like Azure, AWS, GCP, and Oracle. The patches resolve numerous vulnerabilities that could allow attackers to compromise system integrity or escalate privileges through affected subsystems. Administrators should apply the recommended package upgrades and restart their machines, keeping in mind that an ABI change will require recompiling any custom kernel modules.

[USN-8200-3] Linux kernel (Raspberry Pi) vulnerabilities
[USN-8265-1] Linux kernel (NVIDIA Tegra) vulnerabilities
[USN-8267-1] Linux kernel vulnerabilities
[USN-8266-1] Linux kernel vulnerabilities
[USN-8255-2] Linux kernel (Azure) vulnerabilities
[USN-8254-2] Linux kernel (NVIDIA) vulnerabilities
[USN-8180-6] Linux kernel (Raspberry Pi) vulnerabilities

SUSE 5645 Published by Philipp Esselbach 0

Recent SUSE security bulletins address numerous vulnerabilities across their Linux distributions and associated software packages. These patches cover the Linux kernel, php-composer2, libmodsecurity3, Java OpenJ9, mcphost, and krb5 authentication libraries to resolve flaws that could enable unauthorized access or service disruptions. Many of the referenced CVEs carry high severity scores, with specific mitigations targeting memory corruption in network schedulers and command injection vulnerabilities within development tools.

SUSE-SU-2026:1787-1: important: Security update for the Linux Kernel (Live Patch 18 for SUSE Linux Enterprise 15 SP6)
SUSE-SU-2026:1784-1: important: Security update for php-composer2
SUSE-SU-2026:1793-1: important: Security update for the Linux Kernel (Live Patch 13 for SUSE Linux Enterprise 15 SP6)
SUSE-SU-2026:1802-1: important: Security update for the Linux Kernel (Live Patch 21 for SUSE Linux Enterprise 15 SP6)
SUSE-SU-2026:1801-1: important: Security update for the Linux Kernel (Live Patch 19 for SUSE Linux Enterprise 15 SP6)
SUSE-SU-2026:1798-1: important: Security update for the Linux Kernel (Live Patch 32 for SUSE Linux Enterprise 15 SP5)
SUSE-SU-2026:1804-1: important: Security update for the Linux Kernel (Live Patch 33 for SUSE Linux Enterprise 15 SP5)
openSUSE-SU-2026:10732-1: moderate: libmodsecurity3-3.0.15-1.1 on GA media
openSUSE-SU-2026:10728-1: moderate: java-25-openj9-25.0.3.0-1.1 on GA media
openSUSE-SU-2026:10731-1: moderate: mcphost-0.34.0-1.1 on GA media
openSUSE-SU-2026:10729-1: moderate: krb5-1.22.2-3.1 on GA media

Rocky Linux 906 Published by Philipp Esselbach 0

Rocky Linux administrators need to deploy four new security patches that address vulnerabilities across several core libraries. The most critical update targets mingw-libtiff on version eight of the operating system, while two separate moderate fixes resolve libpng flaws for releases nine and ten respectively. A fourth patch handles freeipmi issues within the Rocky Linux nine environment. Each advisory includes detailed CVSS ratings so teams can prioritize deployment based on actual risk levels.

RLSA-2026:14929: Important: mingw-libtiff security update
RLSA-2026:14790: Moderate: libpng security update
RLSA-2026:14791: Moderate: libpng security update
RLSA-2026:14819: Moderate: freeipmi security update

Red Hat 9411 Published by Philipp Esselbach 0

Red Hat recently rolled out numerous security advisories for RHEL systems across versions seven through ten. Administrators will find critical fixes for widely used tools including nginx, bind, golang, and the Linux kernel itself. The company assigned an Important or Moderate impact level to each vulnerability, with full CVSS details available in the reference links. You should schedule these installations quickly to keep your networks secure against emerging threats.

RHSA-2026:15940: Moderate: oci-seccomp-bpf-hook security update
RHSA-2026:15941: Moderate: skopeo security update
RHSA-2026:15980: Important: rhc security update
RHSA-2026:15978: Important: kpatch-patch-5_14_0-611_36_1 and kpatch-patch-5_14_0-611_9_1 security update
RHSA-2026:15971: Moderate: glib2 security update
RHSA-2026:15976: Important: kpatch-patch-4_18_0-553_109_1, kpatch-patch-4_18_0-553_40_1, kpatch-patch-4_18_0-553_53_1, kpatch-patch-4_18_0-553_72_1, and kpatch-patch-4_18_0-553_85_1 secu ...
RHSA-2026:15967: Moderate: libxml2 security update
RHSA-2026:15945: Important: nginx:1.24 security update
RHSA-2026:12071: Important: OpenShift Container Platform 4.18.39 bug fix and security update
RHSA-2026:15942: Important: nginx security update
RHSA-2026:15926: Important: LibRaw security update
RHSA-2026:16111: Important: kpatch-patch-4_18_0-372_137_1, kpatch-patch-4_18_0-372_145_1, kpatch-patch-4_18_0-372_158_1, kpatch-patch-4_18_0-372_170_1, and kpatch-patch-4_18_0-372_181_1 ...
RHSA-2026:16100: Important: kernel security update
RHSA-2026:16101: Important: host-metering security update
RHSA-2026:16102: Important: buildah security update
RHSA-2026:15969: Moderate: glib2 security update
RHSA-2026:16062: Important: kernel security update
RHSA-2026:15968: Moderate: libsoup3 security update
RHSA-2026:15888: Important: openexr security update
RHSA-2026:16055: Important: libtiff security update
RHSA-2026:16059: Important: openssh security update
RHSA-2026:16060: Important: bind security update
RHSA-2026:16063: Important: kpatch-patch-5_14_0-427_100_1, kpatch-patch-5_14_0-427_106_1, kpatch-patch-5_14_0-427_113_1, kpatch-patch-5_14_0-427_55_1, kpatch-patch-5_14_0-427_68_2, and k ...
RHSA-2026:16061: Important: kernel security update
RHSA-2026:16064: Important: bind security update
RHSA-2026:16056: Important: webkit2gtk3 security update
RHSA-2026:16021: Important: golang security update
RHSA-2026:16019: Moderate: freerdp security update
RHSA-2026:16024: Important: golang security update
RHSA-2026:16014: Moderate: freerdp security update
RHSA-2026:16018: Important: kpatch-patch-5_14_0-570_17_1, kpatch-patch-5_14_0-570_39_1, kpatch-patch-5_14_0-570_66_1, and kpatch-patch-5_14_0-570_94_1 security update
RHSA-2026:15966: Important: nginx:1.26 security update
RHSA-2026:15953: Moderate: glib2 security update
RHSA-2026:15943: Important: nginx:1.24 security update

Oracle Linux 6482 Published by Philipp Esselbach 0

Oracle has rolled out multiple security patches for its Unbreakable Enterprise kernel across Linux versions seven through ten. These updates mainly address CVE-2026-43284 and CVE-2026-43500, which involve flawed packet fragment handling within the rxrpc and xfrm esp networking components. Beyond those critical flaws, the release also fixes a wide range of problems touching cryptographic routines, IOMMU tracking features, and general memory management for both Intel and ARM processors. IT teams should prioritize installing these kernel upgrades right away to keep their infrastructure secure.

ELSA-2026-50259 Important: Oracle Linux 9 Unbreakable Enterprise kernel security update: Dirty Frag
ELSA-2026-50257 Important: Oracle Linux 9 Unbreakable Enterprise kernel security update: Dirty Frag
ELSA-2026-50257 Important: Oracle Linux 8 Unbreakable Enterprise kernel security update: Dirty Frag
ELSA-2026-50258 Important: Oracle Linux 8 Unbreakable Enterprise kernel security update: Dirty Frag
ELSA-2026-50257 Important: Oracle Linux 9 Unbreakable Enterprise kernel security update: Dirty Frag
ELSA-2026-50258 Important: Oracle Linux 7 Unbreakable Enterprise kernel security update: Dirty Frag
ELSA-2026-50258 Important: Oracle Linux 8 Unbreakable Enterprise kernel security update: Dirty Frag
ELSA-2026-50259 Important: Unbreakable Enterprise kernel security update: Dirty Frag

Fedora Linux 9348 Published by Philipp Esselbach 0

Fedora users on versions 42, 43, and 44 should apply several critical security patches to keep their systems protected. The updates bring Network Security Services and Firefox up to version 150.0.1 alongside NSS 3.122.2 across all affected releases. Chromium receives a massive security overhaul that addresses dozens of memory corruption flaws and use-after-free vulnerabilities in its core components. Meanwhile, Fedora 44 also gets Apache HTTP Server updated to 2.4.67, which fixes serious issues like arbitrary code execution through the mod_proxy_ajp module.

Fedora 43 Update: nss-3.122.2-1.fc43
Fedora 43 Update: chromium-148.0.7778.96-1.fc43
Fedora 43 Update: firefox-150.0.1-1.fc43
Fedora 42 Update: nss-3.122.2-1.fc42
Fedora 42 Update: firefox-150.0.1-1.fc42
Fedora 44 Update: firefox-150.0.1-1.fc44
Fedora 44 Update: nss-3.122.2-1.fc44
Fedora 44 Update: httpd-2.4.67-1.fc44

Debian 10904 Published by Philipp Esselbach 0

Debian issued multiple security advisories that target serious vulnerabilities in popular packages including dnsmasq, python-authlib, rails, and p7zip. Attackers could exploit these flaws to bypass authentication mechanisms, trigger remote code execution, or crash systems via memory corruption and denial of service attacks. System administrators should upgrade their affected software immediately since the patched versions are already available for various Debian releases. You can find exact version numbers and detailed tracking information on the official Debian security pages.

[DSA 6264-1] dnsmasq security update
[DLA 4579-1] python-authlib security update
[DLA 4578-1] rails security update
[DLA 4577-1] p7zip-rar security update
[DLA 4576-1] p7zip security update
ELA-1716-1 rails security update

AlmaLinux 2560 Published by Philipp Esselbach 0

AlmaLinux released a batch of security patches for versions 8 through 10. The openexr update carries an important rating because it blocks arbitrary code execution triggered by malicious image files. Moderate fixes also target memory corruption bugs in glib2, denial of service flaws in libsoup3 and freerdp, plus several heap overflow issues that could leak sensitive data. System administrators should install these errata immediately to close the documented vulnerability gaps across their infrastructure.

ALSA-2026:15888: openexr security update (Important)
ALSA-2026:15968: libsoup3 security update (Moderate)
ALSA-2026:15971: glib2 security update (Moderate)
ALSA-2026:16019: freerdp security update (Moderate)
ALSA-2026:15953: glib2 security update (Moderate)

[ Archive ]