An important update has been released for the libQt5Pdf5 package in openSUSE Tumbleweed, addressing 16 identified security vulnerabilities. This update, classified as moderate in severity, includes fixes for various issues associated with the Qt5 PDF and web engine components. Users are strongly advised to apply this update to ensure the security and stability of their systems.
Tcpreplay and Chromium packages for Fedora
Fedora has recently updated two important packages: tcpreplay and Chromium, for versions 41 and 42. The tcpreplay package has been upgraded from version 4.5.1 to 4.5.2, addressing multiple security vulnerabilities, including heap overflow and use-after-free issues. Similarly, Fedora 42's Chromium browser has been updated from version 140.0.7338.x to 140.0.7339.80, also to mitigate several security vulnerabilities, particularly use-after-free vulnerabilities and improper implementations.
Firefox, Python, QT5-QT3D, Opentelemetry, AIDE updates for RHEL
Red Hat Enterprise Linux (RHEL) has released multiple security updates for various software packages, including Firefox and Python 3.9. The updates are categorized by Red Hat Product Security as either Important or Moderate, with detailed severity ratings provided through the Common Vulnerability Scoring System (CVSS). These updates are applicable to several RHEL versions ranging from 8.2 to 9.4.
PikaOS 25.09.06 is Now Available
PikaOS has released its latest version, 25.09.06, a Debian-based Linux distribution tailored specifically for gamers, offering an unparalleled out-of-the-box experience. This version emphasizes exceptional ease of use and high compatibility with a wide range of hardware and software. Key features include up-to-date drivers, a custom-tweaked kernel that enhances performance, and a fully automated setup process that simplifies installation, eliminating the need for manual configuration.
Debian GNU Linux 13.1 Trixie Live Images released
Debian GNU/Linux 13.1 "Trixie" Live Images have been released, showcasing several popular desktop environments, including GNOME, KDE Plasma, Xfce, Cinnamon, MATE, LXQt, and LXDE. These Live Images allow users to test and explore the capabilities of Debian before installation, highlighting its stability and versatility, which have made it a preferred choice among developers and system administrators.
Wireless-RegDB new upstream version for Debian 11 LTS
An updated version of the wireless-regdb package has been released for Debian GNU/Linux 11 (Bullseye) Long Term Support (LTS). The new version, 2025.07.10-1~deb11u1, introduces changes related to radio regulations in various countries.
YQ and Kea updates for Fedora
The Fedora project has announced security updates for versions 41 and 42 to address several vulnerabilities. Key updates include:
Chromedriver, Libsixel, Trivy, 7zip, Go updates for openSUSE
openSUSE Tumbleweed has released several moderate security updates addressing vulnerabilities in various packages, including chromedriver, libsixel, trivy, 7zip, and Go version 1.25. These updates collectively address eight identified vulnerabilities, with specific Common Vulnerabilities and Exposures (CVE) codes including CVE-2025-9864, CVE-2025-9865, CVE-2025-9866, CVE-2025-9867, CVE-2025-9300, CVE-2025-46569, CVE-2025-53816, and CVE-2025-47910.
Debian GNU Linux 13.1 released: The first Point Release of Trixie
Debian GNU/Linux 13.1, codenamed Trixie, has officially released its first point update. This update primarily aims to address various security vulnerabilities and critical bugs within the system. Key packages that have received critical updates include imagemagick, libcoap3, and postgresql-17, among others. Users with existing installations can upgrade their systems by connecting to any of Debian's HTTP mirrors, while new installation images will be accessible in the usual locations soon.
Debian GNU Linux 12.12 released
The Debian project has released version 12.12 of Debian GNU/Linux, aimed at enhancing the security and stability of its old stable distribution, Debian 12 (Bookworm). This significant update includes a plethora of security patches and bug fixes for critical packages, such as Apache2, Botan, Glibc, OpenSSL, PostgreSQL-15, and Python-Django, among others. The updated Debian Installer also incorporates these fixes for users opting for new installations.
Linux Mint 22.2 released
Linux Mint 22.2, codenamed "Zara," has been officially released as a long-term support version, ensuring updates and stability until 2029. This release introduces a range of updated software and enhancements aimed at improving user experience and comfort.
SparkyLinux 8.0.1 released
SparkyLinux has announced the release of version 8.0.1, which includes minor updates to its live and install ISO images. This update specifically addresses a bug in the Calamares installer that hindered the proper setup of systems on encrypted disks. Existing users of SparkyLinux do not need to reinstall the operating system; they can simply keep their current installation up to date. The updated ISO images are readily available for download from the SparkyLinux stable page.
Chromium, GN, Nginx, and more updates for SUSE
SUSE Linux has recently released a series of security updates addressing various vulnerabilities, with key updates for software such as Chromium, GN, nginx, and others.
Chromium security update for Debian 12 and 13
On September 5, 2025, Debian announced a security update for the Chromium package to address several vulnerabilities, identified by CVE IDs CVE-2025-9864, CVE-2025-9865, CVE-2025-9866, and CVE-2025-9867. These vulnerabilities pose risks such as arbitrary code execution, denial of service, and potential information disclosure. The updates are available for both Debian GNU/Linux versions 12 (Bookworm) and 13 (Trixie), with the respective fixed versions being 140.0.7339.80-1deb12u1 for Bookworm and 140.0.7339.80-1deb13u1 for Trixie.
Liquorix Linux Kernel 6.16-4 released
The Liquorix Linux Kernel 6.16-4 has been released, building on Kernel 6.16.5. This custom kernel is specifically designed for enhancing desktop, multimedia, and gaming experiences by prioritizing system responsiveness, albeit at the expense of throughput and power consumption. Key optimizations in this release include a switch to the BFQ scheduler for improved resource management, upgraded virtual memory management, and enhanced CPU frequency settings aimed at boosting performance during intensive workloads.
KDE neon 20250904 released
KDE neon 20250904 has been released, showcasing the latest software from the KDE community. This distribution is designed for users who crave the newest features and updates as soon as they are available, making it perfect for KDE enthusiasts willing to explore cutting-edge technology. KDE neon ensures that users have access to the Plasma Desktop and KDE applications that are consistently updated, enabling them to tailor their computing environment to their preferences.
Clamav security updates for Debian 9, 10, and 11
ClamAV, a popular antivirus utility for Unix systems, has received critical security updates for Debian versions 9, 10, and 11 to address two significant vulnerabilities: CVE-2025-20128 and CVE-2025-20260.
RubyGems, PHP, Django, FFmpeg updates for Ubuntu
Summary of Recent Security Updates for RubyGems, PHP, Django, and FFmpeg on Ubuntu
Redis, Python-Django, Rav1e, GIMP, Himmelblau, Firefox, DCMTK updates for SUSE
In October 2023, several security updates were released for SUSE Linux, addressing vulnerabilities in key software packages such as Redis, Python-Django, GIMP, Rav1e, Himmelblau, Mozilla Firefox, and DCMTK. These updates are critical for maintaining system security and ensuring that users are protected against potential exploits.
PAM security update update for AlmaLinux
AlmaLinux has issued a critical security update for AlmaLinux 8, focusing on a vulnerability in the Pluggable Authentication Modules (PAM) system, specifically identified as CVE-2025-6020. This vulnerability presents a directory traversal risk that could potentially allow unauthorized access to sensitive information. Users of the linux-pam package are strongly urged to review the details and implications of this security issue on the official CVE page linked in the announcement.