Skip to main content
Mallory
Mallory

Coordinated Vendor Patch Advisories for Enterprise Software and Linux Kernel

vendor advisorypatchinglinux kernelrhelenterprise softwaregithub enterprise serveradvisorycodeready linux buildervulnerabilitytenable security centerred hatatlassian
Updated February 19, 2026 at 07:01 PM7 sources
Coordinated Vendor Patch Advisories for Enterprise Software and Linux Kernel

Get Ahead of Threats Like This

Know if you're exposed — before adversaries strike.

The Canadian Centre for Cyber Security issued multiple alerts and advisories urging organizations to apply vendor patches for newly disclosed vulnerabilities across widely deployed enterprise platforms, including Splunk (Enterprise, Cloud Platform, Universal Forwarder, and DB Connect prior to 4.2.0), GitHub Enterprise Server (patched releases 3.19.2, 3.18.5, 3.17.11, 3.16.14, 3.15.18, 3.14.23), Jenkins (Weekly 2.550 and prior; LTS 2.541.1 and prior), and Atlassian products (Bamboo, Confluence, and Crowd Data Center/Server across multiple versions). The advisories are framed as patch-and-mitigate guidance rather than incident reporting, emphasizing rapid update adoption to reduce exposure.

Additional vendor guidance highlighted kernel-level risk and security tooling exposure. Tenable released a critical update for Tenable Security Center (6.7.2 and prior) via stand-alone patches, and Red Hat published multiple advisories (Feb 9–15) including Linux kernel fixes across several RHEL-related offerings (e.g., Red Hat Enterprise Linux and CodeReady Linux Builder). Separately, F5 tracked a Linux kernel vulnerability identified as CVE-2025-22026 in its product advisory, reinforcing the need to prioritize kernel patching where affected components are present.

Sources

Related Stories

Canadian Cyber Centre Advisories Highlight Linux Kernel and Other Vendor Patch Updates

Canadian Cyber Centre Advisories Highlight Linux Kernel and Other Vendor Patch Updates

The Canadian Centre for Cyber Security issued multiple advisories urging organizations to apply vendor patches released between **February 16–22, 2026**, including updates addressing **Linux kernel vulnerabilities** impacting **Ubuntu** (16.04 LTS through 25.10) and **Red Hat** platforms (including *RHEL* and related offerings). The advisories emphasize routine but potentially high-impact exposure from unpatched kernel flaws across widely deployed enterprise and server environments, and direct administrators to review upstream vendor notices and deploy the corresponding updates. Separate Cyber Centre advisories also flagged patch requirements outside the Linux kernel: Microsoft released an update for **Microsoft Edge Stable** to remediate vulnerabilities in versions prior to `145.0.3800.70`, IBM published security advisories covering multiple products (including *Aspera Enterprise WebApps*, *Cloud Pak System*, *Storage Defender*, and others), and CISA issued ICS advisories for vulnerabilities across several industrial and IoT/OT products (including **Delta Electronics**, **GE Vernova**, **Honeywell CCTV**, **Siemens Simcenter**, and others) with recommended mitigations and updates where available. A Linux 7.0 release-candidate feature article is not a security advisory and does not materially relate to the patch/vulnerability notices in the other items.

3 weeks ago
March 2026 Vendor Security Advisories for Multiple Products

March 2026 Vendor Security Advisories for Multiple Products

Multiple vendors and agencies published **security advisories** covering newly addressed vulnerabilities across enterprise, Linux, and industrial control system products. The advisories include an **HPE Telco Service Orchestrator** remote buffer overflow affecting versions prior to `4.2.12`, broad **Red Hat** and **Ubuntu** Linux kernel updates, and a large set of **Dell** and **IBM** product fixes spanning storage, networking, cloud, identity, and security platforms. **CISA ICS** advisories also highlighted weaknesses in products from **Siemens, Honeywell, Lantronix, Trane, Ceragon, Apeman,** and **Inductive Automation**, indicating continued exposure across operational technology environments. A related technical disclosure from the **Zero Day Initiative** described **CVE-2022-32250**, a Linux kernel `nf_tables` use-after-free flaw that can allow local privilege escalation to **root** after low-privileged code execution, and noted that Linux distributions have issued updates. That Linux kernel issue aligns with the broader kernel patching activity reflected in the Ubuntu and Red Hat notices, but the overall reporting is not a single incident or exploit campaign; it is a roundup of routine but substantive vulnerability disclosures and remediation guidance. This content is **not fluff** because it contains specific vulnerability information, affected products, and actionable patching intelligence.

Yesterday
Early March 2026 Vendor Security Advisories and Patch Releases Across Enterprise, Mobile, and ICS Products

Early March 2026 Vendor Security Advisories and Patch Releases Across Enterprise, Mobile, and ICS Products

Multiple vendors issued security advisories and patch releases in late February and early March 2026, prompting coordinated update guidance from national and regional CERTs. The Canadian Centre for Cyber Security highlighted updates for **Django** (fixed in `4.2.29`, `5.2.12`, `6.0.3`), **Samsung mobile devices** (March 2026 security update), **Qualcomm** (March 2026 monthly bulletin), **Veeam Kasten for Kubernetes / Kasten K10**, **VMware Tanzu** components (including *Greenplum* and *RabbitMQ on Kubernetes*), and **Red Hat** advisories including **Linux kernel** updates across multiple RHEL-related platforms. Industrial and infrastructure-facing products were also covered via **CISA ICS** advisories spanning a broad set of vendors and solutions (including EV charging ecosystems, building management, cameras, and DCS/SCADA platforms such as **Schneider Electric EcoStruxure Building Operation Workstation** and **Yokogawa CENTUM VP**), with guidance to apply mitigations and updates where available. Additional enterprise patch guidance included **Dell** advisories affecting *PowerStore T* and *PowerEdge* server lines (including AMD-based models and NVIDIA networking/DOCA-related components), and **IBM** advisories across a wide portfolio (including *App Connect Enterprise*, *CICS TX*, *License Metric Tool*, *Maximo*, *Sterling Secure Proxy*, *Terracotta*, *QRadar*, and others). HKCERT separately summarized **Samsung** vulnerabilities impacting Android devices and Exynos chipsets, listing multiple CVEs (e.g., `CVE-2024-31328` and numerous 2025-series CVEs) with potential impacts including **RCE**, **EoP**, **information disclosure**, and **DoS**.

2 weeks ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed — before adversaries strike.