Skip to main content
Mallory
Mallory

Canadian Cyber Centre Advisories Highlight Linux Kernel and Other Vendor Patch Updates

linux kernelrhelpatchingubuntuadvisorycloud pak systemvulnerabilitymicrosoft edgeibm asperaicscisastorage defender
Updated February 23, 2026 at 08:01 PM5 sources
Canadian Cyber Centre Advisories Highlight Linux Kernel and Other Vendor Patch Updates

Get Ahead of Threats Like This

Know if you're exposed — before adversaries strike.

The Canadian Centre for Cyber Security issued multiple advisories urging organizations to apply vendor patches released between February 16–22, 2026, including updates addressing Linux kernel vulnerabilities impacting Ubuntu (16.04 LTS through 25.10) and Red Hat platforms (including RHEL and related offerings). The advisories emphasize routine but potentially high-impact exposure from unpatched kernel flaws across widely deployed enterprise and server environments, and direct administrators to review upstream vendor notices and deploy the corresponding updates.

Separate Cyber Centre advisories also flagged patch requirements outside the Linux kernel: Microsoft released an update for Microsoft Edge Stable to remediate vulnerabilities in versions prior to 145.0.3800.70, IBM published security advisories covering multiple products (including Aspera Enterprise WebApps, Cloud Pak System, Storage Defender, and others), and CISA issued ICS advisories for vulnerabilities across several industrial and IoT/OT products (including Delta Electronics, GE Vernova, Honeywell CCTV, Siemens Simcenter, and others) with recommended mitigations and updates where available. A Linux 7.0 release-candidate feature article is not a security advisory and does not materially relate to the patch/vulnerability notices in the other items.

Related Entities

Related Stories

Coordinated Vendor Patch Advisories for Enterprise Software and Linux Kernel

Coordinated Vendor Patch Advisories for Enterprise Software and Linux Kernel

The Canadian Centre for Cyber Security issued multiple **alerts and advisories** urging organizations to apply vendor patches for newly disclosed vulnerabilities across widely deployed enterprise platforms, including **Splunk** (Enterprise, Cloud Platform, Universal Forwarder, and *DB Connect* prior to `4.2.0`), **GitHub Enterprise Server** (patched releases `3.19.2`, `3.18.5`, `3.17.11`, `3.16.14`, `3.15.18`, `3.14.23`), **Jenkins** (Weekly `2.550` and prior; LTS `2.541.1` and prior), and **Atlassian** products (**Bamboo**, **Confluence**, and **Crowd** Data Center/Server across multiple versions). The advisories are framed as patch-and-mitigate guidance rather than incident reporting, emphasizing rapid update adoption to reduce exposure. Additional vendor guidance highlighted kernel-level risk and security tooling exposure. **Tenable** released a critical update for **Tenable Security Center** (`6.7.2` and prior) via stand-alone patches, and **Red Hat** published multiple advisories (Feb 9–15) including **Linux kernel** fixes across several RHEL-related offerings (e.g., *Red Hat Enterprise Linux* and *CodeReady Linux Builder*). Separately, F5 tracked a **Linux kernel vulnerability** identified as **CVE-2025-22026** in its product advisory, reinforcing the need to prioritize kernel patching where affected components are present.

3 weeks ago

Multiple Security Advisories for Enterprise and Industrial Products (Late October–Early November 2025)

Vendors including Hitachi Energy, Schneider Electric, ABB, Ubiquiti, Dell, IBM, Red Hat, Ubuntu, and Microsoft released security advisories between October 27 and November 3, 2025, addressing vulnerabilities across a wide range of enterprise, industrial, and cloud products. Notable advisories include CISA's ICS alerts for control systems, a critical flaw in ABB's PCM600 software (CVE-2018-1002208), a critical vulnerability in Ubiquiti's UniFi Access Application (CVE-2025-52665), and updates for Microsoft Edge, Red Hat Enterprise Linux, Ubuntu LTS versions, and multiple Dell and IBM products. Organizations are urged to review the advisories, apply recommended mitigations, and update affected systems to reduce exposure to exploitation. The advisories highlight vulnerabilities that could allow remote code execution, privilege escalation, or unauthorized access if left unpatched. The Canadian Centre for Cyber Security and CISA emphasize the importance of timely patching and mitigation, especially for products deployed in critical infrastructure and enterprise environments. Administrators should consult the official vendor advisories for detailed remediation steps and monitor for further updates as new vulnerabilities are disclosed and addressed.

4 months ago
March 2026 Vendor Security Advisories for Multiple Products

March 2026 Vendor Security Advisories for Multiple Products

Multiple vendors and agencies published **security advisories** covering newly addressed vulnerabilities across enterprise, Linux, and industrial control system products. The advisories include an **HPE Telco Service Orchestrator** remote buffer overflow affecting versions prior to `4.2.12`, broad **Red Hat** and **Ubuntu** Linux kernel updates, and a large set of **Dell** and **IBM** product fixes spanning storage, networking, cloud, identity, and security platforms. **CISA ICS** advisories also highlighted weaknesses in products from **Siemens, Honeywell, Lantronix, Trane, Ceragon, Apeman,** and **Inductive Automation**, indicating continued exposure across operational technology environments. A related technical disclosure from the **Zero Day Initiative** described **CVE-2022-32250**, a Linux kernel `nf_tables` use-after-free flaw that can allow local privilege escalation to **root** after low-privileged code execution, and noted that Linux distributions have issued updates. That Linux kernel issue aligns with the broader kernel patching activity reflected in the Ubuntu and Red Hat notices, but the overall reporting is not a single incident or exploit campaign; it is a roundup of routine but substantive vulnerability disclosures and remediation guidance. This content is **not fluff** because it contains specific vulnerability information, affected products, and actionable patching intelligence.

Yesterday

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed — before adversaries strike.