Threat Advisories:
Critical Threat Research : Middle-East at WAR: The Rapidly Escalating Iranian Cyber Threat Download the Report

March 2026 Linux Patch Roundup

Red | Vulnerability Report
Download PDF

Summary

In March 2026, more than 597 new vulnerabilities were discovered and addressed within the Linux ecosystem, impacting several major distributions such as Debian, SUSE, Ubuntu, and Red Hat. During this period, over 3,175 vulnerabilities were also highlighted, with corresponding hotfixes or patches released to resolve them across the Linux security landscape. These Linux vulnerabilities span from information disclosure to privilege escalation to code execution, representing a comprehensive month of Linux security patching activity. HiveForce Labs has identified 10 severe Linux vulnerabilities which are exploited or have high potential of successful exploitation, necessitating immediate attention from Linux system administrators and security teams. To ensure protection against these critical Linux security flaws, it is essential to upgrade Linux systems to the latest version with the necessary security patches and appropriate security controls across all major Linux distributions including Debian, SUSE, Ubuntu, and Red Hat Enterprise Linux.

Vulnerability Details

Comprehensive Linux Vulnerability Landscape for March 2026

In March, the Linux ecosystem addressed over 3,175 vulnerabilities across various distributions and products, covering critical issues such as denial of service, privilege escalation, and remote code execution affecting Linux kernel components, Linux system services, and Linux-based applications. Additionally, 597 newly discovered Linux vulnerabilities were patched across major distributions. HiveForce Lab has identified 10 critical vulnerabilities that are either currently being exploited or highly likely to be targeted soon in Linux environments. Notably, four of these vulnerabilities are under active exploitation, requiring immediate attention and remediation across Linux infrastructure.

Legacy Infrastructure Threats in Linux Systems

Starting with legacy infrastructure threats, CVE-2026-32746 is a critical pre-authentication remote code execution vulnerability (CVSS 9.8) in GNU InetUtils telnetd, a 32-year-old buffer overflow in the LINEMODE SLC handler that allows unauthenticated attackers to achieve root-level code execution over port 23 on vulnerable Linux systems, with multiple public exploits already available. Similarly, CVE-2026-22778, a critical RCE flaw (CVSS 9.8) in vLLM AI inference engine running on Linux servers, enables full server compromise through a malicious video URL by chaining an ASLR bypass with a heap buffer overflow, demonstrating how AI infrastructure on Linux platforms faces severe security risks.

Browser-Based Linux Threats and Zero-Day Exploits

Browser-based threats remain prominent in the Linux vulnerability landscape, with two actively exploited Google Chromium zero-days affecting Linux desktop users. CVE-2026-3909 and CVE-2026-3910 affect the Skia graphics library and V8 JavaScript engine respectively, enabling remote code execution through crafted HTML pages and impacting all Chromium-based browsers running on Linux distributions. These Google Chrome vulnerabilities on Linux demonstrate the continued risk to Linux desktop environments from browser-based exploitation vectors.

Linux Kernel and System-Level Security Vulnerabilities

Linux kernel and system-level components continue to be prime targets for exploitation. CVE-2025-38352, a TOCTOU race condition in the kernel’s POSIX CPU timers, saw renewed urgency after the “Chronomaly” exploit demonstrated complete privilege escalation to root on vulnerable 5.10.x kernels across multiple Linux distributions. CVE-2024-26581, a netfilter nft_set_rbtree race condition (CVSS 7.8) in the Linux kernel, allows local privilege escalation through improper garbage collection handling in the Linux netfilter subsystem.

Critical Service Vulnerabilities Across Linux Distributions

Critical vulnerabilities in widely-deployed Linux services were also addressed during March 2026. CVE-2025-68461, a Roundcube Webmail XSS vulnerability affecting Linux mail servers, enables silent email account takeover through malicious SVG animate tags and is actively exploited by APT28 and Winter Vivern threat actors targeting Linux-based webmail infrastructure. CVE-2026-21945, an Oracle Java SE denial of service flaw (CVSS 7.5) affecting Java applications on Linux, allows unauthenticated remote crashes of Linux-hosted Java services. CVE-2025-11187, an OpenSSL PKCS#12 stack overflow affecting versions 3.4-3.6 on Linux systems, ships alongside the critical CVE-2025-15467 (CVSS 9.8). CVE-2025-53367, a DjVuLibre out-of-bounds write vulnerability, can lead to code execution when Linux users open crafted documents in default Linux document viewers.

March 2026 Linux Security Landscape Analysis

March 2026’s Linux vulnerability landscape reflects continued high-risk trends, with active exploitation of legacy protocols, kernel flaws, browser engines, and widely-deployed services posing urgent threats to Linux infrastructure. Timely Linux patching and defense-in-depth strategies remain essential to prevent system compromise across Debian, SUSE, Ubuntu, Red Hat, and other major Linux distributions.

Recommendations

Conduct Comprehensive Linux Service Exposure Assessment

Conduct a comprehensive service exposure evaluation to identify any publicly accessible Linux services, development hosts, or data processing endpoints that may be vulnerable to exploitation. Prioritize exposure assessment for Linux systems running vLLM AI inference endpoints, Chromium-based browsers, Roundcube Webmail instances, Java and GraalVM deployments, and Linux kernels with NVMe-TCP or netfilter configurations. Linux administrators should inventory all internet-facing Linux services to understand their Linux attack surface.

Implement Regular Linux Patch Management and Kernel Updates

Ensure all Linux distributions, installed packages, and kernel versions are updated to the latest security patches across Debian, SUSE, Ubuntu, and Red Hat systems. Automate Linux updates using tools such as unattended-upgrades, DNF Automatic, or apt-cron to reduce the window of exposure. Pay particular attention to critical Linux updates addressing CVE-2026-32746, CVE-2025-38352, CVE-2026-22778, and the OpenSSL patch bundle including CVE-2025-11187 and CVE-2025-15467 across all Linux distributions.

Disable Legacy Linux Services and Reduce Attack Surface

With CVE-2026-32746 exposing a 32-year-old pre-auth RCE in telnetd, immediately audit all Linux systems for active Telnet services. Disable telnetd wherever possible on Linux servers and migrate to SSH. Block port 23 at the network perimeter for all Linux infrastructure. For AI infrastructure on Linux, restrict vLLM API endpoints to trusted networks, implement API authentication, and disable multimodal video processing if not business-critical. Enforce SELinux or AppArmor policies on Linux systems to restrict process permissions and prevent privilege escalation.

Harden Browser and Web-Facing Applications on Linux

With CVE-2026-3909 and CVE-2026-3910 actively exploited in Chromium on Linux platforms, it is imperative to update all browsers, email clients, and web applications on Linux desktops to the latest supported versions. For Roundcube Webmail deployments on Linux servers, upgrade to version 1.5.12 or 1.6.12 immediately and implement Content Security Policy headers to mitigate XSS risks on Linux-based webmail infrastructure.

Deploy Enhanced Linux Security Monitoring

Deploy or tighten endpoint detection and response (EDR), SIEM rules, and network traffic analysis to detect exploitation attempts and persistence mechanisms on Linux systems. Focus on Telnet exploitation patterns on port 23, suspicious ptrace-based kernel privilege escalation activity on Linux, malformed video URL submissions to AI inference APIs running on Linux, and browser-related script execution anomalies on Linux desktops.

Implement Linux Incident Response Procedures

In case of Linux system compromise, immediately isolate it from the network to prevent further spread. Use iptables or nftables to block malicious traffic on compromised Linux hosts, revoke credentials of affected users, and restore from a clean, verified backup before reconnecting Linux systems to production networks.

MITRE ATT&CK TTPs

Initial Access:

  • T1190: Exploit Public-Facing Application

Execution:

  • T1059: Command and Scripting Interpreter
    • T1059.006: Python
    • T1059.004: Unix Shell
    • T1059.007: JavaScript
  • T1204: User Execution

Privilege Escalation:

  • T1068: Exploitation for Privilege Escalation

Defense Evasion:

  • T1189: Drive-by Compromise

Discovery:

  • T1082: System Information Discovery
  • T1083: File and Directory Discovery

Impact:

  • T1499: Endpoint Denial of Service

Notable CVEs Summary

CVE-2025-38352 – Linux Kernel Time-of-Check Time-of-Use (TOCTOU) Race Condition Vulnerability

  • Status: CISA KEV Listed, Active Exploitation
  • Affected: Android Kernel, Linux Kernel, Debian, Ubuntu, SUSE, Oracle Linux
  • Impact: Privilege Escalation via local attack vector
  • CWE: CWE-367

CVE-2025-68461 – RoundCube Webmail Cross-site Scripting Vulnerability

  • Status: CISA KEV Listed, Active Exploitation
  • Affected: RoundCube Webmail, Debian, Ubuntu, SUSE, Red Hat
  • Impact: Session hijacking via network attack vector
  • Associated Actors: APT28, Winter Vivern
  • CWE: CWE-79

CVE-2026-3909 – Google Skia Out-of-Bounds Write Vulnerability

  • Status: CISA KEV Listed, Active Exploitation
  • Affected: Google Chrome (before 146.0.7680.75)
  • Impact: Remote Code Execution via phishing
  • CWE: CWE-787

CVE-2026-3910 – Google Chromium V8 Improper Restriction of Operations Within the Bounds of a Memory Buffer Vulnerability

  • Status: CISA KEV Listed, Active Exploitation
  • Affected: Google Chrome (before 146.0.7680.75)
  • Impact: Arbitrary Code Execution via phishing
  • CWE: CWE-94, CWE-119

Additional Critical CVEs:

  • CVE-2026-21945: Oracle Java SE/GraalVM Denial of Service Vulnerability
  • CVE-2024-26581: Linux Kernel netfilter Race Condition Vulnerability
  • CVE-2025-11187: OpenSSL Denial of Service Vulnerability
  • CVE-2025-53367: DjVuLibre Out-of-Bounds Write Vulnerability
  • CVE-2026-22778: vLLM Remote Code Execution Vulnerability
  • CVE-2026-32746: GNU Inetutils telnetd Buffer Overflow Vulnerability

References

What’s new on HivePro

Get through updates and upcoming events, and more directly in your inbox