Essential Eight on Linux, Part 2 of 8: Patch Applications on Ubuntu 26.04 LTS Source
Markdown source
1---2title: "Essential Eight on Linux, Part 2 of 8: Patch Applications on Ubuntu 26.04 LTS"3date: "2026-04-27"4tags: ["essential-eight", "asd", "ism", "ubuntu", "ubuntu-pro", "landscape", "linux", "patching", "security"]5author: "Gavin Jackson"6excerpt: "Part 2 of an 8-part series on implementing the Essential Eight on Ubuntu 26.04 LTS, covering application patching with Ubuntu Pro, Landscape, repository governance, and compensating controls."7---89# Essential Eight on Linux, Part 2 of 8: Patch Applications on Ubuntu 26.04 LTS1011When people talk about patching on Linux, they often default to "just run `apt update && apt upgrade`."1213That is not enough for the Essential Eight.1415The ASD expectation is broader: patch internet-facing applications fast, patch office productivity tools, browsers, email clients, PDF readers, and security products, and prove you have a process to identify what is vulnerable in the first place.1617On Ubuntu 26.04 LTS, this mitigation is one of the cleaner ones to implement, provided you standardise how software is delivered.1819## What ASD is trying to achieve2021The risk here is not the kernel. It is the software users touch every day:2223- web browsers24- email clients25- PDF readers26- collaboration tools27- locally installed runtimes28- public-facing application stacks2930Attackers like application vulnerabilities because they are reachable and common. The more ad hoc your Linux software estate is, the harder this mitigation becomes.3132## Ubuntu 26.04 LTS reference implementation3334### Resolute Raccoon highlights3536Resolute Raccoon improves the patching story in a few practical ways:3738- the App Center has a more unified software management experience and better Debian package support39- NVIDIA CUDA is now distributed natively through Ubuntu repositories40- AMD ROCm is now available through Ubuntu repositories as well4142If you support AI or HPC workloads on Linux, moving CUDA and ROCm into trusted Ubuntu package channels makes application patch governance much cleaner than vendor-managed side paths.4344### 1. Standardise application delivery4546The best Linux patching strategy is boring on purpose:4748- use Ubuntu repositories wherever possible49- prefer Canonical-delivered snaps for desktop applications that already fit that model50- minimise manually installed `.deb` files51- aggressively reduce standalone tarballs, shell installers, and random vendor repos5253If an application is outside your package governance model, it is outside your patch assurance model too.5455### 2. Use Ubuntu Pro to extend security coverage5657Ubuntu Pro matters here because it expands the vulnerability and patch coverage available for Ubuntu packages beyond the small base set most people think about.5859For enterprises, **ESM Apps** is especially relevant because a lot of useful application packages live outside the core base OS set. If you are serious about patching Linux applications against the Essential Eight timelines, Ubuntu Pro is not just nice to have.6061### 3. Use Landscape as the patching control plane6263Landscape gives you the fleet-level mechanics:6465- package inventory66- staged rollout67- reporting68- repository governance69- grouping systems by role or risk7071That is important because patching internet-facing application servers and patching user endpoints should not be the same workflow. Landscape lets you separate those rings and prove what happened.7273### 4. Focus on high-risk application classes first7475For Ubuntu desktops and jump hosts, the patching priority should usually be:76771. Firefox and Chromium-based browsers782. email clients and collaboration apps793. PDF readers and document tooling804. remote access clients815. security agents8283For servers, the first wave is different:84851. reverse proxies and web servers862. language runtimes exposed to the internet873. identity and access components884. internet-facing management portals8990### 5. Measure coverage, not just success9192A patching job that succeeds against the packages you know about is not enough.9394You also need to know about the software that escaped your standard channels. On Linux, that usually means:9596- manually installed vendor binaries97- developer-downloaded runtimes98- container images that have not been rebuilt99- old utility packages sitting on bastions and admin hosts100101Inventory discipline is half of this mitigation.102103## ISM control mapping104105The October 2024 Essential Eight to ISM mapping links this mitigation to these controls:106107| ISM control | Linux implementation on Ubuntu 26.04 LTS |108|-------------|-------------------------------------------|109| `ISM-1807` | Patch or remove vulnerable applications on workstations, with priority for internet-facing and user-facing tools. |110| `ISM-1808` | Patch or remove vulnerable applications on internet-facing servers, including exposed web components and management portals. |111| `ISM-1698` | Apply vendor application patches within required timeframes using standard package sources and Landscape rings. |112| `ISM-1699` | Apply rapid remediation for internet-facing applications, especially reverse proxies, browsers, and exposed services. |113| `ISM-1876` | Patch office productivity suites, email clients, web browsers, and PDF software on user systems. |114| `ISM-1690` | Maintain an accurate application inventory so vulnerable software can be found quickly. |115| `ISM-1691` | Verify that application updates have been applied successfully and are not just approved on paper. |116| `ISM-1905` | Patch or replace unsupported application versions before they become a standing exception. |117| `ISM-1704` | Apply higher-maturity application patching disciplines consistently across all relevant asset classes. |118| `ISM-1700` | Govern exceptions and risk acceptance where vendor patches do not exist. |119| `ISM-1693` | Remove or isolate applications that cannot be patched in a reasonable timeframe. |120| `ISM-1692` | Use compensating controls when immediate application patching is not possible. |121| `ISM-1901` | Ensure vulnerable application exposure is reduced through additional controls when patching is delayed. |122123## Where Linux gets awkward124125Ubuntu handles repo-managed software well.126127The pain starts when organisations allow:128129- vendor-specific shell installers130- manually unpacked browsers or agents131- unmanaged developer toolchains132- one-off binaries copied into `/usr/local/bin`133134The Essential Eight does not really care that the app was "just a handy Linux utility." If it is vulnerable and reachable, it is in scope.135136## Compensating controls for third-party software137138When an application cannot be patched quickly, use one or more of these mitigations:139140- remove internet exposure141- put the application behind a reverse proxy or VPN boundary142- limit access through Teleport or another identity-aware broker143- confine the process with AppArmor144- isolate it in a container or VM145- move users to a supported package source146- remove the software entirely if it no longer has a business case147148That last option is underrated.149150## Commercial and enterprise-friendly additions151152Where native Ubuntu controls need help, these are the usual force multipliers:153154- **Ubuntu Pro** for broader package security coverage155- **Landscape** for fleet-scale rollout and reporting156- **Tenable**, **Qualys**, or **Rapid7** for vulnerability discovery if you need a dedicated scanning and reporting layer157- **Teleport** to reduce exposure for unpatched administrative or high-risk services while remediation is underway158159Teleport is especially useful when the vulnerable component is an admin surface that should not be directly reachable anyway.160161## A practical Ubuntu pattern162163If I were standardising this control for an Ubuntu 26.04 estate, I would start here:164165- all standard software delivered via APT or snap166- Ubuntu Pro enabled across the fleet167- Landscape groups for workstations, internal servers, and internet-facing servers168- emergency patch ring for browsers, reverse proxies, and remote access software169- inventory review for manually installed binaries170- AppArmor or isolation for software that cannot be patched immediately171172Once that is in place, the patching conversation becomes much more manageable.173174## The bottom line175176Patching applications on Linux is easy right up until you lose packaging discipline.177178Ubuntu 26.04 LTS gives you a solid reference stack for this mitigation: **APT**, **snap**, **Ubuntu Pro**, and **Landscape**. Resolute Raccoon improves the story further by pulling more high-value software into official package channels. The hard part is not the tooling. It is insisting that the fleet stays inside a governed software supply chain.179180## References181182- [ASD Essential Eight maturity model and ISM mapping (October 2024)](https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/essential-eight/essential-eight-maturity-model-and-ism-mapping)183- [Ubuntu Pro](https://ubuntu.com/pro)184- [Expanded Security Maintenance](https://ubuntu.com/security/esm)185- [Landscape documentation](https://documentation.ubuntu.com/landscape/)186- [Ubuntu security notices](https://ubuntu.com/security/notices)187