Essential Eight on Linux, Part 2 of 8: Patch Applications on Ubuntu 26.04 LTS Source

1---
2title: "Essential Eight on Linux, Part 2 of 8: Patch Applications on Ubuntu 26.04 LTS"
3date: "2026-04-27"
4tags: ["essential-eight", "asd", "ism", "ubuntu", "ubuntu-pro", "landscape", "linux", "patching", "security"]
5author: "Gavin Jackson"
6excerpt: "Part 2 of an 8-part series on implementing the Essential Eight on Ubuntu 26.04 LTS, covering application patching with Ubuntu Pro, Landscape, repository governance, and compensating controls."
7---
8
9# Essential Eight on Linux, Part 2 of 8: Patch Applications on Ubuntu 26.04 LTS
10
11When people talk about patching on Linux, they often default to "just run `apt update && apt upgrade`."
12
13That is not enough for the Essential Eight.
14
15The ASD expectation is broader: patch internet-facing applications fast, patch office productivity tools, browsers, email clients, PDF readers, and security products, and prove you have a process to identify what is vulnerable in the first place.
16
17On Ubuntu 26.04 LTS, this mitigation is one of the cleaner ones to implement, provided you standardise how software is delivered.
18
19## What ASD is trying to achieve
20
21The risk here is not the kernel. It is the software users touch every day:
22
23- web browsers
24- email clients
25- PDF readers
26- collaboration tools
27- locally installed runtimes
28- public-facing application stacks
29
30Attackers like application vulnerabilities because they are reachable and common. The more ad hoc your Linux software estate is, the harder this mitigation becomes.
31
32## Ubuntu 26.04 LTS reference implementation
33
34### Resolute Raccoon highlights
35
36Resolute Raccoon improves the patching story in a few practical ways:
37
38- the App Center has a more unified software management experience and better Debian package support
39- NVIDIA CUDA is now distributed natively through Ubuntu repositories
40- AMD ROCm is now available through Ubuntu repositories as well
41
42If you support AI or HPC workloads on Linux, moving CUDA and ROCm into trusted Ubuntu package channels makes application patch governance much cleaner than vendor-managed side paths.
43
44### 1. Standardise application delivery
45
46The best Linux patching strategy is boring on purpose:
47
48- use Ubuntu repositories wherever possible
49- prefer Canonical-delivered snaps for desktop applications that already fit that model
50- minimise manually installed `.deb` files
51- aggressively reduce standalone tarballs, shell installers, and random vendor repos
52
53If an application is outside your package governance model, it is outside your patch assurance model too.
54
55### 2. Use Ubuntu Pro to extend security coverage
56
57Ubuntu Pro matters here because it expands the vulnerability and patch coverage available for Ubuntu packages beyond the small base set most people think about.
58
59For enterprises, **ESM Apps** is especially relevant because a lot of useful application packages live outside the core base OS set. If you are serious about patching Linux applications against the Essential Eight timelines, Ubuntu Pro is not just nice to have.
60
61### 3. Use Landscape as the patching control plane
62
63Landscape gives you the fleet-level mechanics:
64
65- package inventory
66- staged rollout
67- reporting
68- repository governance
69- grouping systems by role or risk
70
71That is important because patching internet-facing application servers and patching user endpoints should not be the same workflow. Landscape lets you separate those rings and prove what happened.
72
73### 4. Focus on high-risk application classes first
74
75For Ubuntu desktops and jump hosts, the patching priority should usually be:
76
771. Firefox and Chromium-based browsers
782. email clients and collaboration apps
793. PDF readers and document tooling
804. remote access clients
815. security agents
82
83For servers, the first wave is different:
84
851. reverse proxies and web servers
862. language runtimes exposed to the internet
873. identity and access components
884. internet-facing management portals
89
90### 5. Measure coverage, not just success
91
92A patching job that succeeds against the packages you know about is not enough.
93
94You also need to know about the software that escaped your standard channels. On Linux, that usually means:
95
96- manually installed vendor binaries
97- developer-downloaded runtimes
98- container images that have not been rebuilt
99- old utility packages sitting on bastions and admin hosts
100
101Inventory discipline is half of this mitigation.
102
103## ISM control mapping
104
105The October 2024 Essential Eight to ISM mapping links this mitigation to these controls:
106
107| ISM control | Linux implementation on Ubuntu 26.04 LTS |
108|-------------|-------------------------------------------|
109| `ISM-1807` | Patch or remove vulnerable applications on workstations, with priority for internet-facing and user-facing tools. |
110| `ISM-1808` | Patch or remove vulnerable applications on internet-facing servers, including exposed web components and management portals. |
111| `ISM-1698` | Apply vendor application patches within required timeframes using standard package sources and Landscape rings. |
112| `ISM-1699` | Apply rapid remediation for internet-facing applications, especially reverse proxies, browsers, and exposed services. |
113| `ISM-1876` | Patch office productivity suites, email clients, web browsers, and PDF software on user systems. |
114| `ISM-1690` | Maintain an accurate application inventory so vulnerable software can be found quickly. |
115| `ISM-1691` | Verify that application updates have been applied successfully and are not just approved on paper. |
116| `ISM-1905` | Patch or replace unsupported application versions before they become a standing exception. |
117| `ISM-1704` | Apply higher-maturity application patching disciplines consistently across all relevant asset classes. |
118| `ISM-1700` | Govern exceptions and risk acceptance where vendor patches do not exist. |
119| `ISM-1693` | Remove or isolate applications that cannot be patched in a reasonable timeframe. |
120| `ISM-1692` | Use compensating controls when immediate application patching is not possible. |
121| `ISM-1901` | Ensure vulnerable application exposure is reduced through additional controls when patching is delayed. |
122
123## Where Linux gets awkward
124
125Ubuntu handles repo-managed software well.
126
127The pain starts when organisations allow:
128
129- vendor-specific shell installers
130- manually unpacked browsers or agents
131- unmanaged developer toolchains
132- one-off binaries copied into `/usr/local/bin`
133
134The Essential Eight does not really care that the app was "just a handy Linux utility." If it is vulnerable and reachable, it is in scope.
135
136## Compensating controls for third-party software
137
138When an application cannot be patched quickly, use one or more of these mitigations:
139
140- remove internet exposure
141- put the application behind a reverse proxy or VPN boundary
142- limit access through Teleport or another identity-aware broker
143- confine the process with AppArmor
144- isolate it in a container or VM
145- move users to a supported package source
146- remove the software entirely if it no longer has a business case
147
148That last option is underrated.
149
150## Commercial and enterprise-friendly additions
151
152Where native Ubuntu controls need help, these are the usual force multipliers:
153
154- **Ubuntu Pro** for broader package security coverage
155- **Landscape** for fleet-scale rollout and reporting
156- **Tenable**, **Qualys**, or **Rapid7** for vulnerability discovery if you need a dedicated scanning and reporting layer
157- **Teleport** to reduce exposure for unpatched administrative or high-risk services while remediation is underway
158
159Teleport is especially useful when the vulnerable component is an admin surface that should not be directly reachable anyway.
160
161## A practical Ubuntu pattern
162
163If I were standardising this control for an Ubuntu 26.04 estate, I would start here:
164
165- all standard software delivered via APT or snap
166- Ubuntu Pro enabled across the fleet
167- Landscape groups for workstations, internal servers, and internet-facing servers
168- emergency patch ring for browsers, reverse proxies, and remote access software
169- inventory review for manually installed binaries
170- AppArmor or isolation for software that cannot be patched immediately
171
172Once that is in place, the patching conversation becomes much more manageable.
173
174## The bottom line
175
176Patching applications on Linux is easy right up until you lose packaging discipline.
177
178Ubuntu 26.04 LTS gives you a solid reference stack for this mitigation: **APT**, **snap**, **Ubuntu Pro**, and **Landscape**. Resolute Raccoon improves the story further by pulling more high-value software into official package channels. The hard part is not the tooling. It is insisting that the fleet stays inside a governed software supply chain.
179
180## References
181
182- [ASD Essential Eight maturity model and ISM mapping (October 2024)](https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/essential-eight/essential-eight-maturity-model-and-ism-mapping)
183- [Ubuntu Pro](https://ubuntu.com/pro)
184- [Expanded Security Maintenance](https://ubuntu.com/security/esm)
185- [Landscape documentation](https://documentation.ubuntu.com/landscape/)
186- [Ubuntu security notices](https://ubuntu.com/security/notices)
187