Home » Linux Kernel: Multiple vulnerabilities enable denial of service and unspecified assaults

Linux Kernel: Multiple vulnerabilities enable denial of service and unspecified assaults

by admin
Linux Kernel: Multiple vulnerabilities enable denial of service and unspecified assaults

A safety warning issued for the Linux kernel has acquired an replace from the BSI. You can discover out what affected customers can do right here.

Federal workplace for Security in Information Technology (BSI) has issued a Linux kernel safety advisory on May 30, 2024. The safety vulnerability impacts the Linux working system and Debian Linux and Open Source Linux Kernel merchandise. This alert was final up to date on June 2, 2024.

The newest producer suggestions for updates, workarounds and safety patches for this vulnerability could be discovered right here: Debian Security Advisory DSA-5703 (As of June 2, 2024). Some helpful assets are listed later on this article.

Linux Kernel Security Advisory – Risk: medium

Risk stage: 3 (reasonable)
CVSS Base Score: 5.5
CVSS provisional rating: 4.8
Remote assault: No

The Common Vulnerability Scoring System (CVSS) is used to evaluate the vulnerability of pc programs. The CVSS customary makes it potential to check potential or precise safety dangers primarily based on varied metrics to create a precedence record for countermeasures. The attributes “none”, “low”, “medium”, “excessive” and “extreme” are used to find out the severity ranges of vulnerability. The Base Score evaluates the necessities of an assault (together with authentication, complexity, privileges, consumer interplay) and its outcomes. Temporary scores additionally have in mind adjustments over time within the threat state of affairs. The threat of the vulnerability talked about right here is classed as “reasonable” in keeping with the CVSS with a base rating of 5.5.

Linux Kernel Bug: Multiple vulnerabilities enable denial of service and unspecified assaults

The kernel represents the core of the Linux working system.

See also  Android icons in the status bar and their meaning

An area attacker can exploit many vulnerabilities within the Linux kernel to create a denial of service state of affairs or carry out an oblique assault.

Vulnerabilities are recognized by distinctive CVE (Common Vulnerabilities and Exposures) numbers. CVE-2023-52881, CVE-2023-52882, CVE-2024-36016, CVE-2024-36017, CVE-2024-36018, CVE-2024-36019, CVE-2024-360-2020, CVE-2024-36022 , CVE-2024-36023, CVE-2024-36024, CVE-2024-36025, CVE-2024-36026, CVE-2024-36027, CVE-2024-3302-202, CVE-2028-2028, CVE-2024-36026 36030, CVE-2024-36031, CVE-2024-36032, CVE-2024-36033, CVE-2024-36880, CVE-2024-36881, CVE-2024-36882, CVE-4VE-36033, CVE-4VE-68880, CVE-2024-36881 CVE-2024-36885, CVE-2024-36886, CVE-2024-36887, CVE-2024-36888, CVE-2024-36889, CVE-2024-36890, CVE-2024-362-2929 -2024-3682929 2024-36893, CVE-2024-36894, CVE-2024-36895, CVE-2024-36896, CVE-2024-36897, CVE-2024-36898, CVE-2024-33629002 4, CVE-2024-36897 36901, CVE-2024-36902, CVE-2024-36903, CVE-2024-36904, CVE-2024-36905, CVE-2024-36906, CVE-2024-36907, CVE-40-6902 -36908, CVE-40202028 CVE-2024-36910, CVE-2024-36911, CVE-2024-36912, CVE-2024-36913, CVE-2024-36914, CVE-2024-36915, CVE-2024-3669120, CVE- 369120 2024-36918, CVE-2024-36919, CVE-2024-36920, CVE-2024-36921, CVE-2024-36922, CVE-2024-36923, CVE-2024-36924, CVE-2024-36923 -2024-2024 36926, CVE-2024-36927, CVE-2024-36928, CVE-2024-36929, CVE-2024-36930, CVE-2024-36931, CVE-2024-36932, CVE-2024-36929, CVE-2024-36929 4VE-2034-2034 CVE-2024-36935, CVE-2024-36936, CVE-2024-36937, CVE-2024-36938, CVE-2024-36939, CVE-2024-36940, CVE-2024-366942, CVE-269421 , CVE-2024-36939 2024-36943, CVE-2024-36944, CVE-2024-36945, CVE-2024-36946, CVE-2024-36947, CVE-2024-36948, CVE-2024-3362-4502, CVE- 2029-2020 36951, CVE-2024-36952, CVE-2024-36953, CVE-2024-36954, CVE-2024-36955, CVE-2024-36956, CVE-2024-36957, CVE-2024-36954, CVE-2024 -36955, CVE-2024-36956, CVE-2024-36957, CVE-2024-69524 u2029-2024 on the market.

Systems affected by the safety hole at a look

working system
Linux

Products
Debian Linux (cpe:/o:debian:debian_linux)
Open Source Linux Kernel (cpe:/o:linux:linux_kernel)

General steps for coping with IT vulnerabilities

  1. Users of affected programs ought to keep up-to-date. When safety holes are identified, producers are required to repair them shortly by growing a patch or workaround. When new safety updates can be found, set up them instantly.
  2. For data, see the sources listed within the subsequent part. This usually comprises extra details about the most recent model of the software program in query and the provision of safety patches or efficiency suggestions.
  3. If you will have any additional questions or uncertainties, please contact your accountable administrator. IT safety managers ought to recurrently verify the required sources to see if a brand new safety replace is obtainable.
See also  You can play the first few chapters of Fae Farm now for free on PC

Manufacturer details about updates, patches and workarounds

Here you’ll find some hyperlinks with details about bug studies, safety fixes and workarounds.

Debian Security Advisory DSA-5703 vom 2024-06-02 (02.06.2024)
For extra data, see:

from 2024-05-30 (30.05.2024)
For extra data, see:

Version historical past of this safety alert

This is model 2 of this Linux kernel IT safety discover. If additional updates are introduced, this doc can be up to date. You can see the adjustments made utilizing the model historical past under.

May 30, 2024 – First model
06/02/2024 – New updates from Debian added

+++ Editorial word: This doc is predicated on present BSI knowledge and can be up to date in a data-driven method relying on the standing of the alert. We welcome suggestions and feedback at [email protected]. +++

comply with News.de you might be right here Facebook, Twitter, Pinterest once more YouTube? Here you’ll find sizzling information, present movies and a direct line to the editorial group.

kns/roj/information.de

You may also like

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More

Privacy & Cookies Policy