Don't panic It's only 60 Linux CVE security bulletins a week
The Linux security team issues around 60 CVEs weekly, which is routine. Users should regularly update their systems, as most CVEs do not affect every user due to diverse deployments.
Read original articleThe Linux security team issues an average of 60 Common Vulnerabilities and Exposures (CVE) bulletins weekly, a figure that may seem alarming but is considered routine within the Linux ecosystem. Greg Kroah-Hartman, a key maintainer of the Linux stable kernel, emphasized that while these CVEs can indicate serious issues, they do not always affect every user due to the vast diversity of Linux deployments. The Linux kernel consists of approximately 38 million lines of code, with individual systems utilizing only a fraction of this. The kernel team has taken over the assignment of CVEs to ensure accountability and improve the process, especially in light of new regulations. Kroah-Hartman noted that the rapid issuance of CVEs reflects the complexity of the Linux environment, where a bug can have varying levels of severity depending on its context. Users are encouraged to regularly update their systems to the latest stable kernel to maintain security, as many successful deployments, like Debian, demonstrate the effectiveness of this practice. Ultimately, while the volume of CVEs may appear daunting, most users will find that only a small number are relevant to their specific configurations.
- The Linux security team issues about 60 CVEs weekly, which is routine for the ecosystem.
- The Linux kernel has 38 million lines of code, with individual systems using only a small portion.
- The kernel team now assigns CVEs to enhance accountability and adapt to new regulations.
- Regular updates to the latest stable kernel are crucial for maintaining security.
- Most CVEs will not affect every user, as their impact varies by deployment context.
Related
CVE-2021-4440: A Linux CNA Case Study
The Linux CNA mishandled CVE-2021-4440 in the 5.10 LTS kernel, causing information leakage and KASLR defeats. The issue affected Debian Bullseye and SUSE's 5.3.18 kernel, resolved in version 5.10.218.
Ubuntu Security Updates Are a Confusing Mess
The article delves into Ubuntu security update complexities, emphasizing Tomcat vulnerability issues. It discusses patch availability discrepancies across LTS versions, Canonical's support limitations, and considerations of switching to Debian for more consistent security fixes.
Exploring Novel File System Objects for Data-Only Attacks on Linux Systems
The study explores data-only attacks on Linux systems, identifying critical file system objects for exploitation without requiring Kernel Address Space Layout Randomization. It presents novel exploit strategies and evaluates them against real-world vulnerabilities.
Linux VFS Fix for 5 Year Old Bug That Could Cause Corruption, Security or Crash
A significant fix for a five-year-old Linux VFS bug, discovered by Microsoft engineer Christian Brauner, addresses potential on-disk corruption and security vulnerabilities, enhancing kernel stability and security.
New SLUBStick Attack Makes Linux Kernel Vulnerabilities More Dangerous
Researchers from Graz University of Technology developed SLUBStick, a technique that exploits Linux kernel heap vulnerabilities with over 99% success, enabling privilege escalation and container escapes against modern defenses.
Related
CVE-2021-4440: A Linux CNA Case Study
The Linux CNA mishandled CVE-2021-4440 in the 5.10 LTS kernel, causing information leakage and KASLR defeats. The issue affected Debian Bullseye and SUSE's 5.3.18 kernel, resolved in version 5.10.218.
Ubuntu Security Updates Are a Confusing Mess
The article delves into Ubuntu security update complexities, emphasizing Tomcat vulnerability issues. It discusses patch availability discrepancies across LTS versions, Canonical's support limitations, and considerations of switching to Debian for more consistent security fixes.
Exploring Novel File System Objects for Data-Only Attacks on Linux Systems
The study explores data-only attacks on Linux systems, identifying critical file system objects for exploitation without requiring Kernel Address Space Layout Randomization. It presents novel exploit strategies and evaluates them against real-world vulnerabilities.
Linux VFS Fix for 5 Year Old Bug That Could Cause Corruption, Security or Crash
A significant fix for a five-year-old Linux VFS bug, discovered by Microsoft engineer Christian Brauner, addresses potential on-disk corruption and security vulnerabilities, enhancing kernel stability and security.
New SLUBStick Attack Makes Linux Kernel Vulnerabilities More Dangerous
Researchers from Graz University of Technology developed SLUBStick, a technique that exploits Linux kernel heap vulnerabilities with over 99% success, enabling privilege escalation and container escapes against modern defenses.