Linux Kernel Multiple Vulnerabilities Advisory
Summary
CERT-Bund issued security advisory WID-SEC-2026-0950 disclosing multiple vulnerabilities in the Linux Kernel. The vulnerabilities carry a CVSS Base Score of 7.8 (high) and a Temporal Score of 6.8 (medium). Threat actors could exploit these flaws to execute arbitrary code, launch denial-of-service attacks, bypass security controls, or manipulate data. Mitigations are available.
What changed
CERT-Bund published advisory WID-SEC-2026-0950 on March 31, 2026, documenting multiple Linux Kernel vulnerabilities with a CVSS Base Score of 7.8 (high) and Temporal Score of 6.8 (medium). These vulnerabilities affect Open Source Linux Kernel and could allow remote attackers to execute arbitrary code, conduct denial-of-service attacks, bypass security measures, or manipulate data.
Organizations running Linux Kernel should review affected systems immediately, apply available mitigations, and monitor for vendor patches. Since this is a non-binding advisory rather than a regulation, there are no statutory penalties—however, failure to address critical vulnerabilities may expose systems to exploitation. No specific compliance deadline is stated.
What to do next
- Identify all Linux systems running affected kernel versions and assess exposure
- Apply available mitigations or deploy patches as released by Linux distributions
- Monitor for new CVE entries and updated advisories from CERT-Bund
Source document (simplified)
[WID-SEC-2026-0950] Linux Kernel: Mehrere Schwachstellen CVSS Base Score 7.8 (hoch) CVSS Temporal Score 6.8 (mittel) Remoteangriff nein Datum 31.03.2026 Stand 01.04.2026 Mitigation ja
Betroffene Systeme
Betriebssystem
- Linux
Produktbeschreibung
Der Kernel stellt den Kern des Linux Betriebssystems dar.
Produkte
31.03.2026
- Open Source Linux Kernel
Angriff
Angriff
Ein Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um nicht näher spezifizierte Angriffe durchzuführen, darunter möglicherweise Codeausführung, Denial-of-Service-Angriffe, die Umgehung von Sicherheitsmaßnahmen oder die Manipulation von Daten. CVE Informationen Versionshistorie Feedback zum Advisory geben
Named provisions
Related changes
Source
Classification
Who this affects
Taxonomy
Browse Categories
Get Data Privacy & Cybersecurity alerts
Weekly digest. AI-summarized, no noise.
Free. Unsubscribe anytime.
Get alerts for this source
We'll email you when CERT-Bund Security Advisories publishes new changes.