Patches for the vulnerability are already available
Enterprise network security specialists report that a recently discovered vulnerability in the Linux kernel (operating system core) that affects version 4.9 and further versions could allow a hacker to perform denial of service (DoS) attacks on a system with an open port available.
A security report warns of the vulnerability in Linux kernels versions 4.9+ that can allow an attacker to overflow resources from a network with low-effort calls.
With the right procedures, a Linux system can be forced to make a sequence of calls to the kernel for each packet, kernel calls that are very costly in terms of system resources. There are limitations and restrictions to exploit the vulnerability, but there is also evidence that this is real.
“Kernel of Linux versions 4.9+ may be forced to make very expensive calls for each incoming package, which can lead to a denial of service”, the report reveals. “An attacker can induce a denial of service condition by sending specially modified packages within the current TCP sessions”. Enterprise network security experts note that because of this, denial of service attacks cannot be performed using spoofed IP addresses.
Update patches have already been released for the vulnerability, so enterprise network security specialists from the International Institute of Cyber Security recommend users of the Linux operating system to update their systems as soon as possible and avoid any risk.