Newly discovered Linux vulnerability rated 10 in severity

December 24, 2022

Linux administrators are being warned to address five new vulnerabilities, one of which is rated 10 on the Common Vulnerability Scoring System (CVSS) severity ranking.

The vulnerabilities are listed by Trend Micro’s Zero Day Initiative (ZDI), a project that pays security researchers for finding vulnerabilities.

The most serious of the five, designated ZDI-22-1690, allows remote attackers to execute arbitrary code on affected installations of Linux Kernel. Authentication is not required to exploit this vulnerability, but only systems with ksmbd enabled are vulnerable.

The specific flaw exists within the processing of SMB2_TREE_DISCONNECT commands. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the kernel.

An update has been issued to correct this vulnerability. More details can be found here.

Almost as serious is a vulnerability in the handling of SMB2_WRITE commands, rated 9.6 in severity. Designated ZDI-22-1691, it allows remote attackers to disclose sensitive information on affected installations of Linux Kernel. Authentication is required to exploit this vulnerability.

An update has been issued to correct this vulnerability. Details can be found here.

A third vulnerability, ZDI-22-1688, is rated 8.5 in severity. The specific flaw exists within the handling of file attributes. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the kernel.

More information about the bug and the patch can be found here.

The other vulnerabilities revealed Thursday are ranked at 6.5 and 5.3 in severity.

The post Newly discovered Linux vulnerability rated 10 in severity first appeared on IT World Canada.

Top Stories

Related Articles

April 1, 2026 Anthropic has inadvertently exposed the full source code of its Claude Code tool for the second time more...

April 1, 2026 Cisco suffered a cyberattack after attackers used stolen credentials from a compromised developer tool to access its more...

March 30, 2026 Google has expanded its “Results about you” tool, allowing users to remove highly sensitive personal data, including more...

March 27, 2026 Microsoft is updating GitHub Copilot to train on real-world developer interactions, expanding beyond public code datasets to more...

Picture of Howard Solomon

Howard Solomon

Currently a freelance writer, I'm the former editor of ITWorldCanada.com and Computing Canada. An IT journalist since 1997, I've written for ITBusiness.ca and Computer Dealer News. Before that I was a staff reporter at the Calgary Herald and the Brampton (Ont.) Daily Times.
Picture of Howard Solomon

Howard Solomon

Currently a freelance writer, I'm the former editor of ITWorldCanada.com and Computing Canada. An IT journalist since 1997, I've written for ITBusiness.ca and Computer Dealer News. Before that I was a staff reporter at the Calgary Herald and the Brampton (Ont.) Daily Times.

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn