Newly discovered Linux vulnerability rated 10 in severity

December 24, 2022

Linux administrators are being warned to address five new vulnerabilities, one of which is rated 10 on the Common Vulnerability Scoring System (CVSS) severity ranking.

The vulnerabilities are listed by Trend Micro’s Zero Day Initiative (ZDI), a project that pays security researchers for finding vulnerabilities.

The most serious of the five, designated ZDI-22-1690, allows remote attackers to execute arbitrary code on affected installations of Linux Kernel. Authentication is not required to exploit this vulnerability, but only systems with ksmbd enabled are vulnerable.

The specific flaw exists within the processing of SMB2_TREE_DISCONNECT commands. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the kernel.

An update has been issued to correct this vulnerability. More details can be found here.

Almost as serious is a vulnerability in the handling of SMB2_WRITE commands, rated 9.6 in severity. Designated ZDI-22-1691, it allows remote attackers to disclose sensitive information on affected installations of Linux Kernel. Authentication is required to exploit this vulnerability.

An update has been issued to correct this vulnerability. Details can be found here.

A third vulnerability, ZDI-22-1688, is rated 8.5 in severity. The specific flaw exists within the handling of file attributes. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the kernel.

More information about the bug and the patch can be found here.

The other vulnerabilities revealed Thursday are ranked at 6.5 and 5.3 in severity.

The post Newly discovered Linux vulnerability rated 10 in severity first appeared on IT World Canada.

Top Stories

Related Articles

January 20, 2026 Hackers are advertising what they claim is internal source code stolen from Target. A sample of the more...

January 16, 2026 A newly uncovered malware framework suggests attackers are quietly preparing for a much deeper push into Linux more...

January 16, 2026 A massive trove of personal data belonging to thousands of U.S. immigration agents has reportedly been leaked more...

December 30, 2025 A fast-moving cyberattack has compromised more than 59,000 internet-facing Next.js servers in less than two days after more...

Picture of Howard Solomon

Howard Solomon

Currently a freelance writer, I'm the former editor of ITWorldCanada.com and Computing Canada. An IT journalist since 1997, I've written for ITBusiness.ca and Computer Dealer News. Before that I was a staff reporter at the Calgary Herald and the Brampton (Ont.) Daily Times.
Picture of Howard Solomon

Howard Solomon

Currently a freelance writer, I'm the former editor of ITWorldCanada.com and Computing Canada. An IT journalist since 1997, I've written for ITBusiness.ca and Computer Dealer News. Before that I was a staff reporter at the Calgary Herald and the Brampton (Ont.) Daily Times.

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn