Linux administrators are being warned to address five new vulnerabilities, one of which is rated 10 on the Common Vulnerability Scoring System (CVSS) severity ranking.
have vulnerabilities Listed by Trend Micro’s Zero Day Initiative (ZDI)A project that pays security researchers to find vulnerabilities.
The most serious of the five, designated ZDI-22-1690, allows remote attackers to execute arbitrary code on affected installations of the Linux kernel. Exploitation of this vulnerability does not require authentication, but only systems with ksmbd enabled are vulnerable.
The specific flaw exists within the processing of the SMB2_TREE_DISCONNECT command. The problem arises because of the lack of validating the existence of an object before performing operations on the object. An attacker can take advantage of this vulnerability to execute code in the context of the kernel.
An update has been released to fix this vulnerability. More details can be found here.
Almost as serious is a vulnerability in the handling of the SMB2_WRITE command, which is rated 9.6 in severity. Named ZDI-22-1691, it allows remote attackers to reveal sensitive information on affected installations of the Linux kernel. Exploiting this vulnerability requires authentication.
An update has been released to fix this vulnerability. Details can be found here.
A third vulnerability, ZDI-22-1688, is rated 8.5 in severity. The specific flaw lies within the handling of file attributes. This problem is caused by a lack of proper validation of the length of user-supplied data before copying it to a heap-based buffer. An attacker could take advantage of this vulnerability to execute code in the context of the kernel.
More information about bugs and patches can be found here.
The other vulnerabilities revealed on Thursday are ranked at 6.5 and 5.3 in severity.