{"id":167197,"date":"2022-12-24T17:13:01","date_gmt":"2022-12-24T17:13:01","guid":{"rendered":"https:\/\/harchi90.com\/linux-admins-have-a-cvss-10-kernel-bug-to-address-the-register\/"},"modified":"2022-12-24T17:13:01","modified_gmt":"2022-12-24T17:13:01","slug":"linux-admins-have-a-cvss-10-kernel-bug-to-address-the-register","status":"publish","type":"post","link":"https:\/\/harchi90.com\/linux-admins-have-a-cvss-10-kernel-bug-to-address-the-register\/","title":{"rendered":"Linux admins have a CVSS 10 kernel bug to address \u2022 The Register"},"content":{"rendered":"
\n

Merry Christmas, Linux systems administrators: Here’s a kernel vulnerability with a CVSS score of 10 in your SMB server for the holiday season giving an unauthenticated user remote code execution. <\/p>\n

Yes, this sounds bad, and a score of 10 isn’t reassuring at all. Luckily for the sysadmins reaching for more brandy to pour in that eggnog, it doesn’t appear to be that widespread.<\/p>\n

Discovered the Thalium Team vulnerability research team at French aerospace firm Thales Group in July, the vulnerability is specific to the ksmbd module that was added to the Linux kernel in version 5.15. Disclosure was responsively held until a patch was issued.<\/p>\n

\n