BTC $70823.7516
ETH $3531.0259
BNB $621.2790
SOL $172.6448
stETH $3527.9907
XRP $0.6083
DOGE $0.1997
TON $7.2456
ADA $0.5853
AVAX $46.2175
wstETH $4100.4456
DOT $8.4402
BCH $607.1354
WETH $3536.6758
WBTC $70909.4458
TRX $0.1219
LINK $17.6560
MATIC $0.8809
UNI $9.0821
ICP $15.6959
LTC $97.8636
CAKE $3.7041
DAI $0.9996
IMX $2.5675
ETC $33.6641
RNDR $9.1096
FIL $8.1342
STX $2.9994
MNT $1.2895
NEAR $6.8343
TAO $615.5692
VET $0.0503
ATOM $10.8915
HBAR $0.0996
OKB $56.9032
FDUSD $1.0028
WIF $3.3890
KAS $0.1440
MKR $3344.9389
PEPE $0.0000
GRT $0.3114
THETA $2.8807
INJ $31.7467
FET $2.5067
XLM $0.1297
XMR $134.0517
USDE $1.0001
BTC $70823.7516
ETH $3531.0259
BNB $621.2790
SOL $172.6448
stETH $3527.9907
XRP $0.6083
DOGE $0.1997
TON $7.2456
ADA $0.5853
AVAX $46.2175
wstETH $4100.4456
DOT $8.4402
BCH $607.1354
WETH $3536.6758
WBTC $70909.4458
TRX $0.1219
LINK $17.6560
MATIC $0.8809
UNI $9.0821
ICP $15.6959
LTC $97.8636
CAKE $3.7041
DAI $0.9996
IMX $2.5675
ETC $33.6641
RNDR $9.1096
FIL $8.1342
STX $2.9994
MNT $1.2895
NEAR $6.8343
TAO $615.5692
VET $0.0503
ATOM $10.8915
HBAR $0.0996
OKB $56.9032
FDUSD $1.0028
WIF $3.3890
KAS $0.1440
MKR $3344.9389
PEPE $0.0000
GRT $0.3114
THETA $2.8807
INJ $31.7467
FET $2.5067
XLM $0.1297
XMR $134.0517
USDE $1.0001
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • Critical vulnerability in the kmsbd module of the Linux kernel gives a free hand to attackers


    A security flaw allows an unauthorized hacker to execute arbitrary code with kernel privileges.

    An extremely dangerous critical Linux kernel vulnerability has been discovered in the ksmbd module. She received the identifier CVE-2022-47939 and 10 out of 10 possible points on the CVSS scale. Ksmbd is a Linux kernel module that implements a file server based on the SMB3 protocol for exchanging files using the Samba standard.

    According to the participants of the Zero Day Initiative (ZDI) who discovered the vulnerability, CVE-2022-47939 can be used by hackers to execute arbitrary code with kernel privileges. In addition, no authorization is required to exploit this security hole, it is enough that the ksmbd module is activated on the system.

    A vulnerability was caused by the possibility of accessing an already freed memory area due to the lack of checking the existence of an object before performing operations on it. And it manifests itself during processing when processing certain external requests containing SMB2_TREE_DISCONNECT commands.

    It is worth noting that the vulnerability was discovered as early as July 26, 2022, and then quickly fixed in the August updates 5.15.61 , 5.18.18 and 5.19.2 , but the general public learned about it only on December 22.

    Experts recommend that administrators using ksmbd update the Linux kernel to version 5.15.61 or newer.

    Author DeepWeb
    Group Play smashes the German hotel chain H-Hotels
    Glupteba botnet revived

    Comments 0

    Add comment