In the Linux kernel, the following vulnerability has been resolved: smb3:
fix temporary data corruption in insert range insert range doesn’t discard
the affected cached region so can risk temporarily corrupting file data.
Also includes some minor cleanup (avoiding rereading inode size repeatedly
unnecessarily) to make it clearer.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 14.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
git.kernel.org/linus/9c8b7a293f50253e694f19161c045817a938e551 (6.0-rc4)
git.kernel.org/stable/c/0cdde8460c304283d4ebe3f767a70215d1ab9d4e
git.kernel.org/stable/c/9c8b7a293f50253e694f19161c045817a938e551
launchpad.net/bugs/cve/CVE-2022-48667
nvd.nist.gov/vuln/detail/CVE-2022-48667
security-tracker.debian.org/tracker/CVE-2022-48667
www.cve.org/CVERecord?id=CVE-2022-48667