In the Linux kernel, the following vulnerability has been resolved:
smb3: fix temporary data corruption in insert range
insert range doesn't discard the affected cached region so can risk temporarily corrupting file data.
Also includes some minor cleanup (avoiding rereading inode size repeatedly unnecessarily) to make it clearer.
{ "vanir_signatures": [ { "deprecated": false, "id": "CVE-2022-48667-873029db", "digest": { "function_hash": "304932979275267672075697687826264162003", "length": 774.0 }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9c8b7a293f50253e694f19161c045817a938e551", "target": { "file": "fs/cifs/smb2ops.c", "function": "smb3_insert_range" }, "signature_type": "Function", "signature_version": "v1" }, { "deprecated": false, "id": "CVE-2022-48667-a206bc16", "digest": { "function_hash": "304932979275267672075697687826264162003", "length": 774.0 }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0cdde8460c304283d4ebe3f767a70215d1ab9d4e", "target": { "file": "fs/cifs/smb2ops.c", "function": "smb3_insert_range" }, "signature_type": "Function", "signature_version": "v1" }, { "deprecated": false, "id": "CVE-2022-48667-a53f8cae", "digest": { "threshold": 0.9, "line_hashes": [ "202903354459599668584634694003882400664", "31362929602176450252569370288921810537", "139772346933665799708163575816722286678", "205391699558051725509135807893630909074", "340064843063894964156425554936566354828", "156680472605524305378900280601745238970", "198620594376575784360714854231698690004", "195980402926947105655789570777166810659", "190156991898881658408706377449942098160", "217675955560314923539853247978867472814", "28114939326362200055148176733812060807", "239626636614327208746977639019593250783", "72522226541740128090847336588456856379", "338320611985168639384952077696678194938", "262374911260554057065910236200852471711", "183725015610649821681026762515787716417", "84755923810134993422630044988778012044", "287687250097544941104983474909313174797", "66788020703955313854756576544184043442", "113750171457054476305438157994528503633", "93301576873741271985930266060525533472", "334164146722895361476063165094827018551", "153602466811588606379608725416874368835", "198997886748931971499231892592754940851" ] }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9c8b7a293f50253e694f19161c045817a938e551", "target": { "file": "fs/cifs/smb2ops.c" }, "signature_type": "Line", "signature_version": "v1" }, { "deprecated": false, "id": "CVE-2022-48667-ff167d51", "digest": { "threshold": 0.9, "line_hashes": [ "202903354459599668584634694003882400664", "31362929602176450252569370288921810537", "139772346933665799708163575816722286678", "205391699558051725509135807893630909074", "340064843063894964156425554936566354828", "156680472605524305378900280601745238970", "198620594376575784360714854231698690004", "195980402926947105655789570777166810659", "190156991898881658408706377449942098160", "217675955560314923539853247978867472814", "28114939326362200055148176733812060807", "239626636614327208746977639019593250783", "72522226541740128090847336588456856379", "338320611985168639384952077696678194938", "262374911260554057065910236200852471711", "183725015610649821681026762515787716417", "84755923810134993422630044988778012044", "287687250097544941104983474909313174797", "66788020703955313854756576544184043442", "113750171457054476305438157994528503633", "93301576873741271985930266060525533472", "334164146722895361476063165094827018551", "153602466811588606379608725416874368835", "198997886748931971499231892592754940851" ] }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0cdde8460c304283d4ebe3f767a70215d1ab9d4e", "target": { "file": "fs/cifs/smb2ops.c" }, "signature_type": "Line", "signature_version": "v1" } ] }