Vulnerability identifier: #VU93644
Vulnerability risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48667
CWE-ID:
CWE-399
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to corrupt data.
The vulnerability exists due to improper management of internal resources within the smb3_insert_range() function in fs/cifs/smb2ops.c. A local user can corrupt data.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel: 5.19, 5.19 rc1, 5.19 rc4, 5.19 rc5, 5.19 rc6, 5.19.1, 5.19.2, 5.19.3, 5.19.4, 5.19.5, 5.19.6, 5.19.7, 5.19.8, 5.19.9, 5.19.10, 5.19.11, 6.0 rc1, 6.0 rc2, 6.0 rc3, 6.0 rc4
External links
https://git.kernel.org/stable/c/0cdde8460c304283d4ebe3f767a70215d1ab9d4e
https://git.kernel.org/stable/c/9c8b7a293f50253e694f19161c045817a938e551
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.12
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.0
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.