As per samba upstream advisory: All versions of Samba with SMB1 enabled are vulnerable to a server memory information leak bug over SMB1 if a client can write data to a share. Some SMB1 write requests were not correctly range checked to ensure the client had sent enough data to fulfill the write, allowing server memory contents to be written into the file (or printer) instead of client supplied data. The client cannot control the area of the server memory that is written to the file (or printer). Please note that only versions of Samba prior to 4.11.0 are vulnerable to this bug by default. Samba versions 4.11.0 and above disable SMB1 by default, and will only be vulnerable if the administrator has deliberately enabled SMB1 in the smb.conf file.
Created samba tracking bugs for this issue: Affects: fedora-all [bug 2111729]
This issue has been addressed in the following products: Red Hat Gluster Storage 3.5 for RHEL 8 Via RHSA-2022:7056 https://access.redhat.com/errata/RHSA-2022:7056
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:7111 https://access.redhat.com/errata/RHSA-2022:7111
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2022:8317 https://access.redhat.com/errata/RHSA-2022:8317
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-32742