{"id":"CVE-2022-29869","details":"cifs-utils through 6.14, with verbose logging, can cause an information leak when a file contains = (equal sign) characters but is not a valid credentials file.","modified":"2026-04-16T04:32:24.844584434Z","published":"2022-04-28T01:15:06.727Z","related":["SUSE-SU-2022:2801-1","SUSE-SU-2022:2802-1","SUSE-SU-2022:3525-1","openSUSE-SU-2022:2801-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5WBOLMANBYJILXQKRRK7OCR774PXJAYY/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HXKZLJYJJEC3TIBFLXUORRMZUKG5W676/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QIYZ4L6SLSYJQ446VJAO2VGAESURQNSP/"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2022/05/msg00020.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202311-05"},{"type":"ADVISORY","url":"https://www.debian.org/security/2022/dsa-5157"},{"type":"FIX","url":"https://github.com/piastry/cifs-utils/pull/7"},{"type":"FIX","url":"https://github.com/piastry/cifs-utils/commit/8acc963a2e7e9d63fe1f2e7f73f5a03f83d9c379"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/piastry/cifs-utils","events":[{"introduced":"0"},{"fixed":"58ca03f183b375cb723097a241bc2fc2254dab21"},{"fixed":"8acc963a2e7e9d63fe1f2e7f73f5a03f83d9c379"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"6.15"}]}}],"versions":["cifs-utils-4.0","cifs-utils-4.0a1","cifs-utils-4.0rc1","cifs-utils-4.1","cifs-utils-4.2","cifs-utils-4.3","cifs-utils-4.4","cifs-utils-4.5","cifs-utils-4.6","cifs-utils-4.7","cifs-utils-4.8","cifs-utils-4.8.1","cifs-utils-4.9","cifs-utils-5.0","cifs-utils-5.1","cifs-utils-5.2","cifs-utils-5.3","cifs-utils-5.4","cifs-utils-5.5","cifs-utils-5.6","cifs-utils-5.7","cifs-utils-5.8","cifs-utils-5.9","cifs-utils-6.0","cifs-utils-6.1","cifs-utils-6.10","cifs-utils-6.11","cifs-utils-6.12","cifs-utils-6.13","cifs-utils-6.14","cifs-utils-6.2","cifs-utils-6.3","cifs-utils-6.4","cifs-utils-6.5","cifs-utils-6.6","cifs-utils-6.7","cifs-utils-6.8","cifs-utils-6.9","release-4-0a1"],"database_specific":{"vanir_signatures":[{"deprecated":false,"target":{"function":"open_cred_file","file":"mount.cifs.c"},"id":"CVE-2022-29869-079112c6","signature_version":"v1","signature_type":"Function","source":"https://github.com/piastry/cifs-utils/commit/8acc963a2e7e9d63fe1f2e7f73f5a03f83d9c379","digest":{"length":1476,"function_hash":"91061460177468123754902069861250535461"}},{"deprecated":false,"digest":{"line_hashes":["333177565664066831031052731575158110766","269008431299318842638218154133802989812","200416903659751381251677829170609985397","142948789842139240547537937641208830596","44912368005009940171336540415324128652","157149416689637315031584410539095472663","83440183529970733472400725653080485434","172559212895684826899817295477533425772","151755585470736387165767965852064864571","318376024910814506234711884201024569379","1076006348340887466461663850527154898","247924530577808540089783321436504017021","345905160297107181876084015619107312","94278264940853492957148186831503439599"],"threshold":0.9},"target":{"file":"mount.cifs.c"},"signature_version":"v1","signature_type":"Line","source":"https://github.com/piastry/cifs-utils/commit/8acc963a2e7e9d63fe1f2e7f73f5a03f83d9c379","id":"CVE-2022-29869-308c8667"}],"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"34"}]},{"events":[{"introduced":"0"},{"last_affected":"35"}]},{"events":[{"introduced":"0"},{"last_affected":"36"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]},{"events":[{"introduced":"0"},{"last_affected":"11.0"}]}],"vanir_signatures_modified":"2026-04-11T23:14:59Z","source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-29869.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}]}