In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3009-1 | cifs-utils security update |
Debian DSA |
DSA-5157-1 | cifs-utils security update |
EUVD |
EUVD-2022-31748 | In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges. |
Ubuntu USN |
USN-5459-1 | cifs-utils vulnerabilities |
Ubuntu USN |
USN-7688-1 | cifs-utils vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 16 Apr 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat
Redhat enterprise Linux |
|
| CPEs | cpe:/o:redhat:enterprise_linux:8 | |
| Vendors & Products |
Redhat
Redhat enterprise Linux |
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T05:25:32.591Z
Reserved: 2022-03-18T00:00:00
Link: CVE-2022-27239
No data.
Status : Modified
Published: 2022-04-27T14:15:09.203
Modified: 2024-11-21T06:55:28.487
Link: CVE-2022-27239
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN