In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Debian
Subscribe
|
Debian Linux
Subscribe
|
|
Fedoraproject
Subscribe
|
Fedora
Subscribe
|
|
Hp
Subscribe
|
Helion Openstack
Subscribe
|
|
Redhat
Subscribe
|
Enterprise Linux
Subscribe
|
|
Samba
Subscribe
|
Cifs-utils
Subscribe
|
|
Suse
Subscribe
|
Caas Platform
Subscribe
Enterprise Storage
Subscribe
Linux Enterprise Desktop
Subscribe
Linux Enterprise High Performance Computing
Subscribe
Linux Enterprise Micro
Subscribe
Linux Enterprise Point Of Service
Subscribe
Linux Enterprise Real Time
Subscribe
Linux Enterprise Server
Subscribe
Linux Enterprise Software Development Kit
Subscribe
Linux Enterprise Storage
Subscribe
Manager Proxy
Subscribe
Manager Retail Branch Server
Subscribe
Manager Server
Subscribe
Openstack Cloud
Subscribe
Openstack Cloud Crowbar
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3009-1 | cifs-utils security update |
Debian DSA |
DSA-5157-1 | cifs-utils security update |
EUVD |
EUVD-2022-31748 | In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges. |
Ubuntu USN |
USN-5459-1 | cifs-utils vulnerabilities |
Ubuntu USN |
USN-7688-1 | cifs-utils vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 16 Apr 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat
Redhat enterprise Linux |
|
| CPEs | cpe:/o:redhat:enterprise_linux:8 | |
| Vendors & Products |
Redhat
Redhat enterprise Linux |
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T05:25:32.591Z
Reserved: 2022-03-18T00:00:00
Link: CVE-2022-27239
No data.
Status : Modified
Published: 2022-04-27T14:15:09.203
Modified: 2024-11-21T06:55:28.487
Link: CVE-2022-27239
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD
Ubuntu USN