In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges.

Project Subscriptions

Vendors Products
Debian Linux Subscribe
Fedoraproject Subscribe
Helion Openstack Subscribe
Enterprise Linux Subscribe
Cifs-utils Subscribe
Caas Platform Subscribe
Enterprise Storage Subscribe
Linux Enterprise Desktop Subscribe
Linux Enterprise High Performance Computing Subscribe
Linux Enterprise Micro Subscribe
Linux Enterprise Point Of Service Subscribe
Linux Enterprise Real Time Subscribe
Linux Enterprise Server Subscribe
Linux Enterprise Software Development Kit Subscribe
Linux Enterprise Storage Subscribe
Manager Proxy Subscribe
Manager Retail Branch Server Subscribe
Manager Server Subscribe
Openstack Cloud Subscribe
Openstack Cloud Crowbar Subscribe
Advisories
Source ID Title
Debian DLA Debian DLA DLA-3009-1 cifs-utils security update
Debian DSA Debian DSA DSA-5157-1 cifs-utils security update
EUVD EUVD EUVD-2022-31748 In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges.
Ubuntu USN Ubuntu USN USN-5459-1 cifs-utils vulnerabilities
Ubuntu USN Ubuntu USN USN-7688-1 cifs-utils vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00112}

epss

{'score': 0.00103}


Sun, 13 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00101}

epss

{'score': 0.00112}


Wed, 16 Apr 2025 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Redhat
Redhat enterprise Linux
CPEs cpe:/o:redhat:enterprise_linux:8
Vendors & Products Redhat
Redhat enterprise Linux

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-03T05:25:32.591Z

Reserved: 2022-03-18T00:00:00

Link: CVE-2022-27239

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-04-27T14:15:09.203

Modified: 2024-11-21T06:55:28.487

Link: CVE-2022-27239

cve-icon Redhat

Severity : Moderate

Publid Date: 2022-04-27T00:00:00Z

Links: CVE-2022-27239 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses