CVE-2022-27239
27.04.2022, 14:15
In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges.Enginsight
Vendor | Product | Version |
---|---|---|
samba | cifs-utils | 𝑥 < 6.15 |
debian | debian_linux | 9.0 |
debian | debian_linux | 10.0 |
debian | debian_linux | 11.0 |
suse | caas_platform | 4.0 |
suse | enterprise_storage | 6.0 |
suse | enterprise_storage | 7.0 |
suse | linux_enterprise_point_of_service | 11.0:sp3 |
suse | linux_enterprise_storage | 7.1 |
suse | manager_proxy | 4.1 |
suse | manager_proxy | 4.2 |
suse | manager_proxy | 4.3 |
suse | manager_retail_branch_server | 4.1 |
suse | manager_retail_branch_server | 4.2 |
suse | manager_retail_branch_server | 4.3 |
suse | manager_server | 4.1 |
suse | manager_server | 4.2 |
suse | manager_server | 4.3 |
suse | openstack_cloud | 8.0 |
suse | openstack_cloud | 9.0 |
suse | openstack_cloud_crowbar | 8.0 |
suse | openstack_cloud_crowbar | 9.0 |
suse | linux_enterprise_high_performance_computing | 12.0:sp5 |
suse | linux_enterprise_high_performance_computing | 15.0 |
suse | linux_enterprise_high_performance_computing | 15.0:sp1 |
suse | linux_enterprise_high_performance_computing | 15.0:sp1 |
suse | linux_enterprise_high_performance_computing | 15.0:sp2 |
suse | linux_enterprise_high_performance_computing | 15.0:sp2 |
suse | linux_enterprise_high_performance_computing | 15.0:sp3 |
suse | linux_enterprise_high_performance_computing | 15.0:sp4 |
suse | linux_enterprise_micro | 5.2 |
suse | linux_enterprise_micro | 5.2 |
suse | linux_enterprise_real_time | 15.0:sp2 |
hp | helion_openstack | 8.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References