CVE-2022-27239

In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges.
Configurations

Configuration 1

cpe:2.3:a:samba:cifs-utils:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:ltss:*:*:*
cpe:2.3:a:suse:openstack_cloud:8.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:15:*:*:*:*:sap:*:*
cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp5:*:*:*:*:*:*
cpe:2.3:a:suse:openstack_cloud_crowbar:8.0:*:*:*:*:*:*:*
cpe:2.3:a:suse:openstack_cloud_crowbar:9.0:*:*:*:*:*:*:*
cpe:2.3:a:suse:openstack_cloud:9.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:12:sp3:*:*:ltss:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:12:sp3:*:*:*:sap:*:*
cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*
cpe:2.3:a:suse:manager_server:4.1:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:12:sp5:*:*:*:sap:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:15:sp3:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:15:sp3:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:15:sp4:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:15:sp4:*:*:*:*:*:*
cpe:2.3:a:suse:enterprise_storage:7.0:*:*:*:*:*:*:*
cpe:2.3:a:suse:caas_platform:4.0:*:*:*:*:*:*:*
cpe:2.3:a:suse:enterprise_storage:6.0:*:*:*:*:*:*:*
cpe:2.3:a:suse:manager_proxy:4.1:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:15:-:*:*:espos:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:15:-:*:*:ltss:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:15:sp1:*:*:ltss:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:15:sp2:*:*:ltss:*:*:*
cpe:2.3:o:suse:linux_enterprise_high_performance_computing:12.0:sp5:*:*:-:*:*:*
cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:-:*:*:ltss:*:*:*
cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp1:*:*:espos:*:*:*
cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp1:*:*:ltss:*:*:*
cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp2:*:*:espos:*:*:*
cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp2:*:*:ltss:*:*:*
cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp3:*:*:-:*:*:*
cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp4:*:*:-:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:12:sp4:*:*:espos:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:12:sp4:*:*:ltss:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:12:sp3:*:*:espos:*:*:*
cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp2:*:*:*:*:*:*
cpe:2.3:a:suse:linux_enterprise_point_of_service:11.0:sp3:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_micro:5.2:*:*:*:*:rancher:*:*
cpe:2.3:o:suse:linux_enterprise_micro:5.2:*:*:*:*:-:*:*
cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:business_critical_linux:-:*:*
cpe:2.3:o:suse:linux_enterprise_server:12:sp3:*:*:business_critical_linux:-:*:*
cpe:2.3:o:suse:linux_enterprise_server:15:sp1:*:*:business_critical_linux:-:*:*
cpe:2.3:o:suse:linux_enterprise_server:15:sp2:*:*:business_critical_linux:-:*:*
cpe:2.3:o:suse:linux_enterprise_server:12:sp4:*:*:-:sap:*:*
cpe:2.3:a:suse:manager_retail_branch_server:4.2:*:*:*:*:*:*:*
cpe:2.3:a:suse:manager_retail_branch_server:4.1:*:*:*:*:*:*:*
cpe:2.3:a:suse:manager_retail_branch_server:4.3:*:*:*:*:*:*:*
cpe:2.3:a:suse:manager_server:4.2:*:*:*:*:*:*:*
cpe:2.3:a:suse:manager_server:4.3:*:*:*:*:*:*:*
cpe:2.3:a:suse:manager_proxy:4.2:*:*:*:*:*:*:*
cpe:2.3:a:suse:manager_proxy:4.3:*:*:*:*:*:*:*
cpe:2.3:a:suse:linux_enterprise_storage:7.1:*:*:*:*:*:*:*
cpe:2.3:a:hp:helion_openstack:8.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*

Information

Published : 2022-04-27 02:15

Updated : 2022-10-05 07:37


NVD link : CVE-2022-27239

Mitre link : CVE-2022-27239

Products Affected
CWE