First published: Wed Apr 27 2022(Updated: )
In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/cifs-utils | <=2:6.11-3.1<=2:6.8-2<=2:6.14-1 | 2:6.14-1.1 2:6.11-3.1+deb11u1 2:6.8-2+deb10u1 |
debian/cifs-utils | 2:6.8-2+deb10u1 2:6.11-3.1+deb11u1 2:7.0-2 | |
Samba | <6.15 | |
Debian | =9.0 | |
Debian | =10.0 | |
Debian | =11.0 | |
SUSE CaaS Platform | =4.0 | |
SUSE Enterprise Storage | =6.0 | |
SUSE Enterprise Storage | =7.0 | |
SUSE Linux Enterprise Point of Service | =11.0-sp3 | |
suse linux enterprise storage | =7.1 | |
suse manager proxy | =4.1 | |
suse manager proxy | =4.2 | |
suse manager proxy | =4.3 | |
suse manager retail branch server | =4.1 | |
suse manager retail branch server | =4.2 | |
suse manager retail branch server | =4.3 | |
SUSE Manager Server | =4.1 | |
SUSE Manager Server | =4.2 | |
SUSE Manager Server | =4.3 | |
openSUSE OpenStack Cloud | =8.0 | |
openSUSE OpenStack Cloud | =9.0 | |
Dell Crowbar | =8.0 | |
Dell Crowbar | =9.0 | |
SUSE Linux Enterprise Desktop with Beagle | =15-sp3 | |
SUSE Linux Enterprise Desktop with Beagle | =15-sp4 | |
SUSE Linux Enterprise High Performance Computing | =12.0-sp5 | |
SUSE Linux Enterprise High Performance Computing | =15.0 | |
SUSE Linux Enterprise High Performance Computing | =15.0-sp1 | |
SUSE Linux Enterprise High Performance Computing | =15.0-sp1 | |
SUSE Linux Enterprise High Performance Computing | =15.0-sp2 | |
SUSE Linux Enterprise High Performance Computing | =15.0-sp2 | |
SUSE Linux Enterprise High Performance Computing | =15.0-sp3 | |
SUSE Linux Enterprise High Performance Computing | =15.0-sp4 | |
suse linux enterprise micro | =5.2 | |
suse linux enterprise micro rancher | =5.2 | |
SUSE Linux Enterprise Real Time Extension | =15.0-sp2 | |
SUSE Linux Enterprise Server | =11-sp3 | |
SUSE Linux Enterprise Server | =11-sp4 | |
SUSE Linux Enterprise Server | =12-sp2 | |
suse linux enterprise server sap | =12-sp3 | |
SUSE Linux Enterprise Server | =12-sp3 | |
SUSE Linux Enterprise Server | =12-sp3 | |
SUSE Linux Enterprise Server | =12-sp3 | |
suse linux enterprise server sap | =12-sp4 | |
SUSE Linux Enterprise Server | =12-sp4 | |
SUSE Linux Enterprise Server | =12-sp4 | |
suse linux enterprise server sap | =12-sp5 | |
suse linux enterprise server sap | =15 | |
SUSE Linux Enterprise Server | =15 | |
SUSE Linux Enterprise Server | =15 | |
SUSE Linux Enterprise Server | =15-sp1 | |
SUSE Linux Enterprise Server | =15-sp1 | |
SUSE Linux Enterprise Server | =15-sp2 | |
SUSE Linux Enterprise Server | =15-sp2 | |
SUSE Linux Enterprise Server | =15-sp3 | |
SUSE Linux Enterprise Server | =15-sp4 | |
SUSE Linux Enterprise Software Development Kit | =12-sp5 | |
HP Helion OpenStack | =8.0 | |
Fedora | =34 | |
Fedora | =35 | |
Fedora | =36 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-27239 is classified as a high severity vulnerability due to the potential for local attackers to gain root privileges.
To fix CVE-2022-27239, update cifs-utils to version 6.15 or later.
CVE-2022-27239 affects versions of cifs-utils prior to 6.15 across various Debian and SUSE Linux distributions.
CVE-2022-27239 can be exploited by local attackers through a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument.
The impact of CVE-2022-27239 is that it allows local attackers to execute arbitrary code with elevated privileges.