First published: Wed Apr 27 2022(Updated: )
In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/cifs-utils | <=2:6.11-3.1<=2:6.8-2<=2:6.14-1 | 2:6.14-1.1 2:6.11-3.1+deb11u1 2:6.8-2+deb10u1 |
debian/cifs-utils | 2:6.8-2+deb10u1 2:6.11-3.1+deb11u1 2:7.0-2 | |
Samba Cifs-utils | <6.15 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
SUSE CaaS Platform | =4.0 | |
SUSE Enterprise Storage | =6.0 | |
SUSE Enterprise Storage | =7.0 | |
Suse Linux Enterprise Point Of Service | =11.0-sp3 | |
Suse Linux Enterprise Storage | =7.1 | |
Suse Manager Proxy | =4.1 | |
Suse Manager Proxy | =4.2 | |
Suse Manager Proxy | =4.3 | |
Suse Manager Retail Branch Server | =4.1 | |
Suse Manager Retail Branch Server | =4.2 | |
Suse Manager Retail Branch Server | =4.3 | |
SUSE Manager Server | =4.1 | |
SUSE Manager Server | =4.2 | |
SUSE Manager Server | =4.3 | |
SUSE OpenStack Cloud | =8.0 | |
SUSE OpenStack Cloud | =9.0 | |
SUSE OpenStack Cloud Crowbar | =8.0 | |
SUSE OpenStack Cloud Crowbar | =9.0 | |
SUSE Linux Enterprise Desktop | =15-sp3 | |
SUSE Linux Enterprise Desktop | =15-sp4 | |
SUSE Linux Enterprise High Performance Computing | =12.0-sp5 | |
SUSE Linux Enterprise High Performance Computing | =15.0 | |
SUSE Linux Enterprise High Performance Computing | =15.0-sp1 | |
SUSE Linux Enterprise High Performance Computing | =15.0-sp1 | |
SUSE Linux Enterprise High Performance Computing | =15.0-sp2 | |
SUSE Linux Enterprise High Performance Computing | =15.0-sp2 | |
SUSE Linux Enterprise High Performance Computing | =15.0-sp3 | |
SUSE Linux Enterprise High Performance Computing | =15.0-sp4 | |
Suse Linux Enterprise Micro | =5.2 | |
Suse Linux Enterprise Micro Rancher | =5.2 | |
Suse Linux Enterprise Real Time | =15.0-sp2 | |
SUSE Linux Enterprise Server | =11-sp3 | |
SUSE Linux Enterprise Server | =11-sp4 | |
SUSE Linux Enterprise Server | =12-sp2 | |
Suse Linux Enterprise Server Sap | =12-sp3 | |
SUSE Linux Enterprise Server | =12-sp3 | |
SUSE Linux Enterprise Server | =12-sp3 | |
SUSE Linux Enterprise Server | =12-sp3 | |
Suse Linux Enterprise Server Sap | =12-sp4 | |
SUSE Linux Enterprise Server | =12-sp4 | |
SUSE Linux Enterprise Server | =12-sp4 | |
Suse Linux Enterprise Server Sap | =12-sp5 | |
Suse Linux Enterprise Server Sap | =15 | |
SUSE Linux Enterprise Server | =15 | |
SUSE Linux Enterprise Server | =15 | |
SUSE Linux Enterprise Server | =15-sp1 | |
SUSE Linux Enterprise Server | =15-sp1 | |
SUSE Linux Enterprise Server | =15-sp2 | |
SUSE Linux Enterprise Server | =15-sp2 | |
SUSE Linux Enterprise Server | =15-sp3 | |
SUSE Linux Enterprise Server | =15-sp4 | |
SUSE Linux Enterprise Software Development Kit | =12-sp5 | |
Hp Helion Openstack | =8.0 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.