{"id":"CVE-2022-27239","details":"In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges.","modified":"2026-04-16T00:00:34.597013079Z","published":"2022-04-27T14:15:09.203Z","related":["SUSE-SU-2022:1427-1","SUSE-SU-2022:1428-1","SUSE-SU-2022:1429-1","SUSE-SU-2022:1430-1","SUSE-SU-2022:14950-1","SUSE-SU-2022:14951-1","SUSE-SU-2022:2378-1","openSUSE-SU-2024:12087-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5WBOLMANBYJILXQKRRK7OCR774PXJAYY/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HXKZLJYJJEC3TIBFLXUORRMZUKG5W676/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QIYZ4L6SLSYJQ446VJAO2VGAESURQNSP/"},{"type":"ADVISORY","url":"http://wiki.robotz.com/index.php/Linux_CIFS_Utils_and_Samba"},{"type":"ADVISORY","url":"https://bugzilla.samba.org/show_bug.cgi?id=15025"},{"type":"ADVISORY","url":"https://bugzilla.suse.com/show_bug.cgi?id=1197216"},{"type":"ADVISORY","url":"https://github.com/piastry/cifs-utils/pull/7"},{"type":"ADVISORY","url":"https://github.com/piastry/cifs-utils/pull/7/commits/955fb147e97a6a74e1aaa65766de91e2c1479765"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2022/05/msg00020.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202311-05"},{"type":"ADVISORY","url":"https://www.debian.org/security/2022/dsa-5157"},{"type":"REPORT","url":"https://bugzilla.samba.org/show_bug.cgi?id=15025"},{"type":"REPORT","url":"https://bugzilla.suse.com/show_bug.cgi?id=1197216"},{"type":"REPORT","url":"https://github.com/piastry/cifs-utils/pull/7"},{"type":"FIX","url":"https://bugzilla.suse.com/show_bug.cgi?id=1197216"},{"type":"FIX","url":"https://github.com/piastry/cifs-utils/pull/7"},{"type":"FIX","url":"https://github.com/piastry/cifs-utils/pull/7/commits/955fb147e97a6a74e1aaa65766de91e2c1479765"},{"type":"ARTICLE","url":"https://lists.debian.org/debian-lts-announce/2022/05/msg00020.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/piastry/cifs-utils","events":[{"introduced":"0"},{"fixed":"58ca03f183b375cb723097a241bc2fc2254dab21"}]}],"versions":["cifs-utils-4.0","cifs-utils-4.0a1","cifs-utils-4.0rc1","cifs-utils-4.1","cifs-utils-4.2","cifs-utils-4.3","cifs-utils-4.4","cifs-utils-4.5","cifs-utils-4.6","cifs-utils-4.7","cifs-utils-4.8","cifs-utils-4.8.1","cifs-utils-4.9","cifs-utils-5.0","cifs-utils-5.1","cifs-utils-5.2","cifs-utils-5.3","cifs-utils-5.4","cifs-utils-5.5","cifs-utils-5.6","cifs-utils-5.7","cifs-utils-5.8","cifs-utils-5.9","cifs-utils-6.0","cifs-utils-6.1","cifs-utils-6.10","cifs-utils-6.11","cifs-utils-6.12","cifs-utils-6.13","cifs-utils-6.14","cifs-utils-6.2","cifs-utils-6.3","cifs-utils-6.4","cifs-utils-6.5","cifs-utils-6.6","cifs-utils-6.7","cifs-utils-6.8","cifs-utils-6.9","release-4-0a1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-27239.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}