In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges.
{ "binaries": [ { "binary_name": "cifs-utils", "binary_version": "2:6.0-1ubuntu2+esm1" } ], "availability": "Available with Ubuntu Pro with Legacy support add-on: https://ubuntu.com/pro" }
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-27239.json"
{ "binaries": [ { "binary_name": "cifs-utils", "binary_version": "2:6.4-1ubuntu1.1+esm1" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro" }
{ "binaries": [ { "binary_name": "cifs-utils", "binary_version": "2:6.8-1ubuntu1.2" } ], "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "cifs-utils", "binary_version": "2:6.9-1ubuntu0.2" } ], "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "cifs-utils", "binary_version": "2:6.14-1ubuntu0.1" } ], "availability": "No subscription required" }