Опубликовано: 27 апр. 2022
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.2
CVSS3: 7.8
Описание
In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | released | 2:6.8-1ubuntu1.2 |
| devel | not-affected | 2:6.14-1.1 |
| esm-infra-legacy/trusty | released | 2:6.0-1ubuntu2+esm1 |
| esm-infra/bionic | released | 2:6.8-1ubuntu1.2 |
| esm-infra/focal | released | 2:6.9-1ubuntu0.2 |
| esm-infra/xenial | released | 2:6.4-1ubuntu1.1+esm1 |
| focal | released | 2:6.9-1ubuntu0.2 |
| impish | released | 2:6.11-3.1ubuntu0.1 |
| jammy | released | 2:6.14-1ubuntu0.1 |
| kinetic | not-affected | 2:6.14-1.1 |
Показывать по
10
EPSS
Процентиль: 14%
0.00045
Низкий
7.2 High
CVSS2
7.8 High
CVSS3
Связанные уязвимости
CVSS3: 7
redhat
больше 3 лет назад
In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges.
CVSS3: 7.8
nvd
больше 3 лет назад
In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges.
CVSS3: 7.8
debian
больше 3 лет назад
In cifs-utils through 6.14, a stack-based buffer overflow when parsing ...
EPSS
Процентиль: 14%
0.00045
Низкий
7.2 High
CVSS2
7.8 High
CVSS3