Количество 15
Количество 15
CVE-2022-27239
In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges.
CVE-2022-27239
In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges.
CVE-2022-27239
In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges.
CVE-2022-27239
CVE-2022-27239
In cifs-utils through 6.14, a stack-based buffer overflow when parsing ...
SUSE-SU-2022:2378-1
Security update for cifs-utils
SUSE-SU-2022:14951-1
Security update for cifs-utils
SUSE-SU-2022:14950-1
Security update for cifs-utils
SUSE-SU-2022:1430-1
Security update for cifs-utils
SUSE-SU-2022:1429-1
Security update for cifs-utils
SUSE-SU-2022:1428-1
Security update for cifs-utils
SUSE-SU-2022:1427-1
Security update for cifs-utils
GHSA-mhc8-vv44-hh59
In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges.
ROS-20250829-01
Уязвимость cifs-utils
BDU:2022-04338
Уязвимость компонента mount.cifs.c пакета утилит для монтирования сетевых файловых систем CIFS cifs-utils операционной системы Linux, позволяющая нарушителю повысить свои привилегии
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2022-27239 In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges. | CVSS3: 7.8 | 0% Низкий | больше 3 лет назад | |
CVE-2022-27239 In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges. | CVSS3: 7 | 0% Низкий | больше 3 лет назад | |
CVE-2022-27239 In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges. | CVSS3: 7.8 | 0% Низкий | больше 3 лет назад | |
CVSS3: 7.8 | 0% Низкий | больше 3 лет назад | ||
CVE-2022-27239 In cifs-utils through 6.14, a stack-based buffer overflow when parsing ... | CVSS3: 7.8 | 0% Низкий | больше 3 лет назад | |
SUSE-SU-2022:2378-1 Security update for cifs-utils | 0% Низкий | больше 3 лет назад | ||
SUSE-SU-2022:14951-1 Security update for cifs-utils | 0% Низкий | больше 3 лет назад | ||
SUSE-SU-2022:14950-1 Security update for cifs-utils | 0% Низкий | больше 3 лет назад | ||
SUSE-SU-2022:1430-1 Security update for cifs-utils | 0% Низкий | больше 3 лет назад | ||
SUSE-SU-2022:1429-1 Security update for cifs-utils | 0% Низкий | больше 3 лет назад | ||
SUSE-SU-2022:1428-1 Security update for cifs-utils | 0% Низкий | больше 3 лет назад | ||
SUSE-SU-2022:1427-1 Security update for cifs-utils | 0% Низкий | больше 3 лет назад | ||
GHSA-mhc8-vv44-hh59 In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges. | CVSS3: 7.8 | 0% Низкий | больше 3 лет назад | |
ROS-20250829-01 Уязвимость cifs-utils | CVSS3: 7.8 | 0% Низкий | 5 месяцев назад | |
BDU:2022-04338 Уязвимость компонента mount.cifs.c пакета утилит для монтирования сетевых файловых систем CIFS cifs-utils операционной системы Linux, позволяющая нарушителю повысить свои привилегии | CVSS3: 7.8 | 0% Низкий | больше 3 лет назад |
Уязвимостей на страницу