Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3009-1 | cifs-utils security update |
Debian DSA |
DSA-5157-1 | cifs-utils security update |
EUVD |
EUVD-2022-31748 | In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges. |
Ubuntu USN |
USN-5459-1 | cifs-utils vulnerabilities |
Ubuntu USN |
USN-7688-1 | cifs-utils vulnerabilities |
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 16 Apr 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat
Redhat enterprise Linux |
|
| CPEs | cpe:/o:redhat:enterprise_linux:8 | |
| Vendors & Products |
Redhat
Redhat enterprise Linux |
Subscriptions
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T05:25:32.591Z
Reserved: 2022-03-18T00:00:00.000Z
Link: CVE-2022-27239
No data.
Status : Modified
Published: 2022-04-27T14:15:09.203
Modified: 2024-11-21T06:55:28.487
Link: CVE-2022-27239
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN