MGASA-2022-0170

Source
https://advisories.mageia.org/MGASA-2022-0170.html
Import Source
https://advisories.mageia.org/MGASA-2022-0170.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2022-0170
Related
Published
2022-05-12T10:24:45Z
Modified
2022-05-12T09:36:31Z
Summary
Updated cifs-utils packages fix security vulnerability
Details

In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges. (CVE-2022-27239)

cifs-utils through 6.14, with verbose logging, can cause an information leak when a file contains = (equal sign) characters but is not a valid credentials file. (CVE-2022-29869)

References
Credits

Affected packages

Mageia:8 / cifs-utils

Package

Name
cifs-utils
Purl
pkg:rpm/mageia/cifs-utils?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.11-2.2.mga8

Ecosystem specific

{
    "section": "core"
}