In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges.
{ "availability": "Available with Ubuntu Pro with Legacy support add-on: https://ubuntu.com/pro", "binaries": [ { "binary_version": "2:6.0-1ubuntu2+esm1", "binary_name": "cifs-utils" }, { "binary_version": "2:6.0-1ubuntu2+esm1", "binary_name": "cifs-utils-dbgsym" } ] }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "binaries": [ { "binary_version": "2:6.4-1ubuntu1.1+esm1", "binary_name": "cifs-utils" }, { "binary_version": "2:6.4-1ubuntu1.1+esm1", "binary_name": "cifs-utils-dbgsym" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "2:6.8-1ubuntu1.2", "binary_name": "cifs-utils" }, { "binary_version": "2:6.8-1ubuntu1.2", "binary_name": "cifs-utils-dbgsym" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "2:6.9-1ubuntu0.2", "binary_name": "cifs-utils" }, { "binary_version": "2:6.9-1ubuntu0.2", "binary_name": "cifs-utils-dbgsym" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "2:6.14-1ubuntu0.1", "binary_name": "cifs-utils" }, { "binary_version": "2:6.14-1ubuntu0.1", "binary_name": "cifs-utils-dbgsym" } ] }