Bug 2081040 (CVE-2022-27239)

Summary: CVE-2022-27239 cifs-utils: stack-based buffer overflow mount.cifs may lead to local privilege escalation to root
Product: [Other] Security Response Reporter: Marian Rehak <mrehak>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED WONTFIX QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: abokovoy, jlayton, lsahlber, luk.claes, ronniesahlberg, sprabhu, ssorce
Target Milestone: ---Keywords: Reopened, Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A stack-based buffer overflow issue was found in cifs-utils. Parsing the mount.cifs ip command-line argument can lead to local attackers gaining root privileges.
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-09-28 14:06:18 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2081041, 2082325, 2082326, 2082327, 2082328, 2082329, 2082330, 2082331, 2082332, 2102812, 2102813, 2102814    
Bug Blocks: 2081042    

Comment 1 Marian Rehak 2022-05-02 15:28:48 UTC
Created cifs-utils tracking bugs for this issue:

Affects: fedora-all [bug 2081041]

Comment 2 Alexander Bokovoy 2022-05-02 16:00:09 UTC

*** This bug has been marked as a duplicate of bug 2080525 ***