MGASA-2022-0170 - Updated cifs-utils packages fix security vulnerability Publication date: 12 May 2022 URL: https://advisories.mageia.org/MGASA-2022-0170.html Type: security Affected Mageia releases: 8 CVE: CVE-2022-27239, CVE-2022-29869 In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges. (CVE-2022-27239) cifs-utils through 6.14, with verbose logging, can cause an information leak when a file contains = (equal sign) characters but is not a valid credentials file. (CVE-2022-29869) References: - https://bugs.mageia.org/show_bug.cgi?id=30360 - https://www.openwall.com/lists/oss-security/2022/04/27/5 - https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QMGM2N6RR7GOZR7OP37QJTCTTLTTIWUN/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/QIYZ4L6SLSYJQ446VJAO2VGAESURQNSP/ - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27239 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29869 SRPMS: - 8/core/cifs-utils-6.11-2.2.mga8