{"api_version":"1","generated_at":"2026-04-23T02:38:11+00:00","cve":"CVE-2022-27239","urls":{"html":"https://cve.report/CVE-2022-27239","api":"https://cve.report/api/cve/CVE-2022-27239.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-27239","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-27239"},"summary":{"title":"CVE-2022-27239","description":"In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2022-04-27 14:15:00","updated_at":"2023-11-24 15:15:00"},"problem_types":["CWE-787"],"metrics":[],"references":[{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HXKZLJYJJEC3TIBFLXUORRMZUKG5W676/","name":"FEDORA-2022-7fda04ab5a","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 35 Update: cifs-utils-6.15-1.fc35 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/piastry/cifs-utils/pull/7","name":"https://github.com/piastry/cifs-utils/pull/7","refsource":"MISC","tags":[],"title":"mount.cifs: two bug fixes by ddiss · Pull Request #7 · piastry/cifs-utils · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QIYZ4L6SLSYJQ446VJAO2VGAESURQNSP/","name":"FEDORA-2022-eb2d3ca94d","refsource":"","tags":[],"title":"[SECURITY] Fedora 36 Update: cifs-utils-6.15-1.fc36 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/piastry/cifs-utils/pull/7/commits/955fb147e97a6a74e1aaa65766de91e2c1479765","name":"https://github.com/piastry/cifs-utils/pull/7/commits/955fb147e97a6a74e1aaa65766de91e2c1479765","refsource":"MISC","tags":[],"title":"mount.cifs: two bug fixes by ddiss · Pull Request #7 · piastry/cifs-utils · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://wiki.robotz.com/index.php/Linux_CIFS_Utils_and_Samba","name":"http://wiki.robotz.com/index.php/Linux_CIFS_Utils_and_Samba","refsource":"MISC","tags":[],"title":"Linux CIFS Utils and Samba - Free Knowledge Base- The DUCK Project: information for everyone","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://security.gentoo.org/glsa/202311-05","name":"GLSA-202311-05","refsource":"","tags":[],"title":"LinuxCIFS utils: Multiple Vulnerabilities (GLSA 202311-05) — Gentoo security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WBOLMANBYJILXQKRRK7OCR774PXJAYY/","name":"FEDORA-2022-34de4f833d","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 34 Update: cifs-utils-6.15-1.fc34 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://bugzilla.samba.org/show_bug.cgi?id=15025","name":"https://bugzilla.samba.org/show_bug.cgi?id=15025","refsource":"MISC","tags":[],"title":"Bug Access Denied","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://bugzilla.suse.com/show_bug.cgi?id=1197216","name":"https://bugzilla.suse.com/show_bug.cgi?id=1197216","refsource":"MISC","tags":[],"title":"Bug 1197216 – VUL-0: CVE-2022-27239: cifs-utils: buffer overflow in commandline ip= handling","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5WBOLMANBYJILXQKRRK7OCR774PXJAYY/","name":"FEDORA-2022-34de4f833d","refsource":"","tags":[],"title":"[SECURITY] Fedora 34 Update: cifs-utils-6.15-1.fc34 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QIYZ4L6SLSYJQ446VJAO2VGAESURQNSP/","name":"FEDORA-2022-eb2d3ca94d","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 36 Update: cifs-utils-6.15-1.fc36 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HXKZLJYJJEC3TIBFLXUORRMZUKG5W676/","name":"FEDORA-2022-7fda04ab5a","refsource":"","tags":[],"title":"[SECURITY] Fedora 35 Update: cifs-utils-6.15-1.fc35 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.debian.org/debian-lts-announce/2022/05/msg00020.html","name":"[debian-lts-announce] 20220516 [SECURITY] [DLA 3009-1] cifs-utils security update","refsource":"MLIST","tags":[],"title":"[SECURITY] [DLA 3009-1] cifs-utils security update","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.debian.org/security/2022/dsa-5157","name":"DSA-5157","refsource":"DEBIAN","tags":[],"title":"Debian -- Security Information -- DSA-5157-1 cifs-utils","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-27239","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27239","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"10.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"11.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"9.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"34","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"35","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"36","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"hp","cpe5":"helion_openstack","cpe6":"8.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"samba","cpe5":"cifs-utils","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"6.14","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"samba","cpe5":"cifs-utils","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"suse","cpe5":"caas_platform","cpe6":"4.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"suse","cpe5":"enterprise_storage","cpe6":"6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"suse","cpe5":"enterprise_storage","cpe6":"7.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_desktop","cpe6":"15","cpe7":"sp3","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_desktop","cpe6":"15","cpe7":"sp4","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_high_performance_computing","cpe6":"12.0","cpe7":"sp5","cpe8":"*","cpe9":"*","cpe10":"-","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_high_performance_computing","cpe6":"15.0","cpe7":"-","cpe8":"*","cpe9":"*","cpe10":"ltss","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_high_performance_computing","cpe6":"15.0","cpe7":"sp1","cpe8":"*","cpe9":"*","cpe10":"espos","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_high_performance_computing","cpe6":"15.0","cpe7":"sp1","cpe8":"*","cpe9":"*","cpe10":"ltss","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_high_performance_computing","cpe6":"15.0","cpe7":"sp2","cpe8":"*","cpe9":"*","cpe10":"espos","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_high_performance_computing","cpe6":"15.0","cpe7":"sp2","cpe8":"*","cpe9":"*","cpe10":"ltss","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_high_performance_computing","cpe6":"15.0","cpe7":"sp3","cpe8":"*","cpe9":"*","cpe10":"-","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_high_performance_computing","cpe6":"15.0","cpe7":"sp4","cpe8":"*","cpe9":"*","cpe10":"-","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_micro","cpe6":"5.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"-","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_micro","cpe6":"5.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"rancher","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"suse","cpe5":"linux_enterprise_point_of_service","cpe6":"11.0","cpe7":"sp3","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_real_time","cpe6":"15.0","cpe7":"sp2","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_server","cpe6":"11","cpe7":"sp3","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"-","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_server","cpe6":"11","cpe7":"sp4","cpe8":"*","cpe9":"*","cpe10":"ltss","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_server","cpe6":"12","cpe7":"sp2","cpe8":"*","cpe9":"*","cpe10":"business_critical_linux","cpe11":"-","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_server","cpe6":"12","cpe7":"sp3","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"sap","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_server","cpe6":"12","cpe7":"sp3","cpe8":"*","cpe9":"*","cpe10":"business_critical_linux","cpe11":"-","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_server","cpe6":"12","cpe7":"sp3","cpe8":"*","cpe9":"*","cpe10":"espos","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_server","cpe6":"12","cpe7":"sp3","cpe8":"*","cpe9":"*","cpe10":"ltss","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_server","cpe6":"12","cpe7":"sp4","cpe8":"*","cpe9":"*","cpe10":"-","cpe11":"sap","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_server","cpe6":"12","cpe7":"sp4","cpe8":"*","cpe9":"*","cpe10":"espos","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_server","cpe6":"12","cpe7":"sp4","cpe8":"*","cpe9":"*","cpe10":"ltss","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_server","cpe6":"12","cpe7":"sp5","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"sap","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_server","cpe6":"15","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"sap","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_server","cpe6":"15","cpe7":"-","cpe8":"*","cpe9":"*","cpe10":"espos","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_server","cpe6":"15","cpe7":"-","cpe8":"*","cpe9":"*","cpe10":"ltss","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_server","cpe6":"15","cpe7":"sp1","cpe8":"*","cpe9":"*","cpe10":"business_critical_linux","cpe11":"-","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_server","cpe6":"15","cpe7":"sp1","cpe8":"*","cpe9":"*","cpe10":"ltss","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_server","cpe6":"15","cpe7":"sp2","cpe8":"*","cpe9":"*","cpe10":"business_critical_linux","cpe11":"-","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_server","cpe6":"15","cpe7":"sp2","cpe8":"*","cpe9":"*","cpe10":"ltss","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_server","cpe6":"15","cpe7":"sp3","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_server","cpe6":"15","cpe7":"sp4","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_software_development_kit","cpe6":"12","cpe7":"sp5","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"suse","cpe5":"linux_enterprise_storage","cpe6":"7.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"suse","cpe5":"manager_proxy","cpe6":"4.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"suse","cpe5":"manager_proxy","cpe6":"4.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"suse","cpe5":"manager_proxy","cpe6":"4.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"suse","cpe5":"manager_retail_branch_server","cpe6":"4.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"suse","cpe5":"manager_retail_branch_server","cpe6":"4.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"suse","cpe5":"manager_retail_branch_server","cpe6":"4.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"suse","cpe5":"manager_server","cpe6":"4.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"suse","cpe5":"manager_server","cpe6":"4.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"suse","cpe5":"manager_server","cpe6":"4.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"suse","cpe5":"openstack_cloud","cpe6":"8.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"suse","cpe5":"openstack_cloud","cpe6":"9.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"suse","cpe5":"openstack_cloud_crowbar","cpe6":"8.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"27239","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"suse","cpe5":"openstack_cloud_crowbar","cpe6":"9.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-27239","qid":"179289","title":"Debian Security Update for cifs-utils (DLA 3009-1)"},{"cve":"CVE-2022-27239","qid":"179349","title":"Debian Security Update for cifs-utils (DSA 5157-1)"},{"cve":"CVE-2022-27239","qid":"183617","title":"Debian Security Update for cifs-utils (CVE-2022-27239)"},{"cve":"CVE-2022-27239","qid":"198816","title":"Ubuntu Security Notification for cifs-utils Vulnerabilities (USN-5459-1)"},{"cve":"CVE-2022-27239","qid":"282665","title":"Fedora Security Update for cifs (FEDORA-2022-34de4f833d)"},{"cve":"CVE-2022-27239","qid":"282666","title":"Fedora Security Update for cifs (FEDORA-2022-7fda04ab5a)"},{"cve":"CVE-2022-27239","qid":"282720","title":"Fedora Security Update for cifs (FEDORA-2022-eb2d3ca94d)"},{"cve":"CVE-2022-27239","qid":"354381","title":"Amazon Linux Security Advisory for cifs-utils : ALAS2022-2022-089"},{"cve":"CVE-2022-27239","qid":"354469","title":"Amazon Linux Security Advisory for cifs-utils : ALAS2022-2022-204"},{"cve":"CVE-2022-27239","qid":"354785","title":"Amazon Linux Security Advisory for cifs-utils : ALAS2-2023-1977"},{"cve":"CVE-2022-27239","qid":"354805","title":"Amazon Linux Security Advisory for cifs-utils : ALAS2-2023-1978"},{"cve":"CVE-2022-27239","qid":"354811","title":"Amazon Linux Security Advisory for cifs-utils : ALAS-2023-1698"},{"cve":"CVE-2022-27239","qid":"357248","title":"Amazon Linux Security Advisory for cifs-utils : ALAS2023-2024-530"},{"cve":"CVE-2022-27239","qid":"502210","title":"Alpine Linux Security Update for cifs-utils"},{"cve":"CVE-2022-27239","qid":"503880","title":"Alpine Linux Security Update for cifs-utils"},{"cve":"CVE-2022-27239","qid":"671838","title":"EulerOS Security Update for cifs-utils (EulerOS-SA-2022-1883)"},{"cve":"CVE-2022-27239","qid":"671895","title":"EulerOS Security Update for cifs-utils (EulerOS-SA-2022-1923)"},{"cve":"CVE-2022-27239","qid":"671908","title":"EulerOS Security Update for cifs-utils (EulerOS-SA-2022-1960)"},{"cve":"CVE-2022-27239","qid":"671936","title":"EulerOS Security Update for cifs-utils (EulerOS-SA-2022-1990)"},{"cve":"CVE-2022-27239","qid":"671965","title":"EulerOS Security Update for cifs-utils (EulerOS-SA-2022-2127)"},{"cve":"CVE-2022-27239","qid":"671971","title":"EulerOS Security Update for cifs-utils (EulerOS-SA-2022-2152)"},{"cve":"CVE-2022-27239","qid":"672234","title":"EulerOS Security Update for cifs-utils (EulerOS-SA-2022-2602)"},{"cve":"CVE-2022-27239","qid":"710788","title":"Gentoo Linux LinuxCIFS utils Multiple Vulnerabilities (GLSA 202311-05)"},{"cve":"CVE-2022-27239","qid":"752077","title":"SUSE Enterprise Linux Security Update for cifs-utils (SUSE-SU-2022:1428-1)"},{"cve":"CVE-2022-27239","qid":"752078","title":"SUSE Enterprise Linux Security Update for cifs-utils (SUSE-SU-2022:1429-1)"},{"cve":"CVE-2022-27239","qid":"752079","title":"SUSE Enterprise Linux Security Update for cifs-utils (SUSE-SU-2022:1430-1)"},{"cve":"CVE-2022-27239","qid":"752082","title":"SUSE Enterprise Linux Security Update for cifs-utils (SUSE-SU-2022:1427-1)"},{"cve":"CVE-2022-27239","qid":"752347","title":"SUSE Enterprise Linux Security Update for cifs-utils (SUSE-SU-2022:2378-1)"},{"cve":"CVE-2022-27239","qid":"753220","title":"SUSE Enterprise Linux Security Update for cifs-utils (SUSE-SU-2022:14951-1)"},{"cve":"CVE-2022-27239","qid":"901286","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for cifs-utils (9609)"},{"cve":"CVE-2022-27239","qid":"901645","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for cifs-utils (9587)"},{"cve":"CVE-2022-27239","qid":"902033","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for cifs-utils (9609-1)"},{"cve":"CVE-2022-27239","qid":"902080","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for cifs-utils (9587-1)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2022-27239","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://bugzilla.suse.com/show_bug.cgi?id=1197216","refsource":"MISC","name":"https://bugzilla.suse.com/show_bug.cgi?id=1197216"},{"url":"http://wiki.robotz.com/index.php/Linux_CIFS_Utils_and_Samba","refsource":"MISC","name":"http://wiki.robotz.com/index.php/Linux_CIFS_Utils_and_Samba"},{"refsource":"MISC","name":"https://github.com/piastry/cifs-utils/pull/7/commits/955fb147e97a6a74e1aaa65766de91e2c1479765","url":"https://github.com/piastry/cifs-utils/pull/7/commits/955fb147e97a6a74e1aaa65766de91e2c1479765"},{"refsource":"MISC","name":"https://bugzilla.samba.org/show_bug.cgi?id=15025","url":"https://bugzilla.samba.org/show_bug.cgi?id=15025"},{"refsource":"MISC","name":"https://github.com/piastry/cifs-utils/pull/7","url":"https://github.com/piastry/cifs-utils/pull/7"},{"refsource":"FEDORA","name":"FEDORA-2022-eb2d3ca94d","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QIYZ4L6SLSYJQ446VJAO2VGAESURQNSP/"},{"refsource":"FEDORA","name":"FEDORA-2022-7fda04ab5a","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HXKZLJYJJEC3TIBFLXUORRMZUKG5W676/"},{"refsource":"FEDORA","name":"FEDORA-2022-34de4f833d","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WBOLMANBYJILXQKRRK7OCR774PXJAYY/"},{"refsource":"MLIST","name":"[debian-lts-announce] 20220516 [SECURITY] [DLA 3009-1] cifs-utils security update","url":"https://lists.debian.org/debian-lts-announce/2022/05/msg00020.html"},{"refsource":"DEBIAN","name":"DSA-5157","url":"https://www.debian.org/security/2022/dsa-5157"}]}},"nvd":{"publishedDate":"2022-04-27 14:15:00","lastModifiedDate":"2023-11-24 15:15:00","problem_types":["CWE-787"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE","baseScore":7.2},"severity":"HIGH","exploitabilityScore":3.9,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:samba:cifs-utils:*:*:*:*:*:*:*:*","versionEndExcluding":"6.15","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:ltss:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:suse:openstack_cloud:8.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:suse:linux_enterprise_server:15:*:*:*:*:sap:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp5:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:suse:openstack_cloud_crowbar:8.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:suse:openstack_cloud_crowbar:9.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:suse:openstack_cloud:9.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:suse:linux_enterprise_server:12:sp3:*:*:ltss:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:suse:linux_enterprise_server:12:sp3:*:*:*:sap:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:suse:manager_server:4.1:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:suse:linux_enterprise_server:12:sp5:*:*:*:sap:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:suse:linux_enterprise_desktop:15:sp3:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:suse:linux_enterprise_server:15:sp3:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:suse:linux_enterprise_server:15:sp4:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:suse:linux_enterprise_desktop:15:sp4:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:suse:enterprise_storage:7.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:suse:caas_platform:4.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:suse:enterprise_storage:6.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:suse:manager_proxy:4.1:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:suse:linux_enterprise_server:15:-:*:*:espos:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:suse:linux_enterprise_server:15:-:*:*:ltss:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:suse:linux_enterprise_server:15:sp1:*:*:ltss:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:suse:linux_enterprise_server:15:sp2:*:*:ltss:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:suse:linux_enterprise_high_performance_computing:12.0:sp5:*:*:-:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:-:*:*:ltss:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp1:*:*:espos:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp1:*:*:ltss:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp2:*:*:espos:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp2:*:*:ltss:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp3:*:*:-:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp4:*:*:-:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:suse:linux_enterprise_server:12:sp4:*:*:espos:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:suse:linux_enterprise_server:12:sp4:*:*:ltss:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:suse:linux_enterprise_server:12:sp3:*:*:espos:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp2:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:suse:linux_enterprise_point_of_service:11.0:sp3:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:suse:linux_enterprise_micro:5.2:*:*:*:*:rancher:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:suse:linux_enterprise_micro:5.2:*:*:*:*:-:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:business_critical_linux:-:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:suse:linux_enterprise_server:12:sp3:*:*:business_critical_linux:-:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:suse:linux_enterprise_server:15:sp1:*:*:business_critical_linux:-:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:suse:linux_enterprise_server:15:sp2:*:*:business_critical_linux:-:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:suse:linux_enterprise_server:12:sp4:*:*:-:sap:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:suse:manager_retail_branch_server:4.2:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:suse:manager_retail_branch_server:4.1:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:suse:manager_retail_branch_server:4.3:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:suse:manager_server:4.2:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:suse:manager_server:4.3:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:suse:manager_proxy:4.2:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:suse:manager_proxy:4.3:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:suse:linux_enterprise_storage:7.1:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:hp:helion_openstack:8.0:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}