A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.
References
| Link | Resource |
|---|---|
| https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3ac6487e584a1eb54071dbe1212e05b884136704 | Mailing List Patch Vendor Advisory |
| https://security.netapp.com/advisory/ntap-20230214-0006/ | Patch Third Party Advisory |
| https://www.openwall.com/lists/oss-security/2022/05/20/2 | Mailing List Patch Third Party Advisory |
| https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3ac6487e584a1eb54071dbe1212e05b884136704 | Mailing List Patch Vendor Advisory |
| https://security.netapp.com/advisory/ntap-20230214-0006/ | Patch Third Party Advisory |
| https://www.openwall.com/lists/oss-security/2022/05/20/2 | Mailing List Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2022-09-01 21:15
Updated : 2024-11-21 06:41
NVD link : CVE-2022-1729
Mitre link : CVE-2022-1729
CVE.ORG link : CVE-2022-1729
JSON object : View
Products Affected
netapp
- hci_baseboard_management_controller
linux
- linux_kernel
