A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.
References
Link | Resource |
---|---|
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3ac6487e584a1eb54071dbe1212e05b884136704 | Mailing List Patch Vendor Advisory |
https://security.netapp.com/advisory/ntap-20230214-0006/ | Patch Third Party Advisory |
https://www.openwall.com/lists/oss-security/2022/05/20/2 | Mailing List Patch Third Party Advisory |
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3ac6487e584a1eb54071dbe1212e05b884136704 | Mailing List Patch Vendor Advisory |
https://security.netapp.com/advisory/ntap-20230214-0006/ | Patch Third Party Advisory |
https://www.openwall.com/lists/oss-security/2022/05/20/2 | Mailing List Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2022-09-01 21:15
Updated : 2024-11-21 06:41
NVD link : CVE-2022-1729
Mitre link : CVE-2022-1729
CVE.ORG link : CVE-2022-1729
JSON object : View
Products Affected
linux
- linux_kernel
netapp
- hci_baseboard_management_controller