CVE-2022-1729
7.0HIGHA race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kern
Published: 9/1/2022Updated: 11/21/2024
Description
A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.
AI AnalysisPowered by AI
Affected Products
linuxlinux_kernel
linuxlinux_kernel
linuxlinux_kernel
linuxlinux_kernel
linuxlinux_kernel
linuxlinux_kernel
linuxlinux_kernel
linuxlinux_kernel
linuxlinux_kernel
linuxlinux_kernel
netapphci_baseboard_management_controller
h300s
netapphci_baseboard_management_controller
h410s
netapphci_baseboard_management_controller
h500s
netapphci_baseboard_management_controller
h700s
References
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3ac6487e584a1eb54071dbe1212e05b884136704Mailing ListPatchVendor Advisory
- https://security.netapp.com/advisory/ntap-20230214-0006/PatchThird Party Advisory
- https://www.openwall.com/lists/oss-security/2022/05/20/2Mailing ListPatchThird Party Advisory
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3ac6487e584a1eb54071dbe1212e05b884136704Mailing ListPatchVendor Advisory
- https://security.netapp.com/advisory/ntap-20230214-0006/PatchThird Party Advisory
- https://www.openwall.com/lists/oss-security/2022/05/20/2Mailing ListPatchThird Party Advisory