CVE-2022-1729
7.0HIGHA race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kern
Publicado: 9/1/2022Atualizado: 11/21/2024
Descrição
A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.
Análise IADesenvolvido por IA
Produtos Afetados
linuxlinux_kernel
linuxlinux_kernel
linuxlinux_kernel
linuxlinux_kernel
linuxlinux_kernel
linuxlinux_kernel
linuxlinux_kernel
linuxlinux_kernel
linuxlinux_kernel
linuxlinux_kernel
netapphci_baseboard_management_controller
h300s
netapphci_baseboard_management_controller
h410s
netapphci_baseboard_management_controller
h500s
netapphci_baseboard_management_controller
h700s
Referências
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3ac6487e584a1eb54071dbe1212e05b884136704Mailing ListPatchVendor Advisory
- https://security.netapp.com/advisory/ntap-20230214-0006/PatchThird Party Advisory
- https://www.openwall.com/lists/oss-security/2022/05/20/2Mailing ListPatchThird Party Advisory
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3ac6487e584a1eb54071dbe1212e05b884136704Mailing ListPatchVendor Advisory
- https://security.netapp.com/advisory/ntap-20230214-0006/PatchThird Party Advisory
- https://www.openwall.com/lists/oss-security/2022/05/20/2Mailing ListPatchThird Party Advisory