A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.
References
| Link | Resource |
|---|---|
| https://www.openwall.com/lists/oss-security/2022/05/20/2 | Mailing List Patch Third Party Advisory |
| https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3ac6487e584a1eb54071dbe1212e05b884136704 | Mailing List Patch Vendor Advisory |
| https://security.netapp.com/advisory/ntap-20230214-0006/ |
Configurations
Information
Published : 2022-09-01 14:15
Updated : 2023-02-14 05:15
NVD link : CVE-2022-1729
Mitre link : CVE-2022-1729
JSON object : View
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Products Affected
linux
- linux_kernel


