A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.
References
Link | Resource |
---|---|
https://www.openwall.com/lists/oss-security/2022/05/20/2 | Mailing List Patch Third Party Advisory |
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3ac6487e584a1eb54071dbe1212e05b884136704 | Mailing List Patch Vendor Advisory |
https://security.netapp.com/advisory/ntap-20230214-0006/ |
Configurations
Information
Published : 2022-09-01 14:15
Updated : 2023-02-14 05:15
NVD link : CVE-2022-1729
Mitre link : CVE-2022-1729
JSON object : View
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Products Affected
linux
- linux_kernel