Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-1729

Опубликовано: 20 мая 2022
Источник: redhat
CVSS3: 7.4
EPSS Низкий

Описание

A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.

A use-after-free flaw was found in the Linux kernel’s performance events functionality. A user triggers a race condition in setting up performance monitoring between the leading PERF_TYPE_TRACEPOINT and sub PERF_EVENT_HARDWARE plus the PERF_EVENT_SOFTWARE using the perf_event_open() function with these three types. This flaw allows a local user to crash the system.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 7kernel-rtFixedRHSA-2022:523628.06.2022
Red Hat Enterprise Linux 7kernelFixedRHSA-2022:523228.06.2022
Red Hat Enterprise Linux 7.3 Advanced Update SupportkernelFixedRHSA-2022:580602.08.2022
Red Hat Enterprise Linux 7.4 Advanced Update SupportkernelFixedRHSA-2022:515722.06.2022
Red Hat Enterprise Linux 7.6 Advanced Update Support(Disable again in 2026 - SPRHEL-7118)kernelFixedRHSA-2022:643213.09.2022
Red Hat Enterprise Linux 7.6 Telco Extended Update SupportkernelFixedRHSA-2022:643213.09.2022
Red Hat Enterprise Linux 7.6 Update Services for SAP SolutionskernelFixedRHSA-2022:643213.09.2022
Red Hat Enterprise Linux 7.7 Advanced Update SupportkernelFixedRHSA-2022:674128.09.2022
Red Hat Enterprise Linux 7.7 Telco Extended Update SupportkernelFixedRHSA-2022:674128.09.2022

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-366
https://bugzilla.redhat.com/show_bug.cgi?id=2086753kernel: race condition in perf_event_open leads to privilege escalation

EPSS

Процентиль: 28%
0.00095
Низкий

7.4 High

CVSS3

Связанные уязвимости

CVSS3: 7
ubuntu
почти 3 года назад

A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.

CVSS3: 7
nvd
почти 3 года назад

A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.

CVSS3: 7
debian
почти 3 года назад

A race condition was found the Linux kernel in perf_event_open() which ...

rocky
почти 3 года назад

Important: kernel security, bug fix, and enhancement update

oracle-oval
около 3 лет назад

ELSA-2022-9413: Unbreakable Enterprise kernel-container security update (IMPORTANT)

EPSS

Процентиль: 28%
0.00095
Низкий

7.4 High

CVSS3