Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-1729

Опубликовано: 20 мая 2022
Источник: redhat
CVSS3: 7.4

Описание

A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.

A use-after-free flaw was found in the Linux kernel’s performance events functionality. A user triggers a race condition in setting up performance monitoring between the leading PERF_TYPE_TRACEPOINT and sub PERF_EVENT_HARDWARE plus the PERF_EVENT_SOFTWARE using the perf_event_open() function with these three types. This flaw allows a local user to crash the system.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 7kernel-rtFixedRHSA-2022:523628.06.2022
Red Hat Enterprise Linux 7kernelFixedRHSA-2022:523228.06.2022
Red Hat Enterprise Linux 7.3 Advanced Update SupportkernelFixedRHSA-2022:580602.08.2022
Red Hat Enterprise Linux 7.4 Advanced Update SupportkernelFixedRHSA-2022:515722.06.2022
Red Hat Enterprise Linux 7.6 Advanced Update Support(Disable again in 2026 - SPRHEL-7118)kernelFixedRHSA-2022:643213.09.2022
Red Hat Enterprise Linux 7.6 Telco Extended Update SupportkernelFixedRHSA-2022:643213.09.2022
Red Hat Enterprise Linux 7.6 Update Services for SAP SolutionskernelFixedRHSA-2022:643213.09.2022
Red Hat Enterprise Linux 7.7 Advanced Update SupportkernelFixedRHSA-2022:674128.09.2022
Red Hat Enterprise Linux 7.7 Telco Extended Update SupportkernelFixedRHSA-2022:674128.09.2022

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-366
https://bugzilla.redhat.com/show_bug.cgi?id=2086753kernel: race condition in perf_event_open leads to privilege escalation

7.4 High

CVSS3

Связанные уязвимости

CVSS3: 7
ubuntu
около 3 лет назад

A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.

CVSS3: 7
nvd
около 3 лет назад

A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.

CVSS3: 7
debian
около 3 лет назад

A race condition was found the Linux kernel in perf_event_open() which ...

rocky
около 3 лет назад

Important: kernel security, bug fix, and enhancement update

oracle-oval
больше 3 лет назад

ELSA-2022-9413: Unbreakable Enterprise kernel-container security update (IMPORTANT)

7.4 High

CVSS3