A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-3065-1 | linux security update |
![]() |
DSA-5161-1 | linux security update |
![]() |
DSA-5173-1 | linux security update |
![]() |
EUVD-2022-25010 | A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc. |
![]() |
USN-5560-1 | Linux kernel vulnerabilities |
![]() |
USN-5560-2 | Linux kernel vulnerabilities |
![]() |
USN-5594-1 | Linux kernel vulnerabilities |
![]() |
USN-5599-1 | Linux kernel (Oracle) vulnerabilities |
![]() |
USN-5602-1 | Linux kernel (Raspberry Pi) vulnerabilities |
![]() |
USN-5616-1 | Linux kernel (Intel IoTG) vulnerabilities |
![]() |
USN-5622-1 | Linux kernel vulnerabilities |
![]() |
USN-5623-1 | Linux kernel (HWE) vulnerabilities |
![]() |
USN-5630-1 | Linux kernel (Raspberry Pi) vulnerabilities |
![]() |
USN-5639-1 | Linux kernel (Azure CVM) vulnerabilities |
![]() |
USN-5647-1 | Linux kernel (GCP) vulnerabilities |
![]() |
USN-5650-1 | Linux kernel vulnerabilities |
![]() |
USN-5654-1 | Linux kernel (GKE) vulnerabilities |
![]() |
USN-5660-1 | Linux kernel (GCP) vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-03T00:16:58.917Z
Reserved: 2022-05-16T00:00:00
Link: CVE-2022-1729

No data.

Status : Modified
Published: 2022-09-01T21:15:09.057
Modified: 2024-11-21T06:41:20.517
Link: CVE-2022-1729


No data.