First published: Mon May 16 2022(Updated: )
A race condition in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:3.10.0-1160.71.1.rt56.1212.el7 | 0:3.10.0-1160.71.1.rt56.1212.el7 |
redhat/kernel | <0:3.10.0-1160.71.1.el7 | 0:3.10.0-1160.71.1.el7 |
redhat/kernel | <0:3.10.0-514.104.1.el7 | 0:3.10.0-514.104.1.el7 |
redhat/kernel | <0:3.10.0-693.103.1.el7 | 0:3.10.0-693.103.1.el7 |
redhat/kernel | <0:3.10.0-957.97.1.el7 | 0:3.10.0-957.97.1.el7 |
redhat/kernel | <0:3.10.0-1062.70.1.el7 | 0:3.10.0-1062.70.1.el7 |
redhat/kernel-rt | <0:4.18.0-372.16.1.rt7.173.el8_6 | 0:4.18.0-372.16.1.rt7.173.el8_6 |
redhat/kernel | <0:4.18.0-372.16.1.el8_6 | 0:4.18.0-372.16.1.el8_6 |
redhat/kernel | <0:4.18.0-147.70.1.el8_1 | 0:4.18.0-147.70.1.el8_1 |
redhat/kernel-rt | <0:4.18.0-193.87.1.rt13.137.el8_2 | 0:4.18.0-193.87.1.rt13.137.el8_2 |
redhat/kernel | <0:4.18.0-193.87.1.el8_2 | 0:4.18.0-193.87.1.el8_2 |
redhat/kernel-rt | <0:4.18.0-305.57.1.rt7.129.el8_4 | 0:4.18.0-305.57.1.rt7.129.el8_4 |
redhat/kernel | <0:4.18.0-305.57.1.el8_4 | 0:4.18.0-305.57.1.el8_4 |
redhat/kernel | <0:5.14.0-70.17.1.el9_0 | 0:5.14.0-70.17.1.el9_0 |
redhat/kernel-rt | <0:5.14.0-70.17.1.rt21.89.el9_0 | 0:5.14.0-70.17.1.rt21.89.el9_0 |
redhat/kernel | <5.18 | 5.18 |
Linux Kernel | >=3.2.85<3.3 | |
Linux Kernel | >=3.16.40<3.17 | |
Linux Kernel | >=3.18.54<3.19 | |
Linux Kernel | >=4.0.0<4.9.316 | |
Linux Kernel | >=4.10<4.14.281 | |
Linux Kernel | >=4.15<4.19.245 | |
Linux Kernel | >=4.20<5.4.196 | |
Linux Kernel | >=5.5.0<5.10.118 | |
Linux Kernel | >=5.11<5.15.42 | |
Linux Kernel | >=5.16<5.17.10 | |
netapp hci baseboard management controller | =h300s | |
netapp hci baseboard management controller | =h410s | |
netapp hci baseboard management controller | =h500s | |
netapp hci baseboard management controller | =h700s | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.11-1 6.12.12-1 |
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-1729 is categorized as a critical severity vulnerability that allows unprivileged users to gain root privileges.
To fix CVE-2022-1729, upgrade to the specific kernel versions that have addressed this vulnerability.
CVE-2022-1729 affects multiple Linux kernel versions, including 3.10.x, 4.18.x, and several others as specified in the remediation section.
Yes, CVE-2022-1729 can be exploited to execute arbitrary code due to the race condition present in the perf_event_open() function.
CVE-2022-1729 affects various Linux distributions that utilize the vulnerable kernel versions, including Red Hat and Debian.