First published: Mon May 16 2022(Updated: )
A race condition in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | >=3.2.85<3.3 | |
Linux Linux kernel | >=3.16.40<3.17 | |
Linux Linux kernel | >=3.18.54<3.19 | |
Linux Linux kernel | >=4.0.0<4.9.316 | |
Linux Linux kernel | >=4.10<4.14.281 | |
Linux Linux kernel | >=4.15<4.19.245 | |
Linux Linux kernel | >=4.20<5.4.196 | |
Linux Linux kernel | >=5.5.0<5.10.118 | |
Linux Linux kernel | >=5.11<5.15.42 | |
Linux Linux kernel | >=5.16<5.17.10 | |
Netapp Hci Baseboard Management Controller | =h300s | |
Netapp Hci Baseboard Management Controller | =h410s | |
Netapp Hci Baseboard Management Controller | =h500s | |
Netapp Hci Baseboard Management Controller | =h700s | |
redhat/kernel-rt | <0:3.10.0-1160.71.1.rt56.1212.el7 | 0:3.10.0-1160.71.1.rt56.1212.el7 |
redhat/kernel | <0:3.10.0-1160.71.1.el7 | 0:3.10.0-1160.71.1.el7 |
redhat/kernel | <0:3.10.0-514.104.1.el7 | 0:3.10.0-514.104.1.el7 |
redhat/kernel | <0:3.10.0-693.103.1.el7 | 0:3.10.0-693.103.1.el7 |
redhat/kernel | <0:3.10.0-957.97.1.el7 | 0:3.10.0-957.97.1.el7 |
redhat/kernel | <0:3.10.0-1062.70.1.el7 | 0:3.10.0-1062.70.1.el7 |
redhat/kernel-rt | <0:4.18.0-372.16.1.rt7.173.el8_6 | 0:4.18.0-372.16.1.rt7.173.el8_6 |
redhat/kernel | <0:4.18.0-372.16.1.el8_6 | 0:4.18.0-372.16.1.el8_6 |
redhat/kernel | <0:4.18.0-147.70.1.el8_1 | 0:4.18.0-147.70.1.el8_1 |
redhat/kernel-rt | <0:4.18.0-193.87.1.rt13.137.el8_2 | 0:4.18.0-193.87.1.rt13.137.el8_2 |
redhat/kernel | <0:4.18.0-193.87.1.el8_2 | 0:4.18.0-193.87.1.el8_2 |
redhat/kernel-rt | <0:4.18.0-305.57.1.rt7.129.el8_4 | 0:4.18.0-305.57.1.rt7.129.el8_4 |
redhat/kernel | <0:4.18.0-305.57.1.el8_4 | 0:4.18.0-305.57.1.el8_4 |
redhat/kernel | <0:5.14.0-70.17.1.el9_0 | 0:5.14.0-70.17.1.el9_0 |
redhat/kernel-rt | <0:5.14.0-70.17.1.rt21.89.el9_0 | 0:5.14.0-70.17.1.rt21.89.el9_0 |
redhat/kernel | <5.18 | 5.18 |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.12.5-1 6.12.6-1 |
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)