Race Condition Affecting perf package, versions <0:4.18.0-147.70.1.el8_1
Threat Intelligence
EPSS
0.05% (18th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL8-PERF-4398768
- published 4 Jun 2022
- disclosed 20 May 2022
Introduced: 20 May 2022
CVE-2022-1729 Open this link in a new tabHow to fix?
Upgrade RHEL:8
perf
to version 0:4.18.0-147.70.1.el8_1 or higher.
This issue was patched in RHSA-2022:5636
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream perf
package and not the perf
package as distributed by RHEL
.
See How to fix?
for RHEL:8
relevant fixed versions and status.
A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.
CVSS Scores
version 3.1