Lucene search

K
ubuntucveUbuntu.comUB:CVE-2022-1729
HistoryMay 20, 2022 - 12:00 a.m.

CVE-2022-1729

2022-05-2000:00:00
ubuntu.com
ubuntu.com
51
linux kernel
race condition
perf_event_open
unprivileged user
root privileges
ubuntu kernels
security_perf_events_restrict
kernel.perf_event_paranoid

CVSS3

7

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

15.7%

A race condition was found the Linux kernel in perf_event_open() which can
be exploited by an unprivileged user to gain root privileges. The bug
allows to build several exploit primitives such as kernel address
information leak, arbitrary execution, etc.

Notes

Author Note
alexmurray Ubuntu kernels enable SECURITY_PERF_EVENTS_RESTRICT which sets kernel.perf_event_paranoid >= 3 and so disables unprivileged users from using perf by default. As such in their default configuration, Ubuntu kernels are not able to be exploited by this flaw to achieve local privilege escalation.
OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchlinux< 4.15.0-191.202UNKNOWN
ubuntu20.04noarchlinux< 5.4.0-126.142UNKNOWN
ubuntu22.04noarchlinux< 5.15.0-47.51UNKNOWN
ubuntu16.04noarchlinux< 4.4.0-234.268UNKNOWN
ubuntu18.04noarchlinux-aws< 4.15.0-1139.150UNKNOWN
ubuntu20.04noarchlinux-aws< 5.4.0-1085.92UNKNOWN
ubuntu22.04noarchlinux-aws< 5.15.0-1019.23UNKNOWN
ubuntu14.04noarchlinux-aws< 4.4.0-1113.119UNKNOWN
ubuntu16.04noarchlinux-aws< 4.4.0-1151.166UNKNOWN
ubuntu20.04noarchlinux-aws-5.15< 5.15.0-1019.23~20.04.1UNKNOWN
Rows per page:
1-10 of 651

References

CVSS3

7

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

15.7%