Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20220521154759.GA15268@openwall.com>
Date: Sat, 21 May 2022 17:47:59 +0200
From: Solar Designer <solar@...nwall.com>
To: Norbert Slusarek <nslusarek@....net>
Cc: oss-security@...ts.openwall.com, peterz@...radead.org
Subject: Re: CVE-2022-1729: race condition in Linux perf subsystem leads to local privilege escalation

Norbert,

On Fri, May 20, 2022 at 10:14:36PM +0200, Norbert Slusarek wrote:
> this is an announcement for a recently reported vulnerability (CVE-2022-1729) in the perf subsystem
> of the Linux kernel. The issue is a race condition which was proven to allow for a local privilege
> escalation to root on current kernel version >= 5.4.193, but the bug seems to exist since kernel
> version 4.0-rc1 (patch fixes the commit to this version).
> Fortunately, major Linux distributions often restrict the use of perf for unprivileged users by
> setting the sysctl variable kernel.perf_event_paranoid >= 3, effectively rendering the
> vulnerability harmless.
> 
> The patch can be found at
> https://lkml.kernel.org/r/20220520183806.GV2578@worktop.programming.kicks-ass.net
> 
> Details
> -------
> 
> The following syscall order triggers the bug:

Thank you for bringing this to oss-security and for including the detail
on triggering and exploiting the issue.

Since you shared actual exploit code on linux-distros, you're supposed
to also post that to oss-security within 7 days of your first posting
above, so by or on May 27.  Do you intend to?

I realize this is one of the aspects that not everyone is happy about.
It helps against linux-distros and its subscribers' mailboxes becoming
stockpiles of unpublished exploits, and it lets those in the larger
community also test their fixes, general mitigations, and/or detection
tools in the same ways that linux-distros members could and without
extra effort to recreate exploits.  However, it also makes it easier to
exploit the vulnerabilities on unpatched systems in the wild, and it
could go against wishes of specific exploit authors or policies of their
employers.

Alexander

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.