A race condition in perf_event_open() allows local attackers to leak sensitive data from setuid programs. As no relevant locks (in particular the cred_guard_mutex) are held during the ptrace_may_access() call, it is possible for the specified target task to perform an execve() syscall with setuid execution before perf_event_alloc() actually attaches to it, allowing an attacker to bypass the ptrace_may_access() check and the perf_event_exit_task(current) call that is performed in install_exec_creds() during privileged execve() calls. This issue affects kernel versions before 4.8.
AI analysis not yet available
Plain-English explanation, risk summary, and remediation steps will appear here once AI analysis is complete.
No Fix Known
No patch has been released yet. Apply workarounds or mitigations where available.
| Vendor | Product | Versions | Fixed In |
|---|---|---|---|
| linux | linux_kernel | 4.8 | - |
| debian | debian_linux | - | - |
| netapp | active_iq_unified_manager_for_vmware_vsphere |
Published
CVE disclosed publicly
Last Modified
Most recent update
Indexed to CVEInsight
Added to this platform
AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
10
Affected Products
10
References
linux / linux_kernel
| 9.5 |
| - |
| netapp | hci_management_node | - | - |
| netapp | snapprotect | - | - |
| netapp | solidfire | - | - |
| netapp | storage_replication_adapter_for_clustered_data_ontap_for_vmware_vsphere | 7.2 | - |
| netapp | vasa_provider_for_clustered_data_ontap | 7.2 | - |
| netapp | virtual_storage_console_for_vmware_vsphere | 7.2 | - |
| netapp | cn1610_firmware | - | - |
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
Exploitability
Impact