Loading HuntDB...

GHSA-7w4w-2hxm-8cc6

GitHub Security Advisory

⚠ Unreviewed MODERATE Has CVE

Advisory Details

A race condition in perf_event_open() allows local attackers to leak sensitive data from setuid programs. As no relevant locks (in particular the cred_guard_mutex) are held during the ptrace_may_access() call, it is possible for the specified target task to perform an execve() syscall with setuid execution before perf_event_alloc() actually attaches to it, allowing an attacker to bypass the ptrace_may_access() check and the perf_event_exit_task(current) call that is performed in install_exec_creds() during privileged execve() calls. This issue affects kernel versions before 4.8.

Related CVEs

Key Information

GHSA ID
GHSA-7w4w-2hxm-8cc6
Published
May 24, 2022 4:44 PM
Last Modified
December 1, 2022 12:30 AM
CVSS Score
5.0 /10
Primary Ecosystem
Unknown
Primary Package
Unknown
GitHub Reviewed
✗ No

Dataset

Last updated: September 13, 2025 6:30 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.