Vulnerability Description
A flaw was found in the way the "flags" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 5.8, < 5.10.102 |
| Fedoraproject | Fedora | 35 |
| Redhat | Enterprise Linux | 8.0 |
| Redhat | Enterprise Linux Eus | 8.2 |
| Redhat | Enterprise Linux For Ibm Z Systems | 8.0 |
| Redhat | Enterprise Linux For Ibm Z Systems Eus | 8.2 |
| Redhat | Enterprise Linux For Power Little Endian | 8.0 |
| Redhat | Enterprise Linux For Power Little Endian Eus | 8.2 |
| Redhat | Enterprise Linux For Real Time | 8 |
| Redhat | Enterprise Linux For Real Time For Nfv | 8 |
| Redhat | Enterprise Linux For Real Time For Nfv Tus | 8.2 |
| Redhat | Enterprise Linux For Real Time Tus | 8.2 |
| Redhat | Enterprise Linux Server Aus | 8.2 |
| Redhat | Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions | 8.1 |
| Redhat | Enterprise Linux Server Tus | 8.2 |
| Redhat | Enterprise Linux Server Update Services For Sap Solutions | 8.1 |
| Redhat | Codeready Linux Builder | - |
| Redhat | Virtualization Host | 4.0 |
| Ovirt | Ovirt-Engine | 4.4.10.2 |
| Netapp | H300S Firmware | - |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/166229/Dirty-Pipe-Linux-Privilege-EscalatioExploitThird Party AdvisoryVDB Entry
- http://packetstormsecurity.com/files/166230/Dirty-Pipe-SUID-Binary-Hijack-PrivilExploitThird Party AdvisoryVDB Entry
- http://packetstormsecurity.com/files/166258/Dirty-Pipe-Local-Privilege-EscalatioExploitThird Party AdvisoryVDB Entry
- http://packetstormsecurity.com/files/176534/Linux-4.20-KTLS-Read-Only-Write.htmlThird Party AdvisoryVDB Entry
- https://bugzilla.redhat.com/show_bug.cgi?id=2060795Issue TrackingPatchThird Party Advisory
- https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdfThird Party Advisory
- https://dirtypipe.cm4all.com/ExploitThird Party Advisory
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0015Third Party Advisory
- https://security.netapp.com/advisory/ntap-20220325-0005/Third Party Advisory
- https://www.suse.com/support/kb/doc/?id=000020603Third Party Advisory
- http://packetstormsecurity.com/files/166229/Dirty-Pipe-Linux-Privilege-EscalatioExploitThird Party AdvisoryVDB Entry
- http://packetstormsecurity.com/files/166230/Dirty-Pipe-SUID-Binary-Hijack-PrivilExploitThird Party AdvisoryVDB Entry
- http://packetstormsecurity.com/files/166258/Dirty-Pipe-Local-Privilege-EscalatioExploitThird Party AdvisoryVDB Entry
- http://packetstormsecurity.com/files/176534/Linux-4.20-KTLS-Read-Only-Write.htmlThird Party AdvisoryVDB Entry
- https://bugzilla.redhat.com/show_bug.cgi?id=2060795Issue TrackingPatchThird Party Advisory
FAQ
What is CVE-2022-0847?
CVE-2022-0847 is a vulnerability with a CVSS score of 7.8 (HIGH). A flaw was found in the way the "flags" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus c...
How severe is CVE-2022-0847?
CVE-2022-0847 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-0847?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Fedoraproject Fedora, Redhat Enterprise Linux, Redhat Enterprise Linux Eus, Redhat Enterprise Linux For Ibm Z Systems.