← Volver a CVEs
CVE-2022-0847
HIGHCISA KEV7.8
Descripcion
A flaw was found in the way the "flags" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.
Detalles CVE
Puntuacion CVSS v3.17.8
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueLOCAL
ComplejidadLOW
Privilegios requeridosLOW
Interaccion usuarioNONE
Publicado3/10/2022
Ultima modificacion11/6/2025
Fuentekev
Avistamientos honeypot0
CISA KEV
VendedorLinux
ProductoKernel
Nombre vulnerabilidadLinux Kernel Privilege Escalation Vulnerability
Fecha inclusion KEV2022-04-25
Fecha limite remediacion2022-05-16
Uso en ransomwareUnknown
Productos afectados
fedoraproject:fedoralinux:linux_kernelnetapp:h300enetapp:h300e_firmwarenetapp:h300snetapp:h300s_firmwarenetapp:h410cnetapp:h410c_firmwarenetapp:h410snetapp:h410s_firmwarenetapp:h500enetapp:h500e_firmwarenetapp:h500snetapp:h500s_firmwarenetapp:h700enetapp:h700e_firmwarenetapp:h700snetapp:h700s_firmwareovirt:ovirt-engineredhat:codeready_linux_builderredhat:enterprise_linuxredhat:enterprise_linux_eusredhat:enterprise_linux_for_ibm_z_systemsredhat:enterprise_linux_for_ibm_z_systems_eusredhat:enterprise_linux_for_power_little_endianredhat:enterprise_linux_for_power_little_endian_eusredhat:enterprise_linux_for_real_timeredhat:enterprise_linux_for_real_time_for_nfvredhat:enterprise_linux_for_real_time_for_nfv_tusredhat:enterprise_linux_for_real_time_tusredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutionsredhat:enterprise_linux_server_tusredhat:enterprise_linux_server_update_services_for_sap_solutionsredhat:virtualization_hostsiemens:scalance_lpe9403siemens:scalance_lpe9403_firmwaresonicwall:sma1000sonicwall:sma1000_firmware
Debilidades (CWE)
CWE-665CWE-665
Referencias
http://packetstormsecurity.com/files/166229/Dirty-Pipe-Linux-Privilege-Escalation.html(secalert@redhat.com)
http://packetstormsecurity.com/files/166230/Dirty-Pipe-SUID-Binary-Hijack-Privilege-Escalation.html(secalert@redhat.com)
http://packetstormsecurity.com/files/166258/Dirty-Pipe-Local-Privilege-Escalation.html(secalert@redhat.com)
http://packetstormsecurity.com/files/176534/Linux-4.20-KTLS-Read-Only-Write.html(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=2060795(secalert@redhat.com)
https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf(secalert@redhat.com)
https://dirtypipe.cm4all.com/(secalert@redhat.com)
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0015(secalert@redhat.com)
https://security.netapp.com/advisory/ntap-20220325-0005/(secalert@redhat.com)
https://www.suse.com/support/kb/doc/?id=000020603(secalert@redhat.com)
http://packetstormsecurity.com/files/166229/Dirty-Pipe-Linux-Privilege-Escalation.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/166230/Dirty-Pipe-SUID-Binary-Hijack-Privilege-Escalation.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/166258/Dirty-Pipe-Local-Privilege-Escalation.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/176534/Linux-4.20-KTLS-Read-Only-Write.html(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=2060795(af854a3a-2127-422b-91ae-364da2661108)
https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf(af854a3a-2127-422b-91ae-364da2661108)
https://dirtypipe.cm4all.com/(af854a3a-2127-422b-91ae-364da2661108)
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0015(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20220325-0005/(af854a3a-2127-422b-91ae-364da2661108)
https://www.suse.com/support/kb/doc/?id=000020603(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-0847(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.