← Voltar para CVEs
CVE-2022-0847
HIGHCISA KEV7.8
Descricao
A flaw was found in the way the "flags" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.
Detalhes CVE
Pontuacao CVSS v3.17.8
SeveridadeHIGH
Vetor CVSSCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vetor de ataqueLOCAL
ComplexidadeLOW
Privilegios necessariosLOW
Interacao do usuarioNONE
Publicado3/10/2022
Ultima modificacao11/6/2025
Fontekev
Avistamentos honeypot0
CISA KEV
FornecedorLinux
ProdutoKernel
Nome da vulnerabilidadeLinux Kernel Privilege Escalation Vulnerability
Data inclusao KEV2022-04-25
Prazo de remediacao2022-05-16
Uso em ransomwareUnknown
Produtos afetados
fedoraproject:fedoralinux:linux_kernelnetapp:h300enetapp:h300e_firmwarenetapp:h300snetapp:h300s_firmwarenetapp:h410cnetapp:h410c_firmwarenetapp:h410snetapp:h410s_firmwarenetapp:h500enetapp:h500e_firmwarenetapp:h500snetapp:h500s_firmwarenetapp:h700enetapp:h700e_firmwarenetapp:h700snetapp:h700s_firmwareovirt:ovirt-engineredhat:codeready_linux_builderredhat:enterprise_linuxredhat:enterprise_linux_eusredhat:enterprise_linux_for_ibm_z_systemsredhat:enterprise_linux_for_ibm_z_systems_eusredhat:enterprise_linux_for_power_little_endianredhat:enterprise_linux_for_power_little_endian_eusredhat:enterprise_linux_for_real_timeredhat:enterprise_linux_for_real_time_for_nfvredhat:enterprise_linux_for_real_time_for_nfv_tusredhat:enterprise_linux_for_real_time_tusredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutionsredhat:enterprise_linux_server_tusredhat:enterprise_linux_server_update_services_for_sap_solutionsredhat:virtualization_hostsiemens:scalance_lpe9403siemens:scalance_lpe9403_firmwaresonicwall:sma1000sonicwall:sma1000_firmware
Fraquezas (CWE)
CWE-665CWE-665
Referencias
http://packetstormsecurity.com/files/166229/Dirty-Pipe-Linux-Privilege-Escalation.html(secalert@redhat.com)
http://packetstormsecurity.com/files/166230/Dirty-Pipe-SUID-Binary-Hijack-Privilege-Escalation.html(secalert@redhat.com)
http://packetstormsecurity.com/files/166258/Dirty-Pipe-Local-Privilege-Escalation.html(secalert@redhat.com)
http://packetstormsecurity.com/files/176534/Linux-4.20-KTLS-Read-Only-Write.html(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=2060795(secalert@redhat.com)
https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf(secalert@redhat.com)
https://dirtypipe.cm4all.com/(secalert@redhat.com)
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0015(secalert@redhat.com)
https://security.netapp.com/advisory/ntap-20220325-0005/(secalert@redhat.com)
https://www.suse.com/support/kb/doc/?id=000020603(secalert@redhat.com)
http://packetstormsecurity.com/files/166229/Dirty-Pipe-Linux-Privilege-Escalation.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/166230/Dirty-Pipe-SUID-Binary-Hijack-Privilege-Escalation.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/166258/Dirty-Pipe-Local-Privilege-Escalation.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/176534/Linux-4.20-KTLS-Read-Only-Write.html(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=2060795(af854a3a-2127-422b-91ae-364da2661108)
https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf(af854a3a-2127-422b-91ae-364da2661108)
https://dirtypipe.cm4all.com/(af854a3a-2127-422b-91ae-364da2661108)
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0015(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20220325-0005/(af854a3a-2127-422b-91ae-364da2661108)
https://www.suse.com/support/kb/doc/?id=000020603(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-0847(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.