First published: Fri Mar 04 2022(Updated: )
A flaw was found in the way the "flags" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:4.18.0-348.20.1.rt7.150.el8_5 | 0:4.18.0-348.20.1.rt7.150.el8_5 |
redhat/kernel | <0:4.18.0-348.20.1.el8_5 | 0:4.18.0-348.20.1.el8_5 |
redhat/kernel | <0:4.18.0-147.64.1.el8_1 | 0:4.18.0-147.64.1.el8_1 |
redhat/kernel-rt | <0:4.18.0-193.79.1.rt13.129.el8_2 | 0:4.18.0-193.79.1.rt13.129.el8_2 |
redhat/kernel | <0:4.18.0-193.79.1.el8_2 | 0:4.18.0-193.79.1.el8_2 |
redhat/kernel-rt | <0:4.18.0-305.40.2.rt7.113.el8_4 | 0:4.18.0-305.40.2.rt7.113.el8_4 |
redhat/kernel | <0:4.18.0-305.40.2.el8_4 | 0:4.18.0-305.40.2.el8_4 |
redhat/kernel | <5.17 | 5.17 |
Linux kernel | ||
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.13-1 | |
Android | ||
Linux Kernel | >=5.8<5.10.102 | |
Linux Kernel | >=5.15<5.15.25 | |
Linux Kernel | >=5.16<5.16.11 | |
Fedora | =35 | |
Red Hat Enterprise Linux | =8.0 | |
redhat enterprise Linux eus | =8.2 | |
redhat enterprise Linux eus | =8.4 | |
redhat enterprise Linux for ibm z systems | =8.0 | |
redhat enterprise Linux for ibm z systems eus | =8.2 | |
redhat enterprise Linux for ibm z systems eus | =8.4 | |
redhat enterprise Linux for power little endian | =8.0 | |
redhat enterprise Linux for power little endian eus | =8.2 | |
redhat enterprise Linux for power little endian eus | =8.4 | |
redhat enterprise Linux for real time | =8 | |
redhat enterprise Linux for real time for nfv | =8 | |
redhat enterprise Linux for real time for nfv tus | =8.2 | |
redhat enterprise Linux for real time for nfv tus | =8.4 | |
redhat enterprise Linux for real time tus | =8.2 | |
redhat enterprise Linux for real time tus | =8.4 | |
redhat enterprise Linux server aus | =8.2 | |
redhat enterprise Linux server aus | =8.4 | |
redhat enterprise Linux server for power little endian update services for sap solutions | =8.1 | |
redhat enterprise Linux server for power little endian update services for sap solutions | =8.2 | |
redhat enterprise Linux server for power little endian update services for sap solutions | =8.4 | |
redhat enterprise Linux server tus | =8.2 | |
redhat enterprise Linux server tus | =8.4 | |
redhat enterprise Linux server update services for sap solutions | =8.1 | |
redhat enterprise Linux server update services for sap solutions | =8.2 | |
redhat enterprise Linux server update services for sap solutions | =8.4 | |
All of | ||
redhat codeready Linux builder | ||
Any of | ||
Red Hat Enterprise Linux | =8.0 | |
redhat enterprise Linux eus | =8.2 | |
redhat enterprise Linux eus | =8.4 | |
redhat enterprise Linux for power little endian | =8.0 | |
redhat enterprise Linux for power little endian eus | =8.2 | |
redhat enterprise Linux for power little endian eus | =8.4 | |
All of | ||
redhat virtualization host | =4.0 | |
Red Hat Enterprise Linux | =8.0 | |
ovirt ovirt-engine | =4.4.10.2 | |
All of | ||
netapp h300s firmware | ||
netapp h300s | ||
All of | ||
NetApp H500S Firmware | ||
netapp h500s | ||
All of | ||
netapp h700s firmware | ||
netapp h700s | ||
All of | ||
netapp h300e firmware | ||
netapp h300e | ||
All of | ||
netapp h500e firmware | ||
netapp h500e | ||
All of | ||
netapp h700e firmware | ||
netapp h700e | ||
All of | ||
netapp h410s firmware | ||
netapp h410s | ||
All of | ||
netapp h410c firmware | ||
netapp h410c | ||
All of | ||
Siemens Scalance LPE9403 Firmware | <2.0 | |
Siemens Scalance LPE9403 Firmware | ||
All of | ||
sonicwall sma1000 firmware | <=12.4.2-02044 | |
SonicWall SMA1000 Appliances | ||
redhat codeready Linux builder | ||
Red Hat Enterprise Linux | =8.0 | |
redhat enterprise Linux eus | =8.2 | |
redhat enterprise Linux eus | =8.4 | |
redhat enterprise Linux for power little endian | =8.0 | |
redhat enterprise Linux for power little endian eus | =8.2 | |
redhat enterprise Linux for power little endian eus | =8.4 | |
redhat virtualization host | =4.0 | |
netapp h300s firmware | ||
netapp h300s | ||
NetApp H500S Firmware | ||
netapp h500s | ||
netapp h700s firmware | ||
netapp h700s | ||
netapp h300e firmware | ||
netapp h300e | ||
netapp h500e firmware | ||
netapp h500e | ||
netapp h700e firmware | ||
netapp h700e | ||
netapp h410s firmware | ||
netapp h410s | ||
netapp h410c firmware | ||
netapp h410c | ||
Siemens Scalance LPE9403 Firmware | <2.0 | |
Siemens Scalance LPE9403 Firmware | ||
sonicwall sma1000 firmware | <=12.4.2-02044 | |
SonicWall SMA1000 Appliances |
Currently there is no mitigation available for this flaw. Customers should update to fixed packages, once they are available.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The severity of CVE-2022-0847 is rated as high due to the potential for local users to exploit the vulnerability and gain unauthorized access to sensitive data.
To fix CVE-2022-0847, update the Linux kernel to the latest version that is not vulnerable, such as kernel version 0:4.18.0-348.20.1.rt7.150.el8_5 or newer.
CVE-2022-0847 affects various versions of the Linux kernel, specifically those prior to versions 4.18.0-348.20.1 or above version 5.10.102.
Yes, unprivileged local users can exploit CVE-2022-0847 to write to memory pages, potentially leading to information disclosure or system compromise.
CVE-2022-0847 is categorized as a memory initialization flaw, which could result in stale value exploitation in the Linux kernel.