Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-0847

Опубликовано: 07 мар. 2022
Источник: redhat
CVSS3: 7.8
EPSS Высокий

Описание

A flaw was found in the way the "flags" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.

Отчет

Red Hat Product Security is aware of this issue. Updates will be released as they become available. Note that PIPE_BUF_FLAG_CAN_MERGE flag attack vector is not available in Red Hat Enterprise Linux 8 and thus the currently known exploits leveraging this flag do not work. The underlying issue (lack of proper pipe_buffer structure initialization) is still present though and other novel ways leading to successful exploitation cannot be fully ruled out.

Меры по смягчению последствий

Currently there is no mitigation available for this flaw. Customers should update to fixed packages, once they are available.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 7kernel-rtNot affected
Red Hat Enterprise Linux 9kernelNot affected
Red Hat Enterprise Linux 9kernel-rtNot affected
Red Hat Enterprise Linux 8kernel-rtFixedRHSA-2022:081910.03.2022
Red Hat Enterprise Linux 8kernelFixedRHSA-2022:082510.03.2022
Red Hat Enterprise Linux 8.1 Update Services for SAP SolutionskernelFixedRHSA-2022:082310.03.2022
Red Hat Enterprise Linux 8.2 Extended Update Supportkernel-rtFixedRHSA-2022:082110.03.2022
Red Hat Enterprise Linux 8.2 Extended Update SupportkernelFixedRHSA-2022:082010.03.2022

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-281->CWE-909
https://bugzilla.redhat.com/show_bug.cgi?id=2060795kernel: improper initialization of the "flags" member of the new pipe_buffer

EPSS

Процентиль: 99%
0.85239
Высокий

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 3 лет назад

A flaw was found in the way the "flags" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.

CVSS3: 7.8
nvd
больше 3 лет назад

A flaw was found in the way the "flags" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.

CVSS3: 7.8
msrc
больше 3 лет назад

Описание отсутствует

CVSS3: 7.8
debian
больше 3 лет назад

A flaw was found in the way the "flags" member of the new pipe buffer ...

oracle-oval
больше 3 лет назад

ELSA-2022-9213: Unbreakable Enterprise kernel-container security update (IMPORTANT)

EPSS

Процентиль: 99%
0.85239
Высокий

7.8 High

CVSS3