CVE-2022-0847

Published Mar 10, 2022

Last updated 13 days ago

Overview

Description
A flaw was found in the way the "flags" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.
Source
secalert@redhat.com
NVD status
Modified

Risk scores

CVSS 3.1

Type
Primary
Base score
7.8
Impact score
5.9
Exploitability score
1.8
Vector string
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Severity
HIGH

CVSS 2.0

Type
Primary
Base score
7.2
Impact score
10
Exploitability score
3.9
Vector string
AV:L/AC:L/Au:N/C:C/I:C/A:C

Known exploits

Data from CISA

Vulnerability name
Linux Kernel Privilege Escalation Vulnerability
Exploit added on
Apr 25, 2022
Exploit action due
May 16, 2022
Required action
Apply updates per vendor instructions.

Weaknesses

secalert@redhat.com
CWE-665
nvd@nist.gov
CWE-665

Social media

Hype score
Not currently trending

Configurations