// For flags

CVE-2022-0847

Linux Kernel Privilege Escalation Vulnerability

Severity Score

7.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

32
*Multiple Sources

Exploited in Wild

Yes
*KEV

Decision

-
*SSVC
Descriptions

A flaw was found in the way the "flags" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.

Se ha encontrado un fallo en la forma en que el miembro "flags" de la estructura del nuevo búfer de la tubería carecía de la inicialización apropiada en las funciones copy_page_to_iter_pipe y push_pipe en el kernel de Linux y, por tanto, podía contener valores obsoletos. Un usuario local no privilegiado podía usar este fallo para escribir en páginas de la caché de páginas respaldadas por archivos de sólo lectura y así escalar sus privilegios en el sistema

Linux versions 4.20 and above have an issue where ktls writes into spliced readonly pages.

Linux kernel contains an improper initialization vulnerability where an unprivileged local user could escalate their privileges on the system. This vulnerability has the moniker of "Dirty Pipe."

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-02-20 First Exploit
  • 2022-03-03 CVE Reserved
  • 2022-03-07 CVE Published
  • 2022-04-25 Exploited in Wild
  • 2022-05-16 KEV Due Date
  • 2024-07-03 EPSS Updated
  • 2024-08-02 CVE Updated
CWE
  • CWE-665: Improper Initialization
  • CWE-909: Missing Initialization of Resource
CAPEC
References (39)
URL Date SRC
https://www.exploit-db.com/exploits/50808 2022-03-08
https://github.com/Arinerron/CVE-2022-0847-DirtyPipe-Exploit 2022-03-08
https://github.com/AlexisAhmed/CVE-2022-0847-DirtyPipe-Exploits 2022-03-15
https://github.com/r1is/CVE-2022-0847 2023-02-02
https://github.com/bbaranoff/CVE-2022-0847 2022-03-07
https://github.com/Al1ex/CVE-2022-0847 2022-03-09
https://github.com/antx-code/CVE-2022-0847 2022-03-08
https://github.com/basharkey/CVE-2022-0847-dirty-pipe-checker 2023-06-14
https://github.com/knqyf263/CVE-2022-0847 2022-03-08
https://github.com/chenaotian/CVE-2022-0847 2022-03-10
https://github.com/greenhandatsjtu/CVE-2022-0847-Container-Escape 2022-06-16
https://github.com/xndpxs/CVE-2022-0847 2022-03-07
https://github.com/lucksec/CVE-2022-0847 2022-03-08
https://github.com/4luc4rdr5290/CVE-2022-0847 2022-03-08
https://github.com/gyaansastra/CVE-2022-0847 2022-03-20
https://github.com/cspshivam/CVE-2022-0847-dirty-pipe-exploit 2022-03-08
https://github.com/VinuKalana/DirtyPipe-CVE-2022-0847 2022-06-02
https://github.com/arttnba3/CVE-2022-0847 2022-03-14
https://github.com/h4ckm310n/CVE-2022-0847-eBPF 2023-11-04
https://github.com/si1ent-le/CVE-2022-0847 2022-03-08
https://github.com/Mustafa1986/CVE-2022-0847-DirtyPipe-Exploit 2022-03-09
https://github.com/yoeelingBin/CVE-2022-0847-Container-Escape 2022-08-22
https://github.com/ajith737/Dirty-Pipe-CVE-2022-0847-POCs 2023-01-04
https://github.com/MrP1xel/CVE-2022-0847-dirty-pipe-kernel-checker 2022-03-15
https://github.com/sa-infinity8888/Dirty-Pipe-CVE-2022-0847 2022-03-13
https://github.com/tmoneypenny/CVE-2022-0847 2022-12-19
https://github.com/mutur4/CVE-2022-0847 2023-09-06
http://packetstormsecurity.com/files/166229/Dirty-Pipe-Linux-Privilege-Escalation.html 2024-08-02
http://packetstormsecurity.com/files/166230/Dirty-Pipe-SUID-Binary-Hijack-Privilege-Escalation.html 2024-08-02
http://packetstormsecurity.com/files/166258/Dirty-Pipe-Local-Privilege-Escalation.html 2024-08-02
https://dirtypipe.cm4all.com 2024-08-02
https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/local/cve_2022_0847_dirtypipe.rb 2022-02-20
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Redhat
Search vendor "Redhat"
Codeready Linux Builder
Search vendor "Redhat" for product "Codeready Linux Builder"
--
Affected
in Redhat
Search vendor "Redhat"
Enterprise Linux
Search vendor "Redhat" for product "Enterprise Linux"
8.0
Search vendor "Redhat" for product "Enterprise Linux" and version "8.0"
-
Safe
Redhat
Search vendor "Redhat"
Codeready Linux Builder
Search vendor "Redhat" for product "Codeready Linux Builder"
--
Affected
in Redhat
Search vendor "Redhat"
Enterprise Linux Eus
Search vendor "Redhat" for product "Enterprise Linux Eus"
8.2
Search vendor "Redhat" for product "Enterprise Linux Eus" and version "8.2"
-
Safe
Redhat
Search vendor "Redhat"
Codeready Linux Builder
Search vendor "Redhat" for product "Codeready Linux Builder"
--
Affected
in Redhat
Search vendor "Redhat"
Enterprise Linux Eus
Search vendor "Redhat" for product "Enterprise Linux Eus"
8.4
Search vendor "Redhat" for product "Enterprise Linux Eus" and version "8.4"
-
Safe
Redhat
Search vendor "Redhat"
Codeready Linux Builder
Search vendor "Redhat" for product "Codeready Linux Builder"
--
Affected
in Redhat
Search vendor "Redhat"
Enterprise Linux For Power Little Endian
Search vendor "Redhat" for product "Enterprise Linux For Power Little Endian"
8.0
Search vendor "Redhat" for product "Enterprise Linux For Power Little Endian" and version "8.0"
-
Safe
Redhat
Search vendor "Redhat"
Codeready Linux Builder
Search vendor "Redhat" for product "Codeready Linux Builder"
--
Affected
in Redhat
Search vendor "Redhat"
Enterprise Linux For Power Little Endian Eus
Search vendor "Redhat" for product "Enterprise Linux For Power Little Endian Eus"
8.2
Search vendor "Redhat" for product "Enterprise Linux For Power Little Endian Eus" and version "8.2"
-
Safe
Redhat
Search vendor "Redhat"
Codeready Linux Builder
Search vendor "Redhat" for product "Codeready Linux Builder"
--
Affected
in Redhat
Search vendor "Redhat"
Enterprise Linux For Power Little Endian Eus
Search vendor "Redhat" for product "Enterprise Linux For Power Little Endian Eus"
8.4
Search vendor "Redhat" for product "Enterprise Linux For Power Little Endian Eus" and version "8.4"
-
Safe
Redhat
Search vendor "Redhat"
Virtualization Host
Search vendor "Redhat" for product "Virtualization Host"
4.0
Search vendor "Redhat" for product "Virtualization Host" and version "4.0"
-
Affected
in Redhat
Search vendor "Redhat"
Enterprise Linux
Search vendor "Redhat" for product "Enterprise Linux"
8.0
Search vendor "Redhat" for product "Enterprise Linux" and version "8.0"
-
Safe
Netapp
Search vendor "Netapp"
H300s Firmware
Search vendor "Netapp" for product "H300s Firmware"
--
Affected
in Netapp
Search vendor "Netapp"
H300s
Search vendor "Netapp" for product "H300s"
--
Safe
Netapp
Search vendor "Netapp"
H500s Firmware
Search vendor "Netapp" for product "H500s Firmware"
--
Affected
in Netapp
Search vendor "Netapp"
H500s
Search vendor "Netapp" for product "H500s"
--
Safe
Netapp
Search vendor "Netapp"
H700s Firmware
Search vendor "Netapp" for product "H700s Firmware"
--
Affected
in Netapp
Search vendor "Netapp"
H700s
Search vendor "Netapp" for product "H700s"
--
Safe
Netapp
Search vendor "Netapp"
H300e Firmware
Search vendor "Netapp" for product "H300e Firmware"
--
Affected
in Netapp
Search vendor "Netapp"
H300e
Search vendor "Netapp" for product "H300e"
--
Safe
Netapp
Search vendor "Netapp"
H500e Firmware
Search vendor "Netapp" for product "H500e Firmware"
--
Affected
in Netapp
Search vendor "Netapp"
H500e
Search vendor "Netapp" for product "H500e"
--
Safe
Netapp
Search vendor "Netapp"
H700e Firmware
Search vendor "Netapp" for product "H700e Firmware"
--
Affected
in Netapp
Search vendor "Netapp"
H700e
Search vendor "Netapp" for product "H700e"
--
Safe
Netapp
Search vendor "Netapp"
H410s Firmware
Search vendor "Netapp" for product "H410s Firmware"
--
Affected
in Netapp
Search vendor "Netapp"
H410s
Search vendor "Netapp" for product "H410s"
--
Safe
Netapp
Search vendor "Netapp"
H410c Firmware
Search vendor "Netapp" for product "H410c Firmware"
--
Affected
in Netapp
Search vendor "Netapp"
H410c
Search vendor "Netapp" for product "H410c"
--
Safe
Siemens
Search vendor "Siemens"
Scalance Lpe9403 Firmware
Search vendor "Siemens" for product "Scalance Lpe9403 Firmware"
< 2.0
Search vendor "Siemens" for product "Scalance Lpe9403 Firmware" and version " < 2.0"
-
Affected
in Siemens
Search vendor "Siemens"
Scalance Lpe9403
Search vendor "Siemens" for product "Scalance Lpe9403"
--
Safe
Sonicwall
Search vendor "Sonicwall"
Sma1000 Firmware
Search vendor "Sonicwall" for product "Sma1000 Firmware"
<= 12.4.2-02044
Search vendor "Sonicwall" for product "Sma1000 Firmware" and version " <= 12.4.2-02044"
-
Affected
in Sonicwall
Search vendor "Sonicwall"
Sma1000
Search vendor "Sonicwall" for product "Sma1000"
--
Safe
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 5.8 < 5.10.102
Search vendor "Linux" for product "Linux Kernel" and version " >= 5.8 < 5.10.102"
-
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 5.15 < 5.15.25
Search vendor "Linux" for product "Linux Kernel" and version " >= 5.15 < 5.15.25"
-
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 5.16 < 5.16.11
Search vendor "Linux" for product "Linux Kernel" and version " >= 5.16 < 5.16.11"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
35
Search vendor "Fedoraproject" for product "Fedora" and version "35"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux
Search vendor "Redhat" for product "Enterprise Linux"
8.0
Search vendor "Redhat" for product "Enterprise Linux" and version "8.0"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Eus
Search vendor "Redhat" for product "Enterprise Linux Eus"
8.2
Search vendor "Redhat" for product "Enterprise Linux Eus" and version "8.2"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Eus
Search vendor "Redhat" for product "Enterprise Linux Eus"
8.4
Search vendor "Redhat" for product "Enterprise Linux Eus" and version "8.4"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux For Ibm Z Systems
Search vendor "Redhat" for product "Enterprise Linux For Ibm Z Systems"
8.0
Search vendor "Redhat" for product "Enterprise Linux For Ibm Z Systems" and version "8.0"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux For Ibm Z Systems Eus
Search vendor "Redhat" for product "Enterprise Linux For Ibm Z Systems Eus"
8.2
Search vendor "Redhat" for product "Enterprise Linux For Ibm Z Systems Eus" and version "8.2"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux For Ibm Z Systems Eus
Search vendor "Redhat" for product "Enterprise Linux For Ibm Z Systems Eus"
8.4
Search vendor "Redhat" for product "Enterprise Linux For Ibm Z Systems Eus" and version "8.4"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux For Power Little Endian
Search vendor "Redhat" for product "Enterprise Linux For Power Little Endian"
8.0
Search vendor "Redhat" for product "Enterprise Linux For Power Little Endian" and version "8.0"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux For Power Little Endian Eus
Search vendor "Redhat" for product "Enterprise Linux For Power Little Endian Eus"
8.2
Search vendor "Redhat" for product "Enterprise Linux For Power Little Endian Eus" and version "8.2"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux For Power Little Endian Eus
Search vendor "Redhat" for product "Enterprise Linux For Power Little Endian Eus"
8.4
Search vendor "Redhat" for product "Enterprise Linux For Power Little Endian Eus" and version "8.4"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux For Real Time
Search vendor "Redhat" for product "Enterprise Linux For Real Time"
8
Search vendor "Redhat" for product "Enterprise Linux For Real Time" and version "8"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux For Real Time For Nfv
Search vendor "Redhat" for product "Enterprise Linux For Real Time For Nfv"
8
Search vendor "Redhat" for product "Enterprise Linux For Real Time For Nfv" and version "8"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux For Real Time For Nfv Tus
Search vendor "Redhat" for product "Enterprise Linux For Real Time For Nfv Tus"
8.2
Search vendor "Redhat" for product "Enterprise Linux For Real Time For Nfv Tus" and version "8.2"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux For Real Time For Nfv Tus
Search vendor "Redhat" for product "Enterprise Linux For Real Time For Nfv Tus"
8.4
Search vendor "Redhat" for product "Enterprise Linux For Real Time For Nfv Tus" and version "8.4"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux For Real Time Tus
Search vendor "Redhat" for product "Enterprise Linux For Real Time Tus"
8.2
Search vendor "Redhat" for product "Enterprise Linux For Real Time Tus" and version "8.2"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux For Real Time Tus
Search vendor "Redhat" for product "Enterprise Linux For Real Time Tus"
8.4
Search vendor "Redhat" for product "Enterprise Linux For Real Time Tus" and version "8.4"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Server Aus
Search vendor "Redhat" for product "Enterprise Linux Server Aus"
8.2
Search vendor "Redhat" for product "Enterprise Linux Server Aus" and version "8.2"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Server Aus
Search vendor "Redhat" for product "Enterprise Linux Server Aus"
8.4
Search vendor "Redhat" for product "Enterprise Linux Server Aus" and version "8.4"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions
Search vendor "Redhat" for product "Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions"
8.1
Search vendor "Redhat" for product "Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions" and version "8.1"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions
Search vendor "Redhat" for product "Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions"
8.2
Search vendor "Redhat" for product "Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions" and version "8.2"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions
Search vendor "Redhat" for product "Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions"
8.4
Search vendor "Redhat" for product "Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions" and version "8.4"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Server Tus
Search vendor "Redhat" for product "Enterprise Linux Server Tus"
8.2
Search vendor "Redhat" for product "Enterprise Linux Server Tus" and version "8.2"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Server Tus
Search vendor "Redhat" for product "Enterprise Linux Server Tus"
8.4
Search vendor "Redhat" for product "Enterprise Linux Server Tus" and version "8.4"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Server Update Services For Sap Solutions
Search vendor "Redhat" for product "Enterprise Linux Server Update Services For Sap Solutions"
8.1
Search vendor "Redhat" for product "Enterprise Linux Server Update Services For Sap Solutions" and version "8.1"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Server Update Services For Sap Solutions
Search vendor "Redhat" for product "Enterprise Linux Server Update Services For Sap Solutions"
8.2
Search vendor "Redhat" for product "Enterprise Linux Server Update Services For Sap Solutions" and version "8.2"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Server Update Services For Sap Solutions
Search vendor "Redhat" for product "Enterprise Linux Server Update Services For Sap Solutions"
8.4
Search vendor "Redhat" for product "Enterprise Linux Server Update Services For Sap Solutions" and version "8.4"
-
Affected
Ovirt
Search vendor "Ovirt"
Ovirt-engine
Search vendor "Ovirt" for product "Ovirt-engine"
4.4.10.2
Search vendor "Ovirt" for product "Ovirt-engine" and version "4.4.10.2"
-
Affected