{"id":"CVE-2022-0847","details":"A flaw was found in the way the \"flags\" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.","aliases":["A-220741611","ASB-A-220741611"],"modified":"2026-04-16T00:02:31.007205797Z","published":"2022-03-10T17:44:57.283Z","related":["ALSA-2022:0825","SUSE-SU-2022:0755-1","SUSE-SU-2022:0757-1","SUSE-SU-2022:0759-1","SUSE-SU-2022:0760-1","SUSE-SU-2022:0761-1","SUSE-SU-2022:0763-1","SUSE-SU-2022:0764-1","SUSE-SU-2022:0765-1","SUSE-SU-2022:0766-1","SUSE-SU-2022:0767-1","SUSE-SU-2022:0768-1","openSUSE-SU-2022:0755-1","openSUSE-SU-2022:0760-1","openSUSE-SU-2022:0768-1","openSUSE-SU-2024:11910-1","openSUSE-SU-2024:13704-1"],"database_specific":{"unresolved_ranges":[{"cpe":"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"35"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","extracted_events":[{"introduced":"5.8"},{"fixed":"5.10.102"},{"introduced":"5.15"},{"fixed":"5.15.25"},{"introduced":"5.16"},{"fixed":"5.16.11"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"8.0"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"8.2"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"8.4"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"8.0"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.2:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"8.2"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"8.4"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"8.0"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.2:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"8.2"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"8.4"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"8"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:8:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"8"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.2:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"8.2"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.4:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"8.4"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.2:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"8.2"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.4:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"8.4"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"8.2"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"8.4"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"8.1"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"8.2"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"8.4"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"8.2"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"8.4"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"8.1"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"8.2"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"8.4"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:siemens:scalance_lpe9403_firmware:*:*:*:*:*:*:*:*","extracted_events":[{"fixed":"2.0"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:sonicwall:sma1000_firmware:*:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"12.4.2-02044"}],"source":"CPE_FIELD"}]},"references":[{"type":"WEB","url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-0847"},{"type":"ADVISORY","url":"http://packetstormsecurity.com/files/176534/Linux-4.20-KTLS-Read-Only-Write.html"},{"type":"ADVISORY","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf"},{"type":"ADVISORY","url":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0015"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20220325-0005/"},{"type":"ADVISORY","url":"https://www.suse.com/support/kb/doc/?id=000020603"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2060795"},{"type":"EVIDENCE","url":"http://packetstormsecurity.com/files/166229/Dirty-Pipe-Linux-Privilege-Escalation.html"},{"type":"EVIDENCE","url":"http://packetstormsecurity.com/files/166230/Dirty-Pipe-SUID-Binary-Hijack-Privilege-Escalation.html"},{"type":"EVIDENCE","url":"http://packetstormsecurity.com/files/166258/Dirty-Pipe-Local-Privilege-Escalation.html"},{"type":"EVIDENCE","url":"https://dirtypipe.cm4all.com/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/ovirt/ovirt-engine","events":[{"introduced":"0"},{"last_affected":"1ff7e3fdfe522d5068f65ee267d2711d3d7dae6a"},{"last_affected":"1aa653f531d6b1ef4851e2dec28247b38f626b64"}],"database_specific":{"cpe":["cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*","cpe:2.3:a:ovirt:ovirt-engine:4.4.10.2:*:*:*:*:*:*:*"],"extracted_events":[{"introduced":"0"},{"last_affected":"4.0"},{"last_affected":"4.4.10.2"}],"source":"CPE_FIELD"}}],"versions":["list","ovirt-engine-3.3-beta1","ovirt-engine-3.3_beta1","ovirt-engine-3.5.0_alpha1","ovirt-engine-3.5.0_alpha1.1","ovirt-engine-3.5.0_alpha2","ovirt-engine-3.5.0_beta1","ovirt-engine-3.6.0_alpha1","ovirt-engine-3.6.0_alpha1.1","ovirt-engine-3.6.0_alpha1.2","ovirt-engine-3.6.0_alpha2","ovirt-engine-3.6.0_alpha3","ovirt-engine-3.6.0_beta1","ovirt-engine-3.6.0_beta1.1","ovirt-engine-3.6.0_qa1","ovirt-engine-3.6.0_qa2","ovirt-engine-3.6.0_qa3","ovirt-engine-3.6.0_qa4","ovirt-engine-4.0.0","ovirt-engine-4.0.0_alpha1","ovirt-engine-4.0.0_beta1","ovirt-engine-4.1.0_beta1","ovirt-engine-4.2.0","ovirt-engine-4.2.0.1","ovirt-engine-4.2.0.2","ovirt-engine-4.2.0_beta1","ovirt-engine-4.2.0_beta2","ovirt-engine-4.2.0_test1","ovirt-engine-4.2.1","ovirt-engine-4.2.1.1","ovirt-engine-4.2.1.2","ovirt-engine-4.2.1.3","ovirt-engine-4.2.1.4","ovirt-engine-4.3.0","ovirt-engine-4.3.0.1","ovirt-engine-4.3.0.2","ovirt-engine-4.3.0.3","ovirt-engine-4.3.0.4","ovirt-engine-4.3.0_alpha","ovirt-engine-4.3.0_alpha2","ovirt-engine-4.3.0_rc","ovirt-engine-4.3.0_rc2","ovirt-engine-4.3.1","ovirt-engine-4.3.1.1","ovirt-engine-4.3.2","ovirt-engine-4.3.2.1","ovirt-engine-4.4.0","ovirt-engine-4.4.0.1","ovirt-engine-4.4.0.2","ovirt-engine-4.4.0.3","ovirt-engine-4.4.0_beta1","ovirt-engine-4.4.0_beta2","ovirt-engine-4.4.0_beta3","ovirt-engine-4.4.0_beta4","ovirt-engine-4.4.1","ovirt-engine-4.4.1.1","ovirt-engine-4.4.1.2","ovirt-engine-4.4.1.3","ovirt-engine-4.4.1.4","ovirt-engine-4.4.1.5","ovirt-engine-4.4.1.6","ovirt-engine-4.4.1.7","ovirt-engine-4.4.1.8","ovirt-engine-4.4.10","ovirt-engine-4.4.10.2","ovirt-engine-4.4.2","ovirt-engine-4.4.2.1","ovirt-engine-4.4.2.2","ovirt-engine-4.4.3","ovirt-engine-4.4.3.1","ovirt-engine-4.4.3.2","ovirt-engine-4.4.3.3","ovirt-engine-4.4.3.4","ovirt-engine-4.4.3.5","ovirt-engine-4.4.3.6","ovirt-engine-4.4.3.7","ovirt-engine-4.4.3.8","ovirt-engine-4.4.4","ovirt-engine-4.4.4.1","ovirt-engine-4.4.4.2","ovirt-engine-4.4.4.3","ovirt-engine-4.4.4.4","ovirt-engine-4.4.4.5","ovirt-engine-4.4.5","ovirt-engine-4.4.5.1","ovirt-engine-4.4.5.2","ovirt-engine-4.4.5.3","ovirt-engine-4.4.5.4","ovirt-engine-4.4.5.5","ovirt-engine-4.4.5.6","ovirt-engine-4.4.5.7","ovirt-engine-4.4.5.8","ovirt-engine-4.4.6","ovirt-engine-4.4.6.1","ovirt-engine-4.4.6.2","ovirt-engine-4.4.6.3","ovirt-engine-4.4.6.4","ovirt-engine-4.4.6.5","ovirt-engine-4.4.6.6","ovirt-engine-4.4.7","ovirt-engine-4.4.7.1","ovirt-engine-4.4.7.2","ovirt-engine-4.4.7.3","ovirt-engine-4.4.7.4","ovirt-engine-4.4.7.5","ovirt-engine-4.4.7.6","ovirt-engine-4.4.8","ovirt-engine-4.4.8.1","ovirt-engine-4.4.8.2","ovirt-engine-4.4.8.3","ovirt-engine-4.4.8.4","ovirt-engine-4.4.9","ovirt-engine-4.4.9.1","ovirt-engine-4.4.9.2"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-0847.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}