PT-2022-1364 · Linux +11 · Linux Kernel +11
Max Kellermann
·
Published
2016-10-19
·
Updated
2025-08-30
·
CVE-2022-0847
7.8
High
Base vector | Vector | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions:
Linux Kernel versions prior to 5.16.11
Linux Kernel versions prior to 5.15.25
Linux Kernel versions prior to 5.10.102
Linux Kernel versions 5.8 through 5.16.10
Linux Kernel versions 5.8 through 5.15.24
Linux Kernel versions 5.8 through 5.10.101
Description:
A flaw was found in the way the "flags" member of the new pipe buffer structure was lacking proper initialization in copy page to iter pipe and push pipe functions in the Linux kernel, allowing an unprivileged local user to write to pages in the page cache backed by read-only files and escalate their privileges on the system. This issue, known as "Dirty Pipe," can be exploited to overwrite arbitrary data, including files that are normally read-only, and gain complete control of a system. The vulnerability can be used to modify or overwrite arbitrary read-only files, obtain an elevated shell, and potentially allow an attacker to take control of a vulnerable system. It has been observed being used in real-world attacks, including by the UTA0137 threat actor, to gain privileges escalation.
Recommendations:
For Linux Kernel versions prior to 5.16.11, update to version 5.16.11 or later.
For Linux Kernel versions prior to 5.15.25, update to version 5.15.25 or later.
For Linux Kernel versions prior to 5.10.102, update to version 5.10.102 or later.
As a temporary workaround, consider restricting access to sensitive files and directories to minimize the risk of exploitation.
Exploit
Fix
LPE
Improper Preservation of Permissions
Improper Initialization
Related Identifiers
Affected Products
References · 1324
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/local/cve_2022_0847_dirtypipe.rb⭐ 35561 🔗 14312 · Exploit
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/local/netfilter_xtables_heap_oob_write_priv_esc.rb⭐ 35561 🔗 14312 · Exploit
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/local/vmwgfx_fd_priv_esc.rb⭐ 35561 🔗 14312 · Exploit
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/local/docker_cgroup_escape.rb⭐ 35561 🔗 14312 · Exploit
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/local/cve_2021_3490_ebpf_alu32_bounds_check_lpe.rb⭐ 35561 🔗 14312 · Exploit
- 🔥 https://github.com/nixawk/labs/tree/master/CVE-2016-5195⭐ 1172 🔗 440 · Exploit
- 🔥 https://github.com/timwr/CVE-2016-5195⭐ 975 🔗 393 · Exploit
- 🔥 https://github.com/Arinerron/CVE-2022-0847-DirtyPipe-Exploit⭐ 1103 🔗 221 · Exploit
- 🔥 https://github.com/AlexisAhmed/CVE-2022-0847-DirtyPipe-Exploits⭐ 603 🔗 148 · Exploit
- 🔥 https://github.com/tr3ee/CVE-2022-23222⭐ 570 🔗 99 · Exploit
- 🔥 https://github.com/Bonfee/CVE-2022-25636⭐ 430 🔗 82 · Exploit
- 🔥 https://github.com/gbonacini/CVE-2016-5195⭐ 326 🔗 121 · Exploit
- 🔥 https://github.com/Crusaders-of-Rust/CVE-2022-0185⭐ 371 🔗 56 · Exploit
- 🔥 https://github.com/r1is/CVE-2022-0847⭐ 280 🔗 78 · Exploit
- 🔥 https://github.com/imfiver/CVE-2022-0847⭐ 280 🔗 78 · Exploit