CVE-2022-0847 vulnerability in Canonical and Other Products
Published on March 10, 2022





Known Exploited Vulnerability
This Linux Kernel Privilege Escalation Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Linux kernel contains an improper initialization vulnerability where an unprivileged local user could escalate their privileges on the system. This vulnerability has the moniker of "Dirty Pipe.".
The following remediation steps are recommended / required by May 16, 2022: Apply updates per vendor instructions.
Vulnerability Analysis
CVE-2022-0847 can be exploited with local system access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. It has an exploitability score of 1.8 out of four. The potential impact of an exploit of this vulnerability is considered to be very high.
Improper Initialization
The software does not initialize or incorrectly initializes a resource, which might leave the resource in an unexpected state when it is accessed or used. This can have security implications when the associated resource is expected to have certain properties or values, such as a variable that determines whether a user has been authenticated or not.
Products Associated with CVE-2022-0847
You can be notified by stack.watch whenever vulnerabilities like CVE-2022-0847 are published in these products:
What versions are vulnerable to CVE-2022-0847?
-
Linux Kernel Version 5.16 Fixed in Version 5.16.11
-
Linux Kernel Version 5.15 Fixed in Version 5.15.25
-
Linux Kernel Version 5.8 Fixed in Version 5.10.102
-
Fedora Project Fedora Version 35
-
Red Hat Enterprise Linux (RHEL) Version 8.0
-
Red Hat Enterprise Linux Eus Version 8.2
-
Red Hat Enterprise Linux Server Tus Version 8.2
-
Red Hat Enterprise Linux Server Aus Version 8.2
-
Red Hat Enterprise Linux For Real Time Version 8
-
Red Hat Enterprise Linux Server Tus Version 8.4
-
Red Hat Enterprise Linux Eus Version 8.4
-
Red Hat Enterprise Linux Real Time Nfv Tus Version 8.4
-
Red Hat Enterprise Linux Real Time Nfv Tus Version 8.2
-
Red Hat Enterprise Linux Real Time Tus Version 8.4
-
Red Hat Enterprise Linux Real Time Tus Version 8.2
-
Red Hat Enterprise Linux Server Aus Version 8.4
-
Red Hat Enterprise Linux Real Time Nfv Version 8
-
Red Hat Enterprise Linux Server Update Services Sap Solutions Version 8.2
-
Red Hat Enterprise Linux Server Update Services Sap Solutions Version 8.4
-
Red Hat Enterprise Linux Server Update Services Sap Solutions Version 8.1
-
Red Hat Enterprise Linux Power Little Endian Eus Version 8.2
-
Red Hat Enterprise Linux Ibm Z Systems Eus Version 8.2
-
Red Hat Enterprise Linux Power Little Endian Version 8.0
-
Red Hat Enterprise Linux Ibm Z Systems Eus Version 8.4
-
Red Hat Enterprise Linux Ibm Z Systems Version 8.0
-
Red Hat Enterprise Linux Power Little Endian Eus Version 8.4
-
Red Hat Enterprise Linux Server Power Little Endian Update Services Sap Solutions Version 8.1
-
Red Hat Enterprise Linux Server Power Little Endian Update Services Sap Solutions Version 8.2
-
Red Hat Enterprise Linux Server Power Little Endian Update Services Sap Solutions Version 8.4
Each of the following must match for the vulnerability to exist.
Each of the following must match for the vulnerability to exist.
-
Ovirt Engine Version 4.4.10.2
Each of the following must match for the vulnerability to exist.
Each of the following must match for the vulnerability to exist.
Each of the following must match for the vulnerability to exist.
Each of the following must match for the vulnerability to exist.
Each of the following must match for the vulnerability to exist.
Each of the following must match for the vulnerability to exist.
Each of the following must match for the vulnerability to exist.
Each of the following must match for the vulnerability to exist.
Each of the following must match for the vulnerability to exist.
Each of the following must match for the vulnerability to exist.