Linux Kernel Privilege Escalation Vulnerability (CVE-2022-0847)
Linux kernel contains an improper initialization vulnerability where an unprivileged local user could escalate their privileges on the system. This vulnerability has the moniker of "Dirty Pipe."
A local attacker, with a low-privilege account, can achieve full data confidentiality loss, arbitrary modification of data, complete denial of service or system unavailability. Federal agencies are required to remediate by 2022-05-16 under CISA BOD 22-01.
This is a Software Vulnerability (CWE-665) (CWE-665) vulnerability in Linux Kernel. A flaw was found in the way the "flags" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system. Exploitation requires local access, low attack complexity, a low-privilege authenticated account, and no user interaction required.
Probably yes if any of these apply:
Active exploitation documented in the wild. Threat-research write-up: http://packetstormsecurity.com/files/166229/Dirty-Pipe-Linux-Privilege-Escalation.html
Manual remediation steps
No tested PowerShell script for this entry yet. We’re prioritising automation based on user demand.