All Products
Search
Document Center

:Vulnerability announcement | Linux kernel local privilege escalation vulnerability (CVE-2022-0847)

Last Updated:Mar 08, 2024

On March 7, 2022, a Linux kernel local privilege escalation vulnerability (CVE-2022-0847) was disclosed by a security researcher. Non-privileged users can exploit the vulnerability to overwrite read-only files and escalate the privileges of the users to root. This vulnerability is named Dirty Pipe. A proof of concept (PoC) tool that can be used to exploit the vulnerability is available online.

Detected vulnerability

  • Vulnerability ID: CVE-2022-0847

  • Vulnerability severity: critical

  • Affected versions: Linux kernel version 5.8 or later, 5.16.11 or earlier, 5.15.25 or earlier, and 5.10.102 or earlier

Security suggestions

We strongly recommend that you pay attention to the updates of applications and systems associated with the vulnerability, update components to the latest version at the earliest opportunity, or use the automatic update mechanism of associated applications and systems.

The CVE-2022-0847 vulnerability has been fixed in kernel-5.10.84-10.3.al8 of the Alibaba Cloud Linux 3 operating system.

For information about how to upgrade the kernel of other Linux distributions to a secure version, see the following announcements:

Commands used to upgrade the Linux kernel:

Warning

During the upgrade, save your data and then restart your server. Alibaba Cloud is not responsible for any data loss by your failure to save data or restart the server.

If your operating system is CentOS, run the

sudo yum update -y kernel

command to upgrade the kernel. After a system restart, run the

sudo uname -r

command to check whether your kernel is upgraded to a secure version.

References

The Dirty Pipe Vulnerability

Announcing party

Alibaba Cloud Computing Co., Ltd.