On March 7, 2022, a Linux kernel local privilege escalation vulnerability (CVE-2022-0847) was disclosed by a security researcher. Non-privileged users can exploit the vulnerability to overwrite read-only files and escalate the privileges of the users to root. This vulnerability is named Dirty Pipe. A proof of concept (PoC) tool that can be used to exploit the vulnerability is available online.
Detected vulnerability
Vulnerability ID: CVE-2022-0847
Vulnerability severity: critical
Affected versions: Linux kernel version 5.8 or later, 5.16.11 or earlier, 5.15.25 or earlier, and 5.10.102 or earlier
Security suggestions
We strongly recommend that you pay attention to the updates of applications and systems associated with the vulnerability, update components to the latest version at the earliest opportunity, or use the automatic update mechanism of associated applications and systems.
The CVE-2022-0847 vulnerability has been fixed in kernel-5.10.84-10.3.al8 of the Alibaba Cloud Linux 3 operating system.
For information about how to upgrade the kernel of other Linux distributions to a secure version, see the following announcements:
Commands used to upgrade the Linux kernel:
During the upgrade, save your data and then restart your server. Alibaba Cloud is not responsible for any data loss by your failure to save data or restart the server.
If your operating system is CentOS, run the
sudo yum update -y kernelcommand to upgrade the kernel. After a system restart, run the
sudo uname -rcommand to check whether your kernel is upgraded to a secure version.
References
Announcing party
Alibaba Cloud Computing Co., Ltd.