A flaw was found in the way the "flags" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.

Project Subscriptions

Vendors Products
Fedoraproject Subscribe
Linux Kernel Subscribe
H300e Firmware Subscribe
H300s Firmware Subscribe
H410c Firmware Subscribe
H410s Firmware Subscribe
H500e Firmware Subscribe
H500s Firmware Subscribe
H700e Firmware Subscribe
H700s Firmware Subscribe
Ovirt-engine Subscribe
Codeready Linux Builder Subscribe
Enterprise Linux Subscribe
Enterprise Linux Eus Subscribe
Enterprise Linux For Ibm Z Systems Subscribe
Enterprise Linux For Ibm Z Systems Eus Subscribe
Enterprise Linux For Power Little Endian Subscribe
Enterprise Linux For Power Little Endian Eus Subscribe
Enterprise Linux For Real Time Subscribe
Enterprise Linux For Real Time For Nfv Subscribe
Enterprise Linux For Real Time For Nfv Tus Subscribe
Enterprise Linux For Real Time Tus Subscribe
Enterprise Linux Server Aus Subscribe
Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions Subscribe
Enterprise Linux Server Tus Subscribe
Enterprise Linux Server Update Services For Sap Solutions Subscribe
Rhel E4s Subscribe
Rhel Eus Subscribe
Rhev Hypervisor Subscribe
Virtualization Host Subscribe
Siemens Subscribe
Scalance Lpe9403 Subscribe
Scalance Lpe9403 Firmware Subscribe
Sonicwall Subscribe
Sma1000 Subscribe
Sma1000 Firmware Subscribe
Advisories
Source ID Title
Debian DSA Debian DSA DSA-5092-1 linux security update
Ubuntu USN Ubuntu USN USN-5317-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-5362-1 Linux kernel (Intel IOTG) vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 22 Oct 2025 00:30:00 +0000


Tue, 21 Oct 2025 20:30:00 +0000


Tue, 21 Oct 2025 19:30:00 +0000


Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.82694}

epss

{'score': 0.81992}


Sat, 12 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.83093}

epss

{'score': 0.82694}


Tue, 04 Feb 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2022-04-25'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 14 Aug 2024 01:00:00 +0000

Type Values Removed Values Added
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-10-21T23:15:44.668Z

Reserved: 2022-03-03T00:00:00.000Z

Link: CVE-2022-0847

cve-icon Vulnrichment

Updated: 2024-08-02T23:40:04.513Z

cve-icon NVD

Status : Analyzed

Published: 2022-03-10T17:44:57.283

Modified: 2025-11-06T14:50:37.153

Link: CVE-2022-0847

cve-icon Redhat

Severity : Important

Publid Date: 2022-03-07T12:00:00Z

Links: CVE-2022-0847 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses