A flaw was found in the way the "flags" member of the new pipe buffer structure was lacking proper initialization in copypagetoiterpipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.
{
"unresolved_ranges": [
{
"extracted_events": [
{
"last_affected": "35"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"introduced": "5.8"
},
{
"fixed": "5.10.102"
},
{
"introduced": "5.15"
},
{
"fixed": "5.15.25"
},
{
"introduced": "5.16"
},
{
"fixed": "5.16.11"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "8.0"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "8.2"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "8.4"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "8.0"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "8.2"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.2:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "8.4"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "8.0"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "8.2"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.2:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "8.4"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "8"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "8"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:8:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "8.2"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.2:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "8.4"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.4:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "8.2"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.2:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "8.4"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.4:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "8.2"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "8.4"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "8.1"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "8.2"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "8.4"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "8.2"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "8.4"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "8.1"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "8.2"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "8.4"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"fixed": "2.0"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:siemens:scalance_lpe9403_firmware:*:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "12.4.2-02044"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:sonicwall:sma1000_firmware:*:*:*:*:*:*:*:*"
}
]
}{
"extracted_events": [
{
"introduced": "0"
},
{
"last_affected": "4.0"
},
{
"last_affected": "4.4.10.2"
}
],
"source": "CPE_FIELD",
"cpe": [
"cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ovirt:ovirt-engine:4.4.10.2:*:*:*:*:*:*:*"
]
}