Mar 14, 2022
Security updates: Linux® kernel vulnerability
A vulnerability called "Dirty Pipe" (CVE-2022-0847) allows users to increase their access via the page cache. Aiven's CISO writes about our mitigating actions.
On 7th March 2022, we became aware of CVE-2022-0847, also known as "Dirty Pipe". This vulnerability allows an unprivileged local user to write to pages in the page cache backed by read-only files. They could use this to increase their access to the system further by enhancing their privileges.
Current Status
An optional maintenance update will be made available to all customers which will patch them against this issue and can be implemented using the normal maintenance application functions already in use. Over the next 30 days, the optional update will be made mandatory and rolled out to all customers.
Impact on Aiven Services
The Aiven platform does not allow direct interaction with the underlying operating system. Additionally, Aiven’s architecture prevents cross-tenant impact from vulnerabilities such as this.
Our product and infrastructure security teams have reviewed our existing mitigations in context with this particular vulnerability. Furthermore, internal monitoring has been extended to help identify any exploitation attempts.
Further Information
For more information about the vulnerability, see CVE-2022-0847.
Stay updated with Aiven
Subscribe for the latest news and insights on open source, Aiven offerings, and more.
Related resources
Aug 2, 2023
At Aiven, we are doubling down on openness by making our product roadmap publicly available. Register now to provide your feedback and new ideas for development
Sep 24, 2024
Tiered storage is now generally available in Aiven for ClickHouse®. Combine the speed of ClickHouse with the cost optimization of object storage for a powerful data warehouse solution.
Oct 6, 2022
Aiven now offers OpenSearch® 2 as a managed service. Let’s take a look at how we’re bringing it to you and what the key improvements are.