Network Security, Distributed Workforce

Linux vulnerability allowed root-level access

Share
Oracle CEO Larry Ellison delivers a keynote address at the 2006 Oracle OpenWorld conference Oct. 25, 2006, in San Francisco.  (Photo by Justin Sullivan/Getty Images)

A German coder and security researcher recently posted his findings related to a Linux kernel bug that could give root-level access to remote attackers.

In a post, Max Kellerman called the bug in CVE-2022-0847 “Dirty Pipe,” which allowed overwriting data in arbitrary read-only files, which can lead to privilege escalation. The vulnerability was patched in 5.10.102, 5.15.25 and 5.16.11, but is still vulnerable in 5.8, 5.10, 5.15 and 5.16.

CM4all, the company Kellerman works for, uses pipes in Linux for unidirectional inter-process data communication. Due to a bug that was several years old, it became possible to overwrite data in the page cache by writing new data into a pipe, Kellerman explained.

As Paul Duckin at Sophos’ Naked Security blog succinctly explained: 

"He [Kellerman] called the vulnerability Dirty Pipe, because it involves insecure interaction between a true Linux file (one that’s saved permanently on disk) and a Linux pipe, which is a memory-only data buffer that can be used like a file.

"Very greatly simplified, if you have a pipe that you are allowed to write to and a file that you aren’t…

"…then, sometimes, writing into the pipe’s memory buffer may inadvertently also modify the kernel’s temporary in-memory copies – the so-called cache pages – of various parts of the disk file."

There are limitations for the exploit, which are detailed in Kellerman's posting here.

An In-Depth Guide to Network Security

Get essential knowledge and practical strategies to fortify your network security.
Stephen Weigand

Stephen Weigand is managing editor and production manager for SC Media. He has worked for news media in Washington, D.C., covering military and defense issues, as well as federal IT. He is based in the Seattle area.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.