Your Yello Ring Road To Success
GOOGLE LOGIN MY ADS MY SHOP

“As Nasty as Dirty Pipe” — 8 Year Old Linux Kernel Vulnerability Uncovered

Linux Kernel vulnerability

Details of an eight-year-old security vulnerability in the Linux
kernel have emerged that the researchers say is “as nasty as Dirty
Pipe.”

Dubbed DirtyCred[1] by a group of academics
from Northwestern University, the security weakness exploits a
previously unknown flaw (CVE-2022-2588[2]) to escalate privileges
to the maximum level.

“DirtyCred is a kernel exploitation concept that swaps
unprivileged kernel credentials[3]
with privileged ones to escalate privilege,” researchers Zhenpeng
Lin, Yuhang Wu, and Xinyu Xing noted. “Instead of overwriting any
critical data fields on kernel heap, DirtyCred abuses the heap
memory reuse mechanism to get privileged.”

CyberSecurity

This entails three steps –

  • Free an in-use unprivileged credential with the
    vulnerability
  • Allocate privileged credentials in the freed memory slot by
    triggering a privileged userspace process such as su, mount, or
    sshd
  • Operate as a privileged user

The novel exploitation method, according to the researchers,
pushes the dirty pipe to the next level, making it more general as
well as potent in a manner that could work on any version of the
affected kernel.

Linux Kernel vulnerability

“First, rather than tying to a specific vulnerability, this
exploitation method allows any vulnerabilities with double-free
ability to demonstrate dirty-pipe-like ability,” the researchers
said[4].

“Second, while it is like the dirty pipe that could bypass all
the kernel protections, our exploitation method could even
demonstrate the ability to escape the container actively that Dirty
Pipe is not capable of.”

CyberSecurity

Dirty Pipe[5], tracked as
CVE-2022-0847 (CVSS score: 7.8) and affecting Linux kernel versions
starting from 5.8, refers to a security vulnerability in the
pipe subsystem[6]
that allows underprivileged processes to write to arbitrary
readable files, leading to privilege escalation.

The exploitable vulnerability was so called after the Dirty Cow[7]
vulnerability discovered in 2016 based on their similarities.

Given that objects are isolated based on their type and not
privileges, the researchers recommend isolating privileged
credentials from unprivileged ones using virtual memory to prevent
cross-cache attacks.

References

  1. ^
    DirtyCred
    (github.com)
  2. ^
    CVE-2022-2588
    (access.redhat.com)
  3. ^
    kernel
    credentials
    (www.kernel.org)
  4. ^
    said
    (www.blackhat.com)
  5. ^
    Dirty
    Pipe
    (thehackernews.com)
  6. ^
    pipe
    subsystem
    (en.wikipedia.org)
  7. ^
    Dirty
    Cow
    (thehackernews.com)

Read more