Company
Date Published
Author
Itay Vaknin
Word count
1013
Language
English
Hacker News points
None

Summary

The DirtyPipe vulnerability, designated as CVE-2022-0847, is a critical security flaw in the Linux kernel versions 5.8 and later, allowing local attackers to gain root privileges by writing arbitrary data to read-only files. Similar to the DirtyCoW vulnerability of 2016, DirtyPipe affects all major Linux distributions and cloud providers, posing significant risks as it can be exploited to rewrite sensitive files like "/etc/passwd" and potentially break out of containers under certain conditions. The vulnerability was discovered through the misuse of the splice() system call, and it has been addressed in kernel versions 5.16.11, 5.15.25, and 5.10.102. Remediation involves upgrading the kernel to these versions or applying a patch, and for those unable to do so, a mitigation option is to deploy a seccomp profile that disallows the splice syscall. JFrog's security research has confirmed that their products are not vulnerable, and they offer tools like JFrog Xray for identifying affected software versions.