QID 376451

Date Published: 2022-03-09

QID 376451: Linux Kernel Local Privilege Escalation Vulnerability (DirtyPipe)

The Linux Kernel is prone to a local privilege escalation vulnerability caused because of a flaw in the handling of pipe buffer flags..

A flaw was found in the way the "flags" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.

Affected Versions:
Linux kernel versions 5.8 prior to 5.17

Fixed Versions:
Linux Kernel 5.16.11, 5.15.25 and 5.10.102

QID Detection Logic:
This authenticated QID works by getting the version of the Linux Kernel with the following command: uname -rs

Successful exploitation of this vulnerability could allow an attacker to perform malicious actions with elevated privileges

  • CVSS V3 rated as High - 7.8 severity.
  • CVSS V2 rated as High - 7.2 severity.
  • Solution
    Customers can upgrade to latest kernel versions using kernel

    CVEs related to QID 376451

    Software Advisories
    Advisory ID Software Component Link
    Linux Kernel URL Logo git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/refs/?id=9d2231c5d74e13b2a0546fee6737ee4446017903