Linux Has Been Bitten By Its Most High-Severity Vulnerability in Years (arstechnica.com) 110
The name Dirty Pipe is meant to both signal similarities to Dirty Cow and provide clues about the new vulnerability's origins. "Pipe" refers to a pipeline, a Linux mechanism for one OS process to send data to another process. In essence, a pipeline is two or more processes that are chained together so that the output text of one process (stdout) is passed directly as input (stdin) to the next one. Tracked as CVE-2022-0847, the vulnerability came to light when a researcher for website builder CM4all was troubleshooting a series of corrupted files that kept appearing on a customer's Linux machine. After months of analysis, the researcher finally found that the customer's corrupted files were the result of a bug in the Linux kernel.
Somewhere an expert security engineer (Score:2)
Re: (Score:2)
Weekend hobbyists my arse.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
For example, gaming sucks on both macOS and Linux, but is extremely good and popular on Windows. That's proof that macOS and Linux are not toys, but Windows is!!1
Re: (Score:2)
Well, it's proof that if your main concern is gaming, you should use Windows. Of course, it also depends on which particular games you like. The ones I like don't even run on Windows (though most of their close relatives do).
Re: (Score:2)
Quietly laughs in BSD.
Re: (Score:2)
Why did you mindless propagate the mindless AC's brain fart Subject? Even if it might have been intended as a joke?
Re: (Score:2)
Linux powers the servers that run 96.5 percent of the top one million domains in the world (as ranked by Alexa)
Weekend hobbyists my arse.
Oh, so that's what's wrong with the Internet!
[/s]
Re: (Score:2)
I think is was a joke, even though people are responding as if he meant it seriously.
That said, it could have been posted by someone who likes BSD. And from their perspective, they might have a point.
Re: (Score:2)
It was a troll coming out for a snack.
Re: (Score:2)
...when you use a UNIX wannabe coded by weekend hobbyists instead of an industrial quality OS rigorously constructed by professional programmers at respected companies like Apple Corp. or Microsoft.
Well, that was the laugh we all needed in this dark hour. Thanks.
Re: (Score:2)
Not sure if stupid, trolling, or joking but you missed the sarcasm tag at the end.
Given that Microsoft have ...
* More then 50% [microsoft.com] of Azure runs Linux,
* Their own Linux Distribution CBL-Mariner [jreypo.io],
* First started contributing to Linux in 2009,
* Was the fifth largest contributor to the Linux 3.0 kernel having 4% of changes on July 2011,
... then what does that make Microsoft's employees? Respected? Not respected? /s
In case anyone is curious here are some stats for the last few versions of the Linux Kernel and who co
Re: (Score:2)
Re: (Score:2)
I read this same thing on USENET back in the 1990s, along the lines of "Linux is a ragtag OS written by hippies to take money away from real OS makers like Sun, SGI and Microsoft". Some things never change.
Re: (Score:2)
I honestly would have given anything for Sun and SGI to have come out on top.
Re: (Score:2)
The year 2000 called and wants their Troll back.
Re: (Score:1)
Why some lefty twit like you says it every other day; usually talking about oil though.
Re: (Score:1)
You are mistaken. When lefties speak of a "dirty pipeline", we're usually referring to what was left in your mom after our farm animals finished running dicks up her birth canal.
I'm glad she didn't try for child support after you came along, though. I bet the bill for your special ed costs was formidable.
Re: (Score:2)
That's not a polite way to talk about your siblings and yourself Miles...
Re: (Score:2)
If you were able to read English without help, you'd know I was referring to you. Maybe you'd better go get your mom and ask her to read the comment to you. She'll probably be able to fill in some juicy details. ;-)
Re: (Score:2)
The only person talking about oil is you.
Re: (Score:2)
I think the real question is, have they performed deep penetration testing on the dirty pipe?
Only affects kernel 5.8 and later (Score:3)
Re: (Score:2)
According to RedHat's page [redhat.com], RHEL 8 is affected.
Re: (Score:3)
My mistake. Apparently RHEL 8 is simultaneously affected and not affected.
Re: (Score:2)
> My mistake. Apparently RHEL 8 is simultaneously affected and not affected.
It may have this vulnerability but it's not affected by this exploit.
Re: (Score:2)
It's a Schrödinger's Exploit.
Re: (Score:2)
Re: (Score:2)
My mistake. Apparently RHEL 8 is simultaneously affected and not affected.
It's Schrodinger's vulnerability, so you won't know if it's vulnerable unless you look inside the CPU.
Re: (Score:1)
Re: (Score:2)
RedHat kernels only vaguely resemble the referenced kernel version. It backports a tremendous amount of code from newer versions, and thus the only way to know to the extent a new change relates to a redhat version number is for redhat to explain.
This is a huge pain as some security tools are oblivious to this and gives incorrect results on RedHat (and other distributions to, to some extent, which package backports/security fixes to some arbitrary version of various packages).
In this case, it seems they ha
Re: (Score:2)
That page says this: Note that PIPE_BUF_FLAG_CAN_MERGE flag attack vector is not available in Red Hat Enterprise Linux 8 and thus the currently known exploits leveraging this flag do not work. The underlying issue (lack of proper pipe_buffer structure initialization) is still present though and other novel ways leading to successful exploitation cannot be fully ruled out.
So, no, RHEL 8 is NOT affected by this particular vulnerability.
Re: (Score:2)
Reading the article, one critical bit of information omitted from the summary, and only appearing late in the article is that this bug was first introduced in kernel 5.8, so does not affect common installations like RHEL 8.
The article further states that the bug was there all along; it was kernel 5.8 that offered an easy way to exploit it.
Re: (Score:2)
It looks like this is a privilege escalation attack, allowing any account to obtain root privileges. So that means that malicious apps can gain root when run. I didn't see anything about attackers being able to "leap in" using something like a malicious web page or bluetooth transmitter, though. It makes me think people are safe so long as they aren't running sketchy apps.
Does anyone know if there is some way to use this to "push in" to a system if it isn't already running a trojan app?
And anyway, the ar
Re: (Score:2)
I think it's more dangerous than you are suggesting, but Debian issued an update to stable last night (or was it the night before) so I suspect it's been patched if your system is up to date. And for older installs the system isn't vulnerable to this attack, though the basis of the vulnerability is present.
OTOH, yes, it's a privilege escalation attack. But that means that any attack that's successful on any user can be escalated to a root attack. And this would include vulnerabilities in web browsers and
Re: (Score:2)
FUD? DUM? BUG? it's hard to say.
Re: (Score:2)
Isn't the point of Open Source was the idea that all eyes would be able to spot malicious code before it happens.
Re: (Score:2)
Re: (Score:2)
Isn't the point of Open Source was the idea that all eyes would be able to spot malicious code before it happens.
No, that's not the point, and it never was.
I'm surprised- you're normally pretty sensible about stuff but now I wonder if some douchebag has hacked your account.
LOLOL M$ BAD! (Score:2)
Re:LOLOL M$ BAD! (Score:5, Informative)
The guy dug around for months to find the bug, but after he found it, he submitted it to the kernel team (with a patch to fix!) 2 days later. This is a pretty good turnaround compared to commercial competitrors' vuln fix timelines.
The whole story here: https://dirtypipe.cm4all.com/ [cm4all.com]
Re: (Score:2)
Re: (Score:2)
He was not tempted by the dark side of the Force.
Re: (Score:2)
Re: (Score:2)
How long between disclosure and patch availability? I'm guessing a few days to a week here...Windows, there's been CVEs that lasted months after disclosure.
There is a write-up by Max Kellermann [cm4all.com], the initial reporter, about the bug and exploit which includes a timeline near the bottom.
Re: (Score:1)
Re: (Score:2)
Already been fixed last month.
Re: (Score:2)
Feb 21 2022 [kernel.org]
Last month technically, more like 2 weeks by my reckoning.
Re: (Score:2)
Privilege escalation bugs are common in every OS. The reason is because there is a massive attack surface (the OS syscall interface) that was mostly designed without security in mind. It is also why Windows has more security problems than Linux, because the interface exposed is much larger.
The end result is that you should not rely on local privileges as the primary defense in your security model. It can be helpful part of a defense in depth, but it should not be the primary defensive layer (especially sinc
Re: (Score:2)
Not found in OpenBSD. No need to jump over to MS just yet.
Re: (Score:1)
By 'most severe vulnerability in years' they still just mean a local priv escalation though.
Re: (Score:1)
only affects Linux with bleeding edge kernel... not a concern to most of us running stable long term patched stuff.
*yawn*
Re: (Score:1)
So it's not just me. I tried a bunch of test VM systems I have. Some of them with some 6 month old kernels. Nothing happens. It says it's successful. It wasn't.
Yes, *Yawn*. By the title you'd think - run over the women and children! This needs to be fixed NOW!
I told you! (Score:1)
You should have used Win~& v` f}*q [NO CARRIER]
Re: I told you! (Score:1)
Re: (Score:2)
Swap our your old Linux for a shiny new Linux and then you won't have this bug. It's kind of why enterprise customers pay Red Hat, SUSE, etc.
Re: (Score:2)
OTOH, I upgrade only when necessary and prefer LTS distro versions, so no kernel I'm using has the vulnerability. When upgrade time comes, I'll skip the vulnerable versions.
LTS releases are not immune to exploits (Score:2)
It should be present in Ubuntu 20.04.4 (Focal Fossa) LTS running kernel 5.13 (the flaw is in kernel 5.8 and later). When I checked, Canonical hasn't updated their page on the issue. [ubuntu.com]. I but I expect "needs triage" to move to "vulnerable" in short order.
While you wait for an exploit known for over 2 weeks to be fixed, you can feel comforted that a fix will eventually arrive thanks to the Long-Term Support guarantees.
Re: (Score:2)
I'm still on 18.04.6 (Bionic Beaver) because I didn't need to upgrade yet and it is still within support.
Focal Fossa ships with kernel 5.4 (not vulnerable).
Re: (Score:2)
If you update on Focal Fossa you get 5.13 because you'll be moved onto 20.04.4.
Ubuntu 20.04.0 and 20.04.1 LTS ships with v5.4
Ubuntu 20.04.2 LTS ships with v5.8
Ubuntu 20.04.3 LTS ships with v5.11
Ubuntu 20.04.4 LTS ships with v5.13
But remember that 20.04.0 has fallen out of LTS. and is now in ESM (Extended Support Maintenance).
You're pretty safe if you're on v5.4 though. It doesn't falls out of support until year 2025. After that you'll want to consider moving to v5.15 to take you out to yeare 2027.
Re: (Score:2)
Booting the 5.4 kernel remains an option though and the packages are still there. So nobody's stuck.
Details ... (Score:3)
Here are the details [cm4all.com] from the person who discovered the vulnerability.
Note that the vulnerable kernels are 5.16.x, 5.15.x and 5.10.x. So if you are running, for example, Ubuntu 20.04 LTS (like I am), you are not vulnerable since it has 5.4.0.
Re: (Score:2)
Good to know the LTS / long term support release was more stable as we would all hope. And thanks for the post, I can rest easy over here myself as I'm also on the 20.04 LTS version.
Well ... (Score:2)
"Pipe" refers to a pipeline, a Linux mechanism for one OS process to send data to another process.
A Unix mechanism to be sure, having pre-dated Linux by 20 years.
Re: (Score:2)
> A Unix mechanism to be sure, having pre-dated Linux by 20 years.
For those interested, I had the guy who came up with the idea present to our LUG in 2005. Ancient camcorder warning!
https://archive.org/details/Do... [archive.org]
Somewhat limited relevancy (Score:3)
First, it only applies to kernels 5.8 and newer. I found one in my collection in Gentoo. My Debian installations (oldstable) are not even affected. This will also make it irrelevant on many Android installations. Second, this is a _local_ privilege escalation. You know, the kind of thing that on Windows does not even get patched out of schedule anymore, because it is so easy to do there. Still a potential problem, but an attacker has to get in first.
So yes, this needs a patch. But any kind of grandiose headline is simply hyperbole.
Re: (Score:2)
5.8 was released in 2020, it's not a recent version and Ubuntu 20.04 LTS is using 5.15 (assumed vulnerable). Definitely a current issue. And it needs to be addressed because a local root escalation vulnerability like this means that any and all remote code execution compromises/exploits have to be considered remote root escalation vulnerabilities. Fortunately the Linux kernel team had it patched shortly after it was discovered (and before it was announced publicly) and the patches have likely rolled out to
Re: (Score:2)
Re: (Score:2)
My Ubuntu 20.04 is using 5.4. Also reported by another poster. At least get your facts right if you're going to get all preachy.
The preachy idiots do not care about facts. They care about acting all superior and telling everybidy how great and knowledgeable they are. If somebody behaves like this guy, it is a good indicator his information is faulty and his conclusions are worthless.
Re: (Score:2)
If you have a remote code execution vulnerability, you are already screwed. This does somewhere between nothing and very little to make matters worse. Also, I guess you are unfamiliar with long-term supported kernels. You mau want to correct that shortcoming by looking at www.kernel.org. Here is a hint: 2 of 6 kernels with long-term support are affected.
Re: (Score:2)
> My Debian installations (oldstable) are not even affected.
It appears to me that Debian Stable is unpatched after public disclosure, two weeks after the kernel update and one week after private disclosure to the distros. For a two line patch that's obvious on its face.
I hope I can't read...
Re: (Score:2)
> My Debian installations (oldstable) are not even affected.
It appears to me that Debian Stable is unpatched after public disclosure, two weeks after the kernel update and one week after private disclosure to the distros. For a two line patch that's obvious on its face.
I hope I can't read...
Debian is slow. A reason to run oldstable, which is not affected. Also, the Debian maintainers are not prone to hysterics, unlike some people here. Patching this is not that urgent. If you have a remote code execution vulnerability, you are already pretty much screwed. If you do not, you typically have no immediate problem.
Re: (Score:2)
I would think that completely destroying local security is a pretty big deal.
Isn't it still that the biggest threats are internal?
Re: (Score:2)
I would think that completely destroying local security is a pretty big deal.
Isn't it still that the biggest threats are internal?
No. The biggest threats are malware and remote exploits. Local exploits are something that you should patch in a timely manner on Linux (i.e. within a few weeks), but nothing to get hectic about. On windows, local exploits are so numerous that you basically assume if anybody gets any local user the machine is fully compromised.
Re: (Score:2)
To clarify: Yes, the some of the biggest threats from the side of enterprise risk-management are insider-threats. But there is no basically connections to local privilege elevation exploits. Insider threats are about people within an organization abusing rights they legitimately have or illegitimately but within that autorisation framework could obtain, e.g. by claiming to a clueless superior that they need these right to do their job. In almost all cases, these "insiders" are not IT experts and could not u
Re: (Score:1)
If you missed the next line just below vulnerable on https://security-tracker.debian.org/tracker/CVE-2022-0847 [debian.org] then yes, read a bit more carefully next time, please.
Re: (Score:2)
If you missed the next line just below vulnerable on https://security-tracker.debian.org/tracker/CVE-2022-0847 [debian.org] then yes, read a bit more carefully next time, please.
Well, to be fair, regular Bullseye is vulnerable. Bullseye-security is not. There are both good reasons for having the security repo in your sources lists and for not having it in there.
Hurts my soul... (Score:1)
10 months of debugging staring a couple octets? That's an almost inhuman amount of patience... I'm kinda glad it paid off for him - it's rare to find something like this!
Re: (Score:2)
The actual debugging only took me only one (long) day - plus an hour here and there but with no useful result. 10 months is just wallclock time, not user time ;-)
Glad I stayed with WIndows XP (Score:2)
Re: (Score:2)
Did you get CodeRed off your system yet?
Ooof - safety check removed (Score:2)
The real kicker is that the patch [kernel.org] re-enables safety flags that were removed> (line 544). [github.com]
Double-kicker is that Debian apparently hasn't pushed the patch in the week that they had so 'stable' is vulnerable [debian.org]. It's hard to believe, so please correct if I missed it.
Re: (Score:2)
If you go to the developer page [debian.org], you can see that it was uploaded to the security repository [debian.org].
The security repository is enabled when you install stable. Why the packages are not just merged directly into stable, I have no idea. Perhaps it has to do with mirroring?
Re: (Score:2)
Update: the package was updated yesterday and propagated overnight.
However, note that the new archive name is 'stable-security'. You might need to update your pins if you upgraded from Buster and you're not seeing the update now. I put in a pull request to add that to the release notes.
Eep, don't let people ssh in as root! (Score:2)
This is one of many reasons why you should never allow root to log in via ssh (the primary reason is for accountability: requiring sud
Re: (Score:2)
You're not reading that right. They aren't coming in as root through ssh. They are gaining root in an ssh session. Sudo can be used for this exploit.
See an example screenshot of the exploit in action here:
https://www.bleepingcomputer.c... [bleepingcomputer.com]
Re: (Score:2)
Re: (Score:2)
That's too fixated on the specific example given. In your configuration, the attacker would instead just overwrite /etc/sudoers to achieve the same end.
Root login being disabled in ssh would not work to mitigate this vulnerability.
Not surprising giving Linus and Greg KHs attitudes (Score:2)
Both of these individuals refuse to recognize security vulnerabilities as something distinct and insist on treating them as "just another bug".
Except they are not. Letting someone silently gain remote access to your system (in a worst case scenario) is much different from a device driver causing a crash or something.
Until the Linux maintainers prioritize security vulnerabilities as they should be, then it's hard to consider Linux secure. Honestly the Linux attitude is pretty much the same attitude Microsoft
patched in 3 ... 2 ... (Score:2)
Done.
Now to update existing installs.
Pipelines, Text (Score:1)
I see it again in this post where shell pipes are used to pass *text* between processes. This is not correct (at least on *nix), because every byte of output is passed unmolested to the connected process. This is behavior is quite useful fo stuff like this:
ssh remotehost.domain 'tar czf - *' | tar xzf -