{"id":32,"date":"2022-03-07T21:57:00","date_gmt":"2022-03-07T21:57:00","guid":{"rendered":"http:\/\/angelus.linowebserver.org\/?p=32"},"modified":"2022-03-10T07:52:58","modified_gmt":"2022-03-10T07:52:58","slug":"the-dirty-pipe-vulnerability-cve2022-0847","status":"publish","type":"post","link":"https:\/\/linowebserver.org\/index.php\/2022\/03\/07\/the-dirty-pipe-vulnerability-cve2022-0847\/","title":{"rendered":"The Dirty Pipe Vulnerability CVE2022-0847"},"content":{"rendered":"\n<p>This is the story of CVE-2022-0847, a vulnerability in the Linux kernel since 5.8 which allows overwriting data in arbitrary read-only files. This leads to privilege escalation because unprivileged processes can inject code into root processes.<\/p>\n\n\n\n<p>It is similar to <a href=\"https:\/\/dirtycow.ninja\/\">CVE-2016-5195 \u201cDirty Cow\u201d<\/a> but is easier to exploit.<\/p>\n\n\n\n<p>The vulnerability <a href=\"https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/torvalds\/linux.git\/commit\/?id=9d2231c5d74e13b2a0546fee6737ee4446017903\">was fixed<\/a> in Linux 5.16.11, 5.15.25 and 5.10.102.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Check ur System: <a href=\"https:\/\/github.com\/LaLeLu68\/CVE-2022-0847-DirtyPipe-Exploit\/\">https:\/\/github.com\/LaLeLu68\/CVE-2022-0847-DirtyPipe-Exploit\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This is the story of CVE-2022-0847, a vulnerability in the Linux kernel since 5.8 which allows overwriting data in arbitrary read-only files. This leads to privilege escalation because unprivileged processes can inject code into root processes. It is similar to CVE-2016-5195 \u201cDirty Cow\u201d but is easier to exploit. The vulnerability was fixed in Linux 5.16.11, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,11,1],"tags":[30,32,31,29],"class_list":["post-32","post","type-post","status-publish","format-standard","hentry","category-cve","category-cybersecurity","category-uncategorized","tag-android-2","tag-cve-2","tag-kernel-2","tag-linux-2"],"_links":{"self":[{"href":"https:\/\/linowebserver.org\/index.php\/wp-json\/wp\/v2\/posts\/32","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/linowebserver.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/linowebserver.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/linowebserver.org\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/linowebserver.org\/index.php\/wp-json\/wp\/v2\/comments?post=32"}],"version-history":[{"count":1,"href":"https:\/\/linowebserver.org\/index.php\/wp-json\/wp\/v2\/posts\/32\/revisions"}],"predecessor-version":[{"id":33,"href":"https:\/\/linowebserver.org\/index.php\/wp-json\/wp\/v2\/posts\/32\/revisions\/33"}],"wp:attachment":[{"href":"https:\/\/linowebserver.org\/index.php\/wp-json\/wp\/v2\/media?parent=32"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/linowebserver.org\/index.php\/wp-json\/wp\/v2\/categories?post=32"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/linowebserver.org\/index.php\/wp-json\/wp\/v2\/tags?post=32"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}