{"id":21255,"date":"2022-03-09T20:20:02","date_gmt":"2022-03-09T20:20:02","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=21255"},"modified":"2022-03-09T20:20:02","modified_gmt":"2022-03-09T20:20:02","slug":"dirty-pipe-linux-privilege-escalation","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/dirty-pipe-linux-privilege-escalation\/","title":{"rendered":"Dirty Pipe Makes Linux Privilege Escalation Easy"},"content":{"rendered":"<p>A major Linux vulnerability dubbed &#8220;Dirty Pipe&#8221; could allow even the least privileged users to perform malicious actions.<\/p>\n<p>Researcher Max Kellermann of Ionos <a href=\"https:\/\/dirtypipe.cm4all.com\/\" target=\"_blank\" rel=\"noopener\">revealed<\/a> the new vulnerability earlier this week. The name is reminiscent of the \u201cDirty Cow\u201d vulnerability discovered in 2016 that allowed attackers to gain root access on any Android Phone regardless of the OS version, but Dirty Pipe could be even easier to exploit than its predecessor.<\/p>\n<p>Kellermann managed to exploit the Linux kernel bug, which allows any user, including the least privileged ones such as the &#8220;nobody&#8221; account, to perform malicious actions such as adding an SSH-key to the root user\u2019s account to access the server remotely with full privileges.<\/p>\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/products\/vulnerability-management-software\/\">Top Vulnerability Management Tools<\/a><\/p>\n<h2><strong>What is the Linux Nobody Account?<\/strong><\/h2>\n<p>Unix systems have traditionally had a dedicated user called <a href=\"https:\/\/wiki.ubuntu.com\/nobody\" target=\"_blank\" rel=\"noopener\">nobody<\/a> for specific operations with the NFS (Network File System).<\/p>\n<p>This pseudo-user is the least privileged account; it does not have any password and literally owns no files. Indeed, the PoLP (principle of least privilege), a fundamental <a href=\"https:\/\/www.esecurityplanet.com\/products\/zero-trust-security-solutions\/\">zero trust<\/a> security principle, dictates that a user be able to access only the information and resources they need.<\/p>\n<p>A vulnerability that allows the least privileged accounts to gain root privileges is a massive failure for such a prominent operating system as Linux.<\/p>\n<h2><strong>How Dirty Pipe Works<\/strong><\/h2>\n<p>The Common Vulnerabilities and Exposures (CVE) report for the vulnerability, <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2022-0847\" target=\"_blank\" rel=\"noopener\">CVE-2022-0847<\/a>, explains how attackers can take advantage of the bug. The term &#8220;Pipe&#8221; refers to internal mechanisms in the Linux kernel called &#8220;pipelines.&#8221;<\/p>\n<p>Kellermann found an uninitialized variable in the kernel code that could allow an attacker to overwrite any file&#8217;s content in the cache. Of course, there are some conditions, but the attacker does not need write permissions; read access is enough. The bug also affects system binaries and <a href=\"https:\/\/doc.ubuntu-fr.org\/btrfs\" target=\"_blank\" rel=\"noopener\">btrfs<\/a> files.<\/p>\n<p>Indeed, the kernel has permanent access (read and write) to the pages in cache. The kernel always runs with maximum privileges, so there is no verification at this level. It\u2019s the system at its core with hardware access.<\/p>\n<p>The kernel uses flags and pipes to pass data between processes. Kellermann made a proof of concept (image below) for the Linux kernel security team where he created a pipe and filled it with arbitrary data, which activated the PIPE_BUF_FLAG_CAN_MERGE flag and ultimately allowed overwriting of the cached file page.<\/p>\n<p>He noticed some limits, though, as the write could not cross a page boundary, but it was possible to alter files without write permissions, and the modifications could affect all users on the system.<\/p>\n<p>Dirty Pipe does not need the privileges of a legitimate process to write data in files and there&#8217;s no time constraint whatsoever.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-21258\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/03\/kellerman-poc-1024x564.png\" alt=\"kellermann poc\" width=\"696\" height=\"383\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/kellerman-poc-1024x564.png 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/kellerman-poc-300x165.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/kellerman-poc-768x423.png 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/kellerman-poc-1536x847.png 1536w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/kellerman-poc-150x83.png 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/kellerman-poc-696x384.png 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/kellerman-poc-1068x589.png 1068w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/kellerman-poc.png 1604w\" sizes=\"(max-width: 696px) 100vw, 696px\" \/><\/p>\n<p>See also: <a href=\"https:\/\/www.esecurityplanet.com\/products\/zero-trust-security-solutions\/\">10 Top Open Source Penetration Testing Tools<\/a><\/p>\n<h2><strong>What Attackers Could Do with Dirty Pipe<\/strong><\/h2>\n<p>Because it&#8217;s easier to exploit than Dirty Cow and it allows escalating privileges to the root level, Dirty Pipe is a high-severity flaw. Hackers would likely use it to perform additional tasks such as modifying common libraries and execute arbitrary code.<\/p>\n<p>The overwrite can either be temporary or permanent and the attacker can modify a system&#8217;s binaries that are supposed to be immutable. Any malicious application could elevate its capabilities to a high level without the user&#8217;s consent.<\/p>\n<p>This vulnerability is a perfect candidate for lateral movement, arbitrary code execution, and virus propagation.<\/p>\n<p>Such a low-level breach is particularly attractive for <a href=\"https:\/\/www.esecurityplanet.com\/threats\/zero-click-attacks-a-growing-threat\/\">zero-click attacks<\/a>. Almost a year went by between the first support ticket for a &#8220;simple&#8221; file corruption and the final public disclosure:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-21257\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/03\/timeline-1024x277.png\" alt=\"dirty pipe timeline\" width=\"696\" height=\"188\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/timeline-1024x277.png 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/timeline-300x81.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/timeline-768x208.png 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/timeline-1536x416.png 1536w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/timeline-150x41.png 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/timeline-696x188.png 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/timeline-1068x289.png 1068w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/timeline.png 1596w\" sizes=\"(max-width: 696px) 100vw, 696px\" \/><\/p>\n<h2><strong>How to Find and Fix the Dirty Pipe Vulnerability<\/strong><\/h2>\n<p>This critical bug has been <a href=\"https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/torvalds\/linux.git\/commit\/?id=9d2231c5d74e13b2a0546fee6737ee4446017903\" target=\"_blank\" rel=\"noopener\">patched<\/a> in Linux. The good news is that the bug was introduced in Linux 5.8, a relatively recent version at the time of writing, so hopefully not as many production servers will be affected.<\/p>\n<p>Users who run the 5.8 version must update quickly, and those who run a more recent version must be on <a href=\"https:\/\/lore.kernel.org\/stable\/1645618039140207@kroah.com\/\" target=\"_blank\" rel=\"noopener\">5.16.11<\/a> at least. There is no known mitigation for the flawed kernel code other than updating.<\/p>\n<p>Google patched Android at the end of February with the new kernel code, but Android devices, including the latest Pixel (the bug has been demonstrated on a Google Pixel 6) or Samsung (like Galaxy 2022), are affected. Because the Android ecosystem is highly fragmented, with various alternative systems based on the same Linux kernel, many devices could be running with the vulnerability.<\/p>\n<p>Android users are strongly encouraged to check their OS version under Settings &gt; About phone &gt; Android version.<\/p>\n<p>Read next: <a href=\"https:\/\/www.esecurityplanet.com\/products\/patch-management-software\/\">Best Patch Management Software<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6edaced91b-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6edaced91b\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6edaced91b\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6edaced91b\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6edaced91b\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6edaced91b\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6edaced91b\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>A major Linux vulnerability dubbed &#8220;Dirty Pipe&#8221; could allow even the least privileged users to perform malicious actions. Researcher Max Kellermann of Ionos revealed the new vulnerability earlier this week. The name is reminiscent of the \u201cDirty Cow\u201d vulnerability discovered in 2016 that allowed attackers to gain root access on any Android Phone regardless of [&hellip;]<\/p>\n","protected":false},"author":267,"featured_media":21258,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[15272],"b2b_audience":[33,35],"b2b_industry":[],"b2b_product":[382,418,401,31780],"class_list":["post-21255","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","tag-linux-security","b2b_audience-awareness-and-consideration","b2b_audience-implementation-and-support","b2b_product-application-security-vulnerability-management","b2b_product-linux-servers","b2b_product-operating-system-security","b2b_product-patch-management"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Dirty Pipe Makes Linux Privilege Escalation Easy | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"One of the biggest Linux security vulnerabilities in years can let any user escalate privileges. Here&#039;s how to fix Dirty Pipe.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/dirty-pipe-linux-privilege-escalation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Dirty Pipe Makes Linux Privilege Escalation Easy | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"One of the biggest Linux security vulnerabilities in years can let any user escalate privileges. Here&#039;s how to fix Dirty Pipe.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/dirty-pipe-linux-privilege-escalation\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-09T20:20:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/kellerman-poc.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1604\" \/>\n\t<meta property=\"og:image:height\" content=\"884\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Julien Maury\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Julien Maury\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/dirty-pipe-linux-privilege-escalation\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/dirty-pipe-linux-privilege-escalation\/\"},\"author\":{\"name\":\"Julien Maury\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a\"},\"headline\":\"Dirty Pipe Makes Linux Privilege Escalation Easy\",\"datePublished\":\"2022-03-09T20:20:02+00:00\",\"dateModified\":\"2022-03-09T20:20:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/dirty-pipe-linux-privilege-escalation\/\"},\"wordCount\":766,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/dirty-pipe-linux-privilege-escalation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/kellerman-poc.png\",\"keywords\":[\"Linux security\"],\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/dirty-pipe-linux-privilege-escalation\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/dirty-pipe-linux-privilege-escalation\/\",\"name\":\"Dirty Pipe Makes Linux Privilege Escalation Easy | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/dirty-pipe-linux-privilege-escalation\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/dirty-pipe-linux-privilege-escalation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/kellerman-poc.png\",\"datePublished\":\"2022-03-09T20:20:02+00:00\",\"dateModified\":\"2022-03-09T20:20:02+00:00\",\"description\":\"One of the biggest Linux security vulnerabilities in years can let any user escalate privileges. Here's how to fix Dirty Pipe.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/dirty-pipe-linux-privilege-escalation\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/dirty-pipe-linux-privilege-escalation\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/dirty-pipe-linux-privilege-escalation\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/kellerman-poc.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/kellerman-poc.png\",\"width\":1604,\"height\":884,\"caption\":\"kellermann poc\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/dirty-pipe-linux-privilege-escalation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Dirty Pipe Makes Linux Privilege Escalation Easy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a\",\"name\":\"Julien Maury\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp\",\"caption\":\"Julien Maury\"},\"description\":\"eSecurity Planet contributor Julien Maury writes about penetration testing, code security, open source security and more. He is a backend developer, a mentor and a technical writer who enjoys sharing his knowledge and learning new concepts.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jmaury\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Dirty Pipe Makes Linux Privilege Escalation Easy | eSecurity Planet","description":"One of the biggest Linux security vulnerabilities in years can let any user escalate privileges. Here's how to fix Dirty Pipe.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/dirty-pipe-linux-privilege-escalation\/","og_locale":"en_US","og_type":"article","og_title":"Dirty Pipe Makes Linux Privilege Escalation Easy | eSecurity Planet","og_description":"One of the biggest Linux security vulnerabilities in years can let any user escalate privileges. Here's how to fix Dirty Pipe.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/dirty-pipe-linux-privilege-escalation\/","og_site_name":"eSecurity Planet","article_published_time":"2022-03-09T20:20:02+00:00","og_image":[{"width":1604,"height":884,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/kellerman-poc.png","type":"image\/png"}],"author":"Julien Maury","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Julien Maury","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/dirty-pipe-linux-privilege-escalation\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/dirty-pipe-linux-privilege-escalation\/"},"author":{"name":"Julien Maury","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a"},"headline":"Dirty Pipe Makes Linux Privilege Escalation Easy","datePublished":"2022-03-09T20:20:02+00:00","dateModified":"2022-03-09T20:20:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/dirty-pipe-linux-privilege-escalation\/"},"wordCount":766,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/dirty-pipe-linux-privilege-escalation\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/kellerman-poc.png","keywords":["Linux security"],"articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/dirty-pipe-linux-privilege-escalation\/","url":"https:\/\/www.esecurityplanet.com\/threats\/dirty-pipe-linux-privilege-escalation\/","name":"Dirty Pipe Makes Linux Privilege Escalation Easy | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/dirty-pipe-linux-privilege-escalation\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/dirty-pipe-linux-privilege-escalation\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/kellerman-poc.png","datePublished":"2022-03-09T20:20:02+00:00","dateModified":"2022-03-09T20:20:02+00:00","description":"One of the biggest Linux security vulnerabilities in years can let any user escalate privileges. Here's how to fix Dirty Pipe.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/dirty-pipe-linux-privilege-escalation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/dirty-pipe-linux-privilege-escalation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/dirty-pipe-linux-privilege-escalation\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/kellerman-poc.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/kellerman-poc.png","width":1604,"height":884,"caption":"kellermann poc"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/dirty-pipe-linux-privilege-escalation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Dirty Pipe Makes Linux Privilege Escalation Easy"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a","name":"Julien Maury","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp","caption":"Julien Maury"},"description":"eSecurity Planet contributor Julien Maury writes about penetration testing, code security, open source security and more. He is a backend developer, a mentor and a technical writer who enjoys sharing his knowledge and learning new concepts.","url":"https:\/\/www.esecurityplanet.com\/author\/jmaury\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/21255"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/267"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=21255"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/21255\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/21258"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=21255"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=21255"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=21255"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=21255"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=21255"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=21255"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}