Initial skeleton: README, CVE inventory, roadmap, ARCH, ethics + copy_fail_family module absorbed from DIRTYFAIL
This commit is contained in:
@@ -0,0 +1,47 @@
|
||||
# Dirty Pipe — CVE-2022-0847
|
||||
|
||||
> ⚪ **PLANNED** module. See [`../../ROADMAP.md`](../../ROADMAP.md)
|
||||
> Phase 2.
|
||||
|
||||
## Summary
|
||||
|
||||
Pipe-buffer `PIPE_BUF_FLAG_CAN_MERGE` was incorrectly inherited by
|
||||
`copy_page_to_iter_pipe()` and `push_pipe()` paths, allowing an
|
||||
unprivileged user to write into the page cache of any file readable
|
||||
by them.
|
||||
|
||||
## Affected kernels
|
||||
|
||||
- ≤ 5.16.11
|
||||
- ≤ 5.15.25 LTS
|
||||
- ≤ 5.10.102 LTS
|
||||
|
||||
## Upstream patch
|
||||
|
||||
`9d2231c5d74e13b2a0546fee6737ee4446017903` ("lib/iov_iter: initialize
|
||||
"flags" in new pipe_buffer")
|
||||
|
||||
## Why this module is here
|
||||
|
||||
Even in 2026, many production deployments still run vulnerable
|
||||
kernels (RHEL 7/8, older Ubuntu LTS, embedded). Bundling Dirty Pipe
|
||||
makes IAMROOT useful as a "historical sweep" tool on long-tail
|
||||
systems.
|
||||
|
||||
## Implementation plan
|
||||
|
||||
- C exploit ported from public PoCs (credit upstream authors in
|
||||
`NOTICE.md` when implemented)
|
||||
- `detect()`: kernel version check + `/proc/version` parse + test
|
||||
for fixed-version backports
|
||||
- `exploit()`: writes `iamroot::0:0:dirtypipe:/:/bin/bash` into
|
||||
`/etc/passwd`, then `su iamroot` — same shape as copy_fail's
|
||||
backdoor mode
|
||||
- Detection rules: auditd on splice() calls + pipe write patterns,
|
||||
filesystem audit on `/etc/passwd` modification by non-root
|
||||
|
||||
## Not started yet
|
||||
|
||||
Pick this up after Phase 1 (module-interface refactor of the
|
||||
copy_fail family) so this module can use the standard
|
||||
`iamroot_module` shape from the start.
|
||||
Reference in New Issue
Block a user