Dirty Pipe: what you need to know about this particularly dangerous security flaw for Android


A newly discovered exploit could allow malicious apps to take full control of Android 12 devices like the Galaxy S22 and Pixel 6.

Dirty Pipe: what you need to know about this particularly dangerous security flaw for Android

The strength of the Linux kernel, and what explains why it is a component found everywhere including the Android OS, is the fact that its source code is open. It is a partially free software that depends on hundreds of volunteers, but also on many companies.

But this advantage of being open source acts as a double-edged sword when it comes to unpatched security vulnerabilities and obviously the scenarios in which these flaws are exploitable. Although many players are working for the overall security of the Linux ecosystem (which also includes Android), new vulnerabilities and exploits continue to appear. The error this time seems quite serious, unfortunately.

A vulnerability in the Linux kernel called ” Dirty Blowjob puts mobile devices running Android 12 at risk. It also impacts smartphones such as the Pixel 6 series and potentially the Galaxy S22s as well. The issue affects devices on Android 12, although users are still advised to update their device software to the latest version, including security updates, which are released monthly.

What is Dirty Pipe?

The Linux vulnerability called “Dirty Pipe” (CVE-2022-0847) affects Linux kernels that are in a version higher than 5.8. This flaw allows obtaining root privileges on your device. In other words: it is the main access to your data and your device.

Hacked up a quick Dirty Pipe PoC that spawns a shell by hijacking (and restoring) the contents of a setuid binary. https://t.co/q8NtTlbgOZ pic.twitter.com/jxYUKYVCBo

— BLASTY (@bl4sty) March 7, 2022

This security flaw has been named the biggest security threat to Linux for years and can affect any device running a Linux kernel, such as Chromebooks and Android devices.

Keep in mind that Dirty Pipe is not an exploit, but rather a vulnerability. However, this vulnerability allows to access a root access. An attacker can theoretically do whatever they want next.

What fixes?

A fix was provided only three days after the exploit was reported, you can find it here.

The Chrome OS team also got the patch on March 7 and seems to have plans to roll it out in the Chrome OS 99 update.

As for Android, the flaw only affects versions of Android with newer Linux kernels and most Android devices are running an older version – except for the Samsung Galaxy S22 and Google Pixel 6. At the moment, there have been no patches deployed for this.

Another thing to note is that with the Steam Deck’s use of Linux, it’s possible that this exploit could affect Steam Deck users. As a reminder, the Steam Deck works on a forked Custom GNU/Linux Arch Linux distribution.

How do I protect my smartphone or Chromebook?

First of all, you are going to have to check if your device could potentially be at risk. We already know the list of Android devices that are at risk, but if you want to check this on your Chromebook, it’s simple.

Open a new tab and navigate to chrome://system. Then scroll down the list to ” uname“. If the number after “Linux localhost” is greater than 5.8, your device may be affected.

For the moment, while waiting for the patches, there is nothing to do, except… be very careful and follow our essential advice.

How to secure your smartphone, tablet or PC?  The ultimate guide!

Let’s face it, few of us have the right safety reflexes. However, our smartphones, our tablets and our PCs house a great deal of private data. So you are surely interested in following these…
Read more

Logo

If you have a PC with a GNU/Linux distribution, you only have to apply the patch.


To follow us, we invite you to download our Android and iOS application. You can read our articles, files, and watch our latest YouTube videos.





Source link -102