Allocate privileged credentials in the freed memory slot by triggering a privileged userspace process such as su, mount, or sshd
Operate as a privileged user
The novel exploitation method, according to the researchers, pushes the dirty pipe to the next level, making it more general as well as potent in a manner that could work on any version of the affected kernel.
Free an in-use unprivileged credential with the vulnerability
Anonymous