CVE-2022-0847: Dirty Pipe (Linux Kernel)

HIGH
7.8HIGH
Published: 2022-03-07Affected: Linux Kernel 5.8+CWE-281

What is Dirty Pipe?

A vulnerability in the Linux kernel that allows overwriting data in arbitrary read-only files. By exploiting the pipe buffer mechanism, unprivileged users can inject data into cached pages of files they can read, including SUID root binaries.

Impact & Exploitation

Enables local privilege escalation to root on any Linux system running kernel 5.8+. Similar impact to Dirty COW but easier to exploit. Affects millions of Linux servers and Android devices.

How Precogs AI Detects Dirty Pipe (Linux Kernel)

Precogs AI identifies Linux kernel version dependencies in compiled applications and container images, flagging systems vulnerable to Dirty Pipe privilege escalation.

Precogs Logo

Precogs Research

This vulnerability intelligence report was analyzed and enriched by the Precogs AI Security Team. Our researchers continuously monitor emerging threats across AI code, LLM pipelines, and binary architectures to ensure accurate real-time remediation guidance.