CVE-2022-0847: Dirty Pipe (Linux Kernel)

Score: 7.8
HIGH
Published: 2022-03-07Affected: Linux Kernel 5.8+CWE-281 β†—

What is Dirty Pipe?

A vulnerability in the Linux kernel that allows overwriting data in arbitrary read-only files. By exploiting the pipe buffer mechanism, unprivileged users can inject data into cached pages of files they can read, including SUID root binaries.

Impact & Exploitation

Enables local privilege escalation to root on any Linux system running kernel 5.8+. Similar impact to Dirty COW but easier to exploit. Affects millions of Linux servers and Android devices.

Precogs Logo

Precogs Research

This vulnerability intelligence report was analyzed and enriched by the Precogs AI Security Team. Our researchers continuously monitor emerging threats across AI code, LLM pipelines, and binary architectures to ensure accurate real-time remediation guidance.

Is Your System Still Exposed to Critical CVEs?

Vulnerabilities like CVE-2022-0847 Dirty Pipe (Linux Kernel) don’t just exist in source code β€” they persist in compiled binaries, containers, and embedded systems. Precogs AI detects vulnerable components across your entire stack β€” even when source code isn’t available.