CVE-2022-0847
Expert Analysis
Professional remediation guidance
Get tailored security recommendations from our analyst team for CVE-2022-0847. We'll provide specific mitigation strategies based on your environment and risk profile.
CVSS Score
V3.1EPSS Score
v2025.03.14There is a 84.7% chance that this vulnerability will be exploited in the wild within the next 30 days.
Attack Vector Metrics
Impact Metrics
Description
A flaw was found in the way the "flags" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.
Available Exploits
Related News
Known Exploited Vulnerability
This vulnerability is actively being exploited in the wild
Remediation Status
Due Date
Added to KEV
Required Action
Apply updates per vendor instructions.
Affected Product
Ransomware Risk
Social Media Intelligence
Real-time discussions and threat intelligence from social platforms
**🚨 DIRTY PIPE: The Linux Vulnerability Still Causing Chaos** **CVE-2022-0847 - “Dirty Pipe”** **THE VULNERABILITY:** Allows overwriting data in arbitrary read-only files in Linux kernel since version 5.8 **SEVERITY LEVEL:** HIGH - CVSS Score: 7.8 **WHAT ATTACKERS CAN DO:** - Modify/overwrite arbitrary read-only files like /etc/passwd - Obtain an elevated …