https://cve.circl.lu/comments/feedMost recent comment.2025-09-22T07:41:35.025634+00:00Vulnerability-Lookupinfo@circl.lupython-feedgenContains only the most 10 recent comments.https://cve.circl.lu/comment/b84ba3bb-d5e2-4d78-88a6-0c4cbcbe9dbbDirty Pipe (CVE-2022-0847)2025-09-22T07:41:35.033006+00:00Cédric Bonhommehttp://cve.circl.lu/user/cedricDirty Pipe (CVE-2022-0847) is a vulnerability in the Linux kernel which allows an attacker to overwrite files that they have read-only access to. At the time of writing, this vulnerability is 3 years old, but overwriting nearly any file without appropriate permissions using only a few system calls stood out to me. Additionally, since the exploit abuses normal kernel behavior, detecting the exploit is not an easy task.
CVE-2022-0847 affects the following Linux kernel versions, according to NIST’s NVD:
* From 5.8 up to (but not including) 5.10.102
* From 5.15 up to (but not including) 5.15.25
* From 5.16 up to (but not including) 5.16.11
The vulnerability can be weaponized to escalate privileges on older Linux systems due to the arbitrary file overwrite. It abuses a flaw in functions in the Linux kernel that allowed pipes to contain stale flag values. Because of this, a pipe could be used to write to pages in the kernel page cache, which in turn could write arbitrarily to files the user does not have write permission for.2025-07-11T20:52:01.806482+00:00