![Jan Schaumann (@jschauma@mstdn.social) on Twitter: "Ugh. Overwrite any file regardless of permissions, *including immutable or read-only mounts* by splicing data into a pipe. "Dirty Pipe" PoC and detailed write up of CVE- 2022-0847 Jan Schaumann (@jschauma@mstdn.social) on Twitter: "Ugh. Overwrite any file regardless of permissions, *including immutable or read-only mounts* by splicing data into a pipe. "Dirty Pipe" PoC and detailed write up of CVE- 2022-0847](https://pbs.twimg.com/media/FNRGvkRXwAgXUYo.png:large)
Jan Schaumann (@jschauma@mstdn.social) on Twitter: "Ugh. Overwrite any file regardless of permissions, *including immutable or read-only mounts* by splicing data into a pipe. "Dirty Pipe" PoC and detailed write up of CVE- 2022-0847
GitHub - AlexisAhmed/CVE-2022-0847-DirtyPipe-Exploits: A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.
![Linux Kernel Privilege Escalation Vulnerability (CVE-2022-0847) Alert - NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks. Linux Kernel Privilege Escalation Vulnerability (CVE-2022-0847) Alert - NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks.](https://nsfocusglobal.com/wp-content/uploads/2022/03/0309a.jpg)
Linux Kernel Privilege Escalation Vulnerability (CVE-2022-0847) Alert - NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks.
![Phith0n on Twitter: "Talk about 2 POC of DirtyPipe(CVE-2022-0847) Original POC: https://t.co/QBHYU6i33N is able to overwrite arbitrary file with offset like ./exp /etc/passwd 5 ":0:0:rootx" Improved POC: https://t.co/qurmceoXI8 is able to overwrite Phith0n on Twitter: "Talk about 2 POC of DirtyPipe(CVE-2022-0847) Original POC: https://t.co/QBHYU6i33N is able to overwrite arbitrary file with offset like ./exp /etc/passwd 5 ":0:0:rootx" Improved POC: https://t.co/qurmceoXI8 is able to overwrite](https://pbs.twimg.com/media/FNRGwbHVIAEg38u.png)