skip to Main Content
This website use cookies which are necessary to its functioning and required to achieve the purposes illustrated in the privacy policy. To learn more or withdraw consent please click on Learn More. By continued use of this website you are consenting to our use of cookies.


Dirty Pipe

Subscribe to our Security Newsletter

A new privilege escalation vulnerability in the Linux kernel (CVE-2022-0847, dubbed “Dirty Pipe”) can be easily exploited by local unprivileged users on unpatched systems to run as root. This ubiquitous vulnerability was disclosed along with a POC exploit, and others are now available.

This brief Security Flash video with Casey Ellis (Founder, Chairman, and CTO of Bugcrowd) and Adam Foster (Application Security Engineer at Bugcrowd) dives deep on the subject, answering questions such as:

  • What happened?
  • How serious is the flaw and how is it exploited?
  • What should you do to stay secure?
  • How can Bugcrowd help?
  • What additional resources are available?
  • Check out Security Flash to learn more; we hope you find it helpful and informative.
Back To Top