A flaw was found in crun where containers were incorrectly started with non-empty default permissions. A vulnerability was found in Moby (Docker Engine) where containers were started incorrectly with non-empty inheritable Linux process capabilities. This flaw allows an attacker with access to programs with inheritable file capabilities to elevate those capabilities to the permitted set when execve(2) runs.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=2066845 | Issue Tracking Third Party Advisory |
https://github.com/containers/crun/commit/1aeeed2e4fdeffb4875c0d0b439915894594c8c6 | Patch Third Party Advisory |
https://github.com/containers/crun/security/advisories/GHSA-wr4f-w546-m398 | Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYIGABCZ7ZHAG2XCOGITTQRJU2ASWMFA/ |
Configurations
History
07 Nov 2023, 03:45
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2022-04-04 20:15
Updated : 2024-02-28 19:09
NVD link : CVE-2022-27650
Mitre link : CVE-2022-27650
CVE.ORG link : CVE-2022-27650
JSON object : View
Products Affected
crun_project
- crun
redhat
- enterprise_linux
- openshift_container_platform
fedoraproject
- fedora
CWE
CWE-276
Incorrect Default Permissions