A flaw was found in crun where containers were incorrectly started with non-empty default permissions. A vulnerability was found in Moby (Docker Engine) where containers were started incorrectly with non-empty inheritable Linux process capabilities. This flaw allows an attacker with access to programs with inheritable file capabilities to elevate those capabilities to the permitted set when execve(2) runs.
References
| Link | Resource |
|---|---|
| https://bugzilla.redhat.com/show_bug.cgi?id=2066845 | Issue Tracking Third Party Advisory |
| https://github.com/containers/crun/commit/1aeeed2e4fdeffb4875c0d0b439915894594c8c6 | Patch Third Party Advisory |
| https://github.com/containers/crun/security/advisories/GHSA-wr4f-w546-m398 | Third Party Advisory |
| https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HYIGABCZ7ZHAG2XCOGITTQRJU2ASWMFA/ | Mailing List Release Notes Third Party Advisory |
Information
Published : 2022-04-04 13:15
Updated : 2022-11-28 09:51
NVD link : CVE-2022-27650
Mitre link : CVE-2022-27650
JSON object : View
CWE
CWE-276
Incorrect Default Permissions
Products Affected
redhat
- enterprise_linux
- openshift_container_platform
crun_project
- crun
fedoraproject
- fedora


