A flaw was found in crun where containers were incorrectly started with non-empty default permissions. A vulnerability was found in Moby (Docker Engine) where containers were started incorrectly with non-empty inheritable Linux process capabilities. This flaw allows an attacker with access to programs with inheritable file capabilities to elevate those capabilities to the permitted set when execve(2) runs.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=2066845 | Issue Tracking Third Party Advisory |
https://github.com/containers/crun/commit/1aeeed2e4fdeffb4875c0d0b439915894594c8c6 | Patch Third Party Advisory |
https://github.com/containers/crun/security/advisories/GHSA-wr4f-w546-m398 | Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HYIGABCZ7ZHAG2XCOGITTQRJU2ASWMFA/ | Mailing List Release Notes Third Party Advisory |
Information
Published : 2022-04-04 13:15
Updated : 2022-11-28 09:51
NVD link : CVE-2022-27650
Mitre link : CVE-2022-27650
JSON object : View
CWE
CWE-276
Incorrect Default Permissions
Products Affected
redhat
- enterprise_linux
- openshift_container_platform
crun_project
- crun
fedoraproject
- fedora