A flaw was found in cri-o, where containers were incorrectly started with non-empty default permissions. A vulnerability was found in Moby (Docker Engine) where containers started incorrectly with non-empty inheritable Linux process capabilities. This flaw allows an attacker with access to programs with inheritable file capabilities to elevate those capabilities to the permitted set when execve(2) runs.
References
Link | Resource |
---|---|
https://github.com/cri-o/cri-o/security/advisories/GHSA-4hj2-r2pm-3hc6 | Mitigation Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2066839 | Issue Tracking Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Information
Published : 2022-04-18 10:15
Updated : 2022-04-26 17:22
NVD link : CVE-2022-27652
Mitre link : CVE-2022-27652
JSON object : View
CWE
CWE-276
Incorrect Default Permissions
Products Affected
fedoraproject
- fedora
redhat
- openshift_container_platform
kubernetes
- cri-o
mobyproject
- moby