A flaw was found in cri-o, where containers were incorrectly started with non-empty default permissions. A vulnerability was found in Moby (Docker Engine) where containers started incorrectly with non-empty inheritable Linux process capabilities. This flaw allows an attacker with access to programs with inheritable file capabilities to elevate those capabilities to the permitted set when execve(2) runs.
References
| Link | Resource |
|---|---|
| https://bugzilla.redhat.com/show_bug.cgi?id=2066839 | Issue Tracking Third Party Advisory |
| https://github.com/cri-o/cri-o/security/advisories/GHSA-4hj2-r2pm-3hc6 | Mitigation Third Party Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=2066839 | Issue Tracking Third Party Advisory |
| https://github.com/cri-o/cri-o/security/advisories/GHSA-4hj2-r2pm-3hc6 | Mitigation Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
No history.
Information
Published : 2022-04-18 17:15
Updated : 2024-11-21 06:56
NVD link : CVE-2022-27652
Mitre link : CVE-2022-27652
CVE.ORG link : CVE-2022-27652
JSON object : View
Products Affected
mobyproject
- moby
kubernetes
- cri-o
fedoraproject
- fedora
redhat
- openshift_container_platform
CWE
CWE-276
Incorrect Default Permissions
