vulnerability
Alma Linux: CVE-2022-27651: Moderate: container-tools:3.0 security and bug fix update (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:M/Au:S/C:P/I:P/A:N) | Apr 4, 2022 | May 4, 2022 | Mar 31, 2026 |
Severity
5
CVSS
(AV:N/AC:M/Au:S/C:P/I:P/A:N)
Published
Apr 4, 2022
Added
May 4, 2022
Modified
Mar 31, 2026
Description
A flaw was found in buildah where containers were incorrectly started with non-empty default permissions. A bug was found in Moby (Docker Engine) where containers were incorrectly started with non-empty inheritable Linux process capabilities, enabling an attacker with access to programs with inheritable file capabilities to elevate those capabilities to the permitted set when execve(2) runs. This has the potential to impact confidentiality and integrity.
Solutions
alma-upgrade-aardvark-dnsalma-upgrade-buildahalma-upgrade-buildah-testsalma-upgrade-cockpit-podmanalma-upgrade-conmonalma-upgrade-container-selinuxalma-upgrade-containernetworking-pluginsalma-upgrade-containers-commonalma-upgrade-critalma-upgrade-criualma-upgrade-criu-develalma-upgrade-criu-libsalma-upgrade-crunalma-upgrade-fuse-overlayfsalma-upgrade-libslirpalma-upgrade-libslirp-develalma-upgrade-netavarkalma-upgrade-oci-seccomp-bpf-hookalma-upgrade-podmanalma-upgrade-podman-catatonitalma-upgrade-podman-dockeralma-upgrade-podman-gvproxyalma-upgrade-podman-pluginsalma-upgrade-podman-remotealma-upgrade-podman-testsalma-upgrade-python-podman-apialma-upgrade-python3-criualma-upgrade-python3-podmanalma-upgrade-runcalma-upgrade-skopeoalma-upgrade-skopeo-testsalma-upgrade-slirp4netnsalma-upgrade-toolboxalma-upgrade-toolbox-testsalma-upgrade-udica
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.