vulnerability
CentOS Linux: CVE-2022-27649: Moderate: container-tools:3.0 security and bug fix update (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
6 | (AV:N/AC:M/Au:S/C:P/I:P/A:P) | Apr 4, 2022 | Apr 27, 2022 | May 25, 2023 |
Severity
6
CVSS
(AV:N/AC:M/Au:S/C:P/I:P/A:P)
Published
Apr 4, 2022
Added
Apr 27, 2022
Modified
May 25, 2023
Description
A flaw was found in Podman, where containers were started incorrectly with non-empty default permissions. A vulnerability was found in Moby (Docker Engine), where containers were started incorrectly with non-empty inheritable Linux process capabilities. This flaw allows an attacker with access to programs with inheritable file capabilities to elevate those capabilities to the permitted set when execve(2) runs.
Solution(s)
centos-upgrade-aardvark-dnscentos-upgrade-buildahcentos-upgrade-buildah-debuginfocentos-upgrade-buildah-debugsourcecentos-upgrade-buildah-testscentos-upgrade-buildah-tests-debuginfocentos-upgrade-cockpit-podmancentos-upgrade-conmoncentos-upgrade-conmon-debuginfocentos-upgrade-conmon-debugsourcecentos-upgrade-container-selinuxcentos-upgrade-containernetworking-pluginscentos-upgrade-containernetworking-plugins-debuginfocentos-upgrade-containernetworking-plugins-debugsourcecentos-upgrade-containers-commoncentos-upgrade-critcentos-upgrade-criucentos-upgrade-criu-debuginfocentos-upgrade-criu-debugsourcecentos-upgrade-criu-develcentos-upgrade-criu-libscentos-upgrade-criu-libs-debuginfocentos-upgrade-cruncentos-upgrade-crun-debuginfocentos-upgrade-crun-debugsourcecentos-upgrade-fuse-overlayfscentos-upgrade-fuse-overlayfs-debuginfocentos-upgrade-fuse-overlayfs-debugsourcecentos-upgrade-libslirpcentos-upgrade-libslirp-debuginfocentos-upgrade-libslirp-debugsourcecentos-upgrade-libslirp-develcentos-upgrade-netavarkcentos-upgrade-oci-seccomp-bpf-hookcentos-upgrade-oci-seccomp-bpf-hook-debuginfocentos-upgrade-oci-seccomp-bpf-hook-debugsourcecentos-upgrade-podmancentos-upgrade-podman-catatonitcentos-upgrade-podman-catatonit-debuginfocentos-upgrade-podman-debuginfocentos-upgrade-podman-debugsourcecentos-upgrade-podman-dockercentos-upgrade-podman-gvproxycentos-upgrade-podman-gvproxy-debuginfocentos-upgrade-podman-pluginscentos-upgrade-podman-plugins-debuginfocentos-upgrade-podman-remotecentos-upgrade-podman-remote-debuginfocentos-upgrade-podman-testscentos-upgrade-python-podman-apicentos-upgrade-python3-criucentos-upgrade-python3-podmancentos-upgrade-runccentos-upgrade-runc-debuginfocentos-upgrade-runc-debugsourcecentos-upgrade-skopeocentos-upgrade-skopeo-debuginfocentos-upgrade-skopeo-debugsourcecentos-upgrade-skopeo-testscentos-upgrade-slirp4netnscentos-upgrade-slirp4netns-debuginfocentos-upgrade-slirp4netns-debugsourcecentos-upgrade-toolboxcentos-upgrade-toolbox-debuginfocentos-upgrade-toolbox-debugsourcecentos-upgrade-toolbox-testscentos-upgrade-udica
References

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.