vulnerability
Red Hat: CVE-2022-27649: Default inheritable capabilities for linux container should be empty (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:N/AC:M/Au:S/C:P/I:P/A:P) | Apr 4, 2022 | Apr 20, 2022 | Aug 11, 2025 |
Severity
6
CVSS
(AV:N/AC:M/Au:S/C:P/I:P/A:P)
Published
Apr 4, 2022
Added
Apr 20, 2022
Modified
Aug 11, 2025
Description
A flaw was found in Podman, where containers were started incorrectly with non-empty default permissions. A vulnerability was found in Moby (Docker Engine), where containers were started incorrectly with non-empty inheritable Linux process capabilities. This flaw allows an attacker with access to programs with inheritable file capabilities to elevate those capabilities to the permitted set when execve(2) runs.
Solutions
redhat-upgrade-aardvark-dnsredhat-upgrade-buildahredhat-upgrade-buildah-debuginforedhat-upgrade-buildah-debugsourceredhat-upgrade-buildah-testsredhat-upgrade-buildah-tests-debuginforedhat-upgrade-cockpit-podmanredhat-upgrade-conmonredhat-upgrade-conmon-debuginforedhat-upgrade-conmon-debugsourceredhat-upgrade-container-selinuxredhat-upgrade-containernetworking-pluginsredhat-upgrade-containernetworking-plugins-debuginforedhat-upgrade-containernetworking-plugins-debugsourceredhat-upgrade-containers-commonredhat-upgrade-critredhat-upgrade-criuredhat-upgrade-criu-debuginforedhat-upgrade-criu-debugsourceredhat-upgrade-criu-develredhat-upgrade-criu-libsredhat-upgrade-criu-libs-debuginforedhat-upgrade-crunredhat-upgrade-crun-debuginforedhat-upgrade-crun-debugsourceredhat-upgrade-fuse-overlayfsredhat-upgrade-fuse-overlayfs-debuginforedhat-upgrade-fuse-overlayfs-debugsourceredhat-upgrade-libslirpredhat-upgrade-libslirp-debuginforedhat-upgrade-libslirp-debugsourceredhat-upgrade-libslirp-develredhat-upgrade-netavarkredhat-upgrade-oci-seccomp-bpf-hookredhat-upgrade-oci-seccomp-bpf-hook-debuginforedhat-upgrade-oci-seccomp-bpf-hook-debugsourceredhat-upgrade-podmanredhat-upgrade-podman-catatonitredhat-upgrade-podman-catatonit-debuginforedhat-upgrade-podman-debuginforedhat-upgrade-podman-debugsourceredhat-upgrade-podman-dockerredhat-upgrade-podman-gvproxyredhat-upgrade-podman-gvproxy-debuginforedhat-upgrade-podman-pluginsredhat-upgrade-podman-plugins-debuginforedhat-upgrade-podman-remoteredhat-upgrade-podman-remote-debuginforedhat-upgrade-podman-testsredhat-upgrade-python-podman-apiredhat-upgrade-python3-criuredhat-upgrade-python3-podmanredhat-upgrade-runcredhat-upgrade-runc-debuginforedhat-upgrade-runc-debugsourceredhat-upgrade-skopeoredhat-upgrade-skopeo-debuginforedhat-upgrade-skopeo-debugsourceredhat-upgrade-skopeo-testsredhat-upgrade-slirp4netnsredhat-upgrade-slirp4netns-debuginforedhat-upgrade-slirp4netns-debugsourceredhat-upgrade-toolboxredhat-upgrade-toolbox-debuginforedhat-upgrade-toolbox-debugsourceredhat-upgrade-toolbox-testsredhat-upgrade-udica
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.