vulnerability
CentOS Linux: CVE-2022-27651: Moderate: container-tools:3.0 security and bug fix update (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:M/Au:S/C:P/I:P/A:N) | Apr 4, 2022 | Apr 27, 2022 | May 25, 2023 |
Severity
5
CVSS
(AV:N/AC:M/Au:S/C:P/I:P/A:N)
Published
Apr 4, 2022
Added
Apr 27, 2022
Modified
May 25, 2023
Description
A flaw was found in buildah where containers were incorrectly started with non-empty default permissions. A bug was found in Moby (Docker Engine) where containers were incorrectly started with non-empty inheritable Linux process capabilities, enabling an attacker with access to programs with inheritable file capabilities to elevate those capabilities to the permitted set when execve(2) runs. This has the potential to impact confidentiality and integrity.
Solutions
centos-upgrade-aardvark-dnscentos-upgrade-buildahcentos-upgrade-buildah-debuginfocentos-upgrade-buildah-debugsourcecentos-upgrade-buildah-testscentos-upgrade-buildah-tests-debuginfocentos-upgrade-cockpit-podmancentos-upgrade-conmoncentos-upgrade-conmon-debuginfocentos-upgrade-conmon-debugsourcecentos-upgrade-container-selinuxcentos-upgrade-containernetworking-pluginscentos-upgrade-containernetworking-plugins-debuginfocentos-upgrade-containernetworking-plugins-debugsourcecentos-upgrade-containers-commoncentos-upgrade-critcentos-upgrade-criucentos-upgrade-criu-debuginfocentos-upgrade-criu-debugsourcecentos-upgrade-criu-develcentos-upgrade-criu-libscentos-upgrade-criu-libs-debuginfocentos-upgrade-cruncentos-upgrade-crun-debuginfocentos-upgrade-crun-debugsourcecentos-upgrade-fuse-overlayfscentos-upgrade-fuse-overlayfs-debuginfocentos-upgrade-fuse-overlayfs-debugsourcecentos-upgrade-libslirpcentos-upgrade-libslirp-debuginfocentos-upgrade-libslirp-debugsourcecentos-upgrade-libslirp-develcentos-upgrade-netavarkcentos-upgrade-oci-seccomp-bpf-hookcentos-upgrade-oci-seccomp-bpf-hook-debuginfocentos-upgrade-oci-seccomp-bpf-hook-debugsourcecentos-upgrade-podmancentos-upgrade-podman-catatonitcentos-upgrade-podman-catatonit-debuginfocentos-upgrade-podman-debuginfocentos-upgrade-podman-debugsourcecentos-upgrade-podman-dockercentos-upgrade-podman-gvproxycentos-upgrade-podman-gvproxy-debuginfocentos-upgrade-podman-pluginscentos-upgrade-podman-plugins-debuginfocentos-upgrade-podman-remotecentos-upgrade-podman-remote-debuginfocentos-upgrade-podman-testscentos-upgrade-python-podman-apicentos-upgrade-python3-criucentos-upgrade-python3-podmancentos-upgrade-runccentos-upgrade-runc-debuginfocentos-upgrade-runc-debugsourcecentos-upgrade-skopeocentos-upgrade-skopeo-debuginfocentos-upgrade-skopeo-debugsourcecentos-upgrade-skopeo-testscentos-upgrade-slirp4netnscentos-upgrade-slirp4netns-debuginfocentos-upgrade-slirp4netns-debugsourcecentos-upgrade-toolboxcentos-upgrade-toolbox-debuginfocentos-upgrade-toolbox-debugsourcecentos-upgrade-toolbox-testscentos-upgrade-udica
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.