Vulnerability Name: | CVE-2022-27651 (CCN-223423) | ||||||||||||||||||||||||||||||||||||||||
Assigned: | 2022-03-30 | ||||||||||||||||||||||||||||||||||||||||
Published: | 2022-03-30 | ||||||||||||||||||||||||||||||||||||||||
Updated: | 2022-09-03 | ||||||||||||||||||||||||||||||||||||||||
Summary: | A flaw was found in buildah where containers were incorrectly started with non-empty default permissions. A bug was found in Moby (Docker Engine) where containers were incorrectly started with non-empty inheritable Linux process capabilities, enabling an attacker with access to programs with inheritable file capabilities to elevate those capabilities to the permitted set when execve(2) runs. This has the potential to impact confidentiality and integrity. | ||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 6.8 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N) 5.9 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C)
7.7 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
4.2 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 4.9 Medium (CVSS v2 Vector: AV:N/AC:M/Au:S/C:P/I:P/A:N)
| ||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-276 | ||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2022-27651 Source: CCN Type: Red Hat Bugzilla - Bug 2066840 (CVE-2022-27651) - CVE-2022-27651 buildah: Default inheritable capabilities for linux container should be empty Source: MISC Type: Issue Tracking, Third Party Advisory https://bugzilla.redhat.com/show_bug.cgi?id=2066840 Source: XF Type: UNKNOWN buildah-cve202227651-priv-esc(223423) Source: CCN Type: buildah GIT Repository do not set the inheritable capabilities Source: MISC Type: Patch, Third Party Advisory https://github.com/containers/buildah/commit/e7e55c988c05dd74005184ceb64f097a0cfe645b Source: MISC Type: Third Party Advisory https://github.com/containers/buildah/security/advisories/GHSA-c3g4-w6cv-6v7h Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2022-1a15fe81f0 Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2022-224a93852c Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2022-e6388650ea | ||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration RedHat 1: Configuration RedHat 2: ![]() | ||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
BACK |