First published: Tue Mar 22 2022(Updated: )
A flaw was found in cri-o, where containers were incorrectly started with non-empty default permissions. A vulnerability was found in Moby (Docker Engine) where containers started incorrectly with non-empty inheritable Linux process capabilities. This flaw allows an attacker with access to programs with inheritable file capabilities to elevate those capabilities to the permitted set when execve(2) runs.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/cri-o | <0:1.23.2-8.rhaos4.10.git8ad5d25.el8 | 0:1.23.2-8.rhaos4.10.git8ad5d25.el8 |
redhat/cri-o | <0:1.22.5-7.rhaos4.9.git3dbcd3c.el7 | 0:1.22.5-7.rhaos4.9.git3dbcd3c.el7 |
Kubernetes CRI-O | ||
Fedoraproject Fedora | =35 | |
Mobyproject Moby | <20.10.14 | |
Redhat Openshift Container Platform | =3.11 | |
Redhat Openshift Container Platform | =4.0 |
The entry point of a container can be modified to use a utility like capsh(1) to drop inheritable capabilities prior to the primary process starting.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-27652 is a vulnerability found in cri-o, where containers are incorrectly started with non-empty default permissions.
The severity of CVE-2022-27652 is medium with a CVSSv3 score of 5.3.
CVE-2022-27652 allows an attacker with access to programs within a container to escalate privileges and potentially execute arbitrary code on the host.
To fix CVE-2022-27652 in cri-o, it is recommended to upgrade to version 1.24.0 or later.
The references for CVE-2022-27652 are: - [Bugzilla Red Hat - 2070107](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2070107) - [Bugzilla Red Hat - 2070112](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2070112) - [Bugzilla Red Hat - 2070104](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2070104)