A flaw was found in cri-o, where containers were incorrectly started with non-empty default permissions. A vulnerability was found in Moby (Docker Engine) where containers started incorrectly with non-empty inheritable Linux process capabilities. This flaw allows an attacker with access to programs with inheritable file capabilities to elevate those capabilities to the permitted set when execve(2) runs.
During installation, installed file permissions are set to allow anyone to modify those files.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=2066839 | third party advisory issue tracking |
https://github.com/cri-o/cri-o/security/advisories/GHSA-4hj2-r2pm-3hc6 | mitigation third party advisory |