Hide Forgot
A bug was found in Moby (Docker Engine) where containers were incorrectly started with non-empty inheritable Linux process capabilities, creating an atypical Linux environment and enabling programs with inheritable file capabilities to elevate those capabilities to the permitted set during execve(2). Normally, when executable programs have specified permitted file capabilities, otherwise unprivileged users and processes can execute those programs and gain the specified file capabilities up to the bounding set. Due to this bug, containers which included executable programs with inheritable file capabilities allowed otherwise unprivileged users and processes to additionally gain these inheritable file capabilities up to the container's bounding set. Containers which use Linux users and groups to perform privilege separation inside the container are most directly impacted.
Created podman tracking bugs for this issue: Affects: fedora-all [bug 2070102]
Reference to podman project: https://github.com/containers/podman/commit/aafa80918a245edcbdaceb1191d749570f1872d0
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2022:1407 https://access.redhat.com/errata/RHSA-2022:1407
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:1565 https://access.redhat.com/errata/RHSA-2022:1565
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:1566 https://access.redhat.com/errata/RHSA-2022:1566
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:1762 https://access.redhat.com/errata/RHSA-2022:1762
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Extended Update Support Via RHSA-2022:4651 https://access.redhat.com/errata/RHSA-2022:4651
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2022:4816 https://access.redhat.com/errata/RHSA-2022:4816
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-27649