CVE-2022-27650

Source
https://cve.org/CVERecord?id=CVE-2022-27650
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-27650.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-27650
Downstream
Related
Published
2022-04-04T20:15:10.940Z
Modified
2026-02-08T04:11:24.357565Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A flaw was found in crun where containers were incorrectly started with non-empty default permissions. A vulnerability was found in Moby (Docker Engine) where containers were started incorrectly with non-empty inheritable Linux process capabilities. This flaw allows an attacker with access to programs with inheritable file capabilities to elevate those capabilities to the permitted set when execve(2) runs.

References

Affected packages

Git / github.com/containers/crun

Affected ranges

Type
GIT
Repo
https://github.com/containers/crun
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*
0.10
0.10.1
0.10.2
0.10.3
0.10.4
0.10.5
0.10.6
0.11
0.12
0.12.1
0.12.2
0.12.2.1
0.13
0.14
0.14.1
0.15
0.15.1
0.16
0.17
0.18
0.19
0.19.1
0.20
0.20.1
0.21
0.4
0.5
0.6
0.7
0.8
0.9
0.9.1
1.*
1.0
1.1
1.2
1.3
1.4
1.4.1
1.4.2
v0.*
v0.2
v0.3

Database specific

vanir_signatures
[
    {
        "deprecated": false,
        "source": "https://github.com/containers/crun/commit/1aeeed2e4fdeffb4875c0d0b439915894594c8c6",
        "id": "CVE-2022-27650-1369fec2",
        "target": {
            "file": "src/exec.c",
            "function": "crun_command_exec"
        },
        "digest": {
            "function_hash": "326576470114948350835089168532588116583",
            "length": 2525.0
        },
        "signature_type": "Function",
        "signature_version": "v1"
    },
    {
        "deprecated": false,
        "source": "https://github.com/containers/crun/commit/1aeeed2e4fdeffb4875c0d0b439915894594c8c6",
        "id": "CVE-2022-27650-4606fc3a",
        "target": {
            "file": "src/exec.c"
        },
        "digest": {
            "line_hashes": [
                "191965596629947503200297707270879748438",
                "277783579743923417092443488377794187094",
                "59215860372849921584264298802818030309",
                "24826462537997860227952450397939357386",
                "223256907618760933842021811521439593391"
            ],
            "threshold": 0.9
        },
        "signature_type": "Line",
        "signature_version": "v1"
    }
]
source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-27650.json"

Git / github.com/haproxy/haproxy

Affected ranges

Type
GIT
Repo
https://github.com/haproxy/haproxy
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v1.*
v1.0.0
v1.0.1
v1.0.2
v1.1.0
v1.1.1
v1.1.10
v1.1.11
v1.1.12
v1.1.13
v1.1.14
v1.1.15
v1.1.16
v1.1.17
v1.1.18
v1.1.19
v1.1.2
v1.1.20
v1.1.21
v1.1.22
v1.1.23
v1.1.24
v1.1.25
v1.1.26
v1.1.27
v1.1.3
v1.1.4
v1.1.5
v1.1.6
v1.1.7
v1.1.8
v1.1.9
v1.2.0
v1.2.1
v1.2.1-pre1
v1.2.1-pre2
v1.2.1-pre3
v1.2.10
v1.2.10.1
v1.2.11
v1.2.11.1
v1.2.12
v1.2.13
v1.2.13.1
v1.2.14
v1.2.2
v1.2.3
v1.2.4
v1.2.5
v1.2.5-pre1
v1.2.5-pre2
v1.2.5-pre3
v1.2.5-pre4
v1.2.5.1
v1.2.5.2
v1.2.6
v1.2.6-pre4
v1.2.6-pre5
v1.2.7
v1.2.7.1
v1.2.7rc
v1.2.8
v1.2.9
v1.3.0
v1.3.1
v1.3.10
v1.3.10.1
v1.3.10.2
v1.3.11
v1.3.11.1
v1.3.11.2
v1.3.11.3
v1.3.11.4
v1.3.12
v1.3.13
v1.3.14
v1.3.15
v1.3.16
v1.3.16-rc1
v1.3.16-rc2
v1.3.17
v1.3.18
v1.3.2
v1.3.3
v1.3.4
v1.3.5
v1.3.6
v1.3.6.1
v1.3.7
v1.3.8
v1.3.8.1
v1.3.8.2
v1.3.9
v1.4-dev0
v1.4-dev1
v1.4-dev2
v1.4-dev3
v1.4-dev4
v1.4-dev5
v1.4-dev6
v1.4-dev7
v1.4-dev8
v1.4-rc1
v1.4.0
v1.4.1
v1.4.2
v1.4.3

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-27650.json"