5.9 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
4.6 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
0.001 Low
EPSS
Percentile
38.9%
Moby is an open-source project created by Docker to enable and accelerate
software containerization. A bug was found in Moby (Docker Engine) prior to
version 20.10.14 where containers were incorrectly started with non-empty
inheritable Linux process capabilities, creating an atypical Linux
environment and enabling programs with inheritable file capabilities to
elevate those capabilities to the permitted set during execve(2)
.
Normally, when executable programs have specified permitted file
capabilities, otherwise unprivileged users and processes can execute those
programs and gain the specified file capabilities up to the bounding set.
Due to this bug, containers which included executable programs with
inheritable file capabilities allowed otherwise unprivileged users and
processes to additionally gain these inheritable file capabilities up to
the container’s bounding set. Containers which use Linux users and groups
to perform privilege separation inside the container are most directly
impacted. This bug did not affect the container security sandbox as the
inheritable set never contained more capabilities than were included in the
container’s bounding set. This bug has been fixed in Moby (Docker Engine)
20.10.14. Running containers should be stopped, deleted, and recreated for
the inheritable capabilities to be reset. This fix changes Moby (Docker
Engine) behavior such that containers are started with a more typical Linux
environment. As a workaround, the entry point of a container can be
modified to use a utility like capsh(1)
to drop inheritable capabilities
prior to the primary process starting.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | containerd | < 1.5.9-0ubuntu1~18.04.2 | UNKNOWN |
ubuntu | 20.04 | noarch | containerd | < 1.5.9-0ubuntu1~20.04.6 | UNKNOWN |
ubuntu | 22.04 | noarch | containerd | < 1.5.9-0ubuntu3.1 | UNKNOWN |
ubuntu | 22.10 | noarch | containerd | < 1.6.4-0ubuntu1 | UNKNOWN |
ubuntu | 16.04 | noarch | containerd | < any | UNKNOWN |
github.com/containerd/containerd/security/advisories/GHSA-c9cp-9c75-9v8c
github.com/moby/moby/releases/tag/v20.10.14
github.com/moby/moby/security/advisories/GHSA-2mm7-x5h6-5pvq
launchpad.net/bugs/cve/CVE-2022-24769
nvd.nist.gov/vuln/detail/CVE-2022-24769
security-tracker.debian.org/tracker/CVE-2022-24769
ubuntu.com/security/notices/USN-5776-1
www.cve.org/CVERecord?id=CVE-2022-24769
5.9 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
4.6 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
0.001 Low
EPSS
Percentile
38.9%