Lucene search

K
ubuntucveUbuntu.comUB:CVE-2022-24769
HistoryMar 24, 2022 - 12:00 a.m.

CVE-2022-24769

2022-03-2400:00:00
ubuntu.com
ubuntu.com
14

5.9 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

4.6 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

38.9%

Moby is an open-source project created by Docker to enable and accelerate
software containerization. A bug was found in Moby (Docker Engine) prior to
version 20.10.14 where containers were incorrectly started with non-empty
inheritable Linux process capabilities, creating an atypical Linux
environment and enabling programs with inheritable file capabilities to
elevate those capabilities to the permitted set during execve(2).
Normally, when executable programs have specified permitted file
capabilities, otherwise unprivileged users and processes can execute those
programs and gain the specified file capabilities up to the bounding set.
Due to this bug, containers which included executable programs with
inheritable file capabilities allowed otherwise unprivileged users and
processes to additionally gain these inheritable file capabilities up to
the container’s bounding set. Containers which use Linux users and groups
to perform privilege separation inside the container are most directly
impacted. This bug did not affect the container security sandbox as the
inheritable set never contained more capabilities than were included in the
container’s bounding set. This bug has been fixed in Moby (Docker Engine)
20.10.14. Running containers should be stopped, deleted, and recreated for
the inheritable capabilities to be reset. This fix changes Moby (Docker
Engine) behavior such that containers are started with a more typical Linux
environment. As a workaround, the entry point of a container can be
modified to use a utility like capsh(1) to drop inheritable capabilities
prior to the primary process starting.

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchcontainerd< 1.5.9-0ubuntu1~18.04.2UNKNOWN
ubuntu20.04noarchcontainerd< 1.5.9-0ubuntu1~20.04.6UNKNOWN
ubuntu22.04noarchcontainerd< 1.5.9-0ubuntu3.1UNKNOWN
ubuntu22.10noarchcontainerd< 1.6.4-0ubuntu1UNKNOWN
ubuntu16.04noarchcontainerd< anyUNKNOWN

5.9 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

4.6 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

38.9%