CVE-2022-27650

Source
https://cve.org/CVERecord?id=CVE-2022-27650
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-27650.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-27650
Aliases
  • GHSA-wr4f-w546-m398
Downstream
Related
Published
2022-04-04T19:45:45Z
Modified
2026-05-01T11:16:09.046770Z
Summary
[none]
Details

A flaw was found in crun where containers were incorrectly started with non-empty default permissions. A vulnerability was found in Moby (Docker Engine) where containers were started incorrectly with non-empty inheritable Linux process capabilities. This flaw allows an attacker with access to programs with inheritable file capabilities to elevate those capabilities to the permitted set when execve(2) runs.

Database specific
{
    "cwe_ids": [
        "CWE-276"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/27xxx/CVE-2022-27650.json",
    "cna_assigner": "redhat",
    "unresolved_ranges": [
        {
            "extracted_events": [
                {
                    "last_affected": "Affects crun v1.4.3 and prior, Fixed in \u2013 v1.4.4"
                }
            ],
            "source": "AFFECTED_FIELD"
        }
    ]
}
References

Affected packages

Git / github.com/containers/crun

Affected ranges

Type
GIT
Repo
https://github.com/containers/crun
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed
Database specific
{
    "cpe": "cpe:2.3:a:crun_project:crun:*:*:*:*:*:*:*:*",
    "extracted_events": [
        {
            "introduced": "0"
        },
        {
            "fixed": "1.4.4"
        }
    ],
    "source": [
        "CPE_FIELD",
        "REFERENCES"
    ]
}

Affected versions

0.*
0.10
0.10.1
0.10.2
0.10.3
0.10.4
0.10.5
0.10.6
0.12.1
0.4
0.5
0.6
0.7
0.8
0.9
0.9.1
1.*
1.0
v0.*
v0.2
v0.3

Database specific

vanir_signatures_modified
"2026-05-01T11:16:09Z"
vanir_signatures
[
    {
        "signature_version": "v1",
        "digest": {
            "function_hash": "326576470114948350835089168532588116583",
            "length": 2525.0
        },
        "id": "CVE-2022-27650-1369fec2",
        "signature_type": "Function",
        "target": {
            "file": "src/exec.c",
            "function": "crun_command_exec"
        },
        "source": "https://github.com/containers/crun/commit/1aeeed2e4fdeffb4875c0d0b439915894594c8c6",
        "deprecated": false
    },
    {
        "signature_version": "v1",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "191965596629947503200297707270879748438",
                "277783579743923417092443488377794187094",
                "59215860372849921584264298802818030309",
                "24826462537997860227952450397939357386",
                "223256907618760933842021811521439593391"
            ]
        },
        "id": "CVE-2022-27650-4606fc3a",
        "signature_type": "Line",
        "target": {
            "file": "src/exec.c"
        },
        "source": "https://github.com/containers/crun/commit/1aeeed2e4fdeffb4875c0d0b439915894594c8c6",
        "deprecated": false
    }
]
source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-27650.json"