A flaw was found in Podman, where containers were started incorrectly with non-empty default permissions. A vulnerability was found in Moby (Docker Engine), where containers were started incorrectly with non-empty inheritable Linux process capabilities. This flaw allows an attacker with access to programs with inheritable file capabilities to elevate those capabilities to the permitted set when execve(2) runs.
During installation, installed file permissions are set to allow anyone to modify those files.
|Name||Vendor||Start Version||End Version|
|Red Hat Enterprise Linux 8||RedHat||container-tools:3.0-8050020220411083214.e34216c9||*|
|Red Hat Enterprise Linux 8||RedHat||container-tools:2.0-8050020220411114323.e34216c9||*|
|Red Hat Enterprise Linux 8||RedHat||container-tools:rhel8-8060020220401155929.2e213529||*|
|Red Hat Enterprise Linux 8.2 Extended Update Support||RedHat||container-tools:2.0-8020020220420173758.28c38760||*|
|Red Hat Enterprise Linux 8.4 Extended Update Support||RedHat||container-tools:2.0-8040020220411112506.c0c392d5||*|
|Red Hat Enterprise Linux 8.4 Extended Update Support||RedHat||container-tools:3.0-8040020220419093313.c0c392d5||*|