Giuseppe Scrivano

4 exploits Active since Apr 2022
CVE-2022-27649 WRITEUP HIGH WRITEUP
Podman < 4.0.3 - Incorrect Default Permissions
A flaw was found in Podman, where containers were started incorrectly with non-empty default permissions. A vulnerability was found in Moby (Docker Engine), where containers were started incorrectly with non-empty inheritable Linux process capabilities. This flaw allows an attacker with access to programs with inheritable file capabilities to elevate those capabilities to the permitted set when execve(2) runs.
CVSS 7.5
CVE-2022-27650 WRITEUP HIGH WRITEUP
Crun < 1.4.4 - Incorrect Default Permissions
A flaw was found in crun where containers were incorrectly started with non-empty default permissions. A vulnerability was found in Moby (Docker Engine) where containers were started incorrectly with non-empty inheritable Linux process capabilities. This flaw allows an attacker with access to programs with inheritable file capabilities to elevate those capabilities to the permitted set when execve(2) runs.
CVSS 7.5
CVE-2022-27651 WRITEUP MEDIUM WRITEUP
Buildah < 1.25.0 - Incorrect Default Permissions
A flaw was found in buildah where containers were incorrectly started with non-empty default permissions. A bug was found in Moby (Docker Engine) where containers were incorrectly started with non-empty inheritable Linux process capabilities, enabling an attacker with access to programs with inheritable file capabilities to elevate those capabilities to the permitted set when execve(2) runs. This has the potential to impact confidentiality and integrity.
CVSS 6.8
CVE-2025-24965 WRITEUP HIGH WRITEUP
crun <1.20 - Privilege Escalation
crun is an open source OCI Container Runtime fully written in C. In affected versions A malicious container image could trick the krun handler into escaping the root filesystem, allowing file creation or modification on the host. No special permissions are needed, only the ability for the current user to write to the target file. The problem is fixed in crun 1.20 and all users are advised to upgrade. There are no known workarounds for this vulnerability.