{"id":"UBUNTU-CVE-2022-27649","details":"A flaw was found in Podman, where containers were started incorrectly with non-empty default permissions. A vulnerability was found in Moby (Docker Engine), where containers were started incorrectly with non-empty inheritable Linux process capabilities. This flaw allows an attacker with access to programs with inheritable file capabilities to elevate those capabilities to the permitted set when execve(2) runs.","modified":"2026-03-25T18:37:58.480128Z","published":"2022-04-04T20:15:00Z","upstream":["CVE-2022-27649"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-27649"},{"type":"REPORT","url":"https://github.com/containers/podman/releases/tag/v4.0.3"},{"type":"REPORT","url":"https://github.com/containers/podman/commit/aafa80918a245edcbdaceb1191d749570f1872d0"},{"type":"REPORT","url":"https://github.com/containers/podman/commit/7b368768c2990b9781b2b6813e1c7f91c7e6cb13"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2066568"},{"type":"REPORT","url":"https://github.com/containers/podman/security/advisories/GHSA-qvf8-p83w-v58j"},{"type":"REPORT","url":"https://github.com/containers/podman/commit/aafa80918a245edcbdaceb1191d749570f1872d0"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2022-27649"}],"affected":[{"package":{"name":"libpod","ecosystem":"Ubuntu:Pro:22.04:LTS","purl":"pkg:deb/ubuntu/libpod@3.4.4+ds1-1ubuntu1.22.04.3+esm3?arch=source&distro=esm-apps/jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["3.2.1+ds1-2ubuntu3","3.4.4+ds1-1ubuntu1","3.4.4+ds1-1ubuntu1.22.04.1","3.4.4+ds1-1ubuntu1.22.04.2","3.4.4+ds1-1ubuntu1.22.04.3","3.4.4+ds1-1ubuntu1.22.04.3+esm1","3.4.4+ds1-1ubuntu1.22.04.3+esm2","3.4.4+ds1-1ubuntu1.22.04.3+esm3"],"ecosystem_specific":{"binaries":[{"binary_name":"podman","binary_version":"3.4.4+ds1-1ubuntu1.22.04.3+esm3"},{"binary_name":"podman-docker","binary_version":"3.4.4+ds1-1ubuntu1.22.04.3+esm3"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-27649.json"}},{"package":{"name":"libpod","ecosystem":"Ubuntu:Pro:24.04:LTS","purl":"pkg:deb/ubuntu/libpod@4.9.3+ds1-1ubuntu0.2+esm3?arch=source&distro=esm-apps/noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["4.3.1+ds1-8","4.7.2+ds1-2","4.7.2+ds1-2build1","4.8.3+ds1-2","4.9.0+ds1-2","4.9.3+ds1-1","4.9.3+ds1-1build1","4.9.3+ds1-1build2","4.9.3+ds1-1ubuntu0.1","4.9.3+ds1-1ubuntu0.2","4.9.3+ds1-1ubuntu0.2+esm1","4.9.3+ds1-1ubuntu0.2+esm2","4.9.3+ds1-1ubuntu0.2+esm3"],"ecosystem_specific":{"binaries":[{"binary_name":"podman","binary_version":"4.9.3+ds1-1ubuntu0.2+esm3"},{"binary_name":"podman-docker","binary_version":"4.9.3+ds1-1ubuntu0.2+esm3"},{"binary_name":"podman-remote","binary_version":"4.9.3+ds1-1ubuntu0.2+esm3"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-27649.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}