An incorrect handling of the supplementary groups in the Buildah container engine might lead to the sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.
The product or the administrator places a user into an incorrect group.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Buildah | Buildah_project | * | 1.27.1 (excluding) |
Red Hat Enterprise Linux 8 | RedHat | container-tools:rhel8-8070020220929222448.39077419 | * |
Red Hat Enterprise Linux 8 | RedHat | container-tools:rhel8-8070020221026183352.489fc8e9 | * |
Red Hat Enterprise Linux 9 | RedHat | buildah-1:1.27.0-2.el9 | * |
Red Hat Enterprise Linux 9 | RedHat | podman-2:4.2.0-7.el9_1 | * |
Red Hat OpenShift Container Platform 4.13 | RedHat | buildah-1:1.29.1-1.rhaos4.13.el9 | * |
Golang-github-containers-buildah | Ubuntu | kinetic | * |
Golang-github-containers-buildah | Ubuntu | lunar | * |
Golang-github-containers-buildah | Ubuntu | mantic | * |