Name | CVE-2022-2990 |
Description | An incorrect handling of the supplementary groups in the Buildah container engine might lead to the sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
golang-github-containers-buildah (PTS) | bullseye | 1.19.6+dfsg1-1 | vulnerable |
bookworm | 1.28.2+ds1-3 | fixed | |
sid, trixie | 1.38.0+ds1-2 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
golang-github-containers-buildah | source | (unstable) | 1.28.0+ds1-2 |
[bullseye] - golang-github-containers-buildah <no-dsa> (Minor issue)
https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/
https://github.com/containers/buildah/pull/4200
https://github.com/containers/buildah/commit/9934b17365083ce966b44c5ce3c7e052f516e255 (v1.28.0)
https://bugzilla.redhat.com/show_bug.cgi?id=2121453