First published: Tue Jun 08 2021(Updated: )
### Impact When running processes using "chroot" isolation, the process being run can examine the environment variables of its immediate parent and grandparent processes (CVE-2021-3602). This isolation type is often used when running `buildah` in unprivileged containers, and it is often used to do so in CI/CD environments. If sensitive information is exposed to the original `buildah` process through its environment, that information will unintentionally be shared with child processes which it starts as part of handling RUN instructions or during `buildah run`. The commands that `buildah` is instructed to run can read that information if they choose to. ### Patches Users should upgrade packages, or images which contain packages, to include version 1.21.3 or later. ### Workarounds As a workaround, invoking `buildah` in a container under `env -i` to have it started with a reinitialized environment should prevent the leakage. ### For more information If you have any questions or comments about this advisory: * Open an issue in [buildah](https://github.com/containers/buildah/issues) * Email us at [the buildah general mailing list](mailto:buildah@lists.buildah.io), or [the podman security mailing list](mailto:security@lists.podman.io) if it's sensitive.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/containers/buildah | >=1.20.0<=1.21.2 | 1.21.3 |
go/github.com/containers/buildah | >=1.18.0<=1.19.8 | 1.19.9 |
go/github.com/containers/buildah | >=1.17.0<=1.17.1 | 1.17.2 |
go/github.com/containers/buildah | <=1.16.7 | 1.16.8 |
Buildah Project Buildah | <1.16.8 | |
Buildah Project Buildah | >=1.17.0<1.17.2 | |
Buildah Project Buildah | >=1.19.0<1.19.9 | |
Buildah Project Buildah | >=1.21.0<1.21.3 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux For Ibm Z Systems | =8.0 | |
Redhat Enterprise Linux For Power Little Endian | =8.0 | |
redhat/buildah | <1.21.3 | 1.21.3 |
redhat/buildah | <1.19.9 | 1.19.9 |
redhat/buildah | <1.17.2 | 1.17.2 |
redhat/buildah | <1.16.8 | 1.16.8 |
debian/golang-github-containers-buildah | <=1.19.6+dfsg1-1 | 1.28.2+ds1-3 1.37.3+ds1-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Buildah flaw is CVE-2021-3602.
The impact of the vulnerability is an information disclosure.
The vulnerability in Buildah occurs when running processes using "chroot" isolation.
The severity of CVE-2021-3602 is medium.
The versions affected by this vulnerability are 1.21.3, 1.19.9, 1.17.2, and 1.16.8.