First published: Thu Aug 25 2022(Updated: )
An incorrect handling of the supplementary groups in the Buildah container engine might lead to the sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container. Reference: <a href="https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/">https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Buildah |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2121453 is considered to be significant due to potential sensitive information disclosure and data modification risks.
To fix REDHAT-BUG-2121453, you should update to the latest version of Buildah that includes the patched versions addressing this vulnerability.
Users of the Buildah container engine who utilize supplementary groups to set access permissions are affected by REDHAT-BUG-2121453.
The vulnerability in REDHAT-BUG-2121453 is caused by incorrect handling of supplementary groups within the Buildah container engine.
Yes, an attacker needs direct access to the affected container where supplementary groups are being used to exploit REDHAT-BUG-2121453.