Bugzilla – Bug 1202812
VUL-0: CVE-2022-2990: buildah: possible information disclosure and modification
Last modified: 2023-10-17 16:30:11 UTC
rh#2121453 An incorrect handling of the supplementary groups in the Buildah container engine might lead to the sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container. Upstream PR: https://github.com/containers/buildah/pull/4200 Reference: https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/ https://bugzilla.redhat.com/show_bug.cgi?id=2121453 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2990
Affected codestreams: - SUSE:SLE-15-SP1:Update - SUSE:SLE-15-SP3:Update - SUSE:SLE-15-SP4:Update - openSUSE:Factory
SUSE-SU-2022:3655-1: An update that fixes three vulnerabilities is now available. Category: security (important) Bug References: 1167864,1181961,1202812 CVE References: CVE-2020-10696,CVE-2021-20206,CVE-2022-2990 JIRA References: Sources used: openSUSE Leap 15.4 (src): buildah-1.27.1-150400.3.8.1 SUSE Linux Enterprise Module for Containers 15-SP4 (src): buildah-1.27.1-150400.3.8.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2022:3766-1: An update that fixes three vulnerabilities is now available. Category: security (important) Bug References: 1167864,1181961,1202812 CVE References: CVE-2020-10696,CVE-2021-20206,CVE-2022-2990 JIRA References: Sources used: openSUSE Leap Micro 5.2 (src): libgpg-error-1.42-150300.9.3.1 openSUSE Leap 15.3 (src): buildah-1.27.1-150300.8.11.1, libgpg-error-1.42-150300.9.3.1 SUSE Linux Enterprise Module for Containers 15-SP3 (src): buildah-1.27.1-150300.8.11.1 SUSE Linux Enterprise Module for Basesystem 15-SP3 (src): libgpg-error-1.42-150300.9.3.1 SUSE Linux Enterprise Micro 5.2 (src): libgpg-error-1.42-150300.9.3.1 SUSE Linux Enterprise Micro 5.1 (src): libgpg-error-1.42-150300.9.3.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2022:4349-1: An update that fixes two vulnerabilities is now available. Category: security (important) Bug References: 1167864,1202812 CVE References: CVE-2020-10696,CVE-2022-2990 JIRA References: Sources used: openSUSE Leap 15.4 (src): buildah-1.28.2-150400.3.11.1 SUSE Linux Enterprise Module for Containers 15-SP4 (src): buildah-1.28.2-150400.3.11.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2022:4350-1: An update that fixes two vulnerabilities is now available. Category: security (important) Bug References: 1167864,1202812 CVE References: CVE-2020-10696,CVE-2022-2990 JIRA References: Sources used: openSUSE Leap 15.3 (src): buildah-1.28.2-150300.8.14.1 SUSE Linux Enterprise Module for Containers 15-SP3 (src): buildah-1.28.2-150300.8.14.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
I don't see a mention of the cve in 15-sp1 in the build bot comments? Does https://build.suse.de/request/show/277864 fix CVE-2022-2990
(In reply to Brahmajit Das from comment #9) > I don't see a mention of the cve in 15-sp1 in the build bot comments? Does > https://build.suse.de/request/show/277864 fix CVE-2022-2990 That patch was released in 1.28 and was backported to 1.27.1 so I don't think it was fixed in SLE15-SP1 which currently has 1.25.1 and I don't see a patch in that SR either. Dan might be able to give more context here.
I see, just FTR, I have a l3 bug where the customer is requesting PTF with fix for CVE-2022-2990. The customer is using SLED 15-SP2 and I'm building the PTF's on SLES 15-s2 (bsc#1214341). Hence, a patch/backport would be very much appreciated.
(In reply to Brahmajit Das from comment #11) > I see, just FTR, I have a l3 bug where the customer is requesting PTF with > fix for CVE-2022-2990. The customer is using SLED 15-SP2 and I'm building > the PTF's on SLES 15-s2 (bsc#1214341). Hence, a patch/backport would be very > much appreciated. https://build.suse.de/request/show/305939
(In reply to Dan Čermák from comment #12) From https://build.suse.de/request/show/305939, I'm getting " The diff call for SUSE:Maintenance:30314/buildah failed: package 'buildah' does not exist "
(In reply to Brahmajit Das from comment #13) Please ignore comment #13.
SUSE-SU-2023:4099-1: An update that solves one vulnerability and has one security fix can now be installed. Category: security (moderate) Bug References: 1202812, 1216005 CVE References: CVE-2022-2990 Sources used: SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (src): buildah-1.25.1-150100.3.20.15 SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): buildah-1.25.1-150100.3.20.15 SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): buildah-1.25.1-150100.3.20.15 SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): buildah-1.25.1-150100.3.20.15 SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): buildah-1.25.1-150100.3.20.15 SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): buildah-1.25.1-150100.3.20.15 SUSE Enterprise Storage 7 (src): buildah-1.25.1-150100.3.20.15 SUSE CaaS Platform 4.0 (src): buildah-1.25.1-150100.3.20.15 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.