Bug 2121632 (CVE-2022-2995) - CVE-2022-2995 cri-o: incorrect handling of the supplementary groups
Summary: CVE-2022-2995 cri-o: incorrect handling of the supplementary groups
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2022-2995
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2121636 2121635 2121637 2121638 2121639 2121640 2121641 2121642
Blocks: 2121549 2121644 2127793
TreeView+ depends on / blocked
 
Reported: 2022-08-26 05:22 UTC by Avinash Hanwate
Modified: 2023-06-14 14:36 UTC (History)
13 users (show)

Fixed In Version: cri-o 1.25.0
Doc Type: If docs needed, set a value
Doc Text:
Incorrect handling of the supplementary groups in the CRI-O container engine might lead to sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.
Clone Of:
Environment:
Last Closed: 2023-01-21 06:52:09 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2022:7398 0 None None None 2023-01-17 14:51:26 UTC
Red Hat Product Errata RHSA-2023:3216 0 None None None 2023-05-24 13:23:07 UTC
Red Hat Product Errata RHSA-2023:3541 0 None None None 2023-06-14 14:36:23 UTC

Description Avinash Hanwate 2022-08-26 05:22:04 UTC
Incorrect handling of the supplementary groups in the CRI-O container engine might lead to sensitive information disclosure or possible data
modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.

https://github.com/cri-o/cri-o/pull/6159

Comment 2 Avinash Hanwate 2022-08-26 05:40:38 UTC
Created cri-o tracking bugs for this issue:

Affects: fedora-all [bug 2121635]


Created cri-o:1.19/cri-o tracking bugs for this issue:

Affects: fedora-all [bug 2121637]


Created cri-o:1.20/cri-o tracking bugs for this issue:

Affects: fedora-all [bug 2121638]


Created cri-o:1.21/cri-o tracking bugs for this issue:

Affects: epel-all [bug 2121636]
Affects: fedora-all [bug 2121639]


Created cri-o:1.22/cri-o tracking bugs for this issue:

Affects: fedora-all [bug 2121640]


Created cri-o:1.23/cri-o tracking bugs for this issue:

Affects: fedora-all [bug 2121641]


Created cri-o:1.24/cri-o tracking bugs for this issue:

Affects: fedora-all [bug 2121642]

Comment 4 John Helmert III 2022-09-17 18:12:42 UTC
This vulnerability is public for a while now, can the CVE be made public?

Comment 5 errata-xmlrpc 2023-01-17 14:51:24 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.12

Via RHSA-2022:7398 https://access.redhat.com/errata/RHSA-2022:7398

Comment 6 Product Security DevOps Team 2023-01-21 06:52:08 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-2995

Comment 10 errata-xmlrpc 2023-05-24 13:23:06 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.10

Via RHSA-2023:3216 https://access.redhat.com/errata/RHSA-2023:3216

Comment 12 errata-xmlrpc 2023-06-14 14:36:21 UTC
This issue has been addressed in the following products:

  Ironic content for Red Hat OpenShift Container Platform 4.11
  Red Hat OpenShift Container Platform 4.11

Via RHSA-2023:3541 https://access.redhat.com/errata/RHSA-2023:3541


Note You need to log in before you can comment on or make changes to this bug.