Incorrect handling of the supplementary groups in the CRI-O container engine might lead to sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container. https://github.com/cri-o/cri-o/pull/6159
Created cri-o tracking bugs for this issue: Affects: fedora-all [bug 2121635] Created cri-o:1.19/cri-o tracking bugs for this issue: Affects: fedora-all [bug 2121637] Created cri-o:1.20/cri-o tracking bugs for this issue: Affects: fedora-all [bug 2121638] Created cri-o:1.21/cri-o tracking bugs for this issue: Affects: epel-all [bug 2121636] Affects: fedora-all [bug 2121639] Created cri-o:1.22/cri-o tracking bugs for this issue: Affects: fedora-all [bug 2121640] Created cri-o:1.23/cri-o tracking bugs for this issue: Affects: fedora-all [bug 2121641] Created cri-o:1.24/cri-o tracking bugs for this issue: Affects: fedora-all [bug 2121642]
This vulnerability is public for a while now, can the CVE be made public?
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.12 Via RHSA-2022:7398 https://access.redhat.com/errata/RHSA-2022:7398
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-2995
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.10 Via RHSA-2023:3216 https://access.redhat.com/errata/RHSA-2023:3216
This issue has been addressed in the following products: Ironic content for Red Hat OpenShift Container Platform 4.11 Red Hat OpenShift Container Platform 4.11 Via RHSA-2023:3541 https://access.redhat.com/errata/RHSA-2023:3541