Incorrect handling of the supplementary groups in the CRI-O container engine might lead to sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.
References
Link | Resource |
---|---|
https://github.com/cri-o/cri-o/pull/6159 | Patch Third Party Advisory |
https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/ | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2022-09-19T19:53:23
Updated: 2022-09-19T19:53:23
Reserved: 2022-08-25T00:00:00
Link: CVE-2022-2995
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-09-19T20:15:12.493
Modified: 2022-09-21T18:05:11.537
Link: CVE-2022-2995
JSON object: View
Redhat Information
No data.