Exposure of Sensitive Information to an Unauthorized Actor
CVE-2021-3602
Summary
When running processes using "chroot" isolation, the process being run can examine the environment variables of its immediate parent and grandparent processes (CVE-2021-3602). This isolation type is often used when running buildah in unprivileged containers, and it is often used to do so in CI/CD environments. If sensitive information is exposed to the original buildah process through its environment, that information will unintentionally be shared with child processes which it starts as part of handling RUN instructions or during buildah run. The commands that buildah is instructed to run can read that information if they choose to. This issue affects versions prior to 1.16.8, 1.17.x prior to 1.17.2, 1.18.x, 1.19.x prior to 1.19.9, 1.20.x, and 1.21.x prior to 1.21.3.
- LOW
- LOCAL
- HIGH
- UNCHANGED
- NONE
- LOW
- NONE
- NONE
CWE-200 - Information Exposure
An information exposure vulnerability is categorized as an information flow (IF) weakness, which can potentially allow unauthorized access to otherwise classified information in the application, such as confidential personal information (demographics, financials, health records, etc.), business secrets, and the application's internal environment.
Advisory Timeline
- Published