vulnerability
Red Hat: CVE-2021-3602: Host environment variables leaked in build container when using chroot isolation (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 2 | (AV:L/AC:M/Au:N/C:P/I:N/A:N) | Nov 9, 2021 | Nov 10, 2021 | Aug 11, 2025 |
Severity
2
CVSS
(AV:L/AC:M/Au:N/C:P/I:N/A:N)
Published
Nov 9, 2021
Added
Nov 10, 2021
Modified
Aug 11, 2025
Description
An information disclosure flaw was found in Buildah, when building containers using chroot isolation. Running processes in container builds (e.g. Dockerfile RUN commands) can access environment variables from parent and grandparent processes. When run in a container in a CI/CD environment, environment variables may include sensitive information that was shared with the container in order to be used only by Buildah itself (e.g. container registry credentials).
Solutions
no-fix-redhat-rpm-packageredhat-upgrade-buildahredhat-upgrade-buildah-debuginforedhat-upgrade-buildah-debugsourceredhat-upgrade-buildah-testsredhat-upgrade-buildah-tests-debuginforedhat-upgrade-cockpit-podmanredhat-upgrade-conmonredhat-upgrade-conmon-debuginforedhat-upgrade-conmon-debugsourceredhat-upgrade-container-selinuxredhat-upgrade-containernetworking-pluginsredhat-upgrade-containernetworking-plugins-debuginforedhat-upgrade-containernetworking-plugins-debugsourceredhat-upgrade-containers-commonredhat-upgrade-critredhat-upgrade-criuredhat-upgrade-criu-debuginforedhat-upgrade-criu-debugsourceredhat-upgrade-criu-develredhat-upgrade-criu-libsredhat-upgrade-criu-libs-debuginforedhat-upgrade-crunredhat-upgrade-crun-debuginforedhat-upgrade-crun-debugsourceredhat-upgrade-fuse-overlayfsredhat-upgrade-fuse-overlayfs-debuginforedhat-upgrade-fuse-overlayfs-debugsourceredhat-upgrade-libslirpredhat-upgrade-libslirp-debuginforedhat-upgrade-libslirp-debugsourceredhat-upgrade-libslirp-develredhat-upgrade-oci-seccomp-bpf-hookredhat-upgrade-oci-seccomp-bpf-hook-debuginforedhat-upgrade-oci-seccomp-bpf-hook-debugsourceredhat-upgrade-podmanredhat-upgrade-podman-catatonitredhat-upgrade-podman-catatonit-debuginforedhat-upgrade-podman-debuginforedhat-upgrade-podman-debugsourceredhat-upgrade-podman-dockerredhat-upgrade-podman-gvproxyredhat-upgrade-podman-gvproxy-debuginforedhat-upgrade-podman-pluginsredhat-upgrade-podman-plugins-debuginforedhat-upgrade-podman-remoteredhat-upgrade-podman-remote-debuginforedhat-upgrade-podman-testsredhat-upgrade-python-podman-apiredhat-upgrade-python3-criuredhat-upgrade-python3-podmanredhat-upgrade-runcredhat-upgrade-runc-debuginforedhat-upgrade-runc-debugsourceredhat-upgrade-skopeoredhat-upgrade-skopeo-debuginforedhat-upgrade-skopeo-debugsourceredhat-upgrade-skopeo-testsredhat-upgrade-slirp4netnsredhat-upgrade-slirp4netns-debuginforedhat-upgrade-slirp4netns-debugsourceredhat-upgrade-toolboxredhat-upgrade-toolbox-debuginforedhat-upgrade-toolbox-debugsourceredhat-upgrade-toolbox-testsredhat-upgrade-udica
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.