<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cpe="http://cpe.mitre.org/language/2.0" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvssv2="http://scap.nist.gov/schema/cvss-v2/1.0" xmlns:cvssv3="https://www.first.org/cvss/cvss-v3.0.xsd" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:ns0="http://purl.org/dc/elements/1.1/" xmlns:prod="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod" xmlns:scap-core="http://scap.nist.gov/schema/scap-core/1.0" xmlns:sch="http://purl.oclc.org/dsdl/schematron" xmlns:vuln="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
  <DocumentTitle xml:lang="en">CVE-2022-2995</DocumentTitle>
  <DocumentType>SUSE CVE</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE CVE-2022-2995</ID>
    </Identification>
    <Status>Interim</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>6</Number>
        <Date>2025-05-31T23:14:18Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2022-08-26T23:40:05Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-05-31T23:14:18Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf-cve.pl</Engine>
      <Date>2020-12-27T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="CVE" Type="Summary" Ordinal="1" xml:lang="en">CVE-2022-2995</Note>
    <Note Title="Mitre CVE Description" Type="Description" Ordinal="2" xml:lang="en">Incorrect handling of the supplementary groups in the CRI-O container engine might lead to sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="4" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod">
    <Branch Type="Product Family" Name="SUSE CaaS Platform 4.0">
      <Branch Type="Product Name" Name="SUSE CaaS Platform 4.0">
        <FullProductName ProductID="SUSE CaaS Platform 4.0" CPE="cpe:/o:suse:caasp:4.0">SUSE CaaS Platform 4.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="cri-o">
      <FullProductName ProductID="cri-o" CPE="cpe:2.3:a:kubernetes:cri-o:*:*:*:*:*:*:*:*">cri-o</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cri-o-kubeadm-criconfig">
      <FullProductName ProductID="cri-o-kubeadm-criconfig">cri-o-kubeadm-criconfig</FullProductName>
    </Branch>
    <Relationship ProductReference="cri-o" RelationType="Default Component Of" RelatesToProductReference="SUSE CaaS Platform 4.0">
      <FullProductName ProductID="SUSE CaaS Platform 4.0:cri-o">cri-o as a component of SUSE CaaS Platform 4.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="cri-o-kubeadm-criconfig" RelationType="Default Component Of" RelatesToProductReference="SUSE CaaS Platform 4.0">
      <FullProductName ProductID="SUSE CaaS Platform 4.0:cri-o-kubeadm-criconfig">cri-o-kubeadm-criconfig as a component of SUSE CaaS Platform 4.0</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Incorrect handling of the supplementary groups in the CRI-O container engine might lead to sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.</Note>
    </Notes>
    <CVE>CVE-2022-2995</CVE>
    <ProductStatuses>
      <Status Type="Will Not Fix">
        <ProductID>SUSE CaaS Platform 4.0:cri-o</ProductID>
        <ProductID>SUSE CaaS Platform 4.0:cri-o-kubeadm-criconfig</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV3>
        <BaseScoreV3>6.5</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
  </Vulnerability>
</cvrfdoc>
