{"id":"CVE-2022-4123","details":"A flaw was found in Buildah. The local path and the lowest subdirectory may be disclosed due to incorrect absolute path traversal, resulting in an impact to confidentiality.","aliases":["GHSA-rprg-4v7q-87v7","GO-2022-1159"],"modified":"2026-03-13T05:59:09.345212Z","published":"2022-12-08T16:15:14.937Z","references":[{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2144989"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/containers/podman","events":[{"introduced":"0"},{"last_affected":"e4b03902052294d4f342a185bb54702ed5bed8b1"},{"introduced":"0"},{"last_affected":"146dcb28dc028fbb0fdb7854f5e0e5863b78abe9"},{"introduced":"0"},{"last_affected":"0abf243202dc00ecc1f968fc9538b9eb67011716"},{"introduced":"0"},{"last_affected":"f73d8f8875c2be7cd2049094c29aff90b1150241"},{"introduced":"0"},{"last_affected":"7fe5a419cfd2880df2028ad3d7fd9378a88a04f4"},{"introduced":"0"},{"last_affected":"74aa681e59352257eb5f25f089dffa66d6345a3a"},{"introduced":"0"},{"last_affected":"81005b8d809990a0a2e3367a5980d3c4c2499708"},{"introduced":"0"},{"last_affected":"7e1f3106fffc30dba17eb3f85b45c5c1d50d6be6"},{"introduced":"0"},{"last_affected":"62b324ddf718411b1d4d0ba8117c632f7f984a38"},{"introduced":"0"},{"last_affected":"ad42af94903ce4f3c3cd0693e4e17e4286bf094b"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"4.1.0-NA"},{"introduced":"0"},{"last_affected":"4.1.0-rc1"},{"introduced":"0"},{"last_affected":"4.1.0-rc2"},{"introduced":"0"},{"last_affected":"4.1.1"},{"introduced":"0"},{"last_affected":"4.2.0-NA"},{"introduced":"0"},{"last_affected":"4.2.0-rc1"},{"introduced":"0"},{"last_affected":"4.2.0-rc2"},{"introduced":"0"},{"last_affected":"4.2.0-rc3"},{"introduced":"0"},{"last_affected":"4.2.1"},{"introduced":"0"},{"last_affected":"4.3.0-NA"}]}}],"versions":["v0.10.1","v0.10.1.1","v0.10.1.2","v0.10.1.3","v0.11.1","v0.11.1.1","v0.12.1","v0.12.1.1","v0.12.1.2","v0.2","v0.2.1","v0.2.2","v0.3.1","v0.3.2","v0.3.3","v0.3.4","v0.3.5","v0.4.1","v0.4.2","v0.4.3","v0.4.4","v0.5.1","v0.5.2","v0.5.3","v0.5.4","v0.6.1","v0.6.2","v0.6.3","v0.6.4","v0.6.5","v0.7.1","v0.7.2","v0.7.3","v0.7.4","v0.8.1","v0.8.2","v0.8.2.1","v0.8.3","v0.8.4","v0.8.5","v0.9.1","v0.9.1.1","v0.9.2","v0.9.2.1","v0.9.3","v0.9.3.1","v1.1.0","v1.1.1","v1.1.2","v1.2.0","v1.3.0","v1.3.1","v1.4.0","v1.4.1","v1.4.2","v1.4.3","v1.4.4","v1.5.0","v1.5.1","v1.6.0","v1.6.0-rc1","v1.6.0-rc2","v1.6.1","v1.6.1-rc1","v1.6.2","v1.6.2-rc1","v1.7.0","v1.7.0-rc1","v1.7.0-rc2","v1.8.0","v1.8.0-rc1","v1.8.1","v1.8.1-rc1","v1.8.1-rc2","v1.8.1-rc3","v1.8.1-rc4","v1.8.2","v1.8.2-rc1","v1.9.0","v1.9.0-rc1","v1.9.0-rc2","v2.0.0-rc1","v2.0.0-rc2","v2.0.0-rc3","v2.0.0-rc4","v2.0.0-rc5","v2.0.0-rc6","v2.0.0-rc7","v2.1.0","v2.1.0-rc1","v2.1.0-rc2","v2.2.0-rc1","v2.2.0-rc2","v3.1.0-rc1","v3.2.0-rc1","v4.0.0-rc1","v4.0.0-rc2","v4.1.0","v4.1.0-rc1","v4.1.0-rc2","v4.2.0","v4.2.0-rc1","v4.2.0-rc2","v4.2.0-rc3","v4.3.0","v4.3.0-rc1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-4123.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"35"}]},{"events":[{"introduced":"0"},{"last_affected":"36"}]},{"events":[{"introduced":"0"},{"last_affected":"37"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}]}