Skip to content

Conversation

@Yaminyam
Copy link

Updates

  • Affected products

Comments
This is also a false-positive report as access keys and emails are NOT user credentials.
Without proper combination with passwords (for emails) and secret keys (for access keys), they cannot successfully pass authentication nor forge a user's identity.

The historical intention to place emails and access keys there is to allow the user workloads to identify themselves. For example, user workloads may use them as a bookkeeper when mangling the storage paths, output filenames, etc.

Note: As described in the above CVE-2025-49651 response, the container applications including the web shell (ttyd) are NOT exposed to the public networks by default. Thus, all information inside the container, including environ.txt, are private to individual users.

The report did not include but we have more similar stuffs. I'm describing them for future reference.

/home/work/id_container: This SSH private key is randomly generated for each container to allow accessing user's own containers via "backend.ai ssh" or "backend.ai scp" CLI command which automatically downloads and puts this key as a temporary SSH client identity. Those download and application access operations are done via authenticated API requests, going through Backend.AI Manager and App Proxy.

/home/work/id_cluster: It is another randomly generated SSH key for each cluster session. It allows containers to access other containers' shell in cluster sessions, in which multiple containers are spawned and bundled as a single compute session (job) across multiple nodes.

Copilot AI review requested due to automatic review settings January 19, 2026 09:19
@github-actions github-actions bot changed the base branch from main to Yaminyam/advisory-improvement-6671 January 19, 2026 09:20
Copy link

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

This PR updates the security advisory metadata for BackendAI vulnerability GHSA-hxvr-gg2w-j48x (CVE-2025-49653), which the maintainers have clarified is a false-positive report regarding sensitive information exposure. The change updates the advisory's modification timestamp.

Changes:

  • Updated the "modified" timestamp to reflect the latest modification time

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants