Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/golang-github-containers-buildah@1.28.0%2Bds1-2?distro=trixie
Typedeb
Namespacedebian
Namegolang-github-containers-buildah
Version1.28.0+ds1-2
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1.33.7+ds1-1
Latest_non_vulnerable_version1.43.1+ds1-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-fa27-n4rs-h7gp
vulnerability_id VCID-fa27-n4rs-h7gp
summary
Buildah's incorrect handling of the supplementary groups may lead to data disclosure, modification
An incorrect handling of the supplementary groups in the Buildah container engine might lead to the sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2990.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2990.json
1
reference_url https://access.redhat.com/security/cve/CVE-2022-2990
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/security/cve/CVE-2022-2990
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2990
reference_id
reference_type
scores
0
value 0.0009
scoring_system epss
scoring_elements 0.25464
published_at 2026-04-16T12:55:00Z
1
value 0.0009
scoring_system epss
scoring_elements 0.25459
published_at 2026-04-13T12:55:00Z
2
value 0.0009
scoring_system epss
scoring_elements 0.25517
published_at 2026-04-12T12:55:00Z
3
value 0.0009
scoring_system epss
scoring_elements 0.25558
published_at 2026-04-11T12:55:00Z
4
value 0.0009
scoring_system epss
scoring_elements 0.25547
published_at 2026-04-09T12:55:00Z
5
value 0.0009
scoring_system epss
scoring_elements 0.255
published_at 2026-04-08T12:55:00Z
6
value 0.0009
scoring_system epss
scoring_elements 0.25627
published_at 2026-04-02T12:55:00Z
7
value 0.0009
scoring_system epss
scoring_elements 0.25422
published_at 2026-04-21T12:55:00Z
8
value 0.0009
scoring_system epss
scoring_elements 0.25454
published_at 2026-04-18T12:55:00Z
9
value 0.0009
scoring_system epss
scoring_elements 0.25431
published_at 2026-04-07T12:55:00Z
10
value 0.0009
scoring_system epss
scoring_elements 0.25664
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2990
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2121453
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=2121453
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2990
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2990
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://github.com/containers/buildah
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/containers/buildah
7
reference_url https://github.com/containers/buildah/commit/4a8bf740e862f2438279c6feee2ea59ddf0cda0b
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/containers/buildah/commit/4a8bf740e862f2438279c6feee2ea59ddf0cda0b
8
reference_url https://github.com/containers/buildah/pull/4200
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/containers/buildah/pull/4200
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-2990
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-2990
10
reference_url https://pkg.go.dev/vuln/GO-2022-1008
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://pkg.go.dev/vuln/GO-2022-1008
11
reference_url https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation
12
reference_url https://access.redhat.com/errata/RHSA-2022:7457
reference_id RHSA-2022:7457
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7457
13
reference_url https://access.redhat.com/errata/RHSA-2023:1325
reference_id RHSA-2023:1325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1325
fixed_packages
0
url pkg:deb/debian/golang-github-containers-buildah@1.28.0%2Bds1-2?distro=trixie
purl pkg:deb/debian/golang-github-containers-buildah@1.28.0%2Bds1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-github-containers-buildah@1.28.0%252Bds1-2%3Fdistro=trixie
1
url pkg:deb/debian/golang-github-containers-buildah@1.28.2%2Bds1-3%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/golang-github-containers-buildah@1.28.2%2Bds1-3%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-e14a-39np-13bx
1
vulnerability VCID-gyyv-8fkv-syh5
2
vulnerability VCID-j9nr-4d4t-j3e1
3
vulnerability VCID-xe2z-2g23-skhf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-github-containers-buildah@1.28.2%252Bds1-3%252Bdeb12u1%3Fdistro=trixie
2
url pkg:deb/debian/golang-github-containers-buildah@1.39.3%2Bds1-1?distro=trixie
purl pkg:deb/debian/golang-github-containers-buildah@1.39.3%2Bds1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-github-containers-buildah@1.39.3%252Bds1-1%3Fdistro=trixie
3
url pkg:deb/debian/golang-github-containers-buildah@1.43.0%2Bds1-2?distro=trixie
purl pkg:deb/debian/golang-github-containers-buildah@1.43.0%2Bds1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-github-containers-buildah@1.43.0%252Bds1-2%3Fdistro=trixie
4
url pkg:deb/debian/golang-github-containers-buildah@1.43.1%2Bds1-1?distro=trixie
purl pkg:deb/debian/golang-github-containers-buildah@1.43.1%2Bds1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-github-containers-buildah@1.43.1%252Bds1-1%3Fdistro=trixie
aliases CVE-2022-2990, GHSA-fjm8-m7m6-2fjp
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fa27-n4rs-h7gp
1
url VCID-gs2e-ztdw-ayft
vulnerability_id VCID-gs2e-ztdw-ayft
summary
Non-empty default inheritable capabilities for linux container in Buildah
A bug was found in Buildah where containers were created with non-empty inheritable Linux process capabilities, creating an atypical Linux environment and enabling programs with inheritable file capabilities to elevate those capabilities to the permitted set during execve(2).

This bug did not affect the container security sandbox as the inheritable set never contained more capabilities than were included in the container's bounding set.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27651.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27651.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27651
reference_id
reference_type
scores
0
value 0.00182
scoring_system epss
scoring_elements 0.39848
published_at 2026-04-21T12:55:00Z
1
value 0.00182
scoring_system epss
scoring_elements 0.39928
published_at 2026-04-18T12:55:00Z
2
value 0.00182
scoring_system epss
scoring_elements 0.39957
published_at 2026-04-16T12:55:00Z
3
value 0.00182
scoring_system epss
scoring_elements 0.39907
published_at 2026-04-13T12:55:00Z
4
value 0.00182
scoring_system epss
scoring_elements 0.39926
published_at 2026-04-12T12:55:00Z
5
value 0.00182
scoring_system epss
scoring_elements 0.39962
published_at 2026-04-11T12:55:00Z
6
value 0.00182
scoring_system epss
scoring_elements 0.39952
published_at 2026-04-09T12:55:00Z
7
value 0.00182
scoring_system epss
scoring_elements 0.39883
published_at 2026-04-07T12:55:00Z
8
value 0.00182
scoring_system epss
scoring_elements 0.39961
published_at 2026-04-04T12:55:00Z
9
value 0.00182
scoring_system epss
scoring_elements 0.39938
published_at 2026-04-08T12:55:00Z
10
value 0.00182
scoring_system epss
scoring_elements 0.39934
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27651
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2066840
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=2066840
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27651
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/containers/buildah
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/containers/buildah
6
reference_url https://github.com/containers/buildah/commit/90b3254c7404039c1c786999ac189654228f6e0e
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/containers/buildah/commit/90b3254c7404039c1c786999ac189654228f6e0e
7
reference_url https://github.com/containers/buildah/commit/e7e55c988c05dd74005184ceb64f097a0cfe645b
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/containers/buildah/commit/e7e55c988c05dd74005184ceb64f097a0cfe645b
8
reference_url https://github.com/containers/buildah/pull/3855
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/containers/buildah/pull/3855
9
reference_url https://github.com/containers/buildah/security/advisories/GHSA-c3g4-w6cv-6v7h
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/containers/buildah/security/advisories/GHSA-c3g4-w6cv-6v7h
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/25YI27MENCEPZTTGRVU6BQD5V53FNI52
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/25YI27MENCEPZTTGRVU6BQD5V53FNI52
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2VWH6X6HOFPO6HTESF42HIJZEPXSWVIO
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2VWH6X6HOFPO6HTESF42HIJZEPXSWVIO
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7NETC7I6RTMMBRJJQVJOJUPDK4W4PQSJ
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7NETC7I6RTMMBRJJQVJOJUPDK4W4PQSJ
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-27651
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-27651
14
reference_url https://pkg.go.dev/vuln/GO-2022-0417
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://pkg.go.dev/vuln/GO-2022-0417
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1009882
reference_id 1009882
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1009882
16
reference_url https://access.redhat.com/errata/RHSA-2022:1407
reference_id RHSA-2022:1407
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1407
17
reference_url https://access.redhat.com/errata/RHSA-2022:1565
reference_id RHSA-2022:1565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1565
18
reference_url https://access.redhat.com/errata/RHSA-2022:1566
reference_id RHSA-2022:1566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1566
19
reference_url https://access.redhat.com/errata/RHSA-2022:1762
reference_id RHSA-2022:1762
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1762
20
reference_url https://access.redhat.com/errata/RHSA-2022:4651
reference_id RHSA-2022:4651
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4651
21
reference_url https://access.redhat.com/errata/RHSA-2022:4816
reference_id RHSA-2022:4816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4816
fixed_packages
0
url pkg:deb/debian/golang-github-containers-buildah@1.28.0%2Bds1-2?distro=trixie
purl pkg:deb/debian/golang-github-containers-buildah@1.28.0%2Bds1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-github-containers-buildah@1.28.0%252Bds1-2%3Fdistro=trixie
1
url pkg:deb/debian/golang-github-containers-buildah@1.28.2%2Bds1-3%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/golang-github-containers-buildah@1.28.2%2Bds1-3%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-e14a-39np-13bx
1
vulnerability VCID-gyyv-8fkv-syh5
2
vulnerability VCID-j9nr-4d4t-j3e1
3
vulnerability VCID-xe2z-2g23-skhf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-github-containers-buildah@1.28.2%252Bds1-3%252Bdeb12u1%3Fdistro=trixie
2
url pkg:deb/debian/golang-github-containers-buildah@1.39.3%2Bds1-1?distro=trixie
purl pkg:deb/debian/golang-github-containers-buildah@1.39.3%2Bds1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-github-containers-buildah@1.39.3%252Bds1-1%3Fdistro=trixie
3
url pkg:deb/debian/golang-github-containers-buildah@1.43.0%2Bds1-2?distro=trixie
purl pkg:deb/debian/golang-github-containers-buildah@1.43.0%2Bds1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-github-containers-buildah@1.43.0%252Bds1-2%3Fdistro=trixie
4
url pkg:deb/debian/golang-github-containers-buildah@1.43.1%2Bds1-1?distro=trixie
purl pkg:deb/debian/golang-github-containers-buildah@1.43.1%2Bds1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-github-containers-buildah@1.43.1%252Bds1-1%3Fdistro=trixie
aliases CVE-2022-27651, GHSA-c3g4-w6cv-6v7h
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gs2e-ztdw-ayft
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-github-containers-buildah@1.28.0%252Bds1-2%3Fdistro=trixie