The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade github.com/containers/buildah/chroot
to version 1.21.1, 1.19.9, 1.17.2, 1.16.8 or higher.
github.com/containers/buildah/chroot is an a tool that facilitates building OCI images.
Affected versions of this package are vulnerable to Information Exposure. When running processes using chroot
isolation, the process being run can examine the environment variables of its immediate parent and grandparent processes.
This isolation type is often used when running buildah
in unprivileged containers, and it is often used to do so in CI/CD environments. If sensitive information is exposed to the original buildah
process through its environment, that information will unintentionally be shared with child processes which it starts as part of handling RUN
instructions or during buildah
run. The commands that buildah
is instructed to run can read that information.