CVE-2024-23653 – github.com/moby/buildkit
Package
Manager: go
Name: github.com/moby/buildkit
Vulnerable Version: >=0 <0.12.5
Severity
Level: Critical
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.08854 pctl0.92215
Details
Buildkit's interactive containers API does not validate entitlements check ### Impact In addition to running containers as build steps, BuildKit also provides APIs for running interactive containers based on built images. It was possible to use these APIs to ask BuildKit to run a container with elevated privileges. Normally, running such containers is only allowed if special `security.insecure` entitlement is enabled both by buildkitd configuration and allowed by the user initializing the build request. ### Patches The issue has been fixed in v0.12.5 . ### Workarounds Avoid using BuildKit frontends from untrusted sources. A frontend image is usually specified as the `#syntax` line on your Dockerfile, or with `--frontend` flag when using `buildctl build` command. ### References
Metadata
Created: 2024-01-31T22:43:20Z
Modified: 2024-05-20T22:06:06Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/01/GHSA-wr6v-9f75-vh2g/GHSA-wr6v-9f75-vh2g.json
CWE IDs: ["CWE-863"]
Alternative ID: GHSA-wr6v-9f75-vh2g
Finding: F006
Auto approve: 1