CVE-2024-23652
ADVISORY - githubSummary
Impact
A malicious BuildKit frontend or Dockerfile using RUN --mount
could trick the feature that removes empty files created for the mountpoints into removing a file outside the container, from the host system.
Patches
The issue has been fixed in v0.12.5
Workarounds
Avoid using BuildKit frontend from an untrusted source or building an untrusted Dockerfile containing RUN --mount
feature.
References
Common Weakness Enumeration (CWE)
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
NIST
3.9
CVSS SCORE
10criticalGitHub
3.9
CVSS SCORE
10criticalAlpine
-
Ubuntu
3.9
CVSS SCORE
9.1mediumGoLang
-
Amazon
-
CVSS SCORE
N/AhighRed Hat
1.4
CVSS SCORE
7.8lowChainguard
CGA-2cv7-75q6-cvrq
-
Chainguard
CGA-4v29-m22x-5m58
-
Chainguard
CGA-7vxc-hp2w-725j
-
Chainguard
CGA-7wr2-gxv6-5g96
-
Chainguard
CGA-9rhv-6x5x-p3wh
-
Chainguard
CGA-cf38-mj9p-m2h7
-
Chainguard
CGA-hqhv-f77r-cq7c
-
Chainguard
CGA-jh3p-vg64-hm2m
-
Chainguard
CGA-m737-5xv8-m883
-
Chainguard
CGA-mp67-g995-65f4
-
Chainguard
CGA-rpw2-9v92-4g7f
-
Chainguard
CGA-wgv3-9hrx-gj3g
-
Chainguard
CGA-x5pw-xwxw-p7jx
-