CVE-2024-23653
ADVISORY - githubSummary
Impact
In addition to running containers as build steps, BuildKit also provides APIs for running interactive containers based on built images. It was possible to use these APIs to ask BuildKit to run a container with elevated privileges. Normally, running such containers is only allowed if special security.insecure
entitlement is enabled both by buildkitd configuration and allowed by the user initializing the build request.
Patches
The issue has been fixed in v0.12.5 .
Workarounds
Avoid using BuildKit frontends from untrusted sources. A frontend image is usually specified as the #syntax
line on your Dockerfile, or with --frontend
flag when using buildctl build
command.
References
Common Weakness Enumeration (CWE)
Incorrect Authorization
Incorrect Authorization
Incorrect Authorization
NIST
3.9
GitHub
3.9
Alpine
-
Ubuntu
3.9
GoLang
-
Amazon
-
Red Hat
1.0
Chainguard
CGA-3rx2-xc4v-w65p
-
Chainguard
CGA-344h-5273-2qm3
-
Chainguard
CGA-5fx8-mrwp-mm4w
-
Chainguard
CGA-77rr-pw42-jr4h
-
Chainguard
CGA-9xch-c66w-8p9w
-
Chainguard
CGA-c58j-f664-3rrr
-
Chainguard
CGA-c5vw-fj32-5xv5
-
Chainguard
CGA-jg5c-jj8q-4j3c
-
Chainguard
CGA-jh96-52rx-r7gm
-
Chainguard
CGA-mp5r-39jj-5vvr
-
Chainguard
CGA-qqgf-6wqm-gc4v
-
Chainguard
CGA-rj7w-f98x-2f7x
-
Chainguard
CGA-v57q-mvjq-rmjp
-