First published: Wed Jan 31 2024(Updated: )
### Impact Two malicious build steps running in parallel sharing the same cache mounts with subpaths could cause a race condition that can lead to files from the host system being accessible to the build container. ### Patches The issue has been fixed in v0.12.5 ### Workarounds Avoid using BuildKit frontend from an untrusted source or building an untrusted Dockerfile containing cache mounts with `--mount=type=cache,source=...` options. ### References https://www.openwall.com/lists/oss-security/2019/05/28/1
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/moby/buildkit | <0.12.5 | 0.12.5 |
Mobyproject Buildkit | <0.12.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-23651 is considered a high-severity vulnerability due to the potential for unauthorized access to host system files.
To fix CVE-2024-23651, upgrade the buildkit package to version 0.12.5 or later.
CVE-2024-23651 is a race condition vulnerability that occurs when malicious build steps access shared cache mounts.
CVE-2024-23651 affects installations of the buildkit package prior to version 0.12.5.
While the recommended solution is to upgrade, a temporary workaround involves avoiding parallel build steps that share the same cache mounts.