First published: Wed Jan 31 2024(Updated: )
### Impact A malicious BuildKit frontend or Dockerfile using `RUN --mount` could trick the feature that removes empty files created for the mountpoints into removing a file outside the container, from the host system. ### Patches The issue has been fixed in v0.12.5 ### Workarounds Avoid using BuildKit frontend from an untrusted source or building an untrusted Dockerfile containing `RUN --mount` feature. ### References
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/moby/buildkit | <0.12.5 | 0.12.5 |
Mobyproject Buildkit | <0.12.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-23652 has a high severity due to its potential to remove files from the host system.
To fix CVE-2024-23652, upgrade to BuildKit version 0.12.5 or higher.
The impact of CVE-2024-23652 allows a malicious BuildKit frontend to remove files from the host system.
CVE-2024-23652 affects all versions of BuildKit prior to 0.12.5.
There are no official workarounds provided for CVE-2024-23652, and upgrading is recommended.