Lucene search

K
ubuntucveUbuntu.comUB:CVE-2024-23652
HistoryJan 31, 2024 - 12:00 a.m.

CVE-2024-23652

2024-01-3100:00:00
ubuntu.com
ubuntu.com
11
buildkit
vulnerability
dockerfile
removal
fixed
v0.12.5
untrusted source
mount

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:H

7.3 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

21.8%

BuildKit is a toolkit for converting source code to build artifacts in an
efficient, expressive and repeatable manner. A malicious BuildKit frontend
or Dockerfile using RUN --mount could trick the feature that removes empty
files created for the mountpoints into removing a file outside the
container, from the host system. The issue has been fixed in v0.12.5.
Workarounds include avoiding using BuildKit frontends from an untrusted
source or building an untrusted Dockerfile containing RUN --mount feature.

Notes

Author Note
alexmurray Traditionally the docker.io source package contained both the library and docker application. However, in releases that contain the docker.io-app source package, the docker.io source package contains only the library whilst the docker application itself is contained in the docker.io-app package.
sbeattie docker packages contain an embedded copy of github:moby/buildkit

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:H

7.3 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

21.8%