Skip to content

BuildKit vulnerable to possible panic when incorrect parameters sent from frontend

Moderate severity GitHub Reviewed Published Jan 31, 2024 in moby/buildkit • Updated Mar 4, 2024

Package

gomod github.com/moby/buildkit (Go)

Affected versions

< 0.12.5

Patched versions

0.12.5

Description

Impact

A malicious BuildKit client or frontend could craft a request that could lead to BuildKit daemon crashing with a panic.

Patches

The issue has been fixed in v0.12.5

Workarounds

Avoid using BuildKit frontends from untrusted sources. A frontend image is usually specified as the #syntax line on your Dockerfile, or with --frontend flag when using buildctl build command.

References

References

@tonistiigi tonistiigi published to moby/buildkit Jan 31, 2024
Published by the National Vulnerability Database Jan 31, 2024
Published to the GitHub Advisory Database Jan 31, 2024
Reviewed Jan 31, 2024
Last updated Mar 4, 2024

Severity

Moderate
5.3
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
Low
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Weaknesses

CVE ID

CVE-2024-23650

GHSA ID

GHSA-9p26-698r-w4hx

Source code

Credits

Checking history
See something to contribute? Suggest improvements for this vulnerability.