Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2024-23652

Published: 31 January 2024

BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. A malicious BuildKit frontend or Dockerfile using RUN --mount could trick the feature that removes empty files created for the mountpoints into removing a file outside the container, from the host system. The issue has been fixed in v0.12.5. Workarounds include avoiding using BuildKit frontends from an untrusted source or building an untrusted Dockerfile containing RUN --mount feature.

Notes

AuthorNote
alexmurray
Traditionally the docker.io source package contained both the
library and docker application. However, in releases that
contain the
docker.io-app source package, the docker.io source package
contains only
the library whilst the docker application itself is contained
in the
docker.io-app package.
sbeattie
docker packages contain an embedded copy of github:moby/buildkit

Priority

Medium

Cvss 3 Severity Score

9.1

Score breakdown

Status

Package Release Status
docker.io
Launchpad, Ubuntu, Debian
bionic Needed

focal Needed

jammy Needed

mantic Needed

trusty Ignored
(end of standard support)
upstream Needs triage

xenial Ignored
(changes too intrusive)
Patches:
upstream: https://github.com/moby/buildkit/pull/4603/commits/23bebc4a180b84ba18733f545e7559e10c439ac3
docker.io-app
Launchpad, Ubuntu, Debian
bionic Does not exist

focal Needed

jammy Needed

mantic Needed

trusty Ignored
(end of standard support)
upstream Needs triage

xenial Does not exist

Severity score breakdown

Parameter Value
Base score 9.1
Attack vector Network
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality None
Integrity impact High
Availability impact High
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H