Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-23650

Опубликовано: 31 янв. 2024
Источник: redhat
CVSS3: 5.3
EPSS Низкий

Описание

BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. A malicious BuildKit client or frontend could craft a request that could lead to BuildKit daemon crashing with a panic. The issue has been fixed in v0.12.5. As a workaround, avoid using BuildKit frontends from untrusted sources.

A vulnerability was found in the Moby Builder Toolkit. A malicious BuildKit client or any frontend that can craft a request could lead to the BuildKit daemon crashing with a panic due to the lack of input validation. A frontend is usually specified as the #syntax line on a Dockerfile or with the --frontend flag when using the buildctl build command.

Отчет

Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-754: Improper Check for Unusual or Exceptional Conditions vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low. The platform enforces hardening guidelines to apply the most restrictive settings required for operations, while baseline configurations maintain secure system and software states. A defense-in-depth monitoring strategy includes perimeter firewalls and endpoint protection services that detect and respond to indicators in real time, enabling logging and auditing of system behavior to identify and address improper exception handling. Automated integrity checks alert on unverified exception-related errors, while memory protection mechanisms reduce the risk of crashes or vulnerabilities caused by improper handling.

Меры по смягчению последствий

Avoid using untrusted input for the client or frontend syntax to minimize the vulnerability exploration.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenShift Developer Tools and ServicesodoFix deferred
OpenShift Serverlessopenshift-serverless-1/client-kn-rhel8Not affected
OpenShift Serverlessopenshift-serverless-clientsNot affected
OpenShift Service Mesh 2openshift-service-mesh/istio-cni-rhel8Not affected
Red Hat Ansible Automation Platform 1.2openshift-clientsNot affected
Red Hat Ansible Automation Platform 2openshift-clientsNot affected
Red Hat Enterprise Linux 9buildahNot affected
Red Hat Enterprise Linux 9podmanNot affected
Red Hat OpenShift Container Platform 4openshift-clientsAffected
Red Hat OpenShift Dev Spacesdevspaces/traefik-rhel8Affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-754
https://bugzilla.redhat.com/show_bug.cgi?id=2262272moby/buildkit: Possible race condition with accessing subpaths from cache mounts

EPSS

Процентиль: 25%
0.00081
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
ubuntu
больше 1 года назад

BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. A malicious BuildKit client or frontend could craft a request that could lead to BuildKit daemon crashing with a panic. The issue has been fixed in v0.12.5. As a workaround, avoid using BuildKit frontends from untrusted sources.

CVSS3: 5.3
nvd
больше 1 года назад

BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. A malicious BuildKit client or frontend could craft a request that could lead to BuildKit daemon crashing with a panic. The issue has been fixed in v0.12.5. As a workaround, avoid using BuildKit frontends from untrusted sources.

CVSS3: 5.3
msrc
больше 1 года назад

Описание отсутствует

CVSS3: 5.3
github
больше 1 года назад

BuildKit vulnerable to possible panic when incorrect parameters sent from frontend

suse-cvrf
5 месяцев назад

Security update for docker-stable

EPSS

Процентиль: 25%
0.00081
Низкий

5.3 Medium

CVSS3

Уязвимость CVE-2024-23650