Skip to main content
Version: latest

CVE-2024-23652

CVE Details

Visit the official vulnerability details page for CVE-2024-23652 to learn more.

Initial Publication

01/27/2025

Last Update

02/21/2025

Third Party Dependency

github.com/moby/buildkit

NIST CVE Summary

BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. A malicious BuildKit frontend or Dockerfile using RUN --mount could trick the feature that removes empty files created for the mountpoints into removing a file outside the container, from the host system. The issue has been fixed in v0.12.5. Workarounds include avoiding using BuildKit frontends from an untrusted source or building an untrusted Dockerfile containing RUN --mount feature.

CVE Severity

9.1

Our Official Summary

A vulnerability was found in the Moby Builder Toolkit, which arose from BuildKit's attempts to clean up temporarily added directories after use. A malicious BuildKit frontend or Dockerfile using RUN --mount could deceive the feature responsible for removing empty files created for the mount points, potentially leading to removing a file outside the container and affecting the host system. Successful exploitation of this issue may result in the arbitrary deletion of files and directories on the underlying host OS when building an image using a malicious Dockerfile or upstream image (for example, when using FROM).

A upstream fix for the 3rd party images is awaited. Will adopt the fixed version once it becomes available.

Status

Ongoing

Affected Products & Versions

VersionPalette EnterprisePalette Enterprise AirgapVerteXVerteX Airgap
4.6.7⚠️ Impacted✅ No Impact✅ No Impact✅ No Impact
4.6.6⚠️ Impacted✅ No Impact✅ No Impact✅ No Impact
4.5.22⚠️ Impacted✅ No Impact✅ No Impact✅ No Impact
4.5.21⚠️ Impacted✅ No Impact✅ No Impact✅ No Impact
4.5.20⚠️ Impacted✅ No Impact✅ No Impact✅ No Impact

Revision History

DateRevision
02/21/2025Impacted versions changed from 4.5.20, 4.5.21, 4.5.22, 4.6.6 to 4.5.20, 4.5.21, 4.5.22, 4.6.6, 4.6.7
02/17/2025Impacted versions changed from 4.5.20, 4.5.21, 4.5.22 to 4.5.20, 4.5.21, 4.5.22, 4.6.6
02/14/2025Impacted versions changed from 4.5.20, 4.5.21 to 4.5.20, 4.5.21, 4.5.22
02/12/2025Status changed from Open to Ongoing
02/12/2025Official summary added
02/05/2025Impacted versions changed from 4.5.20 to 4.5.20, 4.5.21