CVE-2024-23653

critical

Description

BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. In addition to running containers as build steps, BuildKit also provides APIs for running interactive containers based on built images. It was possible to use these APIs to ask BuildKit to run a container with elevated privileges. Normally, running such containers is only allowed if special `security.insecure` entitlement is enabled both by buildkitd configuration and allowed by the user initializing the build request. The issue has been fixed in v0.12.5 . Avoid using BuildKit frontends from untrusted sources.

References

https://www.wiz.io/blog/leaky-vessels-container-escape-vulnerabilities

https://www.darkreading.com/cloud-security/leaky-vessel-cloud-bugs-container-escapes-globally

https://snyk.io/blog/leaky-vessels-docker-runc-container-breakout-vulnerabilities/

https://github.com/moby/buildkit/security/advisories/GHSA-wr6v-9f75-vh2g

https://github.com/moby/buildkit/releases/tag/v0.12.5

https://github.com/moby/buildkit/pull/4602

Details

Source: Mitre, NVD

Published: 2024-01-31

Updated: 2024-02-09

Risk Information

CVSS v2

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Severity: Critical

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical