Skip to content

Commit 64bc377

Browse files
committed
data/reports: add GO-2024-2494.yaml
Aliases: CVE-2024-23652, GHSA-4v98-7qmw-rqr8 Fixes #2494 Change-Id: I9fb7f144ae04b3219ac1bc59b83484d8045fce19 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/562377 Run-TryBot: Tim King <[email protected]> TryBot-Result: Gopher Robot <[email protected]> Reviewed-by: Tatiana Bradley <[email protected]> LUCI-TryBot-Result: Go LUCI <[email protected]>
1 parent 3754b2a commit 64bc377

File tree

2 files changed

+91
-0
lines changed

2 files changed

+91
-0
lines changed

data/osv/GO-2024-2494.json

Lines changed: 65 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,65 @@
1+
{
2+
"schema_version": "1.3.1",
3+
"id": "GO-2024-2494",
4+
"modified": "0001-01-01T00:00:00Z",
5+
"published": "0001-01-01T00:00:00Z",
6+
"aliases": [
7+
"CVE-2024-23652",
8+
"GHSA-4v98-7qmw-rqr8"
9+
],
10+
"summary": "Host system modification in github.com/moby/buildkit",
11+
"details": "A malicious BuildKit frontend or Dockerfile using RUN --mount could trick the feature that removes empty files created for the mountpoints into removing a file outside the container, from the host system.",
12+
"affected": [
13+
{
14+
"package": {
15+
"name": "github.com/moby/buildkit",
16+
"ecosystem": "Go"
17+
},
18+
"ranges": [
19+
{
20+
"type": "SEMVER",
21+
"events": [
22+
{
23+
"introduced": "0"
24+
},
25+
{
26+
"fixed": "0.12.5"
27+
}
28+
]
29+
}
30+
],
31+
"ecosystem_specific": {
32+
"imports": [
33+
{
34+
"path": "github.com/moby/buildkit/executor",
35+
"symbols": [
36+
"MountStubsCleaner"
37+
]
38+
}
39+
]
40+
}
41+
}
42+
],
43+
"references": [
44+
{
45+
"type": "ADVISORY",
46+
"url": "https://github.com/moby/buildkit/security/advisories/GHSA-4v98-7qmw-rqr8"
47+
},
48+
{
49+
"type": "FIX",
50+
"url": "https://github.com/moby/buildkit/pull/4603"
51+
},
52+
{
53+
"type": "WEB",
54+
"url": "https://github.com/moby/buildkit/releases/tag/v0.12.5"
55+
}
56+
],
57+
"credits": [
58+
{
59+
"name": "@rmcnamara-snyk"
60+
}
61+
],
62+
"database_specific": {
63+
"url": "https://pkg.go.dev/vuln/GO-2024-2494"
64+
}
65+
}

data/reports/GO-2024-2494.yaml

Lines changed: 26 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,26 @@
1+
id: GO-2024-2494
2+
modules:
3+
- module: github.com/moby/buildkit
4+
versions:
5+
- fixed: 0.12.5
6+
vulnerable_at: 0.12.4
7+
packages:
8+
- package: github.com/moby/buildkit/executor
9+
symbols:
10+
- MountStubsCleaner
11+
fix_link: https://github.com/moby/buildkit/commit/00fe637d43aba66f0937f5bdf4b9fc96991794fd
12+
summary: Host system modification in github.com/moby/buildkit
13+
description: |-
14+
A malicious BuildKit frontend or Dockerfile using RUN --mount could trick
15+
the feature that removes empty files created for the mountpoints into
16+
removing a file outside the container, from the host system.
17+
cves:
18+
- CVE-2024-23652
19+
ghsas:
20+
- GHSA-4v98-7qmw-rqr8
21+
credits:
22+
- '@rmcnamara-snyk'
23+
references:
24+
- advisory: https://github.com/moby/buildkit/security/advisories/GHSA-4v98-7qmw-rqr8
25+
- fix: https://github.com/moby/buildkit/pull/4603
26+
- web: https://github.com/moby/buildkit/releases/tag/v0.12.5

0 commit comments

Comments
 (0)