{
  "threat_severity" : "Important",
  "public_date" : "2024-01-31T00:00:00Z",
  "bugzilla" : {
    "description" : "moby/buildkit: Buildkit's interactive containers API does not validate entitlements check",
    "id" : "2262226",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2262226"
  },
  "cvss3" : {
    "cvss3_base_score" : "7.0",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
    "status" : "draft"
  },
  "cwe" : "CWE-863",
  "details" : [ "BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. In addition to running containers as build steps, BuildKit also provides APIs for running interactive containers based on built images. It was possible to use these APIs to ask BuildKit to run a container with elevated privileges. Normally, running such containers is only allowed if special `security.insecure` entitlement is enabled both by buildkitd configuration and allowed by the user initializing the build request. The issue has been fixed in v0.12.5 . Avoid using BuildKit frontends from untrusted sources.", "A vulnerability was found in the Moby Builder Toolkit, specifically in the Interactive Containers API, where entitlement checks are not adequately validated, caused by a missing privilege check in a GRPC endpoint when called using a custom syntax format. This flaw allows the currently running privileged container to leverage its elevated privileges, such as full Linux capabilities, to break out of the container and achieve complete host root command execution. This issue may lead to container escape to the underlying host OS when building an image using a malicious Dockerfile or upstream image (for example, when using FROM)." ],
  "statement" : "This vulnerability can only be exploited when a container execution is part of the build steps of another container. Additionally, an attacker needs to trick a user or process into processing an malicious Buildkit frontend. For these reasons, this flaw was rated with an important severity.\nThe risk of this vulnerability is to systems which build containers. It could have significant consequences to an organization's ability to release new versions of their software.\nRed Hat has reviewed and removed previously listed \"Not Affected\" components from this CVE page to reduce confusion around containers/components",
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2024-23653\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-23653\nhttps://github.com/moby/buildkit/pull/4602\nhttps://github.com/moby/buildkit/security/advisories/GHSA-wr6v-9f75-vh2g\nhttps://pkg.go.dev/vuln/GO-2024-2497\nhttps://snyk.io/blog/cve-2024-23653-buildkit-grpc-securitymode-privilege-check/" ],
  "csaw" : true,
  "name" : "CVE-2024-23653",
  "mitigation" : {
    "value" : "Do not use BuildKit frontends from untrusted sources.",
    "lang" : "en:us"
  }
}