Origin Validation Error Affecting github.com/moby/moby/daemon/containerd package, versions <24.0.9>=25.0.0 <25.0.2


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.05% (24th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-GITHUBCOMMOBYMOBYDAEMONCONTAINERD-6226580
  • published2 Feb 2024
  • disclosed1 Feb 2024
  • creditPaweÅ‚ Gronowski, Djordje Lukic

Introduced: 1 Feb 2024

CVE-2024-24557  (opens in a new tab)
CWE-346  (opens in a new tab)

How to fix?

Upgrade github.com/moby/moby/daemon/containerd to version 24.0.9, 25.0.2 or higher.

Overview

Affected versions of this package are vulnerable to Origin Validation Error via the image build process. An attacker with knowledge of the Dockerfile in use could poison the cache by inducing the pull of a specially crafted image that would be considered a valid cache candidate for certain build steps.

Note:

Version 23.0+ users are only affected if they explicitly opted out of Buildkit DOCKER_BUILDKIT=0 environment variable or are using the /build API endpoint, which uses the classic builder by default.

Workaround

  1. Use --no-cache or use Buildkit if possible DOCKER_BUILDKIT=1, it's default on 23.0+ assuming that the buildx plugin is installed.

  2. Use Version = types.BuilderBuildKit or NoCache = true in ImageBuildOptions for ImageBuild call.

References

CVSS Scores

version 3.1