Nixpkgs Security Tracker

Login with GitHub

Suggestions search

With package: buildkit

Found 2 matching suggestions

View:
Compact
Detailed
Published
updated 21 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    7 packages
    • buildkit-nix
    • buildkite-cli
    • buildkite-agent
    • buildkite-agent-metrics
    • buildkite-test-collector-rust
    • terraform-providers.buildkite
    • terraform-providers.buildkite_buildkite
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
BuildKit Git URL subdir component can cause access to restricted files

BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. Prior to version 0.28.1, insufficient validation of Git URL fragment subdir components may allow access to files outside the checked-out Git repository root. Possible access is limited to files on the same mounted filesystem. The issue has been fixed in version v0.28.1 The issue affects only builds that use Git URLs with a subpath component. As a workaround, avoid building Dockerfiles from untrusted sources or using the subdir component from an untrusted Git repository where the subdir component could point to a symlink.

Affected products

buildkit
  • ==< 0.28.1

Matching in nixpkgs

Ignored packages (7)

Package maintainers

Advisory: https://github.com/moby/buildkit/security/advisories/GHSA-4vrq-3vrq-g6gg
Published
Permalink CVE-2026-33747
8.4 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 21 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    7 packages
    • buildkit-nix
    • buildkite-cli
    • buildkite-agent
    • buildkite-agent-metrics
    • buildkite-test-collector-rust
    • terraform-providers.buildkite
    • terraform-providers.buildkite_buildkite
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
BuildKit vulnerable to malicious frontend causing file escape outside of storage root

BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. Prior to version 0.28.1, when using a custom BuildKit frontend, the frontend can craft an API message that causes files to be written outside of the BuildKit state directory for the execution context. The issue has been fixed in v0.28.1. The vulnerability requires using an untrusted BuildKit frontend set with `#syntax` or `--build-arg BUILDKIT_SYNTAX`. Using these options with a well-known frontend image like `docker/dockerfile` is not affected.

Affected products

buildkit
  • ==< 0.28.1

Matching in nixpkgs

Ignored packages (7)

Package maintainers

Advisory: https://github.com/moby/buildkit/security/advisories/GHSA-4c29-8rgm-jvjj