On Fri, 21 Mar 2025 14:24:26 +0100 Moritz Mühlenhoff <j...@inutil.org> wrote:> The following vulnerability was published for docker-buildx.

CVE-2025-0495[0]:
| Buildx is a Docker CLI plugin that extends build capabilities using
| BuildKit.  Cache backends support credentials by setting secrets
| directly as attribute values in cache-to/cache-from configuration.
| When supplied as user input, these secure values may be
| inadvertently captured in OpenTelemetry traces as part of the
| arguments and flags for the traced CLI command. OpenTelemetry traces
| are also saved in BuildKit daemon's history records.   This
| vulnerability does not impact secrets passed to the Github cache
| backend via environment variables or registry authentication.

https://github.com/docker/buildx/security/advisories/GHSA-m4gq-fm9h-8q75
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

I pushed commit [b16d18a] to a branch as it is my first time fixing a CVE, I am not sure exactly what else I need to do.

From what I understand of the release notes [1], this commit should be enough to fix the CVE.

See also the diff for this release: https://github.com/docker/buildx/compare/v0.21.2...v0.21.3

[b16d18a]: https://salsa.debian.org/go-team/packages/docker-buildx/-/commit/b16d18af52c18d0a2d3499c7d0839d9da3a76f5b
[1]: https://github.com/docker/buildx/releases/tag/v0.21.3
--
Nicolas Peugnet

Reply via email to