ghsa-m4gq-fm9h-8q75
Vulnerability from github
Impact
Some cache backends allow configuring their credentials by setting secrets directly as attribute values in cache-to/cache-from
configuration. If this was done by the user, these secure values could be captured together with OpenTelemetry trace as part of the arguments and flags for the traced CLI command. Passing tokens to Github cache backend via environment variables or using registry authentication is not affected.
If you passed a token value like this and use a custom OpenTelemetry collector for computing traces you should make sure that your traces are kept secure. OpenTelemetry traces are also saved in BuildKit daemon's history records.
Patches
Issue has been fixed in Buildx v0.21.3 or newer.
Workarounds
Avoid passing cache backend credentials with CLI arguments. Make sure access to traces and BuildKit history records is kept secure.
{ "affected": [ { "database_specific": { "last_known_affected_version_range": "\u003c= 0.21.2" }, "package": { "ecosystem": "Go", "name": "github.com/docker/buildx" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "0.21.3" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2025-0495" ], "database_specific": { "cwe_ids": [ "CWE-532" ], "github_reviewed": true, "github_reviewed_at": "2025-03-17T21:27:43Z", "nvd_published_at": "2025-03-17T20:15:13Z", "severity": "MODERATE" }, "details": "### Impact\nSome cache backends allow configuring their credentials by setting secrets directly as attribute values in `cache-to/cache-from` configuration. If this was done by the user, these secure values could be captured together with OpenTelemetry trace as part of the arguments and flags for the traced CLI command. Passing tokens to Github cache backend via environment variables or using registry authentication is not affected.\n\nIf you passed a token value like this and use a custom OpenTelemetry collector for computing traces you should make sure that your traces are kept secure. OpenTelemetry traces are also saved in BuildKit daemon\u0027s history records.\n\n### Patches\nIssue has been fixed in Buildx v0.21.3 or newer.\n\n### Workarounds\nAvoid passing cache backend credentials with CLI arguments. Make sure access to traces and BuildKit history records is kept secure.", "id": "GHSA-m4gq-fm9h-8q75", "modified": "2025-03-17T21:51:49Z", "published": "2025-03-17T21:27:43Z", "references": [ { "type": "WEB", "url": "https://github.com/docker/buildx/security/advisories/GHSA-m4gq-fm9h-8q75" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-0495" }, { "type": "WEB", "url": "https://github.com/docker/buildx/commit/18ccba072076ddbfb0aeedd6746d7719b0729b58" }, { "type": "PACKAGE", "url": "https://github.com/docker/buildx" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:L/VI:N/VA:N/SC:H/SI:N/SA:N", "type": "CVSS_V4" } ], "summary": "buildx allows a possible credential leakage to telemetry endpoint" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.