Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-36621: n/a

0
Medium
VulnerabilityCVE-2024-36621cvecve-2024-36621
Published: Fri Nov 29 2024 (11/29/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

moby v25.0.5 is affected by a Race Condition in builder/builder-next/adapters/snapshot/layer.go. The vulnerability could be used to trigger concurrent builds that call the EnsureLayer function resulting in resource leaks/exhaustion.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 03:31:54 UTC

Technical Analysis

CVE-2024-36621 identifies a race condition vulnerability in moby version 25.0.5, specifically within the builder component's snapshot layer implementation (builder/builder-next/adapters/snapshot/layer.go). The flaw occurs when multiple concurrent builds invoke the EnsureLayer function simultaneously, causing a race condition that leads to resource leaks or exhaustion. This can degrade system performance or cause denial of service by exhausting memory or other critical resources. The vulnerability is classified under CWE-362 (Race Condition), highlighting improper synchronization in concurrent operations. The CVSS v3.1 base score is 6.5, reflecting a medium severity level with network attack vector, low attack complexity, requiring privileges but no user interaction, and impacting availability only. No known exploits have been reported in the wild, and no patches have been published yet. The vulnerability affects container build environments using moby, a foundational container image builder used in Docker and related container ecosystems. Exploitation could disrupt container build pipelines, impacting development and deployment workflows. The absence of patches necessitates cautious operational adjustments to mitigate risk until fixes are available.

Potential Impact

The primary impact of CVE-2024-36621 is denial of service through resource exhaustion caused by concurrent build operations in moby. Organizations relying on moby for container image building may experience degraded performance, build failures, or system instability, potentially disrupting continuous integration and deployment pipelines. This can delay software delivery and increase operational costs. In cloud environments or large-scale container orchestration platforms, the vulnerability could be leveraged to cause widespread service interruptions. Although the vulnerability does not directly compromise confidentiality or integrity, the availability impact can indirectly affect business operations and service reliability. The requirement for low privileges limits exploitation to authenticated users or internal processes, reducing external attack surface but increasing risk from insider threats or compromised accounts. The lack of public exploits currently reduces immediate risk but does not eliminate the threat, especially as awareness grows.

Mitigation Recommendations

Until an official patch is released, organizations should implement specific mitigations to reduce exposure. These include limiting the number of concurrent builds or serializing build operations to avoid triggering the race condition. Monitoring resource usage during builds can help detect abnormal leaks early. Employing container build isolation and resource quotas can contain the impact of potential exhaustion. Reviewing and restricting user privileges to minimize who can initiate builds reduces attack vectors. Keeping moby and related container tooling updated and subscribing to vendor advisories ensures timely application of patches once available. Additionally, consider integrating build retries and failure handling in CI/CD pipelines to gracefully manage transient build disruptions. Security teams should also audit build logs for anomalies indicative of exploitation attempts. Finally, engaging with the moby community or maintainers for status updates on patches is recommended.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-05-30T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c61b7ef31ef0b56380e

Added to database: 2/25/2026, 9:40:49 PM

Last enriched: 2/28/2026, 3:31:54 AM

Last updated: 4/12/2026, 5:05:54 PM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses