Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Prisma Twistlock Flagging 6 Containerd Vulnerabilities in Flatcar 3510.3.3 LTS #1455

Closed
justdan96 opened this issue May 22, 2024 · 2 comments
Labels

Comments

@justdan96
Copy link

justdan96 commented May 22, 2024

Name: containerd

CVEs:
CVE-2022-1996
CVE-2023-27561
CVE-2024-21626
CVE-2023-47108
CVE-2023-44487

CVSSs:
CVE-2022-1996 = 9.1
CVE-2023-27561 = 7.0
CVE-2024-21626 = 8.6
CVE-2023-47108 = 7.5
CVE-2023-44487 = 5.3

Action Needed:
These have been flagged by Prisma Twistlock so will likely need some further analysis. If they are false positives that would be good news for us!

Summary:
We have been using Flatcar LTS Kubernetes nodes in our Lab environments. On these environments we are running the security DaemonSet Palo Alto Prisma Twistlock. From Prisma we can see the vulnerabilities flagged above. Here they are in a table format:

CVE ID Severity Package Version Package Path CVSS Package URL
CVE-2022-1996 critical v2.9.5 /run/torcx/unpack/docker/bin/containerd 9.1 pkg:golang/github.com/emicklei/[email protected]
CVE-2023-27561 high v1.1.2 /run/torcx/unpack/docker/bin/containerd 7.0 pkg:golang/github.com/opencontainers/[email protected]
CVE-2024-21626 high v1.1.2 /run/torcx/unpack/docker/bin/containerd 8.6 pkg:golang/github.com/opencontainers/[email protected]
CVE-2023-47108 high v0.28.0 /run/torcx/unpack/docker/bin/containerd 7.5 pkg:golang/go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/[email protected]
CVE-2023-44487 high v0.0.0-20220722155237-a158d28d115b /run/torcx/unpack/docker/bin/containerd 5.3 pkg:golang/golang.org/x/[email protected]
CVE-2023-44487 high v1.47.0 /run/torcx/unpack/docker/bin/containerd 5.3 pkg:golang/google.golang.org/[email protected]

As you can see it delves into Golang dependencies so if these vulnerabilities have been incorrectly flagged then I can just take that information back to our internal security team.

refmap.gentoo: TBD

@tormath1
Copy link
Contributor

Just mentioning what we said in the chat:

so I checked and it looks like, due to the critical aspect, that LTS 3510.3.2 has the runc update: https://www.flatcar.org/releases#release-3510.3.2
FWIW, you can update docker / containerd / runc using sysext image. I would be curious to see if your vulnerability scan show the same result after :

---
variant: flatcar
version: 1.1.0
storage:
  files:
    - path: /etc/extensions/docker.raw
      contents:
        source: https://github.com/flatcar/sysext-bakery/releases/download/latest/docker-24.0.9-x86-64.raw
    - path: /etc/systemd/system-generators/torcx-generator

@justdan96
Copy link
Author

justdan96 commented May 23, 2024

Some of this was discussed on Matrix but it was flagged that for CVE-2022-1996, as described in containerd/containerd#7117, the vulnerability only affects CORS which containerd does not use. The runc vulnerabilities CVE-2023-27561 and CVE-2024-21626 seem to affect runc itself and I haven't been able to find if it can affect specifically containerd. CVE-2023-47108 is for DoS with the opentelemetry-go library, and CVE-2023-44487 is a DoS when using HTTP/2. These last two we do not expect to cause any issues as containerd is not exposed for remote access and the attacks would require the attacker to already have access to the local machine.

Overall I think these are fine and we should be able to get exceptions for these detected vulnerabilities.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

2 participants