-
Notifications
You must be signed in to change notification settings - Fork 314
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE-2022-0185: heap overflow bug in legacy_parse_param() #2749
Comments
Scanning Report: [control: CVE-2022-0185-linux-kernel-container-escape - https://hub.armo.cloud/docs/c-0079] failed Environment We are using: Azure AKS 1.21.7 version OS Image- 18.04.6 TLS |
this is remediated in Kernel-version:5.4.0-1067-azure which we are working to deploy in AKS. |
@miwithro Thanks for sharing details. Do we need to upgrade AKS cluster from 1.21.7 to 1.22.X ? Or It will be only AKS Nodes/Image upgrade in K8S 1.21.7 Appreciate your response |
No this will not require an AKS upgrade but node image upgrade. Once we have the exact VHD details ready I will update the issue, so everyone knows which node image to upgrade too. |
@miwithro Thanks for your time and updates. |
Until the patched image is release I was able to deploy the mitigation "sysctl -w kernel.unprivileged_userns_clone=0" on all current and new created nodes through a daemonset. Example: Please don't forget to delete Daemonset after patched image is deployed. |
See updated Mitigations applied in the intro for everyone. Thank you. |
How do I get my AKS nodeimage to 1.24? The latest nodepool image I can update to from the portal is 2022.01.08 |
@adamshawvipps we are pushing the 2022.1.24 VHD out next week. |
Any update on when the new image is going to be pushed out this week? |
@michaelschmit Yes it will be rolled out to all Azure regions by 2022-02-07. |
We are running v1.20.7, once you are roll out the fix would we require to upgrade the AKS? |
@maria-pronin no just need to upgrade the node image not the AKS version |
What will be the recommended way of doing this trough az cli? |
@ninkaninus az aks upgrade -n <> -g <> --node-image-only |
May I know when will AKSUbuntu-1804-2022.01.24 be made available to West Europe region? When running |
@sosammy91 it should be available in "westeurope" by Wednesday. So please give it a try on Thursday to be safe. |
@miwithro Thanks for your updates on fix. How about UAE North/Central Region? I |
@miwithro In UAE North/Central, I can see the below image as the latest Image. "kubernetesVersion": "1.21.7", Can you please check and let me know when the 2022.01.24 image will be available for UAE Region. |
According to the release notes for the 2022-01-24 image it is using 5.4.0-1067 and not the remediated version you mentioned above. Is this version (5.4.0-1067) still vulnerable? Snippet from the release notes:
|
The Ubuntu CVE appears to suggest it may have been fixed in 5.4.0-1067.70~18.04.1. However I'm not sure how to correlate that with this thread given the slightly different format. |
@nnellanspdl the 2022-01-24 image is using the remediated kernel (5.4.0-1067.70). Will fix the Release Notes. @zohebs341 "uaenorth" is Wednesday as well. |
Just for those waiting for this, the image does not appear to be available in at least |
@tkent that is correct. Looking like Wednesday that image will hit "westus2" |
@miwithro when will the image hit the US Gov regions? |
@dauntlessXXI by this weekend. |
Still waiting on uscentral, do we have a time on when this might be available? |
Today I was trying to upgrade node image in 'westeurope', the latest node image is 20220119. Kindly help confirm the release time, many thanks. |
@tfbubu111 looks like I was about 1 day off. I see westeurope in the queue for the deployment in the next few hours. |
Interesting that I spun up a node today which is AKSUbuntu-1804gen2containerd-2022.01.24 running 5.4.0-1067-azure which is billed as patched. However the Azure Diagnostics for my cluster is warning me that I have CVE-2022-0185 - Linux Kernel Vulnerability on my nodes. |
@michaelspinks looks like an Azure Diagnostics issue. I am looking into it. Short answer is if you are running 2022.01.24 you are patched for CVE-2022-0185 |
Thanks for that @miwithro |
Before and after the image node upgrade I still see the same kernel version: root@aks-vmss2-73514419-vmss000000:/# uname -a I understand it should show 5.4.0-1067.70-azure rather than 5.4.0-1067-azure after the node image upgrade to "AKSUbuntu-1804gen2containerd-2022.01.24". |
According to this source: linux-azure-5.4 for Ubuntu 18.04 should have 5.4.0-1067.70 to fix CVE-2022-0185 My nodes are linux-azure-5.4 for Ubuntu 18.04: kubectl get nodes -o wide I have already upgraded to "AKSUbuntu-1804gen2containerd-2022.01.24": az aks nodepool show -g BereAKS1 -n vmss2 --cluster-name BereAKS1 --query nodeImageVersion However the kernel version still shows 5.4.0-1067-azure rather than 5.4.0-1067.70: root@aks-vmss2-73514419-vmss000000:/# uname -a |
That is still 5.4.0-1067.70 notice the -azure #70. This is all captured in the commit. |
Same as @Cristiano-Rosa, shouldn't the kernel be Our cluster is in West Europe. This is the output of
Node image version: |
Hi! I'm part of the Ubuntu kernel team and I would like to add some explanation on how our kernel versions work. We basically have two different version numbers: the kernel release number ( The debian package version is composed by the upstream major version ( The upload number is only used to allow us to upload a new version of the same debian kernel package when it has a build failure. So for example, if In this particular case, that means that the kernel with release number If you have any questions or concerns, please let me know. Thank you! |
If you want to easily validate VHD image version and kernel version at the same time, you can use kubectl's custom-columns feature: $ kubectl get nodes -o custom-columns=NAME:.metadata.name,IMAGE:.metadata.labels."kubernetes\.azure\.com/node-image-version",KERNEL:.status.nodeInfo.kernelVersion
NAME IMAGE KERNEL
aks-nodepool1-28048431-vmss000000 AKSUbuntu-1804gen2containerd-2022.01.24 5.4.0-1067-azure
aks-nodepool1-28048431-vmss000001 AKSUbuntu-1804gen2containerd-2022.01.24 5.4.0-1067-azure
aks-nodepool1-28048431-vmss000002 AKSUbuntu-1804gen2containerd-2022.01.24 5.4.0-1067-azure |
@miwithro @marcelocerri Hi Team, For the UAE North region - Still even after upgrading the node image, I can see the same versions. kubectl get nodes -o custom-columns=NAME:.metadata.name,IMAGE:.metadata.labels."kubernetes.azure.com/node-image-version",KERNEL:.status.nodeInfo.kernelVersion And from the portal, seems Microsoft has removed that vulnerability. As I don't see this URL and vulnerability from Microsoft Portal. Few days back, I was able to see this CVE in "Known Issues, Availability and Performance" tab. Why it has been removed from the portal and when can we expect an updated remediated version for UAE North region. |
@zohebs341 uaenorth was completed a while ago. 2022.01.24 should be the latest VHD image in that region. Please try to upgrade again. |
@miwithro Thank you. Upgraded again and this time it reflected. Hopefully, this image is free of vulnerabilities(Remediated one). (AKSUbuntu-1804gen2containerd-2022.01.24) kubectl get nodes -o custom-columns=NAME:.metadata.name,IMAGE:.metadata.labels."kubernetes.azure.com/node-image-version",KERNEL:.status.nodeInfo.kernelVersionNAME IMAGE KERNEL |
In the latest version of AKS Nodes, the value is "1". Again you will create a new image for this [CVE-2022-0185]? sysctl status kernel.unprivileged_userns_clonesysctl: cannot stat /proc/sys/status: No such file or directory AKS: 1.21.7 |
@zohebs341 I'm fairly sure that kernel.unprivileged_userns_clone=0 is only a mitigation and not the fix. The fix is a patch that removes the underflow vulnerability. This patch is part of the updated node image. |
Thanks for reaching out. I'm closing this issue as it was marked with "Answer Provided" and it hasn't had activity for 2 days. |
William Liu and Jamie Hill-Daniel discovered that the file system context functionality in the Linux kernel contained an integer underflow vulnerability, leading to an out-of-bounds write. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code.
Mitigation
AKS has applied the patch to node image version 2022.01.24
AKS Information:
Upgrade your node image to 2022.01.24.
AKS
-- | --
The text was updated successfully, but these errors were encountered: