flatcar / Flatcar

Flatcar project repository for issue tracking, project documentation, etc.

Home Page:https://www.flatcar.org/

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Prisma Twistlock Flagging 6 Containerd Vulnerabilities in Flatcar 3510.3.3 LTS

justdan96 opened this issue · comments

commented

Name: containerd

CVEs:
CVE-2022-1996
CVE-2023-27561
CVE-2024-21626
CVE-2023-47108
CVE-2023-44487

CVSSs:
CVE-2022-1996 = 9.1
CVE-2023-27561 = 7.0
CVE-2024-21626 = 8.6
CVE-2023-47108 = 7.5
CVE-2023-44487 = 5.3

Action Needed:
These have been flagged by Prisma Twistlock so will likely need some further analysis. If they are false positives that would be good news for us!

Summary:
We have been using Flatcar LTS Kubernetes nodes in our Lab environments. On these environments we are running the security DaemonSet Palo Alto Prisma Twistlock. From Prisma we can see the vulnerabilities flagged above. Here they are in a table format:

CVE ID Severity Package Version Package Path CVSS Package URL
CVE-2022-1996 critical v2.9.5 /run/torcx/unpack/docker/bin/containerd 9.1 pkg:golang/github.com/emicklei/go-restful@v2.9.5
CVE-2023-27561 high v1.1.2 /run/torcx/unpack/docker/bin/containerd 7.0 pkg:golang/github.com/opencontainers/runc@v1.1.2
CVE-2024-21626 high v1.1.2 /run/torcx/unpack/docker/bin/containerd 8.6 pkg:golang/github.com/opencontainers/runc@v1.1.2
CVE-2023-47108 high v0.28.0 /run/torcx/unpack/docker/bin/containerd 7.5 pkg:golang/go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.28.0
CVE-2023-44487 high v0.0.0-20220722155237-a158d28d115b /run/torcx/unpack/docker/bin/containerd 5.3 pkg:golang/golang.org/x/net@v0.0.0-20220722155237-a158d28d115b
CVE-2023-44487 high v1.47.0 /run/torcx/unpack/docker/bin/containerd 5.3 pkg:golang/google.golang.org/grpc@v1.47.0

As you can see it delves into Golang dependencies so if these vulnerabilities have been incorrectly flagged then I can just take that information back to our internal security team.

refmap.gentoo: TBD

Just mentioning what we said in the chat:

so I checked and it looks like, due to the critical aspect, that LTS 3510.3.2 has the runc update: https://www.flatcar.org/releases#release-3510.3.2
FWIW, you can update docker / containerd / runc using sysext image. I would be curious to see if your vulnerability scan show the same result after :

---
variant: flatcar
version: 1.1.0
storage:
  files:
    - path: /etc/extensions/docker.raw
      contents:
        source: https://github.com/flatcar/sysext-bakery/releases/download/latest/docker-24.0.9-x86-64.raw
    - path: /etc/systemd/system-generators/torcx-generator
commented

Some of this was discussed on Matrix but it was flagged that for CVE-2022-1996, as described in containerd/containerd#7117, the vulnerability only affects CORS which containerd does not use. The runc vulnerabilities CVE-2023-27561 and CVE-2024-21626 seem to affect runc itself and I haven't been able to find if it can affect specifically containerd. CVE-2023-47108 is for DoS with the opentelemetry-go library, and CVE-2023-44487 is a DoS when using HTTP/2. These last two we do not expect to cause any issues as containerd is not exposed for remote access and the attacks would require the attacker to already have access to the local machine.

Overall I think these are fine and we should be able to get exceptions for these detected vulnerabilities.