CloudCore UDS Server: Malicious Message can crash CloudCore
Moderate severity
GitHub Reviewed
Published
Jun 24, 2022
in
kubeedge/kubeedge
•
Updated Jan 27, 2023
Package
Affected versions
= 1.10.0
< 1.9.3
Patched versions
1.10.1
1.9.3
Description
Published to the GitHub Advisory Database
Jun 25, 2022
Reviewed
Jun 25, 2022
Published by the National Vulnerability Database
Jun 27, 2022
Last updated
Jan 27, 2023
Impact
A malicious message can crash CloudCore by triggering a null-pointer dereference in the UDS Server. Since the UDS Server only communicates with the CSI Driver on the cloud side, the attack is limited to the local host network. As such, an attacker would already need to be an authenticated user of the Cloud.
It will be affected only when users turn on the unixsocket switch in the config file
cloudcore.yaml
as below:Patches
This bug has been fixed in Kubeedge 1.11.0, 1.10.1, and 1.9.3. Users should update to these versions to resolve the issue.
Workarounds
Disable the unixsocket switch of CloudHub in the config file
cloudcore.yaml
.References
NA
Credits
Thanks David Korczynski and Adam Korczynski of ADA Logics for responsibly disclosing this issue in accordance with the kubeedge security policy during a security audit sponsored by CNCF and facilitated by OSTIF.
For more information
If you have any questions or comments about this advisory:
Notes: This vulnerability was found by fuzzing KubeEdge by way of OSS-Fuzz.
References