Hello KubeEdge Community,
Two security issue was discovered in KubeEdge:
· A malicious message can crash CloudCore by triggering a nil-pointer dereference in the UDS Server. This issue has been rated Moderate and assigned CVE-2022-31076.
Score: 4.2, CVSS link is https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
· A malicious message response from KubeEdge can crash the CSI Driver controller server by triggering a nil-pointer dereference panic. This issue has been rated Moderate and assigned CVE-2022-31077.
Score: 4.0, CVSS link is https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H
· Issue CVE-2022-31076:
It will be affected only when users turn on the unixsocket switch in the config file cloudcore.yaml as below:

· Issue CVE-2022-31077:
When the user launches the csidriver then CloudCore may be attacked.
The issues were found as a build failure by OSS-Fuzz. As for the module CSI driver and UDS server of CloudCore, a double pointer parameter is passed to json.Unmarshal(). If json.Unmarshal() is passed the bytes []byte{“n”, “u”, “l”, “l”} as its first parameter and a double pointer as its second, the struct to which the buffer should be unmarshalled (passed as the second parameter) will be nil.
A similar issue was found in another open source project that Ada Logics previously contributed security work to. See https://adalogics.com/blog/fuzzing-istio-cve-CVE-2022-23635 for more info which describes the root cause in more detail.
If you find evidence that this vulnerability has been exploited, please contact cncf-kubeed...@lists.cncf.io
See the GitHub advisory for more details:
· CVE-2022-31076: Please see https://github.com/kubeedge/kubeedge/security/advisories/GHSA-8f4f-v9x5-cg6j for more details.
· CVE-2022-31077: Please see https://github.com/kubeedge/kubeedge/security/advisories/GHSA-x938-fvfw-7jh5 for more details.
These vulnerabilities were reported by David Korczynski and Adam Korczynski of ADA Logics during a security audit sponsored by CNCF and facilitated by OSTIF.
The issues was fixed and coordinated by KubeEdge sig-security and Security Team.
Thank You,
Vincent on behalf of the KubeEdge Security Team