ECS - Solution To Address CVE-2022-31231 Security Vulnerability On 3.5.x - 3.6.x - Dell US
ECS - Solution To Address CVE-2022-31231 Security Vulnerability On 3.5.x - 3.6.x - Dell US
Article Content
Symptoms
Cause
Improper Access Control in the Identity and Access Management (IAM) module.
Resolution
Impact of procedure:
Expect possible I/O timeouts while dataheadsvc services are restarted node by node. Applications should be accessing the cluster via a
Load balancer and must be able to handle the I/O timeout. A maintenance window is advised when performing this procedure.
Bucket Temp
Replication Owner Owner
API FS Versioning Failed
Bucket Name Namespace Group User VDC
Type Enabled Enabled (TSO)
Examples:
An 48 node VDC system can take approximately 80 mins:
60 seconds X 48 (Number of VDC nodes) + 30 minutes (preparation) = 80 mins approx.
Q: If I upgrade ECS after running this procedure, do I rerun the procedure post upgrade?
A: No, if upgrading to a code version specified in DSA-2022-153 which has the permanent fix. Yes, if upgrading to a code
version not specified in this same DSA.
Q: Does the patch need to be reapplied on a system where it was previously installed after a node replacement, reimage, or expansion?
A: No, if the VDC is at the code version that is specified in DSA-2022-153 which has the permanent fix. Yes, if doing any of these actions
against a VDC running a code version not specified in this same DSA. Where the patch is required for these scenarios, the Dell engineer
in question will contact to inform that update is required.
Q: What if I'm only using legacy users and not using IAM?
A: Customers need to apply the patch regardless if using only legacy users and not IAM.
Q: What user should you be logged in as to execute all commands in this KB?
A: admin
Q: Does svc_patch have to be run on all racks or with a specialized MACHINES file where multiple racks in a VDC?
A: No, it autodetects if multiple racks exist and patches all nodes on all racks on that VDC.
Resolution Summary:
Resolution Steps:
1. Upgrade your ECS xDoctor software to latest Version available.
a. Check xDoctor version running on your system. If the version is 4.8-84.0 or later, move to step 2 "Run Prechecks". If not,
proceed with the steps below.
Command:
# sudo xdoctor --version
Example:
admin@node1:~> sudo xdoctor --version
4.8-84.0
b. Sign to the Dell Support Site, connect directly to this download link, search for xDoctor using the keyword search bar, and
click on xDoctor 4.8-84.0 RPM link to download. If you wish to view the Release notes, follow the Release Notes, select
Manuals and documents from the sidebar from where they should be available for download.
c. Once the RPM is downloaded, use any remote SCP program to upload the file to the /home/admin directory on the first ECS
node.
d. Once the upload is complete, SSH to the first node of the ECS system using admin.
e. Upgrade xDoctor on all the nodes with the newly distributed version.
Command:
# sudo xdoctor --upgrade --local=/home/admin/xDoctor4ECS-4.8-84.0.noarch.rpm
Example:
admin@ecs-n1:~> sudo xdoctor --upgrade --local=/home/admin/xDoctor4ECS-4.8-84.0.noarch.rpm
2022-07-04 07:41:49,209: xDoctor_4.8-83.0 - INFO : xDoctor Upgrader Instance (1:SFTP_ONLY)
2022-07-04 07:41:49,210: xDoctor_4.8-83.0 - INFO : Local Upgrade (/home/admin/xDoctor4ECS-4.8-
84.0.noarch.rpm)
2022-07-04 07:41:49,226: xDoctor_4.8-83.0 - INFO : Current Installed xDoctor version is 4.8-83.0
2022-07-04 07:41:49,242: xDoctor_4.8-83.0 - INFO : Requested package version is 4.8-84.0
2022-07-04 07:41:49,242: xDoctor_4.8-83.0 - INFO : Updating xDoctor RPM Package (RPM)
2022-07-04 07:41:49,293: xDoctor_4.8-83.0 - INFO : - Distribute package
2022-07-04 07:41:50,759: xDoctor_4.8-83.0 - INFO : - Install new rpm package
2022-07-04 07:42:04,401: xDoctor_4.8-83.0 - INFO : xDoctor successfully updated to version 4.8-84.0
f. If the environment is a multi-rack VDC, the new xDoctor package must be installed on the first node of each rack. To identify
these rack primaries, run the below command. In this instance, there are four racks and therefore four rack primaries
highlighted
Command:
# svc_exec -m "ip address show private.4 |grep -w inet"
Example:
admin@ecsnode1~> svc_exec -m "ip address show private.4 |grep -w inet"
svc_exec v1.0.2 (svc_tools v2.1.0) Started 2021-12-20 14:03:33
Example:
admin@ecs-n1: scp xDoctor4ECS-4.8-84.0.noarch.rpm 169.254.2.1:/home/admin/
xDoctor4ECS-4.8-84.0.noarch.rpm
100% 32MB 31.9MB/s 00:00
admin@ecsnode1~> scp xDoctor4ECS-4.8-84.0.noarch.rpm 169.254.3.1:/home/admin/
xDoctor4ECS-4.8-84.0.noarch.rpm
100% 32MB 31.9MB/s 00:00
admin@ecsnode1~> scp xDoctor4ECS-4.8-784.0.noarch.rpm 169.254.4.1:/home/admin/
xDoctor4ECS-4.8-84.0.noarch.rpm
100% 32MB 31.9MB/s 00:00
admin@ecsnode1~>
3. Per step 1 above, run the same xDoctor install command on each of the above rack primaries identified previously.
Command:
# sudo xdoctor --upgrade --local=/home/admin/xDoctor4ECS-4.8-84.0.noarch.rpm
2. Run Prechecks
a. Use svc_dt command to check if DTs are stable. DTs are stable if "Unready #" column shows 0. If yes, go to the next
check. If no, wait 15 minutes and check again. If DTs have not stabilized, open a service request with ECS support team.
Command:
# svc_dt check -b
Example:
admin@ecs-n1: svc_dt check -b
Command:
# /opt/emc/xdoctor/patches/CVE-2022-31231_iam-fix/svc_patch status
Example:
admin@ecs-n1:~> /opt/emc/xdoctor/patches/CVE-2022-31231_iam-fix/svc_patch status
svc_patch Version 2.9.2
3. Apply the system patch with svc_patch tool included with xDoctor.
a. Run svc_patch command, type "y" and press "Enter" key when prompted to install the patch. The command can run on any
ECS node.
Commands:
# screen -S patchinstall
# unset TMOUT
# /opt/emc/xdoctor/patches/CVE-2022-31231_iam-fix/svc_patch install
Example:
Note: There is a prompt to proceed in the output below.
admin@ecs-n1:~> screen -S patchinstall
admin@ecs-n1:~> unset TMOUT
admin@ecs-n1:~> /opt/emc/xdoctor/patches/CVE-2022-31231_iam-fix/svc_patch install
svc_patch Version 2.9.2
Patching complete.
b. Exit the screen session when patching completed per the above output.
Example:
admin@node1:/> exit
logout
[screen is terminating]
admin@node1:/>
Note:
If you accidently close the PuTTY session while execution is in progress, you can reattach by logging back into the same
node and run the below command:
Command:
# screen -ls
admin@node 1:~> screen -ls
There is a screen on:
113275.pts-0.ecs-n3 (Detached)
1 Socket in /var/run/uscreens/S-admin.
a. The output below is from a system where the fix has been applied.
Command:
# /opt/emc/xdoctor/patches/CVE-2022-31231_iam-fix/svc_patch status
Example:
admin@ecs-n1:~> /opt/emc/xdoctor/patches/CVE-2022-31231_iam-fix/svc_patch status
svc_patch Version 2.9.2
b. The output below is from a system where the fix has not been applied.
Example:
admin@ecs-n1:~> /opt/emc/xdoctor/patches/CVE-2022-31231_iam-fix/svc_patch status
svc_patch Version 2.9.2
Troubleshooting
1. Patch reports below error while doing precheck. In this scenario contact remote support who will provided customer Isolated
Patch for specific environment
Example:
admin@ecs-n1 /opt/emc/xdoctor/patches/CVE-2022-31231_iam-fix/svc_patch status
svc_patch Version 2.9.2
2. Failed to add the host to the list of known hosts while applying patch.
Example:
svc_patch Version 2.9.2
Resolution:
The reason could be user of file /home/admin/.ssh/known_hosts was root which should be admin by default.
Example:
admin@node1:~> ls -l /home/admin/.ssh/known_hosts
-rw------- 1 root root 1802 Jul 23 2019 /home/admin/.ssh/known_hosts
admin@ecs:~>
To fix the issue from another PuTTY session, log on to the reported node or nodes and change the user to admin on the nodes
where it is present as root user using below command on all the reported nodes:
Command:
# sudo chown admin:users /home/admin/.ssh/known_hosts
Example:
admin@node1:~> sudo chown admin:users /home/admin/.ssh/known_hosts
Now rerun the the svc_patch command again and it should pass
admin@node1:~> /opt/emc/xdoctor/patches/CVE-2022-31231_iam-fix/svc_patch install
3. Could not execute commands on the object-main container on 169.254.x.x due to incorrect host key in
/home/admin/.ssh/known_hosts.
Example:
svc_patch Version 2.9.2
Resolution:
Contact ECS support for a resolution.
4. When using xDoctor version 4.8-85.0 release in prechecks or applying this patch you may get an alert outlining the md5sum did
not match for svc_base.py:
# /opt/emc/xdoctor/patches/CVE-2022-31231_iam-fix/svc_patch status
svc_patch Version 2.9.3
Patch bundle consistency check failed - md5sums for one or more files
in the patch bundle were invalid, or files were not found.
svc_patch will attempt to validate files in the patch using MD5SUMS.bundle, which
is bundled with the patch.
Resolution:
Run the below command prior to applying the patch to update the md5sum:
# sudo sed -i '/svc_base.py/d' /opt/emc/xdoctor/patches/CVE-2022-31231_iam-fix/MD5SUMS.bundle
# sudo sed -i '/MD5SUMS.bundle/d' /opt/emc/xdoctor/.xdr_chksum
Article Properties
Version
24
Article Type
Solution