-
Notifications
You must be signed in to change notification settings - Fork 150
Investigating vulnerabilities CVE-2013-0290 and CVE-2015-8787 #205
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: dev
Are you sure you want to change the base?
Changes from 8 commits
d22b44d
a842c6a
28d7a7d
afb7fc8
da16ab9
98b7649
4b8f04c
1d9beb4
ce4f324
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|
@@ -19,14 +19,14 @@ curated_instructions: | | |||||||||||||||||||
| This will enable additional editorial checks on this file to make sure you | ||||||||||||||||||||
| fill everything out properly. If you are a student, we cannot accept your work | ||||||||||||||||||||
| as finished unless curated is properly updated. | ||||||||||||||||||||
| curation_level: 0 | ||||||||||||||||||||
| curation_level: 2 | ||||||||||||||||||||
| reported_instructions: | | ||||||||||||||||||||
| What date was the vulnerability reported to the security team? Look at the | ||||||||||||||||||||
| security bulletins and bug reports. It is not necessarily the same day that | ||||||||||||||||||||
| the CVE was created. Leave blank if no date is given. | ||||||||||||||||||||
|
|
||||||||||||||||||||
| Please enter your date in YYYY-MM-DD format. | ||||||||||||||||||||
| reported_date: | ||||||||||||||||||||
| reported_date: '2013-02-12' | ||||||||||||||||||||
| announced_instructions: | | ||||||||||||||||||||
| Was there a date that this vulnerability was announced to the world? You can | ||||||||||||||||||||
| find this in changelogs, blogs, bug reports, or perhaps the CVE date. | ||||||||||||||||||||
|
|
@@ -55,7 +55,10 @@ description_instructions: | | |||||||||||||||||||
|
|
||||||||||||||||||||
| Your target audience is people just like you before you took any course in | ||||||||||||||||||||
| security | ||||||||||||||||||||
| description: | ||||||||||||||||||||
| description: | | ||||||||||||||||||||
| The __skb_recv_datagram function in net/core/datagram.c in the Linux kernel | ||||||||||||||||||||
| didn't handle an MSG_PEEK flag with zero-length data. This locked the system | ||||||||||||||||||||
| in an infinite loop and could result in a denial of service. | ||||||||||||||||||||
|
||||||||||||||||||||
| bounty_instructions: | | ||||||||||||||||||||
| If you came across any indications that a bounty was paid out for this | ||||||||||||||||||||
| vulnerability, fill it out here. Or correct it if the information already here | ||||||||||||||||||||
|
|
@@ -75,7 +78,7 @@ bugs_instructions: | | |||||||||||||||||||
| * Mentioned in mailing list discussions | ||||||||||||||||||||
| * References from NVD entry | ||||||||||||||||||||
| * Various other places | ||||||||||||||||||||
| bugs: [] | ||||||||||||||||||||
| bugs: [911473] | ||||||||||||||||||||
|
||||||||||||||||||||
| bugs: [911473] | |
| bugs: | |
| - https://bugzilla.redhat.com/show_bug.cgi?id=911473 |
Outdated
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think this could be refined a bit, consider:
| answer: | | |
| The vulnerability was discovered by a developer, | |
| Tommi Rantala <[email protected]>, testing the code with a fuzzer | |
| answer: | | |
| The vulnerability was discovered by Tommi Rantala <[email protected]> | |
| by testing the code using Trinity, a Linux system call fuzzer. |
I am assuming the trinity in the commit torvalds/linux@3f518bf message is this: https://github.com/kernelslacker/trinity
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This threw me off too in my work. I think this is false. I can't seem to find information on Tommi Rantala being a Linux Kernel developer or Google developer. I think he was just a contributor. His email is just standard gmail. Confirm before you make the change.
| developer: true | |
| developer: false |
Edit: I see it was signed off by Eric Dumazet, a Google developer. So I'm not sure what to do for this one...
Outdated
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is a good start, but consider stating that yes this can be discovered through automated means because it was discovered through automated means. Or/and explain a little more why this type of vulnerability is autodiscoverable.
For one of my CVEs i put:
note: |
The vulnerability was discovered using Google's syzkaller fuzzer. This
demonstrates that it's not only possible, but proven, that automated tools
can be used to uncover similar vulnerabilities.I think even I could expand on what similar vulnerabilities. means.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Did you come to this conclusion after researching the CVE or was this mentioned in a bug report or commit?
Outdated
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I chose not to put my vulnerability-contributing commits as interesting commits, but I think this is fine.
I would definitely reword that note. It's hard to understand. Consider:
| - commit: 3f518bf745cbd6007d8069100fb9cb09e960c872 | |
| note: | | |
| Interesting the initial commit which created the issue was made almost | |
| exactly a year before the vulnerability was fixed | |
| commits: | |
| - commit: 3f518bf745cbd6007d8069100fb9cb09e960c872 | |
| note: | | |
| The commit that first introduced the issue. It was made approximately one | |
| year prior to the discovery and resolution of the vulnerability. |
Outdated
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Although its interesting that there was about a year between discovery and resolution, it doesn't add anything to describing the commit. What was this initial commit for?
Outdated
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| being sent with no payload, which was not impacted by internationalization | |
| being sent with no payload, which was not impacted by internationalization. |
Outdated
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| access control | |
| access control. |
Outdated
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Consider:
| note: | | |
| The vulnerability affected passing socket buffers within the system, which | |
| is an IPC' | |
| note: | | |
| The vulnerability affected passing socket buffers within the system, which | |
| is a form of IPC. |
Outdated
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| had around it | |
| had around it. |
Outdated
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| note: 'The fixed commit was tested, CCed, and signed off on by several developers' | |
| note: | | |
| The commit fixing the issue was tested, reviewed, CCed, and signed off by | |
| multiple developers. |
Outdated
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Consider this slight refactor for 80 char line limit.
| note: | | |
| A flag check was forgotten to ensure zero-length data was not passed into the system, which | |
| caused the vulnerability. | |
| note: | | |
| A flag check was forgotten to ensure zero-length data was not passed into | |
| the system, which caused the vulnerability. |
Outdated
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| note: 'The fix did not involve a change in the order of operations' | |
| note: 'The fix did not involve a change in the order of operations.' |
Outdated
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Consider clarifying this a bit based on the instructions. Was it a lapse, mistake, or planning issue?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can't comment unchanged code, so putting this below it:
CWE_note is not filled out. Make sure you look over CWE 20 and confirm it.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Try to explain the vulnerability a bit more:
I still have a lot of questions after reading your description.
I think that last line is good because it provides an explanation in layman's terms. Just a do a bit more of that! 👍