Skip to content
Open
Show file tree
Hide file tree
Changes from 7 commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
126 changes: 39 additions & 87 deletions cves/kernel/CVE-2016-4998.yml

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

2 upvotes

Original file line number Diff line number Diff line change
Expand Up @@ -19,14 +19,14 @@ curated_instructions: |
This will enable additional editorial checks on this file to make sure you
fill everything out properly. If you are a student, we cannot accept your work
as finished unless curated is properly updated.
curation_level: 0
curation_level: 2
reported_instructions: |
What date was the vulnerability reported to the security team? Look at the
security bulletins and bug reports. It is not necessarily the same day that
the CVE was created. Leave blank if no date is given.

Please enter your date in YYYY-MM-DD format.
reported_date:
reported_date: '2016-06-24'
announced_instructions: |
Was there a date that this vulnerability was announced to the world? You can
find this in changelogs, blogs, bug reports, or perhaps the CVE date.
Expand Down Expand Up @@ -55,7 +55,7 @@ description_instructions: |

Your target audience is people just like you before you took any course in
security
description:
description: underprivileged users were able to call a command normally limited to root. This allows for underprivileged user root access.
Copy link

@nolan-white nolan-white Nov 12, 2023

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

First sentence should be capitalized. Also, the official CVE description contains more information about the vulnerability than this description does. As a reader, I'm left wondering "What was the command? How were underprivileged users able to access it? What impacts could exploiting this vulnerability have?" I would suggest adding this context to your description.

bounty_instructions: |
If you came across any indications that a bounty was paid out for this
vulnerability, fill it out here. Or correct it if the information already here
Expand Down Expand Up @@ -90,8 +90,7 @@ fixes:
note:
- commit: 6e94e0cfb0887e4013b3b930fa6ab1fe6bb6ba91
note: |
Taken from NVD references list with Git commit. If you are
curating, please fact-check that this commit fixes the vulnerability and replace this comment with 'Manually confirmed'
Manually confirmed
vcc_instructions: |
The vulnerability-contributing commits.

Expand All @@ -116,23 +115,10 @@ upvotes_instructions: |
upvotes score on your branch.
upvotes:
unit_tested:
question: |
Were automated unit tests involved in this vulnerability?
Was the original code unit tested, or not unit tested? Did the fix involve
improving the automated tests?

For code: and fix: - your answer should be boolean.

For the code_answer below, look not only at the fix but the surrounding
code near the fix in related directories and determine if and was there were
unit tests involved for this subsystem.

For the fix_answer below, check if the fix for the vulnerability involves
adding or improving an automated test to ensure this doesn't happen again.
code:
code_answer:
fix:
fix_answer:
code: false
code_answer: there were no unit tests surrounding thi
fix: false
fix_answer: There were no unit tests involved in the fix
discovered:
question: |
How was this vulnerability discovered?
Expand All @@ -147,10 +133,10 @@ discovered:

If there is no evidence as to how this vulnerability was found, then please
explain where you looked.
answer:
automated:
contest:
developer:
answer: This vulnerability was found by using a fuzzer tool on the linux kernel

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Missing period at end of sentence.

automated: true
contest: false
developer: false
autodiscoverable:
instructions: |
Is it plausible that a fully automated tool could have discovered
Expand All @@ -167,8 +153,8 @@ autodiscoverable:

The answer field should be boolean. In answer_note, please explain
why you come to that conclusion.
note:
answer:
note: This was discovered by an automated fuzzer

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Missing period at end of sentence.

answer: true
specification:
instructions: |
Is there mention of a violation of a specification? For example, the POSIX
Expand All @@ -184,8 +170,8 @@ specification:

The answer field should be boolean. In answer_note, please explain
why you come to that conclusion.
note:
answer:
note: there was no violation of any standard as this was a memory spacing issue.
Copy link

@nolan-white nolan-white Nov 12, 2023

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

First word in sentence should be capitalized.

answer: false
subsystem:
question: |
What subsystems was the mistake in? These are WITHIN linux kernel
Expand Down Expand Up @@ -219,7 +205,7 @@ subsystem:
e.g.
name: ["subsystemA", "subsystemB"] # ok
name: subsystemA # also ok
name:
name: netfilter
note:
interesting_commits:
question: |
Expand All @@ -237,49 +223,16 @@ interesting_commits:
commits:
- commit:
note:
- commit:
note:
i18n:
question: |
Was the feature impacted by this vulnerability about internationalization
(i18n)?

An internationalization feature is one that enables people from all
over the world to use the system. This includes translations, locales,
typography, unicode, or various other features.

Answer should be true or false
Write a note about how you came to the conclusions you did, regardless of
what your answer was.
answer:
note:
i18n:
answer: false
note: This did not have to do with i18n as it was an issue with having access to too much memory

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Missing period at end of sentence.

sandbox:
question: |
Did this vulnerability violate a sandboxing feature that the system
provides?

A sandboxing feature is one that allows files, users, or other features
limited access. Vulnerabilities that violate sandboxes are usually based on
access control, checking privileges incorrectly, path traversal, and the
like.

Answer should be true or false
Write a note about how you came to the conclusions you did, regardless of
what your answer was.
answer:
note:
answer: false
note: This did not violate a sandboxing feature that the system provides

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Missing period at end of sentence.

ipc:
question: |
Did the feature that this vulnerability affected use inter-process
communication? IPC includes OS signals, pipes, stdin/stdout, message
passing, and clipboard. Writing to files that another program in this
software system reads is another form of IPC.

Answer must be true or false.
Write a note about how you came to the conclusions you did, regardless of
what your answer was.
answer:
note:
answer: false
note: no IPC was occuring.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

First word in sentence should be capitalized.

discussion:
question: |
Was there any discussion surrounding this?
Expand All @@ -305,9 +258,9 @@ discussion:

Put any links to disagreements you found in the notes section, or any other
comment you want to make.
discussed_as_security:
any_discussion:
note:
discussed_as_security: false
any_discussion: false
note: there was minimal discussion as this was discovered then immediately fixed

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Missing period and first word in sentence should be capitalized.

vouch:
question: |
Was there any part of the fix that involved one person vouching for
Expand All @@ -320,8 +273,8 @@ vouch:

Answer must be true or false.
Write a note about how you came to the conclusions you did, regardless of what your answer was.
answer:
note:
answer: false
note: the only discussion present was during fuzzing the kernel.
Copy link

@nolan-white nolan-white Nov 12, 2023

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

First word in sentence should be capitalized. Also this information is not correct as the commit that fixed the issue was signed off on by Florian Westphal and Pablo Neira Ayuso.

stacktrace:
question: |
Are there any stacktraces in the bug reports?
Expand All @@ -335,9 +288,9 @@ stacktrace:
Answer must be true or false.
Write a note about how you came to the conclusions you did, regardless of
what your answer was.
any_stacktraces:
stacktrace_with_fix:
note:
any_stacktraces: false
stacktrace_with_fix: false
note: no stacktrace as this was discovered by fuzzing and posted on a forum.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

First word in sentence should be capitalized.

forgotten_check:
question: |
Does the fix for the vulnerability involve adding a forgotten check?
Expand All @@ -356,8 +309,8 @@ forgotten_check:
Answer must be true or false.
Write a note about how you came to the conclusions you did, regardless of
what your answer was.
answer:
note:
answer: true
note: there was a missing check to see that the data being accessed was within the active blob

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Missing period and first word in sentence should be capitalized. Also "the data being accessed was within the active blob" feels a little too jargony for readers without further explanation.

order_of_operations:
question: |
Does the fix for the vulnerability involve correcting an order of
Expand All @@ -369,7 +322,7 @@ order_of_operations:
Answer must be true or false.
Write a note about how you came to the conclusions you did, regardless of
what your answer was.
answer:
answer: false
note:

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Note missing.

lessons:
question: |
Expand Down Expand Up @@ -448,7 +401,7 @@ mistakes:

Write a thoughtful entry here that people in the software engineering
industry would find interesting.
answer:
answer: There was a forgotten check that made a small error. This mistake was most likely a lapse during development
Copy link

@nolan-white nolan-white Nov 12, 2023

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Last sentence missing period. Also what was the lapse in judgement? The reader may not look at the source code, so I would suggest including a high-level description of the check that was forgotten.

CWE_instructions: |
Please go to http://cwe.mitre.org and find the most specific, appropriate CWE
entry that describes your vulnerability. We recommend going to
Expand All @@ -467,11 +420,10 @@ CWE_instructions: |
CWE:
- 119
CWE_note: |
CWE as registered in the NVD. If you are curating, check that this
is correct and replace this comment with "Manually confirmed".
manually confirmed

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

First word should be capitalized.

nickname_instructions: |
A catchy name for this vulnerability that would draw attention it.
If the report mentions a nickname, use that.
Must be under 30 characters. Optional.
nickname:
CVSS:
nickname: out of blob memory access

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looking at the other vulnerabilities on the VHP website, this should be capitalized like a title for consistency.

CVSS: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
Loading