-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

I got my reports for two of my packages (I'm upstream for both too).

The first problem is I couldn't find what version of the program they found
the bug in.  I also looked closely at one specific example and it didn't
crash at all. Unless there was some underlying problem with a previous
version of atoi() I cannot actually see what sending it what it got would
do anything other than what I see (effectively "meh, you sent 0 Ill exit
now").

 - Craig

On 2020-11-01 at 23:34, calumlikesapple...@gmail.com wrote:
> On Sun, 2020-11-01 at 14:56 -0800, Russ Allbery wrote:
> > Utkarsh Gupta <utka...@debian.org> writes:
> >
> > > That said, it'd be a bit weird if they don't report these issues and
ask
> > > for a CVE assignment against these.  Anyway, the security team might
> > > know more about this.
> >
> > It appears to be the output of automated fuzz testing, which based on
past
> > experience means that a large percentage of the crashes are probably
not
> > exploitable.
>
> Oh, it's definitely the result of automated fuzzing.  Their entire
website
> is about using automated fuzzers to find code defects.  Plus, I don't
think
> any sane person would spend their time concocting test cases for crashes
in
> 0xffff (a nokia firmware writer) without bothering to report the bugs
they
> found in binutils (a somewhat more common package).
>
> Further, I would argue that many of the crashes might not be just
> unexploitable, but appropriate.  If given highly unusual and bizarre
input,
> crashing with SIGABRT might be the most sane response.
>
> > The raw data is not hugely useful in aggregate unless you enjoy fixing
> > edge-case buffer management bugs that no one is likely to care about
(such
> > as in options parsing code).  It can be made useful by tracking down
where
> > the crash happens and then figuring out if that's part of an attack
> > surface, but that's quite a bit of work which they're clearly not
> > volunteering to do.
>
> That being said, I do think we should at least take a look.  A ton of
> security bugs are just buffer overflows, and it has been shown that even
> tiny bugs can lead to remote code execution.  I recently read
>
googleprojectzero.blogspot.com/2014/08/the-poisoned-nul-byte-2014-edition.html

> which goes from writing a single null byte past the end of a linked list
to
> full privileges, despite security features like ASLR.  Even if none of
their
> test cases can be used to exploit modern packages, we'd at least know.
>
> I agree with Daniel Leidert that Debian should take charge of this,
rather
> than expecting each of the package maintainers to individually request
the
> CITL data and test it.  Perhaps QA could get the master copy, devise a
> script to find the unfixed test cases, and notify package maintainers.
>
>
> Thanks for taking the time to read my wall of words,
> Calum M
-----BEGIN PGP SIGNATURE-----
Version: FlowCrypt Email Encryption 7.9.7
Comment: Seamlessly send and receive encrypted email
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=DoyM
-----END PGP SIGNATURE-----

Attachment: 0x3938F96BDF50FEA5.asc
Description: application/pgp-keys

Reply via email to