bugzilla-daemon at mindrot.org
2022-Jun-26 06:06 UTC
[Bug 3452] New: Potential Software vulnerabilities detected using ESBMC-WR tool
https://bugzilla.mindrot.org/show_bug.cgi?id=3452
Bug ID: 3452
Summary: Potential Software vulnerabilities detected using
ESBMC-WR tool
Product: Portable OpenSSH
Version: 8.8p1
Hardware: Other
OS: Linux
Status: NEW
Severity: security
Priority: P5
Component: ssh
Assignee: unassigned-bugs at mindrot.org
Reporter: janislley at gmail.com
Created attachment 3599
--> https://bugzilla.mindrot.org/attachment.cgi?id=3599&action=edit
memory property violations
Hello,
We found some potential code failures that might cause a security
vulnerability.
To identify this kind of vulnerability I used tool ESBMC-WR:
https://github.com/thalestas/esbmc-wr
More about the tool: https://arxiv.org/pdf/2102.02368.pdf
Our main objective was to check memory safety properties (e.g., pointer
dereference and memory leaks) while
performing the verification code.
Failures found:
Bug 01: packet.c, ssh_set_newkeys, ssh_set_newkeys , line 948 ,division
by zero
State 40 file packet.c line 948 function ssh_set_newkeys thread 0
----------------------------------------------------
Violated property:
file packet.c line 948 function ssh_set_newkeys
division by zero
(unsigned long int)enc->block_size != 0
Bug 02: logintest.c, main, main , line 288 ,dereference failure: array
bounds violated
State 5 file logintest.c line 288 function main thread 0
----------------------------------------------------
Violated property:
file logintest.c line 288 function main
dereference failure: array bounds violated
Bug 03: cipher-chachapoly.c, chachapoly_get_length,
chachapoly_get_length , line 135 ,dereference failure: invalid pointer
State 1 file cipher-chachapoly.c line 135 function
chachapoly_get_length thread 0
----------------------------------------------------
Violated property:
file cipher-chachapoly.c line 135 function chachapoly_get_length
dereference failure: invalid pointer
Bug 04: sshkey.c, fingerprint_bubblebabble, fingerprint_bubblebabble ,
line 1081 ,dereference failure: array bounds violated
State 6 file sshkey.c line 1081 function fingerprint_bubblebabble
thread 0
----------------------------------------------------
Violated property:
file sshkey.c line 1081 function fingerprint_bubblebabble
dereference failure: array bounds violated
If you need any other information, please ask me.
I also attached a file containing others property violations found
using our tool. But it will need time to check if it is all false
positives.
--
You are receiving this mail because:
You are watching the assignee of the bug.
bugzilla-daemon at mindrot.org
2022-Jun-26 23:31 UTC
[Bug 3452] Potential Software vulnerabilities detected using ESBMC-WR tool
https://bugzilla.mindrot.org/show_bug.cgi?id=3452
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution|--- |INVALID
CC| |djm at mindrot.org
--- Comment #1 from Damien Miller <djm at mindrot.org> ---
Most of these are completely obvious false positives. E.g.
> State 6 file sshkey.c line 1081 function fingerprint_bubblebabble thread 0
> ----------------------------------------------------
> Violated property:
> file sshkey.c line 1081 function fingerprint_bubblebabble
> dereference failure: array bounds violated
The array is allocated to be sufficiently sized literally in the
previous line.
Please forgive my bluntness, but low quality reports like this do
nothing but waste our time - there is no discernable signal among the
noise.
Please do not submit more unless they have been assessed by a human.
--
You are receiving this mail because:
You are watching the assignee of the bug.
You are watching someone on the CC list of the bug.
bugzilla-daemon at mindrot.org
2022-Oct-04 10:59 UTC
[Bug 3452] Potential Software vulnerabilities detected using ESBMC-WR tool
https://bugzilla.mindrot.org/show_bug.cgi?id=3452 --- Comment #2 from Damien Miller <djm at mindrot.org> --- Closing bugs from openssh-9.1 release cycle -- You are receiving this mail because: You are watching someone on the CC list of the bug. You are watching the assignee of the bug.
bugzilla-daemon at mindrot.org
2023-Mar-17 02:37 UTC
[Bug 3452] Potential Software vulnerabilities detected using ESBMC-WR tool
https://bugzilla.mindrot.org/show_bug.cgi?id=3452
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|RESOLVED |CLOSED
--- Comment #3 from Damien Miller <djm at mindrot.org> ---
OpenSSH 9.3 has been released. Close resolved bugs
--
You are receiving this mail because:
You are watching the assignee of the bug.
You are watching someone on the CC list of the bug.