-
-
Notifications
You must be signed in to change notification settings - Fork 2.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Pcapreader() does not work at specific packets and memory usage continues to increase #1407
Comments
Thanks a lot for reporting this. |
You may want to try #1409 patch. |
For some reason, this was assigned CVE-2019-1010142. |
I think that this is a consequence of really aggressive communication from Imperva, see https://www.imperva.com/blog/scapy-sploit-python-network-tool-is-vulnerable-to-denial-of-service-dos-attack-cve-pending/ The maintainers were never informed of this ... |
FTR. GitHub started notifying users about the “issue”.
|
We might wanna try using https://github.com/secdev/scapy/network/alerts |
I work on GitHub's security workflows team and am looking into how we can make security alerts work better for maintainers. I'd love your feedback if you have 5 mins? We pick up new vulnerabilities when maintainers submit a Security Advisory (in the security tab on this repo) or when they appear in the NVD feed - in this case it's CVE-2019-1010142 that brought this to our attention. We then have a manual curation process (the NVD feed isn't structured enough to process automatically, and can contain spurious reports). In this case we've picked up that v2.4.1 onwards are patched and added that to our alerts, which also power automated security fix PRs like this one. I'd love your feedback on the process. What could we be doing better, from your perspective as maintainers? If you'd have been able to use "Maintainer Security Advisories" to publicise this vulnerability back in May 2018 would you have? What would make that feature useful to you in future, and how would you like us to handle vulnerabilities we're alerted of via the NVD feed? Any thoughts really appreciated - we're trying to make the process better for everyone, but I appreciate there may be some sharp edges at the moment. You can email me on [email protected] if you'd like to discuss anything privately. |
Hi, I don't have much to say about that. Here are a few thoughts:
|
Really helpful, thanks @gpotter2.
Folks who have
We're hearing this a lot and want to do something about it! |
@greysteil As someone who both uses the PRs and the Advisory's i have some ideas but mainly around the discovery and notification process. As many developers simply never know when a CVE is filed against their project. I'll shoot you an email when I get less busy. |
@greysteil thanks for reaching us! To complete @gpotter2 comments, I think that it would be really helpful to contact maintainers on github before/while sending notifications to other repositories. I discovered that you were sending notifications because on my project depends on Scapy. Also, it might be useful to have a list of projects/contacted and opened PR in the security tab. I will be at BHUSA next month. We could follow the discussion if you attend too. |
Thanks @guedou. I'm hearing the "contact us first" feedback from everyone I ask for feedback, so we'll almost certainly be implementing that. Sadly won't be at BHUSA - have an awesome time. |
Scary version: scapy-2.4.0.dev149
Python version: Python 3.6.5
OS: Ubuntu 16.04.03 LTS
I try to read the attached pcap file using Pcapreader(), but Pcapreader() does not work after read a packet which timestamp is 1523958716.205101, and memory usage increases, finally, the process forcibly terminates.
output
I also try to read the attached pcap file using dpkt and dpkt succeed in read the file.
output
test.pcap.zip
The text was updated successfully, but these errors were encountered: