Skip to content

Commit

Permalink
feat: support Amazon Linux 2023 advisories (#107)
Browse files Browse the repository at this point in the history
Signed-off-by: Weston Steimel <[email protected]>
  • Loading branch information
westonsteimel authored Mar 9, 2023
1 parent 73c56bb commit 0a2d2ee
Show file tree
Hide file tree
Showing 5 changed files with 163 additions and 1 deletion.
1 change: 1 addition & 0 deletions src/vunnel/providers/amazon/parser.py
Original file line number Diff line number Diff line change
Expand Up @@ -21,6 +21,7 @@
# '1': 'https://alas.aws.amazon.com/alas.rss',
"2": "https://alas.aws.amazon.com/AL2/alas.rss",
"2022": "https://alas.aws.amazon.com/AL2022/alas.rss",
"2023": "https://alas.aws.amazon.com/AL2023/alas.rss",
}

severity_map = {
Expand Down
1 change: 1 addition & 0 deletions tests/unit/cli/test_cli.py
Original file line number Diff line number Diff line change
Expand Up @@ -146,6 +146,7 @@ def test_config(monkeypatch) -> None:
security_advisories:
'2': https://alas.aws.amazon.com/AL2/alas.rss
'2022': https://alas.aws.amazon.com/AL2022/alas.rss
'2023': https://alas.aws.amazon.com/AL2023/alas.rss
centos:
request_timeout: 125
runtime:
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,139 @@

<!doctype html>
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<title>ALAS2023-2023-126</title>
<link rel='icon' type='image/x-icon' href='../static/favicon.ico' />
<link rel="stylesheet" href="../static/bootstrap.min.css" type='text/css' media='print, projection, screen' >
<link rel='stylesheet' href='../static/blue_style.css' type='text/css' media='print, projection, screen' />
<link rel='stylesheet' href='../static/fontawesome.css' type='text/css' media='print, projection, screen' />
<link rel='stylesheet' href='../static/style.css' type='text/css' media='print, projection, screen' />
<script type='text/javascript' src='../static/jquery.min.js'></script>
<script type='text/javascript' src='../static/jquery.tablesorter.min.js'></script>
<script type="text/javascript" src="../static/index.js"></script>

<!--Add constant cookie banner on this page-->
<script type = 'text/javascript'>
var shortbread = AWSCShortbread();
shortbread.checkForCookieConsent();
function customize() {
shortbread.customizeCookies();
}
</script>

<style>
a{text-decoration: none; color: #0073BB}
a:visited{color: #0073BB}
.Site {
display: flex;
display: -webkit-flex; /* Safari */
min-height: 100vh;
flex-direction: column;
}
.Site-content {
flex: 1;
}
</style>
</head>
<body class="Site">
<main class="Site-content">
<div class="container">
<nav class="navbar navbar-fixed-top navbar-inverse" style="background-color: #000000" id="bs-navbar">
<a style="font-size: 20px; color: #FF9900" class="navbar-brand" href="/"><b>Amazon Linux Security Center</b></a>
<ul class="nav navbar-nav navbar-right" style="color: #ff9900">
<li style="background-color: #333333;"> <a style="color: #FFFFFF" href="/">Amazon Linux</a> </li><li style="background-color: #333333;"> <a style="color: #FFFFFF" href="/alas2.html">Amazon Linux 2</a> </li><li style="background-color: #FF9900;"> <a style="color: #000000" href="/alas2023.html">Amazon Linux 2023</a> </li><li style="background-color: #333333;"> <a style="color: #FFFFFF" href="/announcements.html">Announcements</a> </li><li style="background-color: #333333;"> <a style="color: #FFFFFF" href="/faqs.html">FAQs</a> </li>
</ul>
</nav>
</div>
<div style='min-height: 523px; margin-top:80px;' class='nine columns content-with-nav' role='main'>
<section>
<div class='title'>
<h1 id='ALAS2023-2023-126'>ALAS2023-2023-126</h1>
</div>

<div class='text'>
<hr class='mid-pad'>
<span class='alas-info'>

<b>Amazon Linux 2023 Security Advisory:</b> ALAS-2023-126

</span><br />
<span class='alas-info'><b>Advisory Release Date:</b> 2023-03-07 00:29 Pacific</span><br />
<span class='alas-info'><b>Advisory Updated Date:</b> 2023-03-08 00:51 Pacific</span><br />

<div id='severity' class='alas-info'>
<b>Severity:</b>
<span class='date'>
<span class='bulletin-type'>
<i class='fas fa-exclamation-triangle'></i>
</span>
</span>
Important<br />
</div>

<div id='references'>
<b>References:</b>
<a href='/cve/html/CVE-2022-3787.html' target='_blank' rel='noopener noreferrer'>CVE-2022-3787&nbsp;<i class="fas fa-external-link-alt"></i></a>
<a href='/cve/html/CVE-2022-41973.html' target='_blank' rel='noopener noreferrer'>CVE-2022-41973&nbsp;<i class="fas fa-external-link-alt"></i></a>
<a href='/cve/html/CVE-2022-41974.html' target='_blank' rel='noopener noreferrer'>CVE-2022-41974&nbsp;<i class="fas fa-external-link-alt"></i></a>
<br />
<a href="../../faqs.html">FAQs regarding Amazon Linux ALAS/CVE Severity</a>
</div>

<hr class='mid-pad'>
<div id='issue_overview'>
<b>Issue Overview:</b>
<p>A vulnerability was found in the device-mapper-multipath. The device-mapper-multipath allows local users to obtain root access, exploited alone or in conjunction with CVE-2022-41973. Local users that are able to write to UNIX domain sockets can bypass access controls and manipulate the multipath setup. This issue occurs because an attacker can repeat a keyword, which is mishandled when arithmetic ADD is used instead of bitwise OR. This could lead to local privilege escalation to root. (CVE-2022-3787)</p><p>A vulnerability was found in the device-mapper-multipath. The device-mapper-multipath allows local users to obtain root access, in conjunction with CVE-2022-41974. Local users that are able to access /dev/shm can change symlinks in multipathd due to incorrect symlink handling, which may lead to controlled file writes outside of the /dev/shm directory. This could be used indirectly for local privilege escalation to root. (CVE-2022-41973)</p><p>multipath-tools 0.7.0 through 0.9.x before 0.9.2 allows local users to obtain root access, as exploited alone or in conjunction with CVE-2022-41973. Local users able to write to UNIX domain sockets can bypass access controls and manipulate the multipath setup. This can lead to local privilege escalation to root. This occurs because an attacker can repeat a keyword, which is mishandled because arithmetic ADD is used instead of bitwise OR. (CVE-2022-41974)</p>
</div>

<div id='affected_packages' class='alas-info'>
<br />
<b>Affected Packages:</b>
<br />
<p>device-mapper-multipath</p>
</div>

<div id='issue_correction'>
<br />
<b>Issue Correction:</b>
<br />Run <i>dnf update device-mapper-multipath --releasever=2023.0.20230308</i> to update your system.
<br /></div>
<br />
<div id='new_packages'>
<b>New Packages:</b><pre>aarch64:<br />&nbsp;&nbsp;&nbsp; device-mapper-multipath-debuginfo-0.8.7-16.amzn2023.0.1.aarch64<br />&nbsp;&nbsp;&nbsp; kpartx-debuginfo-0.8.7-16.amzn2023.0.1.aarch64<br />&nbsp;&nbsp;&nbsp; device-mapper-multipath-debugsource-0.8.7-16.amzn2023.0.1.aarch64<br />&nbsp;&nbsp;&nbsp; libdmmp-0.8.7-16.amzn2023.0.1.aarch64<br />&nbsp;&nbsp;&nbsp; libdmmp-devel-0.8.7-16.amzn2023.0.1.aarch64<br />&nbsp;&nbsp;&nbsp; libdmmp-debuginfo-0.8.7-16.amzn2023.0.1.aarch64<br />&nbsp;&nbsp;&nbsp; device-mapper-multipath-devel-0.8.7-16.amzn2023.0.1.aarch64<br />&nbsp;&nbsp;&nbsp; kpartx-0.8.7-16.amzn2023.0.1.aarch64<br />&nbsp;&nbsp;&nbsp; device-mapper-multipath-0.8.7-16.amzn2023.0.1.aarch64<br />&nbsp;&nbsp;&nbsp; device-mapper-multipath-libs-debuginfo-0.8.7-16.amzn2023.0.1.aarch64<br />&nbsp;&nbsp;&nbsp; device-mapper-multipath-libs-0.8.7-16.amzn2023.0.1.aarch64<br /><br />i686:<br />&nbsp;&nbsp;&nbsp; device-mapper-multipath-debuginfo-0.8.7-16.amzn2023.0.1.i686<br />&nbsp;&nbsp;&nbsp; device-mapper-multipath-libs-debuginfo-0.8.7-16.amzn2023.0.1.i686<br />&nbsp;&nbsp;&nbsp; device-mapper-multipath-libs-0.8.7-16.amzn2023.0.1.i686<br />&nbsp;&nbsp;&nbsp; device-mapper-multipath-debugsource-0.8.7-16.amzn2023.0.1.i686<br />&nbsp;&nbsp;&nbsp; device-mapper-multipath-0.8.7-16.amzn2023.0.1.i686<br />&nbsp;&nbsp;&nbsp; kpartx-debuginfo-0.8.7-16.amzn2023.0.1.i686<br />&nbsp;&nbsp;&nbsp; libdmmp-0.8.7-16.amzn2023.0.1.i686<br />&nbsp;&nbsp;&nbsp; kpartx-0.8.7-16.amzn2023.0.1.i686<br />&nbsp;&nbsp;&nbsp; libdmmp-debuginfo-0.8.7-16.amzn2023.0.1.i686<br />&nbsp;&nbsp;&nbsp; libdmmp-devel-0.8.7-16.amzn2023.0.1.i686<br />&nbsp;&nbsp;&nbsp; device-mapper-multipath-devel-0.8.7-16.amzn2023.0.1.i686<br /><br />src:<br />&nbsp;&nbsp;&nbsp; device-mapper-multipath-0.8.7-16.amzn2023.0.1.src<br /><br />x86_64:<br />&nbsp;&nbsp;&nbsp; device-mapper-multipath-libs-debuginfo-0.8.7-16.amzn2023.0.1.x86_64<br />&nbsp;&nbsp;&nbsp; kpartx-0.8.7-16.amzn2023.0.1.x86_64<br />&nbsp;&nbsp;&nbsp; device-mapper-multipath-debugsource-0.8.7-16.amzn2023.0.1.x86_64<br />&nbsp;&nbsp;&nbsp; libdmmp-debuginfo-0.8.7-16.amzn2023.0.1.x86_64<br />&nbsp;&nbsp;&nbsp; libdmmp-0.8.7-16.amzn2023.0.1.x86_64<br />&nbsp;&nbsp;&nbsp; kpartx-debuginfo-0.8.7-16.amzn2023.0.1.x86_64<br />&nbsp;&nbsp;&nbsp; device-mapper-multipath-devel-0.8.7-16.amzn2023.0.1.x86_64<br />&nbsp;&nbsp;&nbsp; device-mapper-multipath-0.8.7-16.amzn2023.0.1.x86_64<br />&nbsp;&nbsp;&nbsp; libdmmp-devel-0.8.7-16.amzn2023.0.1.x86_64<br />&nbsp;&nbsp;&nbsp; device-mapper-multipath-debuginfo-0.8.7-16.amzn2023.0.1.x86_64<br />&nbsp;&nbsp;&nbsp; device-mapper-multipath-libs-0.8.7-16.amzn2023.0.1.x86_64<br /><br /></pre></div>
</div>
<div style="flex:1; margin-bottom: 40px;" class="links-container">
<h3 class="section-heading">Additional References</h3>
<p>
Red Hat:&nbsp;<a style="margin-bottom: 40px;" href="https://access.redhat.com/security/cve/CVE-2022-3787" target="_blank" rel="noopener noreferrer">CVE-2022-3787</a>,
<a style="margin-bottom: 40px;" href="https://access.redhat.com/security/cve/CVE-2022-41973" target="_blank" rel="noopener noreferrer">CVE-2022-41973</a>,
<a style="margin-bottom: 40px;" href="https://access.redhat.com/security/cve/CVE-2022-41974" target="_blank" rel="noopener noreferrer">CVE-2022-41974</a></p>
<p>
Mitre:&nbsp;<a style="margin-bottom: 40px;" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3787" target="_blank" rel="noopener noreferrer">CVE-2022-3787</a>,
<a style="margin-bottom: 40px;" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41973" target="_blank" rel="noopener noreferrer">CVE-2022-41973</a>,
<a style="margin-bottom: 40px;" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41974" target="_blank" rel="noopener noreferrer">CVE-2022-41974</a></p>
</div>
</section>
</div>
</main>
<footer style="padding-left: 30px; padding-right: 30px;"><p style="color: #687078">
CVE description copyright &#169 2023
<a href="https://cve.mitre.org/about/termsofuse.html" target="_blank" rel="noopener noreferrer">The MITRE Corporation</a>
</p>
<p style="color: #687078">
CVE description copyright &#169 2023 Red Hat, Inc. Per
<a href="https://access.redhat.com/security/data" target="_blank" rel="noopener noreferrer">https://access.redhat.com/security/data</a>,
RedHat's CVE report is licensed under
<a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" rel="noopener noreferrer">CC BY 4.0</a>.
</p>
</footer>
<footer style="padding-left: 30px; padding-right: 30px;"><p>
<a href="https://aws.amazon.com/privacy/" target="_blank" rel="noopener noreferrer">Privacy</a> |
<a href="https://aws.amazon.com/terms/" target="_blank" rel="noopener noreferrer">Site terms</a> |
<a href="#" onclick="customize()">Cookie preferences</a> |
<span style="color: #687078">&#169 2023, Amazon Web Services, Inc. or its affiliates. All rights reserved.</span>
</p>
</footer>
</body>
</html>
21 changes: 21 additions & 0 deletions tests/unit/providers/amazon/test-fixtures/input/2023_rss.xml
Original file line number Diff line number Diff line change
@@ -0,0 +1,21 @@
<?xml version="1.0" encoding="UTF-8" ?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Amazon Linux 2023 Security Bulletins</title>
<description>Amazon Linux 2023 Security Bulletins</description>
<link>https://alas.aws.amazon.com</link>
<language>en-us</language>
<ttl>35</ttl>

<item>
<title>ALAS-2023-126 (important): device-mapper-multipath</title>
<description>
CVE-2022-3787, CVE-2022-41973, CVE-2022-41974
</description>
<pubDate>Tue, 07 Mar 2023 00:29:00 GMT</pubDate>
<lastBuildDate>Wed, 08 Mar 2023 00:51:00 GMT</lastBuildDate>
<guid>https://alas.aws.amazon.com/AL2023/ALAS-2023-126.html</guid>
<link>https://alas.aws.amazon.com/AL2023/ALAS-2023-126.html</link>
</item>
</channel>
</rss>
2 changes: 1 addition & 1 deletion tests/unit/providers/amazon/test_amazon.py
Original file line number Diff line number Diff line change
Expand Up @@ -101,5 +101,5 @@ def mock_download(self, *args, **kwargs):

p.update(None)

assert 2 == workspace.num_result_entries()
assert 3 == workspace.num_result_entries()
assert workspace.result_schemas_valid(require_entries=True)

0 comments on commit 0a2d2ee

Please sign in to comment.