-
Notifications
You must be signed in to change notification settings - Fork 682
Open
Description
Hi,
our team have developed a recurring vulnerability detection tool. This tool mainly uses static analysis methods, and it has a high detection accuracy in our dataset. We have also received positive feedback from other projects before.
we have scanned your LVS and found some vulnerabilities, which were confirmed and fixed by linux do not get patched in this repo. Here are some details as follows:
inet_create,inet6_createandinet6_createfunctions fromkernel/.pc/patches.taobao/lvs-toa-rs-export-symbols.patch/net/ipv4/af_inet.c,kernel/.pc/patches.taobao/lvs-toa-rs-export-symbols.patch/net/ipv6/af_inet6.candkernel/net/ipv6/af_inet6.crespectively, which shares the similarity with CVE-2015-8543 and the patch is torvalds/linux@79462adpipe_iov_copy_from_userandpipe_iov_copy_to_userfunctions fromkernel/fs/pipe.c, which shares the similarity with CVE-2015-1805 and the patch is torvalds/linux@637b58c__mptctl_ioctl,mptctl_do_reset,mptctl_fw_download,mptctl_getiocinfo,mptctl_gettargetinfo,mptctl_readtest,mptctl_eventquery,mptctl_eventenable,mptctl_eventreport,mptctl_replace_fw,mptctl_mpt_command,mptctl_hp_hostinfo,mptctl_hp_targetinfo,compat_mptfwxfer_ioctlandcompat_mpt_commandfunctions fromkernel/drivers/message/fusion/mptctl.c, which shares the similarity with CVE-2020-12652 and the patch is torvalds/linux@28d76dfsunkbd_interruptfunction fromkernel/net/ipv4/af_inet.candkernel/drivers/input/keyboard/sunkbd.c, which shares the similarity with CVE-2020-25669 and the patch is torvalds/linux@77e70d3vgacon_scrollfunction fromkernel/drivers/video/console/vgacon.c, which shares the similarity with CVE-2020-28097 and the patch is torvalds/linux@973c096notify_changefunction fromkernel/fs/attr.c, which shares the similarity with CVE-2015-1350 and the patch is torvalds/linux@030b533isdn_ppp_ioctl,slhc_init, andsl_alloc_bufsfunctions fromkernel/drivers/isdn/i4l/isdn_ppp.c,kernel/drivers/net/slhc.candkernel/drivers/net/slip.crespectively, which shares the similarity with CVE-2015-7799 and the patch is torvalds/linux@4ab42d7register_diskand__nbd_ioctlfunctions fromkernel/fs/partitions/check.candkernel/drivers/block/nbd.crespectively, which shares the similarity with CVE-2013-2851 and the patch is torvalds/linux@ffc8b30ext4_ext_splitandext4_ext_splitfromkernel/fs/ext4/extents.candkernel/.pc/patches.taobao/ext4-free-allocated-and-pre-allocated-blocks-when-ch.patch/fs/ext4/extents.crespectively, which shares the similarity with CVE-2019-11833 and the patch is torvalds/linux@592acbfsnd_seq_client_enqueue_event,kernel_client_enqueue,snd_seq_fifo_event_in,snd_seq_cell_allocandsnd_seq_event_dupfunctions fromkernel/sound/core/seq/seq_clientmgr.c,kernel/sound/core/seq/seq_fifo.candkernel/sound/core/seq/seq_memory.crespectively, which shares the similarity with CVE-2018-1000004 and the patch is torvalds/linux@7bd8009persistent_prepare_exceptionandread_exceptionsfrom kernel/drivers/md/dm-snap-persistent.c which shares the similarity to CVE-2013-4299 and the patch is torvalds/linux@e9c6a18ext4_read_inode_bitmapandext4_read_block_bitmapfunctions fromkernel/fs/ext4/ialloc.candkernel/fs/ext4/balloc.crespectively, which shares the similarity with CVE-2018-1093 and the patch is torvalds/linux@7dac4a1ext4_mb_add_groupinfo,ext4_mb_add_groupinfoandext4_mb_add_groupinfofunctions fromkernel/fs/ext4/mballoc.c,kernel/.pc/patches.taobao/ext4-use-dedicated-slab-caches-for-group_info-structures.patch/fs/ext4/mballoc.candkernel/.pc/patches.taobao/ext4-Adding-error-check-after-calling-ext4_mb_regular_allocator.patch/fs/ext4/mballoc.crespectively, which shares the similarity with CVE-2018-10876 and the patch is torvalds/linux@8844618__ext4_get_inode_loc,__ext4_get_inode_locand__ext4_get_inode_locfunctions fromkernel/fs/ext4/inode.c,kernel/.pc/patches.taobao/ext4-Fix-possible-lost-inode-write-in-no-journal-mode.diff/fs/ext4/inode.candkernel/.pc/patches.taobao/ext4-Fix-buffer-head-leaks-after-calls-to-ext4_get_inode_loc.diff/fs/ext4/inode.cwhich shares the similarity with CVE-2018-10882 and the patch is torvalds/linux@c37e9e0mem_cgroup_move_charge_pte_rangefrom the filekernel/mm/memcontrol.cwhich shares the similarity to CVE-2012-1179 and the patch is torvalds/linux@1a5a990flush_ldt,init_new_context,alloc_ldt,copy_ldtandconvert_ip_to_linearfunctions fromkernel/arch/x86/kernel/ldt.candkernel/arch/x86/kernel/step.crespectively, which shares the similarity with CVE-2015-5157 and the patch is torvalds/linux@37868fehandle_rx_mergeablefromkernel/drivers/vhost/net.cshares the similarity to CVE-2014-0077 and the patch is torvalds/linux@d8316f3create_kthreadfromkernel/kernel/kthread.c, which shares the similarity with CVE-2012-4398 and the patch is torvalds/linux@786235ecypress_openfromkernel/drivers/usb/serial/cypress_m8.c, which shares the similarity with CVE-2016-3137 and the patch is torvalds/linux@c55aee1gru_handle_user_call_osandgru_check_context_placementfunctions fromkernel/drivers/misc/sgi-gru/grufault.candkernel/drivers/misc/sgi-gru/grumain.crespectively, which shares the similarity with CVE-2022-3424 and the patch is torvalds/linux@643a16arose_start_idletimerfromernel/net/rose/rose_timer.c, which shares the similarity with CVE-2022-2318 and the patch is torvalds/linux@9cc02edext4_xattr_ibody_findandext3_xattr_ibody_findfunctions fromkernel/fs/ext4/xattr.candkernel/fs/ext3/xattr.crespectively, which shares the similarity with CVE-2023-2513 and the patch is torvalds/linux@67d7d8ad99befib6_rule_actionfunction fromkernel/net/ipv6/fib6_rules.c, which shares the similarity with CVE-2023-3022 and the patch is torvalds/linux@a65120bae4b7
We have preliminarily verified the correctness of the above list through static analysis. Would you can help to check if this bug is true? If it's true, please try to fix it, or I'd like to open a PR for that if necessary. Thank you for your effort and patience!
Metadata
Metadata
Assignees
Labels
No labels