You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Hi,
our team have developed a recurring vulnerability detection tool. This tool mainly uses static analysis methods, and it has a high detection accuracy in our dataset. We have also received positive feedback from other projects before.
we have scanned your LVS and found some vulnerabilities, which were confirmed and fixed by linux do not get patched in this repo. Here are some details as follows:
inet_create, inet6_create and inet6_create functions from kernel/.pc/patches.taobao/lvs-toa-rs-export-symbols.patch/net/ipv4/af_inet.c, kernel/.pc/patches.taobao/lvs-toa-rs-export-symbols.patch/net/ipv6/af_inet6.c and kernel/net/ipv6/af_inet6.c respectively, which shares the similarity with CVE-2015-8543 and the patch is torvalds/linux@79462ad
pipe_iov_copy_from_user and pipe_iov_copy_to_user functions from kernel/fs/pipe.c , which shares the similarity with CVE-2015-1805 and the patch is torvalds/linux@637b58c
__mptctl_ioctl, mptctl_do_reset, mptctl_fw_download, mptctl_getiocinfo, mptctl_gettargetinfo, mptctl_readtest, mptctl_eventquery, mptctl_eventenable, mptctl_eventreport, mptctl_replace_fw, mptctl_mpt_command, mptctl_hp_hostinfo, mptctl_hp_targetinfo, compat_mptfwxfer_ioctl and compat_mpt_command functions from kernel/drivers/message/fusion/mptctl.c, which shares the similarity with CVE-2020-12652 and the patch is torvalds/linux@28d76df
sunkbd_interrupt function from kernel/net/ipv4/af_inet.c and kernel/drivers/input/keyboard/sunkbd.c, which shares the similarity with CVE-2020-25669 and the patch is torvalds/linux@77e70d3
vgacon_scroll function from kernel/drivers/video/console/vgacon.c, which shares the similarity with CVE-2020-28097 and the patch is torvalds/linux@973c096
isdn_ppp_ioctl, slhc_init, and sl_alloc_bufs functions from kernel/drivers/isdn/i4l/isdn_ppp.c, kernel/drivers/net/slhc.c and kernel/drivers/net/slip.c respectively, which shares the similarity with CVE-2015-7799 and the patch is torvalds/linux@4ab42d7
register_disk and __nbd_ioctl functions from kernel/fs/partitions/check.c and kernel/drivers/block/nbd.c respectively, which shares the similarity with CVE-2013-2851 and the patch is torvalds/linux@ffc8b30
ext4_ext_split and ext4_ext_split from kernel/fs/ext4/extents.c and kernel/.pc/patches.taobao/ext4-free-allocated-and-pre-allocated-blocks-when-ch.patch/fs/ext4/extents.c respectively, which shares the similarity with CVE-2019-11833 and the patch is torvalds/linux@592acbf
snd_seq_client_enqueue_event, kernel_client_enqueue, snd_seq_fifo_event_in, snd_seq_cell_alloc and snd_seq_event_dup functions from kernel/sound/core/seq/seq_clientmgr.c, kernel/sound/core/seq/seq_fifo.c and kernel/sound/core/seq/seq_memory.c respectively, which shares the similarity with CVE-2018-1000004 and the patch is torvalds/linux@7bd8009
persistent_prepare_exception and read_exceptions from kernel/drivers/md/dm-snap-persistent.c which shares the similarity to CVE-2013-4299 and the patch is torvalds/linux@e9c6a18
ext4_read_inode_bitmap and ext4_read_block_bitmap functions from kernel/fs/ext4/ialloc.c and kernel/fs/ext4/balloc.c respectively, which shares the similarity with CVE-2018-1093 and the patch is torvalds/linux@7dac4a1
ext4_mb_add_groupinfo, ext4_mb_add_groupinfo and ext4_mb_add_groupinfo functions from kernel/fs/ext4/mballoc.c, kernel/.pc/patches.taobao/ext4-use-dedicated-slab-caches-for-group_info-structures.patch/fs/ext4/mballoc.c and kernel/.pc/patches.taobao/ext4-Adding-error-check-after-calling-ext4_mb_regular_allocator.patch/fs/ext4/mballoc.c respectively, which shares the similarity with CVE-2018-10876 and the patch is torvalds/linux@8844618
__ext4_get_inode_loc, __ext4_get_inode_loc and __ext4_get_inode_loc functions from kernel/fs/ext4/inode.c, kernel/.pc/patches.taobao/ext4-Fix-possible-lost-inode-write-in-no-journal-mode.diff/fs/ext4/inode.c and kernel/.pc/patches.taobao/ext4-Fix-buffer-head-leaks-after-calls-to-ext4_get_inode_loc.diff/fs/ext4/inode.c which shares the similarity with CVE-2018-10882 and the patch is torvalds/linux@c37e9e0
mem_cgroup_move_charge_pte_range from the file kernel/mm/memcontrol.c which shares the similarity to CVE-2012-1179 and the patch is torvalds/linux@1a5a990
flush_ldt, init_new_context, alloc_ldt, copy_ldt and convert_ip_to_linear functions from kernel/arch/x86/kernel/ldt.c and kernel/arch/x86/kernel/step.c respectively, which shares the similarity with CVE-2015-5157 and the patch is torvalds/linux@37868fe
cypress_open from kernel/drivers/usb/serial/cypress_m8.c, which shares the similarity with CVE-2016-3137 and the patch is torvalds/linux@c55aee1
gru_handle_user_call_os and gru_check_context_placement functions from kernel/drivers/misc/sgi-gru/grufault.c and kernel/drivers/misc/sgi-gru/grumain.c respectively, which shares the similarity with CVE-2022-3424 and the patch is torvalds/linux@643a16a
rose_start_idletimer from ernel/net/rose/rose_timer.c, which shares the similarity with CVE-2022-2318 and the patch is torvalds/linux@9cc02ed
ext4_xattr_ibody_find and ext3_xattr_ibody_find functions from kernel/fs/ext4/xattr.c and kernel/fs/ext3/xattr.c respectively, which shares the similarity with CVE-2023-2513 and the patch is torvalds/linux@67d7d8ad99be
fib6_rule_action function from kernel/net/ipv6/fib6_rules.c, which shares the similarity with CVE-2023-3022 and the patch is torvalds/linux@a65120bae4b7
We have preliminarily verified the correctness of the above list through static analysis. Would you can help to check if this bug is true? If it's true, please try to fix it, or I'd like to open a PR for that if necessary. Thank you for your effort and patience!
The text was updated successfully, but these errors were encountered:
Hi,
our team have developed a recurring vulnerability detection tool. This tool mainly uses static analysis methods, and it has a high detection accuracy in our dataset. We have also received positive feedback from other projects before.
we have scanned your LVS and found some vulnerabilities, which were confirmed and fixed by linux do not get patched in this repo. Here are some details as follows:
inet_create
,inet6_create
andinet6_create
functions fromkernel/.pc/patches.taobao/lvs-toa-rs-export-symbols.patch/net/ipv4/af_inet.c
,kernel/.pc/patches.taobao/lvs-toa-rs-export-symbols.patch/net/ipv6/af_inet6.c
andkernel/net/ipv6/af_inet6.c
respectively, which shares the similarity with CVE-2015-8543 and the patch is torvalds/linux@79462adpipe_iov_copy_from_user
andpipe_iov_copy_to_user
functions fromkernel/fs/pipe.c
, which shares the similarity with CVE-2015-1805 and the patch is torvalds/linux@637b58c__mptctl_ioctl
,mptctl_do_reset
,mptctl_fw_download
,mptctl_getiocinfo
,mptctl_gettargetinfo
,mptctl_readtest
,mptctl_eventquery
,mptctl_eventenable
,mptctl_eventreport
,mptctl_replace_fw
,mptctl_mpt_command
,mptctl_hp_hostinfo
,mptctl_hp_targetinfo
,compat_mptfwxfer_ioctl
andcompat_mpt_command
functions fromkernel/drivers/message/fusion/mptctl.c
, which shares the similarity with CVE-2020-12652 and the patch is torvalds/linux@28d76dfsunkbd_interrupt
function fromkernel/net/ipv4/af_inet.c
andkernel/drivers/input/keyboard/sunkbd.c
, which shares the similarity with CVE-2020-25669 and the patch is torvalds/linux@77e70d3vgacon_scroll
function fromkernel/drivers/video/console/vgacon.c
, which shares the similarity with CVE-2020-28097 and the patch is torvalds/linux@973c096notify_change
function fromkernel/fs/attr.c
, which shares the similarity with CVE-2015-1350 and the patch is torvalds/linux@030b533isdn_ppp_ioctl
,slhc_init
, andsl_alloc_bufs
functions fromkernel/drivers/isdn/i4l/isdn_ppp.c
,kernel/drivers/net/slhc.c
andkernel/drivers/net/slip.c
respectively, which shares the similarity with CVE-2015-7799 and the patch is torvalds/linux@4ab42d7register_disk
and__nbd_ioctl
functions fromkernel/fs/partitions/check.c
andkernel/drivers/block/nbd.c
respectively, which shares the similarity with CVE-2013-2851 and the patch is torvalds/linux@ffc8b30ext4_ext_split
andext4_ext_split
fromkernel/fs/ext4/extents.c
andkernel/.pc/patches.taobao/ext4-free-allocated-and-pre-allocated-blocks-when-ch.patch/fs/ext4/extents.c
respectively, which shares the similarity with CVE-2019-11833 and the patch is torvalds/linux@592acbfsnd_seq_client_enqueue_event
,kernel_client_enqueue
,snd_seq_fifo_event_in
,snd_seq_cell_alloc
andsnd_seq_event_dup
functions fromkernel/sound/core/seq/seq_clientmgr.c
,kernel/sound/core/seq/seq_fifo.c
andkernel/sound/core/seq/seq_memory.c
respectively, which shares the similarity with CVE-2018-1000004 and the patch is torvalds/linux@7bd8009persistent_prepare_exception
andread_exceptions
from kernel/drivers/md/dm-snap-persistent.c which shares the similarity to CVE-2013-4299 and the patch is torvalds/linux@e9c6a18ext4_read_inode_bitmap
andext4_read_block_bitmap
functions fromkernel/fs/ext4/ialloc.c
andkernel/fs/ext4/balloc.c
respectively, which shares the similarity with CVE-2018-1093 and the patch is torvalds/linux@7dac4a1ext4_mb_add_groupinfo
,ext4_mb_add_groupinfo
andext4_mb_add_groupinfo
functions fromkernel/fs/ext4/mballoc.c
,kernel/.pc/patches.taobao/ext4-use-dedicated-slab-caches-for-group_info-structures.patch/fs/ext4/mballoc.c
andkernel/.pc/patches.taobao/ext4-Adding-error-check-after-calling-ext4_mb_regular_allocator.patch/fs/ext4/mballoc.c
respectively, which shares the similarity with CVE-2018-10876 and the patch is torvalds/linux@8844618__ext4_get_inode_loc
,__ext4_get_inode_loc
and__ext4_get_inode_loc
functions fromkernel/fs/ext4/inode.c
,kernel/.pc/patches.taobao/ext4-Fix-possible-lost-inode-write-in-no-journal-mode.diff/fs/ext4/inode.c
andkernel/.pc/patches.taobao/ext4-Fix-buffer-head-leaks-after-calls-to-ext4_get_inode_loc.diff/fs/ext4/inode.c
which shares the similarity with CVE-2018-10882 and the patch is torvalds/linux@c37e9e0mem_cgroup_move_charge_pte_range
from the filekernel/mm/memcontrol.c
which shares the similarity to CVE-2012-1179 and the patch is torvalds/linux@1a5a990flush_ldt
,init_new_context
,alloc_ldt
,copy_ldt
andconvert_ip_to_linear
functions fromkernel/arch/x86/kernel/ldt.c
andkernel/arch/x86/kernel/step.c
respectively, which shares the similarity with CVE-2015-5157 and the patch is torvalds/linux@37868fehandle_rx_mergeable
fromkernel/drivers/vhost/net.c
shares the similarity to CVE-2014-0077 and the patch is torvalds/linux@d8316f3create_kthread
fromkernel/kernel/kthread.c
, which shares the similarity with CVE-2012-4398 and the patch is torvalds/linux@786235ecypress_open
fromkernel/drivers/usb/serial/cypress_m8.c
, which shares the similarity with CVE-2016-3137 and the patch is torvalds/linux@c55aee1gru_handle_user_call_os
andgru_check_context_placement
functions fromkernel/drivers/misc/sgi-gru/grufault.c
andkernel/drivers/misc/sgi-gru/grumain.c
respectively, which shares the similarity with CVE-2022-3424 and the patch is torvalds/linux@643a16arose_start_idletimer
fromernel/net/rose/rose_timer.c
, which shares the similarity with CVE-2022-2318 and the patch is torvalds/linux@9cc02edext4_xattr_ibody_find
andext3_xattr_ibody_find
functions fromkernel/fs/ext4/xattr.c
andkernel/fs/ext3/xattr.c
respectively, which shares the similarity with CVE-2023-2513 and the patch is torvalds/linux@67d7d8ad99befib6_rule_action
function fromkernel/net/ipv6/fib6_rules.c
, which shares the similarity with CVE-2023-3022 and the patch is torvalds/linux@a65120bae4b7We have preliminarily verified the correctness of the above list through static analysis. Would you can help to check if this bug is true? If it's true, please try to fix it, or I'd like to open a PR for that if necessary. Thank you for your effort and patience!
The text was updated successfully, but these errors were encountered: