Fastsocket is a highly scalable socket and its underlying networking implementation of Linux kernel. With the straight linear scalability, Fastsocket can provide extremely good performance in multicore machines. In addition, it is very easy to use and maintain. As a result, it has been deployed in the production environment of SINA.
GNU General Public License v2.0
3.76k
stars
727
forks
source link
Security Vulnerability - Action Required: some unpatched vulnerabilities are detected in your repo #65
Hi,
our team have developed a recurring vulnerability detection tool. This tool mainly uses static analysis methods, and it has a high detection accuracy in our dataset. We have also received positive feedback from other projects before.
we have scanned your fastsocket and found some vulnerabilities, which were confirmed and fixed by linux do not get patched in this repo. Here are some details as follows:
__mptctl_ioctl, mptctl_do_reset, mptctl_fw_download, mptctl_getiocinfo, mptctl_gettargetinfo, mptctl_readtest, mptctl_eventquery, mptctl_eventenable, mptctl_eventreport, mptctl_replace_fw, mptctl_mpt_command, mptctl_hp_hostinfo, mptctl_hp_targetinfo, compat_mptfwxfer_ioctl and compat_mpt_command functions from kernel/drivers/message/fusion/mptctl.c, which shares the similarity with CVE-2020-12652 and the patch is https://github.com/torvalds/linux/commit/28d76df18f0ad5bcf5fa48510b225f0ed262a99b
snd_seq_client_enqueue_event, kernel_client_enqueue, snd_seq_fifo_event_in, snd_seq_cell_alloc and snd_seq_event_dup functions from kernel/sound/core/seq/seq_clientmgr.c, kernel/sound/core/seq/seq_fifo.c and kernel/sound/core/seq/seq_memory.c respectively, which shares the similarity with CVE-2018-1000004 and the patch is https://github.com/torvalds/linux/commit/7bd80091567789f1c0cb70eb4737aac8bcd2b6b9
ext4_xattr_ibody_find and ext3_xattr_ibody_find functions from kernel/fs/ext4/xattr.c and kernel/fs/ext3/xattr.c respectively, which shares the similarity with CVE-2023-2513 and the patch is https://github.com/torvalds/linux/commit/67d7d8ad99be
fib6_rule_action function from kernel/net/ipv6/fib6_rules.c, which shares the similarity with CVE-2023-3022 and the patch is https://github.com/torvalds/linux/commit/a65120bae4b7We have preliminarily verified the correctness of the above list through static analysis. Would you can help to check if this bug is true? If it's true, please try to fix it, or I'd like to open a PR for that if necessary. Thank you for your effort and patience!
Hi, our team have developed a recurring vulnerability detection tool. This tool mainly uses static analysis methods, and it has a high detection accuracy in our dataset. We have also received positive feedback from other projects before. we have scanned your fastsocket and found some vulnerabilities, which were confirmed and fixed by linux do not get patched in this repo. Here are some details as follows:
inet_create
andinet6_create
functions fromkernel/net/ipv4/af_inet.c
andkernel/net/ipv6/af_inet6.c
respectively, which shares the similarity with CVE-2015-8543 and the patch is https://github.com/torvalds/linux/commit/79462ad02e861803b3840cc782248c7359451cd9pipe_iov_copy_from_user
andpipe_iov_copy_to_user
functions fromkernel/fs/pipe.c
, which shares the similarity with CVE-2015-1805 and the patch is https://github.com/torvalds/linux/commit/637b58c2887e5e57850865839cc75f59184b23d1__mptctl_ioctl
,mptctl_do_reset
,mptctl_fw_download
,mptctl_getiocinfo
,mptctl_gettargetinfo
,mptctl_readtest
,mptctl_eventquery
,mptctl_eventenable
,mptctl_eventreport
,mptctl_replace_fw
,mptctl_mpt_command
,mptctl_hp_hostinfo
,mptctl_hp_targetinfo
,compat_mptfwxfer_ioctl
andcompat_mpt_command
functions fromkernel/drivers/message/fusion/mptctl.c
, which shares the similarity with CVE-2020-12652 and the patch is https://github.com/torvalds/linux/commit/28d76df18f0ad5bcf5fa48510b225f0ed262a99bsunkbd_interrupt
function fromkernel/net/ipv4/af_inet.c
andkernel/drivers/input/keyboard/sunkbd.c
, which shares the similarity with CVE-2020-25669 and the patch is https://github.com/torvalds/linux/commit/77e70d351db7de07a46ac49b87a6c3c7a60fca7evgacon_scroll
function fromkernel/drivers/video/console/vgacon.c
, which shares the similarity with CVE-2020-28097 and the patch is https://github.com/torvalds/linux/commit/973c096f6a85e5b5f2a295126ba6928d9a6afd45notify_change
function fromkernel/fs/attr.c
, which shares the similarity with CVE-2015-1350 and the patch is https://github.com/torvalds/linux/commit/030b533c4fd4d2ec3402363323de4bb2983c9ceeenable_nmi_window
fromkernel/arch/x86/kvm/svm.c
, which shares the similarity with CVE-2015-8104 and the patch is https://github.com/torvalds/linux/commit/cbdb967af3d54993f5814f1cee0ed311a055377disdn_ppp_ioctl
,slhc_init
, andsl_alloc_bufs
functions fromkernel/drivers/isdn/i4l/isdn_ppp.c
,kernel/drivers/net/slhc.c
andkernel/drivers/net/slip.c
respectively, which shares the similarity with CVE-2015-7799 and the patch is https://github.com/torvalds/linux/commit/4ab42d78e37a294ac7bc56901d563c642e03c4aeext4_ext_split
fromkernel/fs/ext4/extents.c
, which shares the similarity with CVE-2019-11833 and the patch is https://github.com/torvalds/linux/commit/592acbf16821288ecdc4192c47e3774a4c48bb64snd_seq_client_enqueue_event
,kernel_client_enqueue
,snd_seq_fifo_event_in
,snd_seq_cell_alloc
andsnd_seq_event_dup
functions fromkernel/sound/core/seq/seq_clientmgr.c
,kernel/sound/core/seq/seq_fifo.c
andkernel/sound/core/seq/seq_memory.c
respectively, which shares the similarity with CVE-2018-1000004 and the patch is https://github.com/torvalds/linux/commit/7bd80091567789f1c0cb70eb4737aac8bcd2b6b9ext4_read_inode_bitmap
andext4_read_block_bitmap
functions fromkernel/fs/ext4/ialloc.c
andkernel/fs/ext4/balloc.c
respectively, which shares the similarity with CVE-2018-1093 and the patch is https://github.com/torvalds/linux/commit/7dac4a1726a9c64a517d595c40e95e2d0d135f6fext4_mb_add_groupinfo
andext4_has_uninit_itable
functions fromkernel/fs/ext4/mballoc.c
andkernel/fs/ext4/super.c
respectively, which shares the similarity with CVE-2018-10876 and the patch is https://github.com/torvalds/linux/commit/8844618d8aa7a9973e7b527d038a2a589665002c__ext4_get_inode_loc
functions fromkernel/fs/ext4/inode.c
, which shares the similarity with CVE-2018-10882 and the patch is https://github.com/torvalds/linux/commit/c37e9e013469521d9adb932d17a1795c139b36dbflush_ldt
,init_new_context
,alloc_ldt
,copy_ldt
andconvert_ip_to_linear
functions fromkernel/arch/x86/kernel/ldt.c
andkernel/arch/x86/kernel/step.c
respectively, which shares the similarity with CVE-2015-5157 and the patch is https://github.com/torvalds/linux/commit/37868fe113ff2ba814b3b4eb12df214df555f8dccreate_kthread
fromkernel/kernel/kthread.c
, which shares the similarity with CVE-2012-4398 and the patch is https://github.com/torvalds/linux/commit/786235eeba0e1e85e5cbbb9f97d1087ad03dfa21cypress_open
fromkernel/drivers/usb/serial/cypress_m8.c
, which shares the similarity with CVE-2016-3137 and the patch is https://github.com/torvalds/linux/commit/c55aee1bf0e6b6feec8b2927b43f7a09a6d5f754gru_handle_user_call_os
andgru_check_context_placement
functions fromkernel/drivers/misc/sgi-gru/grufault.c
andkernel/drivers/misc/sgi-gru/grumain.c
respectively, which shares the similarity with CVE-2022-3424 and the patch is https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dcrose_start_idletimer
fromernel/net/rose/rose_timer.c
, which shares the similarity with CVE-2022-2318 and the patch is https://github.com/torvalds/linux/commit/9cc02ede696272c5271a401e4f27c262359bc2f6ext4_xattr_ibody_find
andext3_xattr_ibody_find
functions fromkernel/fs/ext4/xattr.c
andkernel/fs/ext3/xattr.c
respectively, which shares the similarity with CVE-2023-2513 and the patch is https://github.com/torvalds/linux/commit/67d7d8ad99befib6_rule_action
function fromkernel/net/ipv6/fib6_rules.c
, which shares the similarity with CVE-2023-3022 and the patch is https://github.com/torvalds/linux/commit/a65120bae4b7 We have preliminarily verified the correctness of the above list through static analysis. Would you can help to check if this bug is true? If it's true, please try to fix it, or I'd like to open a PR for that if necessary. Thank you for your effort and patience!