diff --git a/vulntest/SSTSTestcases/2024/08/CVE-2024-36008/TestCaseInfo-CVE-2024-36008.json b/vulntest/SSTSTestcases/2024/08/CVE-2024-36008/TestCaseInfo-CVE-2024-36008.json new file mode 100644 index 0000000000000000000000000000000000000000..9fa3f4fddf45bfb515597116ed83f749ad0d6642 --- /dev/null +++ b/vulntest/SSTSTestcases/2024/08/CVE-2024-36008/TestCaseInfo-CVE-2024-36008.json @@ -0,0 +1,141 @@ +{ + "month": "2024-08", + "release_time": "", + "vulnerabilities": [ + { + "month": "2024-08", + + "vul_id": { + "cve": "CVE-2024-36008", + "openharmony-sa": "" + }, + + "severity": "medium", + + "vul_description": { + "zh": "syzbot在一个旧代码库[1]中触发了fib_validate_source()中的NULL解引用。该问题似乎在最新的代码库中仍然存在", + "en": "syzbot was able to trigger a NULL deref in fib_validate_source()in an old tree[1].It appears the bug exists in latest trees." + }, + + "vul_impact": { + "zh": "攻击者可以利用此漏洞通过构造特定的数据包或请求来反复触发fib_validate_source()的 NULL 解引用,导致内核多次崩溃,从而实施拒绝服务攻击,严重影响系统和网络的稳定性。", + "en": "An attacker can exploit this vulnerability by crafting specific packets or requests to repeatedly trigger the NULL dereference in fib_validate_source(), causing the kernel to crash multiple times and thereby launching a denial-of-service (DoS) attack, which can severely impact system and network stability." + }, + + "disclosure": { + "zh": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-08.md", + "en": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2024/2024-08.md" + }, + + "patch_info": { + "4.0.x": { + "patch_url": [ + "https://gitee.com/openharmony/kernel_linux_5.10/commit/08a4732c7325548fd499fc7bf0ebc00d59cc49e3" + ], + "patch_file": [ + "https://gitee.com/openharmony/kernel_linux_5.10/commit/08a4732c7325548fd499fc7bf0ebc00d59cc49e3.patch" + ], + "diff_file": [ + "https://gitee.com/openharmony/kernel_linux_5.10/commit/08a4732c7325548fd499fc7bf0ebc00d59cc49e3.diff" + ] + }, + "4.1.x": { + "patch_url": [ + "https://gitee.com/openharmony/kernel_linux_5.10/commit/0508a65beafe95901b4847579a44d0c424311405" + ], + "patch_file": [ + "https://gitee.com/openharmony/kernel_linux_5.10/commit/0508a65beafe95901b4847579a44d0c424311405.patch" + ], + "diff_file": [ + "https://gitee.com/openharmony/kernel_linux_5.10/commit/0508a65beafe95901b4847579a44d0c424311405.diff" + ] + } + }, + + "affected_projects": "kernel_linux_5.10", + + "affected_versions": [ + "4.0.0-4.0.1", + "4.1.0-4.1.1" + ], + + "affected_device": { + "mini": { + "liteos": { + "rics-v": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + } + }, + + "small": { + "liteos": { + "rics-v": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + }, + "linux": { + "arm": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + } + }, + + "standard": { + "linux": { + "arm": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": true, + "yara": { + "affected_files": [ + "/dev/block/platform/fe310000.sdhci/by-name/boot_linux" + + ], + "yara_rules": [ + "TestCaseRule-CVE-2024-36008.yara" + ] + } + } + } + }, + "arm64": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + } + } + } + } + ] +} \ No newline at end of file diff --git a/vulntest/SSTSTestcases/2024/08/CVE-2024-36008/TestCaseRule-CVE-2024-36008.yara b/vulntest/SSTSTestcases/2024/08/CVE-2024-36008/TestCaseRule-CVE-2024-36008.yara new file mode 100644 index 0000000000000000000000000000000000000000..0996f46d9d2fdba7668400dbc0c664d182e2a69b --- /dev/null +++ b/vulntest/SSTSTestcases/2024/08/CVE-2024-36008/TestCaseRule-CVE-2024-36008.yara @@ -0,0 +1,35 @@ +/* + * Copyright (c) 2024 Beijing University of Posts and Telecommunications. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +import "console" +import "elf" + +rule CVE_2024_36008 +{ + meta: + date="2024-12-18" + openharmony_sa="" + cve="CVE-2024-36008" + affected_files="/dev/block/platform/fe310000.sdhci/by-name/boot_linux" + + strings: + + $fix= {C6 06 00 B4 F3 03 00 AA A0 02 80 12 4B 0C 1C 12 7F 81 03 71} + + condition: + $fix and console.log("CVE-2024-36008 testcase pass") + } +