diff --git a/vulntest/SSTSTestcases/2025/07/CVE-2025-22842/TestCaseInfo-CVE-2025-22842.json b/vulntest/SSTSTestcases/2025/07/CVE-2025-22842/TestCaseInfo-CVE-2025-22842.json new file mode 100644 index 0000000000000000000000000000000000000000..1d2a39387d7f47f5e16d3474a901dfe0dfe083a3 --- /dev/null +++ b/vulntest/SSTSTestcases/2025/07/CVE-2025-22842/TestCaseInfo-CVE-2025-22842.json @@ -0,0 +1,142 @@ +{ + "month": "2025-04", + "release_time": "", + "vulnerabilities": [ + { + "month": "2025-04", + + "vul_id": { + "cve": "CVE-2025-22842", + "openharmony-sa": "" + }, + + "severity": "Low", + + "vul_description": { + "zh": "arkcompiler_ets_runtime越界读", + "en": "arkcompiler_ets_runtime has an out-of-bounds read vulnerability" + }, + + "vul_impact": { + "zh": "本地攻击者可造成DOS", + "en": "allow a local attacker cause DOS" + }, + + "disclosure": { + "zh": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-04.md", + "en": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2025/2025-04.md" + }, + + "patch_info": { + "4.1.x": { + "patch_url": [ + "https://gitee.com/openharmony/arkcompiler_ets_runtime/pulls/10951" + ], + "patch_file": [ + "https://gitee.com/openharmony/arkcompiler_ets_runtime/pulls/10951.patch" + ], + "diff_file": [ + "https://gitee.com/openharmony/arkcompiler_ets_runtime/pulls/10951.diff" + ] + }, + "5.0.2.x": { + "patch_url": [ + "https://gitee.com/openharmony/arkcompiler_ets_runtime/pulls/10949" + ], + "patch_file": [ + "https://gitee.com/openharmony/arkcompiler_ets_runtime/pulls/10949.patch" + ], + "diff_file": [ + "https://gitee.com/openharmony/arkcompiler_ets_runtime/pulls/10949.diff" + ] + } + }, + + "affected_projects": "arkcompiler_ets_runtime", + + "object_type": "arkcompiler_ets_runtime", + + "affected_versions": [ + "4.1.0-4.1.2", + "5.0.2.0-5.0.2.1" + ], + + "affected_device": { + "mini": { + "liteos": { + "rics-v": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + } + }, + + "small": { + "liteos": { + "rics-v": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + }, + "linux": { + "arm": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + } + }, + + "standard": { + "linux": { + "arm": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + }, + "arm64": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": true, + "yara": { + "affected_files": [ + "/system/lib64/platformsdk/libark_jsruntime.so" + ], + "yara_rules": [ + "TestCaseRule-CVE-2025-22842.yara" + ] + } + } + } + } + } + } + } + } + ] +} \ No newline at end of file diff --git a/vulntest/SSTSTestcases/2025/07/CVE-2025-22842/TestCaseRule-CVE-2025-22842.yara b/vulntest/SSTSTestcases/2025/07/CVE-2025-22842/TestCaseRule-CVE-2025-22842.yara new file mode 100644 index 0000000000000000000000000000000000000000..e990b99a6fb434ea369f4bef3efcc8747f5a26fe --- /dev/null +++ b/vulntest/SSTSTestcases/2025/07/CVE-2025-22842/TestCaseRule-CVE-2025-22842.yara @@ -0,0 +1,34 @@ +/* + * Copyright (c) 2024 Beijing University of Posts and Telecommunications. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +import "console" + +rule CVE_2025_22842 +{ + meta: + date = "2025-07-29" + openharmony_sa = "" + cve = "CVE-2025-22842" + affected_files = "/system/lib64/platformsdk/libark_jsruntime.so" + + strings: + + $fix = "[a-zA-Z_\\-/]" + + condition: + $fix and console.log("CVE-2025-22842 testcase pass") + } + diff --git a/vulntest/SSTSTestcases/2025/07/CVE-2025-22886/TestCaseInfo-CVE-2025-22886.json b/vulntest/SSTSTestcases/2025/07/CVE-2025-22886/TestCaseInfo-CVE-2025-22886.json new file mode 100644 index 0000000000000000000000000000000000000000..c340004ec0a8287223cb4140aa73a212a757be0c --- /dev/null +++ b/vulntest/SSTSTestcases/2025/07/CVE-2025-22886/TestCaseInfo-CVE-2025-22886.json @@ -0,0 +1,130 @@ +{ + "month": "2025-05", + "release_time": "", + "vulnerabilities": [ + { + "month": "2025-05", + + "vul_id": { + "cve": "CVE-2025-22886", + "openharmony-sa": "" + }, + + "severity": "Low", + + "vul_description": { + "zh": "distributeddatamgr_udmf 内存泄露", + "en": "distributeddatamgr_udmf has a memory leak vulnerability" + }, + + "vul_impact": { + "zh": "本地攻击者可造成DOS", + "en": "allow a local attacker cause DOS" + }, + + "disclosure": { + "zh": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-05.md", + "en": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2025/2025-05.md" + }, + + "patch_info": { + "5.0.3.x": { + "patch_url": [ + "https://gitee.com/openharmony/distributeddatamgr_udmf/pulls/526" + ], + "patch_file": [ + "https://gitee.com/openharmony/distributeddatamgr_udmf/pulls/526.patch" + ], + "diff_file": [ + "https://gitee.com/openharmony/distributeddatamgr_udmf/pulls/526.diff" + ] + } + }, + + "affected_projects": "distributeddatamgr_udmf", + + "object_type": "distributeddatamgr_udmf", + + "affected_versions": [ + "5.0.3.0-5.0.3.2" + ], + + "affected_device": { + "mini": { + "liteos": { + "rics-v": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + } + }, + + "small": { + "liteos": { + "rics-v": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + }, + "linux": { + "arm": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + } + }, + + "standard": { + "linux": { + "arm": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + }, + "arm64": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": true, + "yara": { + "affected_files": [ + "/system/lib64/platformsdk/libudmf_client.z.so" + ], + "yara_rules": [ + "TestCaseRule-CVE-2025-22886.yara" + ] + } + } + } + } + } + } + } + } + ] +} \ No newline at end of file diff --git a/vulntest/SSTSTestcases/2025/07/CVE-2025-22886/TestCaseRule-CVE-2025-22886.yara b/vulntest/SSTSTestcases/2025/07/CVE-2025-22886/TestCaseRule-CVE-2025-22886.yara new file mode 100644 index 0000000000000000000000000000000000000000..e9d4221df313bd1694073cbeb4cef17a05338eaf --- /dev/null +++ b/vulntest/SSTSTestcases/2025/07/CVE-2025-22886/TestCaseRule-CVE-2025-22886.yara @@ -0,0 +1,37 @@ +/* + * Copyright (c) 2024 Beijing University of Posts and Telecommunications. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +import "console" + +rule CVE_2025_22886 +{ + meta: + date = "2025-07-29" + openharmony_sa = "" + cve = "CVE-2025-22886" + affected_files = "/system/lib64/platformsdk/libudmf_client.z.so" + + strings: + + $fix1 = "tokenId=%{public}u, tokenType=%{public}d" + $fix2 = "The setting data initiated by the SA cannot contain the file type" + $fix3 = "Process big data error, status = %{public}d" + $fix4 = "applicationDefinedRecordMark" + + condition: + $fix1 and $fix2 and $fix3 and $fix4 and console.log("CVE-2025-22886 testcase pass") + } + diff --git a/vulntest/SSTSTestcases/2025/07/CVE-2025-24301/TestCaseInfo-CVE-2025-24301.json b/vulntest/SSTSTestcases/2025/07/CVE-2025-24301/TestCaseInfo-CVE-2025-24301.json new file mode 100644 index 0000000000000000000000000000000000000000..867eb1f7e69d7c0417956fae0970cfbd184bc56f --- /dev/null +++ b/vulntest/SSTSTestcases/2025/07/CVE-2025-24301/TestCaseInfo-CVE-2025-24301.json @@ -0,0 +1,130 @@ +{ + "month": "2025-03", + "release_time": "", + "vulnerabilities": [ + { + "month": "2025-03", + + "vul_id": { + "cve": "CVE-2025-24301", + "openharmony-sa": "" + }, + + "severity": "Low", + + "vul_description": { + "zh": "arkcompiler_ets_runtime UAF漏洞", + "en": "arkcompiler_ets_runtime has an UAF vulnerability" + }, + + "vul_impact": { + "zh": "本地攻击者可在受限场景造成任意代码执行", + "en": "allow a local attacker arbitrary code execution in pre-installed apps" + }, + + "disclosure": { + "zh": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md", + "en": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2025/2025-03.md" + }, + + "patch_info": { + "5.0.2.x": { + "patch_url": [ + "https://gitee.com/openharmony/arkcompiler_ets_runtime/pulls/10949" + ], + "patch_file": [ + "https://gitee.com/openharmony/arkcompiler_ets_runtime/pulls/10949.patch" + ], + "diff_file": [ + "https://gitee.com/openharmony/arkcompiler_ets_runtime/pulls/10949.diff" + ] + } + }, + + "affected_projects": "arkcompiler_ets_runtime", + + "object_type": "arkcompiler_ets_runtime", + + "affected_versions": [ + "5.0.2.0-5.0.2.2" + ], + + "affected_device": { + "mini": { + "liteos": { + "rics-v": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + } + }, + + "small": { + "liteos": { + "rics-v": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + }, + "linux": { + "arm": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + } + }, + + "standard": { + "linux": { + "arm": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + }, + "arm64": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": true, + "yara": { + "affected_files": [ + "/system/lib64/platformsdk/libark_jsruntime.so" + ], + "yara_rules": [ + "TestCaseRule-CVE-2025-24301.yara" + ] + } + } + } + } + } + } + } + } + ] +} \ No newline at end of file diff --git a/vulntest/SSTSTestcases/2025/07/CVE-2025-24301/TestCaseRule-CVE-2025-24301.yara b/vulntest/SSTSTestcases/2025/07/CVE-2025-24301/TestCaseRule-CVE-2025-24301.yara new file mode 100644 index 0000000000000000000000000000000000000000..8b8ca6ac30c4604c7df0a4c7c136ed3f55cceac9 --- /dev/null +++ b/vulntest/SSTSTestcases/2025/07/CVE-2025-24301/TestCaseRule-CVE-2025-24301.yara @@ -0,0 +1,34 @@ +/* + * Copyright (c) 2024 Beijing University of Posts and Telecommunications. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +import "console" + +rule CVE_2025_24301 +{ + meta: + date = "2025-07-29" + openharmony_sa = "" + cve = "CVE-2025-24301" + affected_files = "/system/lib64/platformsdk/libark_jsruntime.so" + + strings: + + $fix = "[a-zA-Z_\\-/]*" + + condition: + $fix and console.log("CVE-2025-24301 testcase pass") + } + diff --git a/vulntest/SSTSTestcases/2025/07/CVE-2025-24309/TestCaseInfo-CVE-2025-24309.json b/vulntest/SSTSTestcases/2025/07/CVE-2025-24309/TestCaseInfo-CVE-2025-24309.json new file mode 100644 index 0000000000000000000000000000000000000000..f1530163d2203c46a94c5d7f3c2eeb865269768a --- /dev/null +++ b/vulntest/SSTSTestcases/2025/07/CVE-2025-24309/TestCaseInfo-CVE-2025-24309.json @@ -0,0 +1,130 @@ +{ + "month": "2025-03", + "release_time": "", + "vulnerabilities": [ + { + "month": "2025-03", + + "vul_id": { + "cve": "CVE-2025-24309", + "openharmony-sa": "" + }, + + "severity": "Low", + + "vul_description": { + "zh": "arkcompiler_ets_runtime越界写漏洞", + "en": "arkcompiler_ets_runtime has an out-of-bounds write vulnerability" + }, + + "vul_impact": { + "zh": "本地攻击者可在受限场景造成任意代码执行", + "en": "allow a local attacker arbitrary code execution in pre-installed apps" + }, + + "disclosure": { + "zh": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md", + "en": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2025/2025-03.md" + }, + + "patch_info": { + "5.0.2.x": { + "patch_url": [ + "https://gitee.com/openharmony/arkcompiler_ets_runtime/pulls/10937" + ], + "patch_file": [ + "https://gitee.com/openharmony/arkcompiler_ets_runtime/pulls/10937.patch" + ], + "diff_file": [ + "https://gitee.com/openharmony/arkcompiler_ets_runtime/pulls/10937.diff" + ] + } + }, + + "affected_projects": "arkcompiler_ets_runtime", + + "object_type": "arkcompiler_ets_runtime", + + "affected_versions": [ + "5.0.2.0-5.0.2.2" + ], + + "affected_device": { + "mini": { + "liteos": { + "rics-v": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + } + }, + + "small": { + "liteos": { + "rics-v": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + }, + "linux": { + "arm": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + } + }, + + "standard": { + "linux": { + "arm": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + }, + "arm64": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": true, + "yara": { + "affected_files": [ + "/system/lib64/platformsdk/libark_jsruntime.so" + ], + "yara_rules": [ + "TestCaseRule-CVE-2025-24309.yara" + ] + } + } + } + } + } + } + } + } + ] +} \ No newline at end of file diff --git a/vulntest/SSTSTestcases/2025/07/CVE-2025-24309/TestCaseRule-CVE-2025-24309.yara b/vulntest/SSTSTestcases/2025/07/CVE-2025-24309/TestCaseRule-CVE-2025-24309.yara new file mode 100644 index 0000000000000000000000000000000000000000..50ed9b357f0c0a8b28e8a46c05f89039887c0de3 --- /dev/null +++ b/vulntest/SSTSTestcases/2025/07/CVE-2025-24309/TestCaseRule-CVE-2025-24309.yara @@ -0,0 +1,34 @@ +/* + * Copyright (c) 2024 Beijing University of Posts and Telecommunications. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +import "console" + +rule CVE_2025_24309 +{ + meta: + date = "2025-07-29" + openharmony_sa = "" + cve = "CVE-2025-24309" + affected_files = "/system/lib64/platformsdk/libark_jsruntime.so" + + strings: + + $fix = {00 00 79 9E C0 03 5F D6} + + condition: + $fix and console.log("CVE-2025-24309 testcase pass") + } + diff --git a/vulntest/SSTSTestcases/2025/07/CVE-2025-25217/TestCaseInfo-CVE-2025-25217.json b/vulntest/SSTSTestcases/2025/07/CVE-2025-25217/TestCaseInfo-CVE-2025-25217.json new file mode 100644 index 0000000000000000000000000000000000000000..75810f25529d65170d8dce9a1a19bb2cdf340537 --- /dev/null +++ b/vulntest/SSTSTestcases/2025/07/CVE-2025-25217/TestCaseInfo-CVE-2025-25217.json @@ -0,0 +1,130 @@ +{ + "month": "2025-06", + "release_time": "", + "vulnerabilities": [ + { + "month": "2025-06", + + "vul_id": { + "cve": "CVE-2025-25217", + "openharmony-sa": "" + }, + + "severity": "Low", + + "vul_description": { + "zh": "arkui_ace_engine空指针解引用漏洞", + "en": "arkui_ace_enginehas a NULL pointer dereference vulnerability" + }, + + "vul_impact": { + "zh": "本地攻击者可造成DOS", + "en": "allow a local attacker cause DOS" + }, + + "disclosure": { + "zh": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md", + "en": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2025/2025-06.md" + }, + + "patch_info": { + "5.0.3.x": { + "patch_url": [ + "https://gitee.com/openharmony/arkui_ace_engine/pulls/60922" + ], + "patch_file": [ + "https://gitee.com/openharmony/arkui_ace_engine/pulls/60922.patch" + ], + "diff_file": [ + "https://gitee.com/openharmony/arkui_ace_engine/pulls/60922.diff" + ] + } + }, + + "affected_projects": "arkui_ace_engine", + + "object_type": "arkui_ace_engine", + + "affected_versions": [ + "5.0.3.0-5.0.3.2" + ], + + "affected_device": { + "mini": { + "liteos": { + "rics-v": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + } + }, + + "small": { + "liteos": { + "rics-v": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + }, + "linux": { + "arm": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + } + }, + + "standard": { + "linux": { + "arm": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + }, + "arm64": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": true, + "yara": { + "affected_files": [ + "/system/lib64/platformsdk/libace_compatible.z.so" + ], + "yara_rules": [ + "TestCaseRule-CVE-2025-25217.yara" + ] + } + } + } + } + } + } + } + } + ] +} \ No newline at end of file diff --git a/vulntest/SSTSTestcases/2025/07/CVE-2025-25217/TestCaseRule-CVE-2025-25217.yara b/vulntest/SSTSTestcases/2025/07/CVE-2025-25217/TestCaseRule-CVE-2025-25217.yara new file mode 100644 index 0000000000000000000000000000000000000000..093c02f98132713e9159e282c8751aeef9d7405e --- /dev/null +++ b/vulntest/SSTSTestcases/2025/07/CVE-2025-25217/TestCaseRule-CVE-2025-25217.yara @@ -0,0 +1,34 @@ +/* + * Copyright (c) 2024 Beijing University of Posts and Telecommunications. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +import "console" + +rule CVE_2025_25217 +{ + meta: + date = "2025-07-29" + openharmony_sa = "" + cve = "CVE-2025-25217" + affected_files = "/system/lib64/platformsdk/libace_compatible.z.so" + + strings: + + $fix = "Dynamic symbol %{public}s is null. Please check if it is correctly loaded." + + condition: + $fix and console.log("CVE-2025-25217 testcase pass") + } + diff --git a/vulntest/SSTSTestcases/2025/07/CVE-2025-27242/TestCaseInfo-CVE-2025-27242.json b/vulntest/SSTSTestcases/2025/07/CVE-2025-27242/TestCaseInfo-CVE-2025-27242.json new file mode 100644 index 0000000000000000000000000000000000000000..9a9434d90d83f4d7db4f96fae01ed75e87cac638 --- /dev/null +++ b/vulntest/SSTSTestcases/2025/07/CVE-2025-27242/TestCaseInfo-CVE-2025-27242.json @@ -0,0 +1,130 @@ +{ + "month": "2025-06", + "release_time": "", + "vulnerabilities": [ + { + "month": "2025-06", + + "vul_id": { + "cve": "CVE-2025-27242", + "openharmony-sa": "" + }, + + "severity": "Low", + + "vul_description": { + "zh": "安全组件管理模块不当输入验证", + "en": "security_access_token has an improper input vulnerability" + }, + + "vul_impact": { + "zh": "本地攻击者可造成敏感信息泄露", + "en": "allow a local attacker cause information leak" + }, + + "disclosure": { + "zh": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md", + "en": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2025/2025-06.md" + }, + + "patch_info": { + "5.0.3.x": { + "patch_url": [ + "https://gitee.com/openharmony/security_security_component_manager/pulls/300" + ], + "patch_file": [ + "https://gitee.com/openharmony/security_security_component_manager/pulls/300.patch" + ], + "diff_file": [ + "https://gitee.com/openharmony/security_security_component_manager/pulls/300.diff" + ] + } + }, + + "affected_projects": "security_security_component_manager", + + "object_type": "security_security_component_manager", + + "affected_versions": [ + "5.0.3.0-5.0.3.2" + ], + + "affected_device": { + "mini": { + "liteos": { + "rics-v": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + } + }, + + "small": { + "liteos": { + "rics-v": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + }, + "linux": { + "arm": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + } + }, + + "standard": { + "linux": { + "arm": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + }, + "arm64": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": true, + "yara": { + "affected_files": [ + "/system/lib64/libsecurity_component_service.z.so" + ], + "yara_rules": [ + "TestCaseRule-CVE-2025-27242.yara" + ] + } + } + } + } + } + } + } + } + ] +} \ No newline at end of file diff --git a/vulntest/SSTSTestcases/2025/07/CVE-2025-27242/TestCaseRule-CVE-2025-27242.yara b/vulntest/SSTSTestcases/2025/07/CVE-2025-27242/TestCaseRule-CVE-2025-27242.yara new file mode 100644 index 0000000000000000000000000000000000000000..480fc8a9c5ec000acf0e44fa7f33cfb247588bec --- /dev/null +++ b/vulntest/SSTSTestcases/2025/07/CVE-2025-27242/TestCaseRule-CVE-2025-27242.yara @@ -0,0 +1,34 @@ +/* + * Copyright (c) 2024 Beijing University of Posts and Telecommunications. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +import "console" + +rule CVE_2025_27242 +{ + meta: + date = "2025-07-29" + openharmony_sa = "" + cve = "CVE-2025-27242" + affected_files = "/system/lib64/libsecurity_component_service.z.so" + + strings: + + $fix = {E0 03 14 2A F7 0B 40 F9 F4 4F 43 A9 F6 57 42 A9 FD} + + condition: + $fix and console.log("CVE-2025-27242 testcase pass") + } + diff --git a/vulntest/SSTSTestcases/2025/07/CVE-2025-27247/TestCaseInfo-CVE-2025-27247.json b/vulntest/SSTSTestcases/2025/07/CVE-2025-27247/TestCaseInfo-CVE-2025-27247.json new file mode 100644 index 0000000000000000000000000000000000000000..934c98a4c7cdbfc928542534ff976e2b52dba28c --- /dev/null +++ b/vulntest/SSTSTestcases/2025/07/CVE-2025-27247/TestCaseInfo-CVE-2025-27247.json @@ -0,0 +1,130 @@ +{ + "month": "2025-06", + "release_time": "", + "vulnerabilities": [ + { + "month": "2025-06", + + "vul_id": { + "cve": "CVE-2025-27247", + "openharmony-sa": "" + }, + + "severity": "Medium", + + "vul_description": { + "zh": "剪切板模块权限绕过漏洞", + "en": "pasteboard has an improper preservation of permissions vulnerability" + }, + + "vul_impact": { + "zh": "本地攻击者可造成敏感信息泄露", + "en": "allow a local attacker cause information leak" + }, + + "disclosure": { + "zh": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md", + "en": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2025/2025-06.md" + }, + + "patch_info": { + "5.0.3.x": { + "patch_url": [ + "https://gitee.com/openharmony/distributeddatamgr_pasteboard/pulls/1106" + ], + "patch_file": [ + "https://gitee.com/openharmony/distributeddatamgr_pasteboard/pulls/1106.patch" + ], + "diff_file": [ + "https://gitee.com/openharmony/distributeddatamgr_pasteboard/pulls/1106.diff" + ] + } + }, + + "affected_projects": "distributeddatamgr_pasteboard", + + "object_type": "distributeddatamgr_pasteboard", + + "affected_versions": [ + "5.0.3.0-5.0.3.2" + ], + + "affected_device": { + "mini": { + "liteos": { + "rics-v": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + } + }, + + "small": { + "liteos": { + "rics-v": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + }, + "linux": { + "arm": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + } + }, + + "standard": { + "linux": { + "arm": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + }, + "arm64": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": true, + "yara": { + "affected_files": [ + "/system/lib64/libpasteboard_service.z.so" + ], + "yara_rules": [ + "TestCaseRule-CVE-2025-27247.yara" + ] + } + } + } + } + } + } + } + } + ] +} \ No newline at end of file diff --git a/vulntest/SSTSTestcases/2025/07/CVE-2025-27247/TestCaseRule-CVE-2025-27247.yara b/vulntest/SSTSTestcases/2025/07/CVE-2025-27247/TestCaseRule-CVE-2025-27247.yara new file mode 100644 index 0000000000000000000000000000000000000000..63f95428a54789edc21955930443972234d5bd57 --- /dev/null +++ b/vulntest/SSTSTestcases/2025/07/CVE-2025-27247/TestCaseRule-CVE-2025-27247.yara @@ -0,0 +1,34 @@ +/* + * Copyright (c) 2024 Beijing University of Posts and Telecommunications. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +import "console" + +rule CVE_2025_27247 +{ + meta: + date = "2025-07-29" + openharmony_sa = "" + cve = "CVE-2025-27247" + affected_files = "/system/lib64/libpasteboard_service.z.so" + + strings: + + $fix = "isReadGrant is %{public}d, isSecureGrant is %{public}d, isPrivilegeApp is %{public}d" + + condition: + $fix and console.log("CVE-2025-27247 testcase pass") + } + diff --git a/vulntest/SSTSTestcases/2025/07/CVE-2025-27248/TestCaseInfo-CVE-2025-27248.json b/vulntest/SSTSTestcases/2025/07/CVE-2025-27248/TestCaseInfo-CVE-2025-27248.json new file mode 100644 index 0000000000000000000000000000000000000000..8048661441dd92fded9ee05adea4f4079bbf6b73 --- /dev/null +++ b/vulntest/SSTSTestcases/2025/07/CVE-2025-27248/TestCaseInfo-CVE-2025-27248.json @@ -0,0 +1,130 @@ +{ + "month": "2025-05", + "release_time": "", + "vulnerabilities": [ + { + "month": "2025-05", + + "vul_id": { + "cve": "CVE-2025-27248", + "openharmony-sa": "" + }, + + "severity": "Low", + + "vul_description": { + "zh": "ai_neural_network_runtime 空指针解引用", + "en": "ai_neural_network_runtime has a NULL pointer dereference vulnerability" + }, + + "vul_impact": { + "zh": "本地攻击者可造成DOS", + "en": "allow a local attacker cause DOS" + }, + + "disclosure": { + "zh": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-05.md", + "en": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2025/2025-05.md" + }, + + "patch_info": { + "5.0.3.x": { + "patch_url": [ + "https://gitee.com/openharmony/ai_neural_network_runtime/pulls/258" + ], + "patch_file": [ + "https://gitee.com/openharmony/ai_neural_network_runtime/pulls/258.patch" + ], + "diff_file": [ + "https://gitee.com/openharmony/ai_neural_network_runtime/pulls/258.diff" + ] + } + }, + + "affected_projects": "ai_neural_network_runtime", + + "object_type": "ai_neural_network_runtime", + + "affected_versions": [ + "5.0.3.0-5.0.3.2" + ], + + "affected_device": { + "mini": { + "liteos": { + "rics-v": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + } + }, + + "small": { + "liteos": { + "rics-v": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + }, + "linux": { + "arm": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + } + }, + + "standard": { + "linux": { + "arm": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + }, + "arm64": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": true, + "yara": { + "affected_files": [ + "/system/lib64/ndk/libneural_network_runtime.so" + ], + "yara_rules": [ + "TestCaseRule-CVE-2025-27248.yara" + ] + } + } + } + } + } + } + } + } + ] +} \ No newline at end of file diff --git a/vulntest/SSTSTestcases/2025/07/CVE-2025-27248/TestCaseRule-CVE-2025-27248.yara b/vulntest/SSTSTestcases/2025/07/CVE-2025-27248/TestCaseRule-CVE-2025-27248.yara new file mode 100644 index 0000000000000000000000000000000000000000..615fd524bb0822b23ac6db13f07921b2358120b2 --- /dev/null +++ b/vulntest/SSTSTestcases/2025/07/CVE-2025-27248/TestCaseRule-CVE-2025-27248.yara @@ -0,0 +1,34 @@ +/* + * Copyright (c) 2024 Beijing University of Posts and Telecommunications. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +import "console" + +rule CVE_2025_27248 +{ + meta: + date = "2025-07-29" + openharmony_sa = "" + cve = "CVE-2025-27248" + affected_files = "/system/lib64/ndk/libneural_network_runtime.so" + + strings: + + $fix = "[NNExecutor] SetExtensionConfig, m_executorConfig create failed." + + condition: + $fix and console.log("CVE-2025-27248 testcase pass") + } + diff --git a/vulntest/SSTSTestcases/2025/07/CVE-2025-27534/TestCaseInfo-CVE-2025-27534.json b/vulntest/SSTSTestcases/2025/07/CVE-2025-27534/TestCaseInfo-CVE-2025-27534.json new file mode 100644 index 0000000000000000000000000000000000000000..d5d0e16b11d4f53e30fe01360127dabe2d77b4dd --- /dev/null +++ b/vulntest/SSTSTestcases/2025/07/CVE-2025-27534/TestCaseInfo-CVE-2025-27534.json @@ -0,0 +1,142 @@ +{ + "month": "2025-04", + "release_time": "", + "vulnerabilities": [ + { + "month": "2025-04", + + "vul_id": { + "cve": "CVE-2025-27534", + "openharmony-sa": "" + }, + + "severity": "Low", + + "vul_description": { + "zh": "arkcompiler_ets_runtime越界读", + "en": "arkcompiler_ets_runtime has an out-of-bounds read vulnerability" + }, + + "vul_impact": { + "zh": "本地攻击者可造成DOS", + "en": "allow a local attacker cause DOS" + }, + + "disclosure": { + "zh": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-04.md", + "en": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2025/2025-04.md" + }, + + "patch_info": { + "4.1.x": { + "patch_url": [ + "https://gitee.com/openharmony/arkcompiler_ets_runtime/pulls/10936" + ], + "patch_file": [ + "https://gitee.com/openharmony/arkcompiler_ets_runtime/pulls/10936.patch" + ], + "diff_file": [ + "https://gitee.com/openharmony/arkcompiler_ets_runtime/pulls/10936.diff" + ] + }, + "5.0.2.x": { + "patch_url": [ + "https://gitee.com/openharmony/arkcompiler_ets_runtime/pulls/10937" + ], + "patch_file": [ + "https://gitee.com/openharmony/arkcompiler_ets_runtime/pulls/10937.patch" + ], + "diff_file": [ + "https://gitee.com/openharmony/arkcompiler_ets_runtime/pulls/10937.diff" + ] + } + }, + + "affected_projects": "arkcompiler_ets_runtime", + + "object_type": "arkcompiler_ets_runtime", + + "affected_versions": [ + "4.1.0-4.1.1", + "5.0.2.0-5.0.2.1" + ], + + "affected_device": { + "mini": { + "liteos": { + "rics-v": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + } + }, + + "small": { + "liteos": { + "rics-v": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + }, + "linux": { + "arm": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + } + }, + + "standard": { + "linux": { + "arm": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + }, + "arm64": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": true, + "yara": { + "affected_files": [ + "/system/lib64/platformsdk/libark_jsruntime.so" + ], + "yara_rules": [ + "TestCaseRule-CVE-2025-27534.yara" + ] + } + } + } + } + } + } + } + } + ] +} \ No newline at end of file diff --git a/vulntest/SSTSTestcases/2025/07/CVE-2025-27534/TestCaseRule-CVE-2025-27534.yara b/vulntest/SSTSTestcases/2025/07/CVE-2025-27534/TestCaseRule-CVE-2025-27534.yara new file mode 100644 index 0000000000000000000000000000000000000000..05b2e8f47f073a118895d1ce5a8afe1f4949aee5 --- /dev/null +++ b/vulntest/SSTSTestcases/2025/07/CVE-2025-27534/TestCaseRule-CVE-2025-27534.yara @@ -0,0 +1,34 @@ +/* + * Copyright (c) 2024 Beijing University of Posts and Telecommunications. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +import "console" + +rule CVE_2025_27534 +{ + meta: + date = "2025-07-29" + openharmony_sa = "" + cve = "CVE-2025-27534" + affected_files = "/system/lib64/platformsdk//libark_jsruntime.so" + + strings: + + $fix = {00 00 79 9E C0 03 5F D6} + + condition: + $fix and console.log("CVE-2025-27534 testcase pass") + } + diff --git a/vulntest/SSTSTestcases/2025/07/CVE-2025-27563/TestCaseInfo-CVE-2025-27563.json b/vulntest/SSTSTestcases/2025/07/CVE-2025-27563/TestCaseInfo-CVE-2025-27563.json new file mode 100644 index 0000000000000000000000000000000000000000..7782407ffcfca4153b2a0341e7f00dc5a3b53e5d --- /dev/null +++ b/vulntest/SSTSTestcases/2025/07/CVE-2025-27563/TestCaseInfo-CVE-2025-27563.json @@ -0,0 +1,130 @@ +{ + "month": "2025-06", + "release_time": "", + "vulnerabilities": [ + { + "month": "2025-06", + + "vul_id": { + "cve": "CVE-2025-27563", + "openharmony-sa": "" + }, + + "severity": "Low", + + "vul_description": { + "zh": "security_access_token权限绕过漏洞", + "en": "security_access_token has an improper preservation of permissions vulnerability" + }, + + "vul_impact": { + "zh": "本地攻击者可造成敏感信息泄露", + "en": "allow a local attacker cause information leak" + }, + + "disclosure": { + "zh": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md", + "en": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2025/2025-06.md" + }, + + "patch_info": { + "5.0.3.x": { + "patch_url": [ + "https://gitee.com/openharmony/security_access_token/pulls/3203" + ], + "patch_file": [ + "https://gitee.com/openharmony/security_access_token/pulls/3203.patch" + ], + "diff_file": [ + "https://gitee.com/openharmony/security_access_token/pulls/3203.diff" + ] + } + }, + + "affected_projects": "security_access_token", + + "object_type": "security_access_token", + + "affected_versions": [ + "5.0.3.0-5.0.3.2" + ], + + "affected_device": { + "mini": { + "liteos": { + "rics-v": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + } + }, + + "small": { + "liteos": { + "rics-v": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + }, + "linux": { + "arm": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + } + }, + + "standard": { + "linux": { + "arm": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + }, + "arm64": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": true, + "yara": { + "affected_files": [ + "/system/lib64/libprivacy_manager_service.z.so" + ], + "yara_rules": [ + "TestCaseRule-CVE-2025-27563.yara" + ] + } + } + } + } + } + } + } + } + ] +} \ No newline at end of file diff --git a/vulntest/SSTSTestcases/2025/07/CVE-2025-27563/TestCaseRule-CVE-2025-27563.yara b/vulntest/SSTSTestcases/2025/07/CVE-2025-27563/TestCaseRule-CVE-2025-27563.yara new file mode 100644 index 0000000000000000000000000000000000000000..c66e31c7b00b56854c7a8cdf838b555508ce00e0 --- /dev/null +++ b/vulntest/SSTSTestcases/2025/07/CVE-2025-27563/TestCaseRule-CVE-2025-27563.yara @@ -0,0 +1,34 @@ +/* + * Copyright (c) 2024 Beijing University of Posts and Telecommunications. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +import "console" + +rule CVE_2025_27563 +{ + meta: + date = "2025-07-29" + openharmony_sa = "" + cve = "CVE-2025-27563" + affected_files = "/system/lib64/libprivacy_manager_service.z.so" + + strings: + + $fix = "Permission denied(tokenID=%{public}d)" + + condition: + $fix and console.log("CVE-2025-27563 testcase pass") + } +