From 60518eea6e911adf435b957fb7d02446d9f3a7a2 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?=E9=99=88=E6=B6=9B?= Date: Wed, 30 Jul 2025 18:23:31 +0800 Subject: [PATCH] =?UTF-8?q?SSTS=E6=96=B0=E5=A2=9E=E8=A7=84=E5=88=99(arm64)?= =?UTF-8?q?=EF=BC=9ACVE-2025-27534=20CVE-2025-22842=20CVE-2025-27247=20CVE?= =?UTF-8?q?-2025-27242=20CVE-2025-27563=20CVE-2025-25217=20CVE-2025-27248?= =?UTF-8?q?=20CVE-2025-22886=20CVE-2025-24301=20CVE-2025-24309?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Signed-off-by: 陈涛 --- .../TestCaseInfo-CVE-2025-22842.json | 142 ++++++++++++++++++ .../TestCaseRule-CVE-2025-22842.yara | 34 +++++ .../TestCaseInfo-CVE-2025-22886.json | 130 ++++++++++++++++ .../TestCaseRule-CVE-2025-22886.yara | 37 +++++ .../TestCaseInfo-CVE-2025-24301.json | 130 ++++++++++++++++ .../TestCaseRule-CVE-2025-24301.yara | 34 +++++ .../TestCaseInfo-CVE-2025-24309.json | 130 ++++++++++++++++ .../TestCaseRule-CVE-2025-24309.yara | 34 +++++ .../TestCaseInfo-CVE-2025-25217.json | 130 ++++++++++++++++ .../TestCaseRule-CVE-2025-25217.yara | 34 +++++ .../TestCaseInfo-CVE-2025-27242.json | 130 ++++++++++++++++ .../TestCaseRule-CVE-2025-27242.yara | 34 +++++ .../TestCaseInfo-CVE-2025-27247.json | 130 ++++++++++++++++ .../TestCaseRule-CVE-2025-27247.yara | 34 +++++ .../TestCaseInfo-CVE-2025-27248.json | 130 ++++++++++++++++ .../TestCaseRule-CVE-2025-27248.yara | 34 +++++ .../TestCaseInfo-CVE-2025-27534.json | 142 ++++++++++++++++++ .../TestCaseRule-CVE-2025-27534.yara | 34 +++++ .../TestCaseInfo-CVE-2025-27563.json | 130 ++++++++++++++++ .../TestCaseRule-CVE-2025-27563.yara | 34 +++++ 20 files changed, 1667 insertions(+) create mode 100644 vulntest/SSTSTestcases/2025/07/CVE-2025-22842/TestCaseInfo-CVE-2025-22842.json create mode 100644 vulntest/SSTSTestcases/2025/07/CVE-2025-22842/TestCaseRule-CVE-2025-22842.yara create mode 100644 vulntest/SSTSTestcases/2025/07/CVE-2025-22886/TestCaseInfo-CVE-2025-22886.json create mode 100644 vulntest/SSTSTestcases/2025/07/CVE-2025-22886/TestCaseRule-CVE-2025-22886.yara create mode 100644 vulntest/SSTSTestcases/2025/07/CVE-2025-24301/TestCaseInfo-CVE-2025-24301.json create mode 100644 vulntest/SSTSTestcases/2025/07/CVE-2025-24301/TestCaseRule-CVE-2025-24301.yara create mode 100644 vulntest/SSTSTestcases/2025/07/CVE-2025-24309/TestCaseInfo-CVE-2025-24309.json create mode 100644 vulntest/SSTSTestcases/2025/07/CVE-2025-24309/TestCaseRule-CVE-2025-24309.yara create mode 100644 vulntest/SSTSTestcases/2025/07/CVE-2025-25217/TestCaseInfo-CVE-2025-25217.json create mode 100644 vulntest/SSTSTestcases/2025/07/CVE-2025-25217/TestCaseRule-CVE-2025-25217.yara create mode 100644 vulntest/SSTSTestcases/2025/07/CVE-2025-27242/TestCaseInfo-CVE-2025-27242.json create mode 100644 vulntest/SSTSTestcases/2025/07/CVE-2025-27242/TestCaseRule-CVE-2025-27242.yara create mode 100644 vulntest/SSTSTestcases/2025/07/CVE-2025-27247/TestCaseInfo-CVE-2025-27247.json create mode 100644 vulntest/SSTSTestcases/2025/07/CVE-2025-27247/TestCaseRule-CVE-2025-27247.yara create mode 100644 vulntest/SSTSTestcases/2025/07/CVE-2025-27248/TestCaseInfo-CVE-2025-27248.json create mode 100644 vulntest/SSTSTestcases/2025/07/CVE-2025-27248/TestCaseRule-CVE-2025-27248.yara create mode 100644 vulntest/SSTSTestcases/2025/07/CVE-2025-27534/TestCaseInfo-CVE-2025-27534.json create mode 100644 vulntest/SSTSTestcases/2025/07/CVE-2025-27534/TestCaseRule-CVE-2025-27534.yara create mode 100644 vulntest/SSTSTestcases/2025/07/CVE-2025-27563/TestCaseInfo-CVE-2025-27563.json create mode 100644 vulntest/SSTSTestcases/2025/07/CVE-2025-27563/TestCaseRule-CVE-2025-27563.yara diff --git a/vulntest/SSTSTestcases/2025/07/CVE-2025-22842/TestCaseInfo-CVE-2025-22842.json b/vulntest/SSTSTestcases/2025/07/CVE-2025-22842/TestCaseInfo-CVE-2025-22842.json new file mode 100644 index 0000000..1d2a393 --- /dev/null +++ b/vulntest/SSTSTestcases/2025/07/CVE-2025-22842/TestCaseInfo-CVE-2025-22842.json @@ -0,0 +1,142 @@ +{ + "month": "2025-04", + "release_time": "", + "vulnerabilities": [ + { + "month": "2025-04", + + "vul_id": { + "cve": "CVE-2025-22842", + "openharmony-sa": "" + }, + + "severity": "Low", + + "vul_description": { + "zh": "arkcompiler_ets_runtime越界读", + "en": "arkcompiler_ets_runtime has an out-of-bounds read vulnerability" + }, + + "vul_impact": { + "zh": "本地攻击者可造成DOS", + "en": "allow a local attacker cause DOS" + }, + + "disclosure": { + "zh": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-04.md", + "en": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2025/2025-04.md" + }, + + "patch_info": { + "4.1.x": { + "patch_url": [ + "https://gitee.com/openharmony/arkcompiler_ets_runtime/pulls/10951" + ], + "patch_file": [ + "https://gitee.com/openharmony/arkcompiler_ets_runtime/pulls/10951.patch" + ], + "diff_file": [ + "https://gitee.com/openharmony/arkcompiler_ets_runtime/pulls/10951.diff" + ] + }, + "5.0.2.x": { + "patch_url": [ + "https://gitee.com/openharmony/arkcompiler_ets_runtime/pulls/10949" + ], + "patch_file": [ + "https://gitee.com/openharmony/arkcompiler_ets_runtime/pulls/10949.patch" + ], + "diff_file": [ + "https://gitee.com/openharmony/arkcompiler_ets_runtime/pulls/10949.diff" + ] + } + }, + + "affected_projects": "arkcompiler_ets_runtime", + + "object_type": "arkcompiler_ets_runtime", + + "affected_versions": [ + "4.1.0-4.1.2", + "5.0.2.0-5.0.2.1" + ], + + "affected_device": { + "mini": { + "liteos": { + "rics-v": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + } + }, + + "small": { + "liteos": { + "rics-v": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + }, + "linux": { + "arm": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + } + }, + + "standard": { + "linux": { + "arm": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + }, + "arm64": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": true, + "yara": { + "affected_files": [ + "/system/lib64/platformsdk/libark_jsruntime.so" + ], + "yara_rules": [ + "TestCaseRule-CVE-2025-22842.yara" + ] + } + } + } + } + } + } + } + } + ] +} \ No newline at end of file diff --git a/vulntest/SSTSTestcases/2025/07/CVE-2025-22842/TestCaseRule-CVE-2025-22842.yara b/vulntest/SSTSTestcases/2025/07/CVE-2025-22842/TestCaseRule-CVE-2025-22842.yara new file mode 100644 index 0000000..e990b99 --- /dev/null +++ b/vulntest/SSTSTestcases/2025/07/CVE-2025-22842/TestCaseRule-CVE-2025-22842.yara @@ -0,0 +1,34 @@ +/* + * Copyright (c) 2024 Beijing University of Posts and Telecommunications. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +import "console" + +rule CVE_2025_22842 +{ + meta: + date = "2025-07-29" + openharmony_sa = "" + cve = "CVE-2025-22842" + affected_files = "/system/lib64/platformsdk/libark_jsruntime.so" + + strings: + + $fix = "[a-zA-Z_\\-/]" + + condition: + $fix and console.log("CVE-2025-22842 testcase pass") + } + diff --git a/vulntest/SSTSTestcases/2025/07/CVE-2025-22886/TestCaseInfo-CVE-2025-22886.json b/vulntest/SSTSTestcases/2025/07/CVE-2025-22886/TestCaseInfo-CVE-2025-22886.json new file mode 100644 index 0000000..c340004 --- /dev/null +++ b/vulntest/SSTSTestcases/2025/07/CVE-2025-22886/TestCaseInfo-CVE-2025-22886.json @@ -0,0 +1,130 @@ +{ + "month": "2025-05", + "release_time": "", + "vulnerabilities": [ + { + "month": "2025-05", + + "vul_id": { + "cve": "CVE-2025-22886", + "openharmony-sa": "" + }, + + "severity": "Low", + + "vul_description": { + "zh": "distributeddatamgr_udmf 内存泄露", + "en": "distributeddatamgr_udmf has a memory leak vulnerability" + }, + + "vul_impact": { + "zh": "本地攻击者可造成DOS", + "en": "allow a local attacker cause DOS" + }, + + "disclosure": { + "zh": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-05.md", + "en": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2025/2025-05.md" + }, + + "patch_info": { + "5.0.3.x": { + "patch_url": [ + "https://gitee.com/openharmony/distributeddatamgr_udmf/pulls/526" + ], + "patch_file": [ + "https://gitee.com/openharmony/distributeddatamgr_udmf/pulls/526.patch" + ], + "diff_file": [ + "https://gitee.com/openharmony/distributeddatamgr_udmf/pulls/526.diff" + ] + } + }, + + "affected_projects": "distributeddatamgr_udmf", + + "object_type": "distributeddatamgr_udmf", + + "affected_versions": [ + "5.0.3.0-5.0.3.2" + ], + + "affected_device": { + "mini": { + "liteos": { + "rics-v": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + } + }, + + "small": { + "liteos": { + "rics-v": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + }, + "linux": { + "arm": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + } + }, + + "standard": { + "linux": { + "arm": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + }, + "arm64": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": true, + "yara": { + "affected_files": [ + "/system/lib64/platformsdk/libudmf_client.z.so" + ], + "yara_rules": [ + "TestCaseRule-CVE-2025-22886.yara" + ] + } + } + } + } + } + } + } + } + ] +} \ No newline at end of file diff --git a/vulntest/SSTSTestcases/2025/07/CVE-2025-22886/TestCaseRule-CVE-2025-22886.yara b/vulntest/SSTSTestcases/2025/07/CVE-2025-22886/TestCaseRule-CVE-2025-22886.yara new file mode 100644 index 0000000..e9d4221 --- /dev/null +++ b/vulntest/SSTSTestcases/2025/07/CVE-2025-22886/TestCaseRule-CVE-2025-22886.yara @@ -0,0 +1,37 @@ +/* + * Copyright (c) 2024 Beijing University of Posts and Telecommunications. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +import "console" + +rule CVE_2025_22886 +{ + meta: + date = "2025-07-29" + openharmony_sa = "" + cve = "CVE-2025-22886" + affected_files = "/system/lib64/platformsdk/libudmf_client.z.so" + + strings: + + $fix1 = "tokenId=%{public}u, tokenType=%{public}d" + $fix2 = "The setting data initiated by the SA cannot contain the file type" + $fix3 = "Process big data error, status = %{public}d" + $fix4 = "applicationDefinedRecordMark" + + condition: + $fix1 and $fix2 and $fix3 and $fix4 and console.log("CVE-2025-22886 testcase pass") + } + diff --git a/vulntest/SSTSTestcases/2025/07/CVE-2025-24301/TestCaseInfo-CVE-2025-24301.json b/vulntest/SSTSTestcases/2025/07/CVE-2025-24301/TestCaseInfo-CVE-2025-24301.json new file mode 100644 index 0000000..867eb1f --- /dev/null +++ b/vulntest/SSTSTestcases/2025/07/CVE-2025-24301/TestCaseInfo-CVE-2025-24301.json @@ -0,0 +1,130 @@ +{ + "month": "2025-03", + "release_time": "", + "vulnerabilities": [ + { + "month": "2025-03", + + "vul_id": { + "cve": "CVE-2025-24301", + "openharmony-sa": "" + }, + + "severity": "Low", + + "vul_description": { + "zh": "arkcompiler_ets_runtime UAF漏洞", + "en": "arkcompiler_ets_runtime has an UAF vulnerability" + }, + + "vul_impact": { + "zh": "本地攻击者可在受限场景造成任意代码执行", + "en": "allow a local attacker arbitrary code execution in pre-installed apps" + }, + + "disclosure": { + "zh": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md", + "en": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2025/2025-03.md" + }, + + "patch_info": { + "5.0.2.x": { + "patch_url": [ + "https://gitee.com/openharmony/arkcompiler_ets_runtime/pulls/10949" + ], + "patch_file": [ + "https://gitee.com/openharmony/arkcompiler_ets_runtime/pulls/10949.patch" + ], + "diff_file": [ + "https://gitee.com/openharmony/arkcompiler_ets_runtime/pulls/10949.diff" + ] + } + }, + + "affected_projects": "arkcompiler_ets_runtime", + + "object_type": "arkcompiler_ets_runtime", + + "affected_versions": [ + "5.0.2.0-5.0.2.2" + ], + + "affected_device": { + "mini": { + "liteos": { + "rics-v": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + } + }, + + "small": { + "liteos": { + "rics-v": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + }, + "linux": { + "arm": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + } + }, + + "standard": { + "linux": { + "arm": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + }, + "arm64": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": true, + "yara": { + "affected_files": [ + "/system/lib64/platformsdk/libark_jsruntime.so" + ], + "yara_rules": [ + "TestCaseRule-CVE-2025-24301.yara" + ] + } + } + } + } + } + } + } + } + ] +} \ No newline at end of file diff --git a/vulntest/SSTSTestcases/2025/07/CVE-2025-24301/TestCaseRule-CVE-2025-24301.yara b/vulntest/SSTSTestcases/2025/07/CVE-2025-24301/TestCaseRule-CVE-2025-24301.yara new file mode 100644 index 0000000..8b8ca6a --- /dev/null +++ b/vulntest/SSTSTestcases/2025/07/CVE-2025-24301/TestCaseRule-CVE-2025-24301.yara @@ -0,0 +1,34 @@ +/* + * Copyright (c) 2024 Beijing University of Posts and Telecommunications. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +import "console" + +rule CVE_2025_24301 +{ + meta: + date = "2025-07-29" + openharmony_sa = "" + cve = "CVE-2025-24301" + affected_files = "/system/lib64/platformsdk/libark_jsruntime.so" + + strings: + + $fix = "[a-zA-Z_\\-/]*" + + condition: + $fix and console.log("CVE-2025-24301 testcase pass") + } + diff --git a/vulntest/SSTSTestcases/2025/07/CVE-2025-24309/TestCaseInfo-CVE-2025-24309.json b/vulntest/SSTSTestcases/2025/07/CVE-2025-24309/TestCaseInfo-CVE-2025-24309.json new file mode 100644 index 0000000..f153016 --- /dev/null +++ b/vulntest/SSTSTestcases/2025/07/CVE-2025-24309/TestCaseInfo-CVE-2025-24309.json @@ -0,0 +1,130 @@ +{ + "month": "2025-03", + "release_time": "", + "vulnerabilities": [ + { + "month": "2025-03", + + "vul_id": { + "cve": "CVE-2025-24309", + "openharmony-sa": "" + }, + + "severity": "Low", + + "vul_description": { + "zh": "arkcompiler_ets_runtime越界写漏洞", + "en": "arkcompiler_ets_runtime has an out-of-bounds write vulnerability" + }, + + "vul_impact": { + "zh": "本地攻击者可在受限场景造成任意代码执行", + "en": "allow a local attacker arbitrary code execution in pre-installed apps" + }, + + "disclosure": { + "zh": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md", + "en": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2025/2025-03.md" + }, + + "patch_info": { + "5.0.2.x": { + "patch_url": [ + "https://gitee.com/openharmony/arkcompiler_ets_runtime/pulls/10937" + ], + "patch_file": [ + "https://gitee.com/openharmony/arkcompiler_ets_runtime/pulls/10937.patch" + ], + "diff_file": [ + "https://gitee.com/openharmony/arkcompiler_ets_runtime/pulls/10937.diff" + ] + } + }, + + "affected_projects": "arkcompiler_ets_runtime", + + "object_type": "arkcompiler_ets_runtime", + + "affected_versions": [ + "5.0.2.0-5.0.2.2" + ], + + "affected_device": { + "mini": { + "liteos": { + "rics-v": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + } + }, + + "small": { + "liteos": { + "rics-v": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + }, + "linux": { + "arm": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + } + }, + + "standard": { + "linux": { + "arm": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + }, + "arm64": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": true, + "yara": { + "affected_files": [ + "/system/lib64/platformsdk/libark_jsruntime.so" + ], + "yara_rules": [ + "TestCaseRule-CVE-2025-24309.yara" + ] + } + } + } + } + } + } + } + } + ] +} \ No newline at end of file diff --git a/vulntest/SSTSTestcases/2025/07/CVE-2025-24309/TestCaseRule-CVE-2025-24309.yara b/vulntest/SSTSTestcases/2025/07/CVE-2025-24309/TestCaseRule-CVE-2025-24309.yara new file mode 100644 index 0000000..50ed9b3 --- /dev/null +++ b/vulntest/SSTSTestcases/2025/07/CVE-2025-24309/TestCaseRule-CVE-2025-24309.yara @@ -0,0 +1,34 @@ +/* + * Copyright (c) 2024 Beijing University of Posts and Telecommunications. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +import "console" + +rule CVE_2025_24309 +{ + meta: + date = "2025-07-29" + openharmony_sa = "" + cve = "CVE-2025-24309" + affected_files = "/system/lib64/platformsdk/libark_jsruntime.so" + + strings: + + $fix = {00 00 79 9E C0 03 5F D6} + + condition: + $fix and console.log("CVE-2025-24309 testcase pass") + } + diff --git a/vulntest/SSTSTestcases/2025/07/CVE-2025-25217/TestCaseInfo-CVE-2025-25217.json b/vulntest/SSTSTestcases/2025/07/CVE-2025-25217/TestCaseInfo-CVE-2025-25217.json new file mode 100644 index 0000000..75810f2 --- /dev/null +++ b/vulntest/SSTSTestcases/2025/07/CVE-2025-25217/TestCaseInfo-CVE-2025-25217.json @@ -0,0 +1,130 @@ +{ + "month": "2025-06", + "release_time": "", + "vulnerabilities": [ + { + "month": "2025-06", + + "vul_id": { + "cve": "CVE-2025-25217", + "openharmony-sa": "" + }, + + "severity": "Low", + + "vul_description": { + "zh": "arkui_ace_engine空指针解引用漏洞", + "en": "arkui_ace_enginehas a NULL pointer dereference vulnerability" + }, + + "vul_impact": { + "zh": "本地攻击者可造成DOS", + "en": "allow a local attacker cause DOS" + }, + + "disclosure": { + "zh": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md", + "en": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2025/2025-06.md" + }, + + "patch_info": { + "5.0.3.x": { + "patch_url": [ + "https://gitee.com/openharmony/arkui_ace_engine/pulls/60922" + ], + "patch_file": [ + "https://gitee.com/openharmony/arkui_ace_engine/pulls/60922.patch" + ], + "diff_file": [ + "https://gitee.com/openharmony/arkui_ace_engine/pulls/60922.diff" + ] + } + }, + + "affected_projects": "arkui_ace_engine", + + "object_type": "arkui_ace_engine", + + "affected_versions": [ + "5.0.3.0-5.0.3.2" + ], + + "affected_device": { + "mini": { + "liteos": { + "rics-v": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + } + }, + + "small": { + "liteos": { + "rics-v": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + }, + "linux": { + "arm": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + } + }, + + "standard": { + "linux": { + "arm": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + }, + "arm64": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": true, + "yara": { + "affected_files": [ + "/system/lib64/platformsdk/libace_compatible.z.so" + ], + "yara_rules": [ + "TestCaseRule-CVE-2025-25217.yara" + ] + } + } + } + } + } + } + } + } + ] +} \ No newline at end of file diff --git a/vulntest/SSTSTestcases/2025/07/CVE-2025-25217/TestCaseRule-CVE-2025-25217.yara b/vulntest/SSTSTestcases/2025/07/CVE-2025-25217/TestCaseRule-CVE-2025-25217.yara new file mode 100644 index 0000000..093c02f --- /dev/null +++ b/vulntest/SSTSTestcases/2025/07/CVE-2025-25217/TestCaseRule-CVE-2025-25217.yara @@ -0,0 +1,34 @@ +/* + * Copyright (c) 2024 Beijing University of Posts and Telecommunications. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +import "console" + +rule CVE_2025_25217 +{ + meta: + date = "2025-07-29" + openharmony_sa = "" + cve = "CVE-2025-25217" + affected_files = "/system/lib64/platformsdk/libace_compatible.z.so" + + strings: + + $fix = "Dynamic symbol %{public}s is null. Please check if it is correctly loaded." + + condition: + $fix and console.log("CVE-2025-25217 testcase pass") + } + diff --git a/vulntest/SSTSTestcases/2025/07/CVE-2025-27242/TestCaseInfo-CVE-2025-27242.json b/vulntest/SSTSTestcases/2025/07/CVE-2025-27242/TestCaseInfo-CVE-2025-27242.json new file mode 100644 index 0000000..9a9434d --- /dev/null +++ b/vulntest/SSTSTestcases/2025/07/CVE-2025-27242/TestCaseInfo-CVE-2025-27242.json @@ -0,0 +1,130 @@ +{ + "month": "2025-06", + "release_time": "", + "vulnerabilities": [ + { + "month": "2025-06", + + "vul_id": { + "cve": "CVE-2025-27242", + "openharmony-sa": "" + }, + + "severity": "Low", + + "vul_description": { + "zh": "安全组件管理模块不当输入验证", + "en": "security_access_token has an improper input vulnerability" + }, + + "vul_impact": { + "zh": "本地攻击者可造成敏感信息泄露", + "en": "allow a local attacker cause information leak" + }, + + "disclosure": { + "zh": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md", + "en": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2025/2025-06.md" + }, + + "patch_info": { + "5.0.3.x": { + "patch_url": [ + "https://gitee.com/openharmony/security_security_component_manager/pulls/300" + ], + "patch_file": [ + "https://gitee.com/openharmony/security_security_component_manager/pulls/300.patch" + ], + "diff_file": [ + "https://gitee.com/openharmony/security_security_component_manager/pulls/300.diff" + ] + } + }, + + "affected_projects": "security_security_component_manager", + + "object_type": "security_security_component_manager", + + "affected_versions": [ + "5.0.3.0-5.0.3.2" + ], + + "affected_device": { + "mini": { + "liteos": { + "rics-v": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + } + }, + + "small": { + "liteos": { + "rics-v": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + }, + "linux": { + "arm": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + } + }, + + "standard": { + "linux": { + "arm": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + }, + "arm64": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": true, + "yara": { + "affected_files": [ + "/system/lib64/libsecurity_component_service.z.so" + ], + "yara_rules": [ + "TestCaseRule-CVE-2025-27242.yara" + ] + } + } + } + } + } + } + } + } + ] +} \ No newline at end of file diff --git a/vulntest/SSTSTestcases/2025/07/CVE-2025-27242/TestCaseRule-CVE-2025-27242.yara b/vulntest/SSTSTestcases/2025/07/CVE-2025-27242/TestCaseRule-CVE-2025-27242.yara new file mode 100644 index 0000000..480fc8a --- /dev/null +++ b/vulntest/SSTSTestcases/2025/07/CVE-2025-27242/TestCaseRule-CVE-2025-27242.yara @@ -0,0 +1,34 @@ +/* + * Copyright (c) 2024 Beijing University of Posts and Telecommunications. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +import "console" + +rule CVE_2025_27242 +{ + meta: + date = "2025-07-29" + openharmony_sa = "" + cve = "CVE-2025-27242" + affected_files = "/system/lib64/libsecurity_component_service.z.so" + + strings: + + $fix = {E0 03 14 2A F7 0B 40 F9 F4 4F 43 A9 F6 57 42 A9 FD} + + condition: + $fix and console.log("CVE-2025-27242 testcase pass") + } + diff --git a/vulntest/SSTSTestcases/2025/07/CVE-2025-27247/TestCaseInfo-CVE-2025-27247.json b/vulntest/SSTSTestcases/2025/07/CVE-2025-27247/TestCaseInfo-CVE-2025-27247.json new file mode 100644 index 0000000..934c98a --- /dev/null +++ b/vulntest/SSTSTestcases/2025/07/CVE-2025-27247/TestCaseInfo-CVE-2025-27247.json @@ -0,0 +1,130 @@ +{ + "month": "2025-06", + "release_time": "", + "vulnerabilities": [ + { + "month": "2025-06", + + "vul_id": { + "cve": "CVE-2025-27247", + "openharmony-sa": "" + }, + + "severity": "Medium", + + "vul_description": { + "zh": "剪切板模块权限绕过漏洞", + "en": "pasteboard has an improper preservation of permissions vulnerability" + }, + + "vul_impact": { + "zh": "本地攻击者可造成敏感信息泄露", + "en": "allow a local attacker cause information leak" + }, + + "disclosure": { + "zh": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md", + "en": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2025/2025-06.md" + }, + + "patch_info": { + "5.0.3.x": { + "patch_url": [ + "https://gitee.com/openharmony/distributeddatamgr_pasteboard/pulls/1106" + ], + "patch_file": [ + "https://gitee.com/openharmony/distributeddatamgr_pasteboard/pulls/1106.patch" + ], + "diff_file": [ + "https://gitee.com/openharmony/distributeddatamgr_pasteboard/pulls/1106.diff" + ] + } + }, + + "affected_projects": "distributeddatamgr_pasteboard", + + "object_type": "distributeddatamgr_pasteboard", + + "affected_versions": [ + "5.0.3.0-5.0.3.2" + ], + + "affected_device": { + "mini": { + "liteos": { + "rics-v": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + } + }, + + "small": { + "liteos": { + "rics-v": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + }, + "linux": { + "arm": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + } + }, + + "standard": { + "linux": { + "arm": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + }, + "arm64": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": true, + "yara": { + "affected_files": [ + "/system/lib64/libpasteboard_service.z.so" + ], + "yara_rules": [ + "TestCaseRule-CVE-2025-27247.yara" + ] + } + } + } + } + } + } + } + } + ] +} \ No newline at end of file diff --git a/vulntest/SSTSTestcases/2025/07/CVE-2025-27247/TestCaseRule-CVE-2025-27247.yara b/vulntest/SSTSTestcases/2025/07/CVE-2025-27247/TestCaseRule-CVE-2025-27247.yara new file mode 100644 index 0000000..63f9542 --- /dev/null +++ b/vulntest/SSTSTestcases/2025/07/CVE-2025-27247/TestCaseRule-CVE-2025-27247.yara @@ -0,0 +1,34 @@ +/* + * Copyright (c) 2024 Beijing University of Posts and Telecommunications. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +import "console" + +rule CVE_2025_27247 +{ + meta: + date = "2025-07-29" + openharmony_sa = "" + cve = "CVE-2025-27247" + affected_files = "/system/lib64/libpasteboard_service.z.so" + + strings: + + $fix = "isReadGrant is %{public}d, isSecureGrant is %{public}d, isPrivilegeApp is %{public}d" + + condition: + $fix and console.log("CVE-2025-27247 testcase pass") + } + diff --git a/vulntest/SSTSTestcases/2025/07/CVE-2025-27248/TestCaseInfo-CVE-2025-27248.json b/vulntest/SSTSTestcases/2025/07/CVE-2025-27248/TestCaseInfo-CVE-2025-27248.json new file mode 100644 index 0000000..8048661 --- /dev/null +++ b/vulntest/SSTSTestcases/2025/07/CVE-2025-27248/TestCaseInfo-CVE-2025-27248.json @@ -0,0 +1,130 @@ +{ + "month": "2025-05", + "release_time": "", + "vulnerabilities": [ + { + "month": "2025-05", + + "vul_id": { + "cve": "CVE-2025-27248", + "openharmony-sa": "" + }, + + "severity": "Low", + + "vul_description": { + "zh": "ai_neural_network_runtime 空指针解引用", + "en": "ai_neural_network_runtime has a NULL pointer dereference vulnerability" + }, + + "vul_impact": { + "zh": "本地攻击者可造成DOS", + "en": "allow a local attacker cause DOS" + }, + + "disclosure": { + "zh": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-05.md", + "en": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2025/2025-05.md" + }, + + "patch_info": { + "5.0.3.x": { + "patch_url": [ + "https://gitee.com/openharmony/ai_neural_network_runtime/pulls/258" + ], + "patch_file": [ + "https://gitee.com/openharmony/ai_neural_network_runtime/pulls/258.patch" + ], + "diff_file": [ + "https://gitee.com/openharmony/ai_neural_network_runtime/pulls/258.diff" + ] + } + }, + + "affected_projects": "ai_neural_network_runtime", + + "object_type": "ai_neural_network_runtime", + + "affected_versions": [ + "5.0.3.0-5.0.3.2" + ], + + "affected_device": { + "mini": { + "liteos": { + "rics-v": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + } + }, + + "small": { + "liteos": { + "rics-v": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + }, + "linux": { + "arm": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + } + }, + + "standard": { + "linux": { + "arm": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + }, + "arm64": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": true, + "yara": { + "affected_files": [ + "/system/lib64/ndk/libneural_network_runtime.so" + ], + "yara_rules": [ + "TestCaseRule-CVE-2025-27248.yara" + ] + } + } + } + } + } + } + } + } + ] +} \ No newline at end of file diff --git a/vulntest/SSTSTestcases/2025/07/CVE-2025-27248/TestCaseRule-CVE-2025-27248.yara b/vulntest/SSTSTestcases/2025/07/CVE-2025-27248/TestCaseRule-CVE-2025-27248.yara new file mode 100644 index 0000000..615fd52 --- /dev/null +++ b/vulntest/SSTSTestcases/2025/07/CVE-2025-27248/TestCaseRule-CVE-2025-27248.yara @@ -0,0 +1,34 @@ +/* + * Copyright (c) 2024 Beijing University of Posts and Telecommunications. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +import "console" + +rule CVE_2025_27248 +{ + meta: + date = "2025-07-29" + openharmony_sa = "" + cve = "CVE-2025-27248" + affected_files = "/system/lib64/ndk/libneural_network_runtime.so" + + strings: + + $fix = "[NNExecutor] SetExtensionConfig, m_executorConfig create failed." + + condition: + $fix and console.log("CVE-2025-27248 testcase pass") + } + diff --git a/vulntest/SSTSTestcases/2025/07/CVE-2025-27534/TestCaseInfo-CVE-2025-27534.json b/vulntest/SSTSTestcases/2025/07/CVE-2025-27534/TestCaseInfo-CVE-2025-27534.json new file mode 100644 index 0000000..d5d0e16 --- /dev/null +++ b/vulntest/SSTSTestcases/2025/07/CVE-2025-27534/TestCaseInfo-CVE-2025-27534.json @@ -0,0 +1,142 @@ +{ + "month": "2025-04", + "release_time": "", + "vulnerabilities": [ + { + "month": "2025-04", + + "vul_id": { + "cve": "CVE-2025-27534", + "openharmony-sa": "" + }, + + "severity": "Low", + + "vul_description": { + "zh": "arkcompiler_ets_runtime越界读", + "en": "arkcompiler_ets_runtime has an out-of-bounds read vulnerability" + }, + + "vul_impact": { + "zh": "本地攻击者可造成DOS", + "en": "allow a local attacker cause DOS" + }, + + "disclosure": { + "zh": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-04.md", + "en": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2025/2025-04.md" + }, + + "patch_info": { + "4.1.x": { + "patch_url": [ + "https://gitee.com/openharmony/arkcompiler_ets_runtime/pulls/10936" + ], + "patch_file": [ + "https://gitee.com/openharmony/arkcompiler_ets_runtime/pulls/10936.patch" + ], + "diff_file": [ + "https://gitee.com/openharmony/arkcompiler_ets_runtime/pulls/10936.diff" + ] + }, + "5.0.2.x": { + "patch_url": [ + "https://gitee.com/openharmony/arkcompiler_ets_runtime/pulls/10937" + ], + "patch_file": [ + "https://gitee.com/openharmony/arkcompiler_ets_runtime/pulls/10937.patch" + ], + "diff_file": [ + "https://gitee.com/openharmony/arkcompiler_ets_runtime/pulls/10937.diff" + ] + } + }, + + "affected_projects": "arkcompiler_ets_runtime", + + "object_type": "arkcompiler_ets_runtime", + + "affected_versions": [ + "4.1.0-4.1.1", + "5.0.2.0-5.0.2.1" + ], + + "affected_device": { + "mini": { + "liteos": { + "rics-v": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + } + }, + + "small": { + "liteos": { + "rics-v": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + }, + "linux": { + "arm": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + } + }, + + "standard": { + "linux": { + "arm": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + }, + "arm64": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": true, + "yara": { + "affected_files": [ + "/system/lib64/platformsdk/libark_jsruntime.so" + ], + "yara_rules": [ + "TestCaseRule-CVE-2025-27534.yara" + ] + } + } + } + } + } + } + } + } + ] +} \ No newline at end of file diff --git a/vulntest/SSTSTestcases/2025/07/CVE-2025-27534/TestCaseRule-CVE-2025-27534.yara b/vulntest/SSTSTestcases/2025/07/CVE-2025-27534/TestCaseRule-CVE-2025-27534.yara new file mode 100644 index 0000000..05b2e8f --- /dev/null +++ b/vulntest/SSTSTestcases/2025/07/CVE-2025-27534/TestCaseRule-CVE-2025-27534.yara @@ -0,0 +1,34 @@ +/* + * Copyright (c) 2024 Beijing University of Posts and Telecommunications. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +import "console" + +rule CVE_2025_27534 +{ + meta: + date = "2025-07-29" + openharmony_sa = "" + cve = "CVE-2025-27534" + affected_files = "/system/lib64/platformsdk//libark_jsruntime.so" + + strings: + + $fix = {00 00 79 9E C0 03 5F D6} + + condition: + $fix and console.log("CVE-2025-27534 testcase pass") + } + diff --git a/vulntest/SSTSTestcases/2025/07/CVE-2025-27563/TestCaseInfo-CVE-2025-27563.json b/vulntest/SSTSTestcases/2025/07/CVE-2025-27563/TestCaseInfo-CVE-2025-27563.json new file mode 100644 index 0000000..7782407 --- /dev/null +++ b/vulntest/SSTSTestcases/2025/07/CVE-2025-27563/TestCaseInfo-CVE-2025-27563.json @@ -0,0 +1,130 @@ +{ + "month": "2025-06", + "release_time": "", + "vulnerabilities": [ + { + "month": "2025-06", + + "vul_id": { + "cve": "CVE-2025-27563", + "openharmony-sa": "" + }, + + "severity": "Low", + + "vul_description": { + "zh": "security_access_token权限绕过漏洞", + "en": "security_access_token has an improper preservation of permissions vulnerability" + }, + + "vul_impact": { + "zh": "本地攻击者可造成敏感信息泄露", + "en": "allow a local attacker cause information leak" + }, + + "disclosure": { + "zh": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md", + "en": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2025/2025-06.md" + }, + + "patch_info": { + "5.0.3.x": { + "patch_url": [ + "https://gitee.com/openharmony/security_access_token/pulls/3203" + ], + "patch_file": [ + "https://gitee.com/openharmony/security_access_token/pulls/3203.patch" + ], + "diff_file": [ + "https://gitee.com/openharmony/security_access_token/pulls/3203.diff" + ] + } + }, + + "affected_projects": "security_access_token", + + "object_type": "security_access_token", + + "affected_versions": [ + "5.0.3.0-5.0.3.2" + ], + + "affected_device": { + "mini": { + "liteos": { + "rics-v": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + } + }, + + "small": { + "liteos": { + "rics-v": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + }, + "linux": { + "arm": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + } + }, + + "standard": { + "linux": { + "arm": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + }, + "arm64": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": true, + "yara": { + "affected_files": [ + "/system/lib64/libprivacy_manager_service.z.so" + ], + "yara_rules": [ + "TestCaseRule-CVE-2025-27563.yara" + ] + } + } + } + } + } + } + } + } + ] +} \ No newline at end of file diff --git a/vulntest/SSTSTestcases/2025/07/CVE-2025-27563/TestCaseRule-CVE-2025-27563.yara b/vulntest/SSTSTestcases/2025/07/CVE-2025-27563/TestCaseRule-CVE-2025-27563.yara new file mode 100644 index 0000000..c66e31c --- /dev/null +++ b/vulntest/SSTSTestcases/2025/07/CVE-2025-27563/TestCaseRule-CVE-2025-27563.yara @@ -0,0 +1,34 @@ +/* + * Copyright (c) 2024 Beijing University of Posts and Telecommunications. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +import "console" + +rule CVE_2025_27563 +{ + meta: + date = "2025-07-29" + openharmony_sa = "" + cve = "CVE-2025-27563" + affected_files = "/system/lib64/libprivacy_manager_service.z.so" + + strings: + + $fix = "Permission denied(tokenID=%{public}d)" + + condition: + $fix and console.log("CVE-2025-27563 testcase pass") + } + -- Gitee