2
2
LLVM Security Group Transparency Reports
3
3
========================================
4
4
5
- This page lists the yearly LLVM Security group transparency reports.
5
+ This page lists the yearly LLVM Security Response group transparency reports.
6
+
7
+ The LLVM Security Response group started out as the LLVM security group, previous
8
+ year's transparency reports keep the original name.
9
+
10
+ Initially the Chromium issue tracker was used to record issues. This
11
+ component has been archived and is read-only. A GitHub
12
+ llvm/llvm-project issue has been created for each issue in the
13
+ Chromium issue tracker. All of these issues contain an attached PDF
14
+ with the content of the Chromium issue, and have the SecurityArchive
15
+ label.
16
+
17
+ Each Chromium issue has 3 URLs, the first is the original URL recorded in
18
+ previous transparency reports. The second is the redirect URL to the archive.
19
+ The third is to the GitHub archive issue.
6
20
7
21
2021
8
22
----
@@ -29,8 +43,13 @@ In 2021, the security group received 13 issue reports that were made publicly
29
43
visible before 31st of December 2021. The security group judged 2 of these
30
44
reports to be security issues:
31
45
32
- * https://bugs.chromium.org/p/llvm/issues/detail?id=5
33
- * https://bugs.chromium.org/p/llvm/issues/detail?id=11
46
+ * original: https://bugs.chromium.org/p/llvm/issues/detail?id=5
47
+ redirect: https://issuetracker.google.com/issues/42410043 archive:
48
+ https://github.com/llvm/llvm-project/issues/125709
49
+
50
+ * original: https://bugs.chromium.org/p/llvm/issues/detail?id=11
51
+ redirect: https://issuetracker.google.com/issues/42410002 archive:
52
+ https://github.com/llvm/llvm-project/issues/127644
34
53
35
54
Both issues were addressed with source changes: #5 in clangd/vscode-clangd, and
36
55
#11 in llvm-project. No dedicated LLVM release was made for either.
@@ -54,24 +73,32 @@ the time of writing this transparency report.
54
73
55
74
5 of these were judged to be security issues:
56
75
57
- * https://bugs.chromium.org/p/llvm/issues/detail?id=17 reports a miscompile in
58
- LLVM that can result in the frame pointer and return address being
59
- overwritten. This was fixed.
76
+ * https://bugs.chromium.org/p/llvm/issues/detail?id=17 reports a miscompile in LLVM
77
+ that can result in the frame pointer and return address being overwritten. This
78
+ was fixed. Redirect: https://issuetracker.google.com/issues/42410008 archive:
79
+ https://github.com/llvm/llvm-project/issues/127645
60
80
61
- * https://bugs.chromium.org/p/llvm/issues/detail?id=19 reports a vulnerability
62
- in `std::filesystem::remove_all ` in libc++. This was fixed.
81
+ * https://bugs.chromium.org/p/llvm/issues/detail?id=19 reports a vulnerability in
82
+ `std::filesystem::remove_all ` in libc++. This was fixed.
83
+ Redirect: https://issuetracker.google.com/issues/42410010 archive:
84
+ https://github.com/llvm/llvm-project/issues/127647
63
85
64
86
* https://bugs.chromium.org/p/llvm/issues/detail?id=23 reports a new Spectre
65
87
gadget variant that Speculative Load Hardening (SLH) does not mitigate. No
66
88
extension to SLH was implemented to also mitigate against this variant.
89
+ Redirect: https://issuetracker.google.com/issues/42410015 archive:
90
+ https://github.com/llvm/llvm-project/issues/127648
67
91
68
92
* https://bugs.chromium.org/p/llvm/issues/detail?id=30 reports missing memory
69
93
safety protection on the (C++) exception handling path. A number of fixes
70
- were implemented.
94
+ were implemented. Redirect: https://issuetracker.google.com/issues/42410023
95
+ archive: https://github.com/llvm/llvm-project/issues/127649
71
96
72
97
* https://bugs.chromium.org/p/llvm/issues/detail?id=33 reports the RETBLEED
73
98
vulnerability. The outcome was clang growing a new security hardening feature
74
99
`-mfunction-return=thunk-extern `, see https://reviews.llvm.org/D129572.
100
+ Redirect: https://issuetracker.google.com/issues/42410026 archive:
101
+ https://github.com/llvm/llvm-project/issues/127650
75
102
76
103
77
104
No dedicated LLVM releases were made for any of the above issues.
@@ -84,33 +111,52 @@ that were received earlier, but were disclosed in 2023.
84
111
85
112
9 of these were judged to be security issues:
86
113
87
- https://bugs.chromium.org/p/llvm/issues/detail?id=36 reports the presence of
88
- .git folder in https://llvm.org/.git.
89
-
90
- https://bugs.chromium.org/p/llvm/issues/detail?id=66 reports the presence of
91
- a GitHub Personal Access token in a DockerHub imaage.
92
-
93
- https://bugs.chromium.org/p/llvm/issues/detail?id=42 reports a potential gap
94
- in the Armv8.1-m BTI protection, involving a combination of large switch statements
95
- and __builtin_unreachable() in the default case.
96
-
97
- https://bugs.chromium.org/p/llvm/issues/detail?id=43 reports a dependency
98
- on an old version of xml2js with a CVE filed against it.
99
-
100
- https://bugs.chromium.org/p/llvm/issues/detail?id=45 reports a number of
101
- dependencies that have had vulnerabilities reported against them.
102
-
103
- https://bugs.chromium.org/p/llvm/issues/detail?id=46 is related to issue 43.
104
-
105
- https://bugs.chromium.org/p/llvm/issues/detail?id=48 reports a buffer overflow
106
- in std::format from -fexperimental-library.
107
-
108
- https://bugs.chromium.org/p/llvm/issues/detail?id=54 reports a memory leak in
109
- basic_string move assignment when built with libc++ versions <=6.0 and run against
110
- newer libc++ shared/dylibs.
111
-
112
- https://bugs.chromium.org/p/llvm/issues/detail?id=56 reports an out of bounds buffer
113
- store introduced by LLVM backends, that regressed due to a procedural oversight.
114
+ * https://bugs.chromium.org/p/llvm/issues/detail?id=36 reports the presence of
115
+ .git folder in https://llvm.org/.git. Redirect:
116
+ https://issuetracker.google.com/issues/42410029 archive:
117
+ https://github.com/llvm/llvm-project/issues/131841
118
+
119
+ * https://bugs.chromium.org/p/llvm/issues/detail?id=66 reports the presence of a
120
+ GitHub Personal Access token in a DockerHub imaage. Redirect
121
+ https://issuetracker.google.com/issues/42410060 archive:
122
+ https://github.com/llvm/llvm-project/issues/131846
123
+
124
+ * https://bugs.chromium.org/p/llvm/issues/detail?id=42 reports a potential gap
125
+ in the Armv8.1-m BTI protection, involving a combination of large switch statements
126
+ and __builtin_unreachable() in the default case. Redirect:
127
+ https://issuetracker.google.com/issues/42410035 archive:
128
+ https://github.com/llvm/llvm-project/issues/131848
129
+
130
+ * https://bugs.chromium.org/p/llvm/issues/detail?id=43 reports a dependency
131
+ on an old version of xml2js with a CVE filed against it. Redirect:
132
+ https://issuetracker.google.com/issues/42410036 archive:
133
+ https://github.com/llvm/llvm-project/issues/131849
134
+
135
+ * https://bugs.chromium.org/p/llvm/issues/detail?id=45 reports a number of
136
+ dependencies that have had vulnerabilities reported against them. Redirect:
137
+ https://issuetracker.google.com/issues/42410038 archive:
138
+ https://github.com/llvm/llvm-project/issues/131851
139
+
140
+ * https://bugs.chromium.org/p/llvm/issues/detail?id=46 is related to
141
+ issue 43. Redirect https://issuetracker.google.com/issues/42410039 archive:
142
+ https://github.com/llvm/llvm-project/issues/131852
143
+
144
+ * https://bugs.chromium.org/p/llvm/issues/detail?id=48 reports a buffer overflow in
145
+ std::format from -fexperimental-library. Redirect:
146
+ https://issuetracker.google.com/issues/42410041 archive:
147
+ https://github.com/llvm/llvm-project/issues/131856
148
+
149
+ * https://bugs.chromium.org/p/llvm/issues/detail?id=54 reports a memory leak in
150
+ basic_string move assignment when built with libc++ versions <=6.0 and run against
151
+ newer libc++ shared/dylibs. Redirect:
152
+ https://issuetracker.google.com/issues/42410047 archive:
153
+ https://github.com/llvm/llvm-project/issues/131857
154
+
155
+ * https://bugs.chromium.org/p/llvm/issues/detail?id=56 reports an out
156
+ of bounds buffer store introduced by LLVM backends, that regressed
157
+ due to a procedural oversight. Redirect
158
+ https://issuetracker.google.com/issues/42410049 archive:
159
+ https://github.com/llvm/llvm-project/issues/131858
114
160
115
161
No dedicated LLVM releases were made for any of the above issues.
116
162
@@ -152,10 +198,14 @@ publishing security advisories for those issues at
152
198
https://github.com/llvm/llvm-security-repo/security/advisories/.
153
199
154
200
1. “Unexpected behavior when using LTO and branch-protection together” |br |
155
- Details are available at https://bugs.chromium.org/p/llvm/issues/detail?id=58
201
+ Details are available at https://bugs.chromium.org/p/llvm/issues/detail?id=58 |br |
202
+ redirect: https://issuetracker.google.com/issues/42410051 |br |
203
+ archive: https://github.com/llvm/llvm-project/issues/132185
156
204
2. “Security weakness in PCS for CMSE”
157
205
(`CVE-2024-0151 <https://nvd.nist.gov/vuln/detail/CVE-2024-0151 >`_) |br |
158
- Details are available at https://bugs.chromium.org/p/llvm/issues/detail?id=68
206
+ Details are available at https://bugs.chromium.org/p/llvm/issues/detail?id=68 |br |
207
+ redirect: https://issuetracker.google.com/issues/42410062 |br |
208
+ archive: https://github.com/llvm/llvm-project/issues/132186
159
209
3. “CMSE secure state may leak from stack to floating-point registers”
160
210
(`CVE-2024-7883 <https://www.cve.org/cverecord?id=CVE-2024-7883 >`_) |br |
161
211
Details are available at
@@ -165,9 +215,13 @@ Supply chain security related issues and project services-related issues
165
215
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
166
216
167
217
1. “GitHub User Involved in xz backdoor may have attempted to change to clang in order to help hide the exploit” |br |
168
- Details are available at https://bugs.chromium.org/p/llvm/issues/detail?id=71
218
+ Details are available at https://bugs.chromium.org/p/llvm/issues/detail?id=71 |br |
219
+ redirect: https://issuetracker.google.com/issues/42410066 |br |
220
+ archive: https://github.com/llvm/llvm-project/issues/132187
169
221
2. “llvmbot account suspended due to supicious login” |br |
170
- Details are available at https://bugs.chromium.org/p/llvm/issues/detail?id=72
222
+ Details are available at https://bugs.chromium.org/p/llvm/issues/detail?id=72 |br |
223
+ redirect: https://issuetracker.google.com/issues/42410067 |br |
224
+ archive: https://github.com/llvm/llvm-project/issues/132243
171
225
3. “.git Exposure” |br |
172
226
GHSA-mr8r-vvrc-w6rq |br |
173
227
The .git directory was accessible via web browsers under apt.llvm.org, a site
@@ -204,23 +258,41 @@ Issues deemed to not require coordinated action before disclosing publicly
204
258
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
205
259
206
260
1. “Clang Address Sanitizer gives False Negative for Array Out of Bounds Compiled with Optimization” |br |
207
- Details are available at https://bugs.chromium.org/p/llvm/issues/detail?id=57
261
+ Details are available at https://bugs.chromium.org/p/llvm/issues/detail?id=57 |br |
262
+ redirect: https://issuetracker.google.com/issues/42410050 |br |
263
+ archive: https://github.com/llvm/llvm-project/issues/132191
208
264
2. “Found exposed .svn folder” |br |
209
- Details are available at https://bugs.chromium.org/p/llvm/issues/detail?id=59
265
+ Details are available at https://bugs.chromium.org/p/llvm/issues/detail?id=59 |br |
266
+ redirect: https://issuetracker.google.com/issues/42410052
267
+ archive: https://github.com/llvm/llvm-project/issues/132192
210
268
3. “Arbitrary code execution when combining SafeStack \+ dynamic stack allocations \+ \_\_ builtin\_ setjmp/longjmp” |br |
211
- Details are available at https://bugs.chromium.org/p/llvm/issues/detail?id=60
269
+ Details are available at https://bugs.chromium.org/p/llvm/issues/detail?id=60 |br |
270
+ redirect: https://issuetracker.google.com/issues/42410054
271
+ archive: https://github.com/llvm/llvm-project/issues/132220
212
272
4. “RISC-V: Constants are allocated in writeable .sdata section” |br |
213
- Details are available at https://bugs.chromium.org/p/llvm/issues/detail?id=61
273
+ Details are available at https://bugs.chromium.org/p/llvm/issues/detail?id=61 |br |
274
+ redirect: https://issuetracker.google.com/issues/42410055 |br |
275
+ archive: https://github.com/llvm/llvm-project/issues/132223
214
276
5. “Manifest File with Out-of-Date Dependencies with CVEs” |br |
215
- Details are available at https://bugs.chromium.org/p/llvm/issues/detail?id=62
277
+ Details are available at https://bugs.chromium.org/p/llvm/issues/detail?id=62 |br |
278
+ redirect: https://issuetracker.google.com/issues/42410056 |br |
279
+ archive: https://github.com/llvm/llvm-project/issues/132225
216
280
6. “Non-const derived ctor should fail compilation when having a consteval base ctor” |br |
217
- Details are available at https://bugs.chromium.org/p/llvm/issues/detail?id=67
281
+ Details are available at https://bugs.chromium.org/p/llvm/issues/detail?id=67 |br |
282
+ redirect: https://issuetracker.google.com/issues/42410061 |br |
283
+ archive: https://github.com/llvm/llvm-project/issues/132226
218
284
7. “Wrong assembly code generation. Branching to the corrupted "LR".” |br |
219
- Details are available at https://bugs.chromium.org/p/llvm/issues/detail?id=69
285
+ Details are available at https://bugs.chromium.org/p/llvm/issues/detail?id=69 |br |
286
+ redirect: https://issuetracker.google.com/issues/42410063 |br |
287
+ archive: https://github.com/llvm/llvm-project/issues/132229
220
288
8. “Security bug report” |br |
221
- Details are available at https://bugs.chromium.org/p/llvm/issues/detail?id=70
289
+ Details are available at https://bugs.chromium.org/p/llvm/issues/detail?id=70 |br |
290
+ redirect: https://issuetracker.google.com/issues/42410065 |br |
291
+ archive: https://github.com/llvm/llvm-project/issues/132233
222
292
9. “Using ASan with setuid binaries can lead to arbitrary file write and elevation of privileges” |br |
223
- Details are available at https://bugs.chromium.org/p/llvm/issues/detail?id=73
293
+ Details are available at https://bugs.chromium.org/p/llvm/issues/detail?id=73 |br |
294
+ redirect: https://issuetracker.google.com/issues/42410068 |br |
295
+ archive: https://github.com/llvm/llvm-project/issues/132235
224
296
10. “Interesting bugs for bool variable in clang projects and aarch64 modes outputting inaccurate results.” |br |
225
297
GHSA-w7qc-292v-5xh6 |br |
226
298
The issue reported is on a source code example having undefined behaviour
@@ -282,4 +354,4 @@ as part of migrating to GitHub's “security advisory”-based reporting:
282
354
1. “Test if new draft security advisory gets emailed to LLVM security group” |br |
283
355
GHSA-82m9-xvw3-rvpv
284
356
2. “Test that a non-admin can create an advisory (no vulnerability).” |br |
285
- GHSA-34gr-6c7h-cc93
357
+ GHSA-34gr-6c7h-cc93
0 commit comments