Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Code Security Report: 167 high severity findings, 256 total findings [develop] #39

Open
1 task
mend-for-github-com bot opened this issue Jan 15, 2025 · 0 comments
Open
1 task
Labels
Mend: code security findings Code security findings detected by Mend

Comments

@mend-for-github-com
Copy link
Contributor

Code Security Report

Scan Metadata

Latest Scan: 2025-01-15 05:49pm
Total Findings: 256 | New Findings: 0 | Resolved Findings: 0
Tested Project Files: 1926
Detected Programming Languages: 2 (Python*, C/C++ (Beta))

  • Check this box to manually trigger a scan

Most Relevant Findings

The list below presents the 10 most relevant findings that need your attention. To view information on the remaining findings, navigate to the Mend Application.

SeverityVulnerability TypeCWEFileData FlowsDetected
HighOut of Buffer Bounds Write

CWE-787

net.c:442

12025-01-15 06:20pm
Vulnerable Code

grub2/grub-core/net/net.c

Lines 437 to 442 in 34ea034

grub_uint16_t newip[8];
const char *ptr = val;
int word, quaddot = -1;
int bracketed = 0;
if (ptr[0] == '[') {

1 Data Flow/s detected

if (ptr[0] == '[') {

Secure Code Warrior Training Material

● Training

   ▪ Secure Code Warrior Out of Buffer Bounds Write Training

● Videos

   ▪ Secure Code Warrior Out of Buffer Bounds Write Video

 
HighOut of Buffer Bounds Write

CWE-787

des.c:873

12025-01-15 06:20pm
Vulnerable Code

int i;
byte input[8] =
{0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10};
byte key1[8] =
{0x12, 0x34, 0x56, 0x78, 0x9a, 0xbc, 0xde, 0xf0};
byte key2[8] =

1 Data Flow/s detected

Secure Code Warrior Training Material

● Training

   ▪ Secure Code Warrior Out of Buffer Bounds Write Training

● Videos

   ▪ Secure Code Warrior Out of Buffer Bounds Write Video

 
HighOut of Buffer Bounds Write

CWE-787

twofish.c:887

12025-01-15 06:20pm
Vulnerable Code

};
static const byte ciphertext[16] = {
0x01, 0x9F, 0x98, 0x09, 0xDE, 0x17, 0x11, 0x85,
0x8F, 0xAA, 0xC3, 0xA3, 0xBA, 0x20, 0xFB, 0xC3
};
static byte plaintext_256[16] = {

1 Data Flow/s detected

static byte plaintext_256[16] = {

Secure Code Warrior Training Material

● Training

   ▪ Secure Code Warrior Out of Buffer Bounds Write Training

● Videos

   ▪ Secure Code Warrior Out of Buffer Bounds Write Video

 
HighOut of Buffer Bounds Write

CWE-787

twofish.c:883

12025-01-15 06:20pm
Vulnerable Code

};
static byte key[16] = {
0x9F, 0x58, 0x9F, 0x5C, 0xF6, 0x12, 0x2C, 0x32,
0xB6, 0xBF, 0xEC, 0x2F, 0x2A, 0xE8, 0xC3, 0x5A
};
static const byte ciphertext[16] = {

1 Data Flow/s detected

static const byte ciphertext[16] = {

Secure Code Warrior Training Material

● Training

   ▪ Secure Code Warrior Out of Buffer Bounds Write Training

● Videos

   ▪ Secure Code Warrior Out of Buffer Bounds Write Video

 
HighOut of Buffer Bounds Write

CWE-787

platform.c:401

12025-01-15 06:20pm
Vulnerable Code

endp->type = GRUB_EFI_END_DEVICE_PATH_TYPE;
endp->subtype = GRUB_EFI_END_ENTIRE_DEVICE_PATH_SUBTYPE;
endp->length = sizeof (*endp);
pathptr = endp + 1;
entry[4] = (grub_uint8_t *) pathptr - path;

1 Data Flow/s detected

entry[4] = (grub_uint8_t *) pathptr - path;

Secure Code Warrior Training Material

● Training

   ▪ Secure Code Warrior Out of Buffer Bounds Write Training

● Videos

   ▪ Secure Code Warrior Out of Buffer Bounds Write Video

 
HighUse After Free

CWE-416

grub-mkrescue.c:784

12025-01-15 06:20pm
Vulnerable Code

grub2/util/grub-mkrescue.c

Lines 779 to 784 in 34ea034

make_image_fwdisk_abs (GRUB_INSTALL_PLATFORM_RISCV32_EFI, "riscv32-efi",
imgname);
free (imgname);
imgname = grub_util_path_concat (2, efidir_efi_boot, "bootriscv64.efi");
make_image_fwdisk_abs (GRUB_INSTALL_PLATFORM_RISCV64_EFI, "riscv64-efi",

1 Data Flow/s detected

make_image_fwdisk_abs (GRUB_INSTALL_PLATFORM_RISCV64_EFI, "riscv64-efi",

Secure Code Warrior Training Material

● Training

   ▪ Secure Code Warrior Use After Free Training

● Videos

   ▪ Secure Code Warrior Use After Free Video

 
HighOut of Buffer Bounds Write

CWE-787

cast5.c:490

12025-01-15 06:20pm
Vulnerable Code

#if 0 /* full maintenance test */
{
int i;
byte a0[16] = { 0x01,0x23,0x45,0x67,0x12,0x34,0x56,0x78,
0x23,0x45,0x67,0x89,0x34,0x56,0x78,0x9A };
byte b0[16] = { 0x01,0x23,0x45,0x67,0x12,0x34,0x56,0x78,

1 Data Flow/s detected

byte b0[16] = { 0x01,0x23,0x45,0x67,0x12,0x34,0x56,0x78,

Secure Code Warrior Training Material

● Training

   ▪ Secure Code Warrior Out of Buffer Bounds Write Training

● Videos

   ▪ Secure Code Warrior Out of Buffer Bounds Write Video

 
HighOut of Buffer Bounds Write

CWE-787

filenamecat-lgpl.c:84

12025-01-15 06:20pm
Vulnerable Code

if (base_in_result)
*base_in_result = p;
p = mempcpy (p, base, baselen);
*p = '\0';

1 Data Flow/s detected

Secure Code Warrior Training Material

● Training

   ▪ Secure Code Warrior Out of Buffer Bounds Write Training

● Videos

   ▪ Secure Code Warrior Out of Buffer Bounds Write Video

 
HighOut of Buffer Bounds Write

CWE-787

cast5.c:473

12025-01-15 06:20pm
Vulnerable Code

selftest(void)
{
CAST5_context c;
byte key[16] = { 0x01, 0x23, 0x45, 0x67, 0x12, 0x34, 0x56, 0x78,
0x23, 0x45, 0x67, 0x89, 0x34, 0x56, 0x78, 0x9A };
byte plain[8] = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xAB, 0xCD, 0xEF };

1 Data Flow/s detected

byte plain[8] = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xAB, 0xCD, 0xEF };

Secure Code Warrior Training Material

● Training

   ▪ Secure Code Warrior Out of Buffer Bounds Write Training

● Videos

   ▪ Secure Code Warrior Out of Buffer Bounds Write Video

 
HighOut of Buffer Bounds Write

CWE-787

cast5.c:471

12025-01-15 06:20pm
Vulnerable Code

static const char*
selftest(void)
{
CAST5_context c;
byte key[16] = { 0x01, 0x23, 0x45, 0x67, 0x12, 0x34, 0x56, 0x78,

1 Data Flow/s detected

byte key[16] = { 0x01, 0x23, 0x45, 0x67, 0x12, 0x34, 0x56, 0x78,

Secure Code Warrior Training Material

● Training

   ▪ Secure Code Warrior Out of Buffer Bounds Write Training

● Videos

   ▪ Secure Code Warrior Out of Buffer Bounds Write Video

Findings Overview

Severity Vulnerability Type CWE Language Count
High Integer Overflow CWE-190 C/C++ (Beta) 7
High Buffer Overflow CWE-121 C/C++ (Beta) 15
High Out of Buffer Bounds Write CWE-787 C/C++ (Beta) 120
High Use After Free CWE-416 C/C++ (Beta) 18
High Double Free CWE-415 C/C++ (Beta) 7
Medium Integer Underflow CWE-191 C/C++ (Beta) 1
Medium Out of Buffer Bounds Read CWE-125 C/C++ (Beta) 67
Medium Heap Inspection CWE-244 C/C++ (Beta) 19
Low Divide By Zero CWE-369 C/C++ (Beta) 2
@mend-for-github-com mend-for-github-com bot added the Mend: code security findings Code security findings detected by Mend label Jan 15, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Mend: code security findings Code security findings detected by Mend
Development

No branches or pull requests

0 participants