Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Code Security Report: 3 high severity findings, 4 total findings [develop] #37

Open
1 task
mend-for-github-com bot opened this issue Jan 15, 2025 · 0 comments
Open
1 task
Labels
Mend: code security findings Code security findings detected by Mend

Comments

@mend-for-github-com
Copy link

Code Security Report

Scan Metadata

Latest Scan: 2025-01-15 05:53pm
Total Findings: 4 | New Findings: 0 | Resolved Findings: 0
Tested Project Files: 66
Detected Programming Languages: 2 (C/C++ (Beta), Python*)

  • Check this box to manually trigger a scan

Finding Details

SeverityVulnerability TypeCWEFileData FlowsDetected
HighUse After Free

CWE-416

fcache.c:438

12025-01-15 05:55pm
Vulnerable Code

fch->data = fces->data;
fch->fces = fces;
} else {
if (fces) {
memcpy(fch->embed_fces, fces, nent * sizeof(*fces));
free(fces);

1 Data Flow/s detected

Secure Code Warrior Training Material

● Training

   ▪ Secure Code Warrior Use After Free Training

● Videos

   ▪ Secure Code Warrior Use After Free Video

 
HighDouble Free

CWE-415

fcache.c:438

12025-01-15 05:55pm
Vulnerable Code

fch->data = fces->data;
fch->fces = fces;
} else {
if (fces) {
memcpy(fch->embed_fces, fces, nent * sizeof(*fces));
free(fces);

1 Data Flow/s detected

Secure Code Warrior Training Material

● Training

   ▪ Secure Code Warrior Double Free Training

● Videos

   ▪ Secure Code Warrior Double Free Video

 
HighOut of Buffer Bounds Write

CWE-787

errmsg.h:140

12025-01-15 05:55pm
Vulnerable Code

libkdumpfile/src/errmsg.h

Lines 135 to 140 in 4aa6565

newbuf = realloc(err->dyn, 1 + curlen + msglen + 1);
if (newbuf) {
if (err->dyn <= msg && msg <= err->dyn + 1)
msg += newbuf - err->dyn;
err->dyn = newbuf;
memmove(newbuf + msglen + 1, msg, curlen + 1);

1 Data Flow/s detected

memmove(newbuf + msglen + 1, msg, curlen + 1);

Secure Code Warrior Training Material

● Training

   ▪ Secure Code Warrior Out of Buffer Bounds Write Training

● Videos

   ▪ Secure Code Warrior Out of Buffer Bounds Write Video

 
MediumTime of Check Time of Use

CWE-367

devmem.c:91

12025-01-15 05:55pm
Vulnerable Code

if (access(FN_XEN, F_OK) != 0)
return KDUMP_OK; /* No Xen */
ret = KDUMP_OK;
xen_type = KDUMP_XEN_DOMAIN;
f = fopen(FN_XEN_CAPS, "r");

1 Data Flow/s detected

f = fopen(FN_XEN_CAPS, "r");

Secure Code Warrior Training Material

● Training

   ▪ Secure Code Warrior Time of Check Time of Use Training

● Videos

   ▪ Secure Code Warrior Time of Check Time of Use Video

@mend-for-github-com mend-for-github-com bot added the Mend: code security findings Code security findings detected by Mend label Jan 15, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Mend: code security findings Code security findings detected by Mend
Development

No branches or pull requests

0 participants