Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Code Security Report: 4 high severity findings, 6 total findings [develop] #65

Open
1 task
mend-for-github-com bot opened this issue Jan 15, 2025 · 0 comments
Open
1 task
Labels
Mend: code security findings Code security findings detected by Mend

Comments

@mend-for-github-com
Copy link

Code Security Report

Scan Metadata

Latest Scan: 2025-01-15 05:18pm
Total Findings: 6 | New Findings: 0 | Resolved Findings: 0
Tested Project Files: 238
Detected Programming Languages: 2 (Python*, C/C++ (Beta))

  • Check this box to manually trigger a scan

Finding Details

SeverityVulnerability TypeCWEFileData FlowsDetected
HighBuffer Overflow

CWE-121

serialize.c:167

12025-01-15 05:23pm
Vulnerable Code

drgn/libdrgn/serialize.c

Lines 162 to 167 in ad65e41

unsigned int shift;
if (size > sizeof(ret))
memcpy(&ret, &p[1], sizeof(ret));
else
memcpy((char *)(&ret + 1) - size, p, size);

1 Data Flow/s detected

first_mask = 0xff00 >> bit_offset;

bits = bit_offset + bit_size;

size = (bits + 7) / 8;

memcpy((char *)(&ret + 1) - size, p, size);

Secure Code Warrior Training Material

● Training

   ▪ Secure Code Warrior Buffer Overflow Training

● Videos

   ▪ Secure Code Warrior Buffer Overflow Video

 
HighOut of Buffer Bounds Write

CWE-787

util.h:144

12025-01-15 05:23pm
Vulnerable Code

drgn/libdrgn/util.h

Lines 139 to 144 in ad65e41

{
if (size > *capacity) {
free(*buf);
*buf = malloc(size);
if (!*buf) {
*capacity = 0;

1 Data Flow/s detected

*capacity = 0;

Secure Code Warrior Training Material

● Training

   ▪ Secure Code Warrior Out of Buffer Bounds Write Training

● Videos

   ▪ Secure Code Warrior Out of Buffer Bounds Write Video

 
HighOut of Buffer Bounds Write

CWE-787

util.h:147

12025-01-15 05:23pm
Vulnerable Code

drgn/libdrgn/util.h

Lines 142 to 147 in ad65e41

*buf = malloc(size);
if (!*buf) {
*capacity = 0;
return false;
}
*capacity = size;

1 Data Flow/s detected

*capacity = size;

Secure Code Warrior Training Material

● Training

   ▪ Secure Code Warrior Out of Buffer Bounds Write Training

● Videos

   ▪ Secure Code Warrior Out of Buffer Bounds Write Video

 
HighUse After Free

CWE-416

stack_trace.c:459

12025-01-15 05:23pm
Vulnerable Code

drgn/libdrgn/stack_trace.c

Lines 454 to 459 in ad65e41

frame->scopes = new_scopes;
frame->num_scopes = new_num_scopes;
frame->function_scope = num_ancestors;
/* Look for the name in the new scopes. */
err = drgn_find_in_dwarf_scopes(frame->scopes, num_ancestors,

1 Data Flow/s detected

err = drgn_find_in_dwarf_scopes(frame->scopes, num_ancestors,

Secure Code Warrior Training Material

● Training

   ▪ Secure Code Warrior Use After Free Training

● Videos

   ▪ Secure Code Warrior Use After Free Video

 
MediumInteger Underflow

CWE-191

serialize.c:16

52025-01-15 05:23pm
Vulnerable Code

drgn/libdrgn/serialize.c

Lines 11 to 16 in ad65e41

unsigned int dst_bit_offset, bool lsb0)
{
uint8_t result;
if (lsb0) {
result = s[0] >> src_bit_offset;
if (bit_size > 8 - src_bit_offset)

5 Data Flow/s detected
View Data Flow 1

if (bit_size > 8 - src_bit_offset)

View Data Flow 2

if (bit_size > 8 - src_bit_offset)

View Data Flow 3

if (bit_size > 8 - src_bit_offset)

View more Data Flows

Secure Code Warrior Training Material

● Training

   ▪ Secure Code Warrior Integer Underflow Training

● Videos

   ▪ Secure Code Warrior Integer Underflow Video

 
LowUncontrolled Memory Allocation

CWE-789

linux_kernel.c:126

12025-01-15 05:23pm
Vulnerable Code

drgn/libdrgn/linux_kernel.c

Lines 121 to 126 in ad65e41

return drgn_error_create(DRGN_ERROR_OTHER,
"could not parse /sys/kernel/vmcoreinfo");
}
fclose(file);
_cleanup_free_ char *buf = malloc(size);

1 Data Flow/s detected

fclose(file);

Secure Code Warrior Training Material
@mend-for-github-com mend-for-github-com bot added the Mend: code security findings Code security findings detected by Mend label Jan 15, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Mend: code security findings Code security findings detected by Mend
Development

No branches or pull requests

0 participants