Skip to content

Code Security Report: 3 high severity findings, 4 total findings [develop] #37

@mend-for-github-com

Description

@mend-for-github-com

Code Security Report

Scan Metadata

Latest Scan: 2025-08-27 08:21pm
Total Findings: 4 | New Findings: 0 | Resolved Findings: 0
Tested Project Files: 60
Detected Programming Languages: 1 (C/C++ (Beta))

  • Check this box to manually trigger a scan

Finding Details

SeverityVulnerability TypeCWEFileData FlowsDetected
HighUse After Free

CWE-416

fcache.c:438

12025-01-15 05:55pm
Vulnerable Code

fch->data = fces->data;
fch->fces = fces;
} else {
if (fces) {
memcpy(fch->embed_fces, fces, nent * sizeof(*fces));
free(fces);

1 Data Flow/s detected

Secure Code Warrior Training Material

● Training

   ▪ Secure Code Warrior Use After Free Training

● Videos

   ▪ Secure Code Warrior Use After Free Video

🏴 Suppress Finding
  • ... as False Alarm
  • ... as Acceptable Risk
 
HighDouble Free

CWE-415

fcache.c:438

12025-01-15 05:55pm
Vulnerable Code

fch->data = fces->data;
fch->fces = fces;
} else {
if (fces) {
memcpy(fch->embed_fces, fces, nent * sizeof(*fces));
free(fces);

1 Data Flow/s detected

Secure Code Warrior Training Material

● Training

   ▪ Secure Code Warrior Double Free Training

● Videos

   ▪ Secure Code Warrior Double Free Video

🏴 Suppress Finding
  • ... as False Alarm
  • ... as Acceptable Risk
 
HighOut of Buffer Bounds Write

CWE-787

errmsg.h:142

12025-01-15 05:55pm
Vulnerable Code

libkdumpfile/src/errmsg.h

Lines 137 to 142 in 0da5b3b

newbuf = realloc(err->dyn, 1 + curlen + msglen + 1);
if (newbuf) {
if (err->dyn <= msg && msg <= err->dyn + 1)
msg += newbuf - err->dyn;
err->dyn = newbuf;
memmove(newbuf + msglen + 1, msg, curlen + 1);

1 Data Flow/s detected

memmove(newbuf + msglen + 1, msg, curlen + 1);

Secure Code Warrior Training Material

● Training

   ▪ Secure Code Warrior Out of Buffer Bounds Write Training

● Videos

   ▪ Secure Code Warrior Out of Buffer Bounds Write Video

🏴 Suppress Finding
  • ... as False Alarm
  • ... as Acceptable Risk
 
MediumTime of Check Time of Use

CWE-367

devmem.c:91

12025-01-15 05:55pm
Vulnerable Code

if (access(FN_XEN, F_OK) != 0)
return KDUMP_OK; /* No Xen */
ret = KDUMP_OK;
xen_type = KDUMP_XEN_DOMAIN;
f = fopen(FN_XEN_CAPS, "r");

1 Data Flow/s detected

f = fopen(FN_XEN_CAPS, "r");

Secure Code Warrior Training Material

● Training

   ▪ Secure Code Warrior Time of Check Time of Use Training

● Videos

   ▪ Secure Code Warrior Time of Check Time of Use Video

🏴 Suppress Finding
  • ... as False Alarm
  • ... as Acceptable Risk

Metadata

Metadata

Assignees

No one assigned

    Labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions