You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
One thing I've noticed is that sometimes a vulnerability patch involves making changes to code involving memory management. For example, in tmux, CVE-2020-27347, commit a868bacb46e3c900530bed47a1c6f85b0fbe701c:
Note that free(..) is called here, so it involved memory management. Now this CVE was mapped to CWE-121 Stack-based Buffer Overflow, so it doesn't help us here - but it might be a useful thing to look at patches and do a basic text string search for things like malloc( and free(
It'll be useful especially if we don't have CWE mapping, or might be useful some other way. Maybe casting for overflow? Anyway - interesting observation for an easy metric to collect.
The text was updated successfully, but these errors were encountered:
andymeneely
added
rust-discuss
Issues up for discussion in our CWE to Rust mitigations manual mapping
and removed
rust-discuss
Issues up for discussion in our CWE to Rust mitigations manual mapping
labels
Sep 25, 2024
One thing I've noticed is that sometimes a vulnerability patch involves making changes to code involving memory management. For example, in tmux, CVE-2020-27347, commit
a868bacb46e3c900530bed47a1c6f85b0fbe701c
:Note that
free(..)
is called here, so it involved memory management. Now this CVE was mapped to CWE-121 Stack-based Buffer Overflow, so it doesn't help us here - but it might be a useful thing to look at patches and do a basic text string search for things likemalloc(
andfree(
It'll be useful especially if we don't have CWE mapping, or might be useful some other way. Maybe casting for overflow? Anyway - interesting observation for an easy metric to collect.
The text was updated successfully, but these errors were encountered: