Skip to content

fix: an unchecked strcpy() call at problem in problem.c#275

Open
orbisai0security wants to merge 1 commit into
MolotovCherry:masterfrom
orbisai0security:fix-strcpy-buffer-overflow-problem-c
Open

fix: an unchecked strcpy() call at problem in problem.c#275
orbisai0security wants to merge 1 commit into
MolotovCherry:masterfrom
orbisai0security:fix-strcpy-buffer-overflow-problem-c

Conversation

@orbisai0security
Copy link
Copy Markdown

Summary

Fix critical severity security issue in libfftw-3.3.8/libbench2/problem.c.

Vulnerability

Field Value
ID V-001
Severity CRITICAL
Scanner multi_agent_ai
Rule V-001
File libfftw-3.3.8/libbench2/problem.c:253
CWE CWE-120

Description: An unchecked strcpy() call at problem.c line 253 copies the source string s into p->pstring without validating that the source length fits within the allocated destination buffer. If s is longer than the allocated size of p->pstring — for example, when supplied via a CLI argument or benchmark configuration file — this causes a heap or stack buffer overflow, overwriting adjacent memory and potentially corrupting control-flow data.

Changes

  • libfftw-3.3.8/libbench2/problem.c

Verification

  • Build passes
  • Scanner re-scan confirms fix
  • LLM code review passed

Automated security fix by OrbisAI Security

Automated security fix generated by Orbis Security AI
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant