From 193c61c5b5c80a633e64c37bc7ca67f91f6c8ce2 Mon Sep 17 00:00:00 2001 From: Geoffrey White <40627776+geoffw0@users.noreply.github.com> Date: Mon, 25 Mar 2019 17:40:22 +0000 Subject: [PATCH] CPP: Re-enable OverflowDestination.ql on the security dashboard. --- cpp/config/suites/security/cwe-119 | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cpp/config/suites/security/cwe-119 b/cpp/config/suites/security/cwe-119 index 2f8849beb42..1c5ff45169a 100644 --- a/cpp/config/suites/security/cwe-119 +++ b/cpp/config/suites/security/cwe-119 @@ -3,8 +3,8 @@ @name Call to memory access function may overflow buffer (CWE-119) + semmlecode-cpp-queries/Critical/OverflowStatic.ql: /CWE/CWE-119 @name Static array access may cause overflow (CWE-119) -# + semmlecode-cpp-queries/Critical/OverflowDestination.ql: /CWE/CWE-119 -# ^ disabled due to timeout issue ++ semmlecode-cpp-queries/Critical/OverflowDestination.ql: /CWE/CWE-119 + @name Copy function using source size (CWE-119) + semmlecode-cpp-queries/Likely Bugs/Memory Management/SuspiciousCallToStrncat.ql: /CWE/CWE-119 @name Potentially unsafe call to strncat (CWE-119) + semmlecode-cpp-queries/Likely Bugs/Memory Management/StrncpyFlippedArgs.ql: /CWE/CWE-119