Nick Kralevich 260bf8cfe0 FORTIFY_SOURCE: strlen check.
This test is designed to detect code such as:

int main() {
  char buf[10];
  memcpy(buf, "1234567890", sizeof(buf));
  size_t len = strlen(buf); // segfault here with _FORTIFY_SOURCE
  printf("%d\n", len);
  return 0;
}

or anytime strlen reads beyond an object boundary. This should
help address memory leakage vulnerabilities and make other
unrelated vulnerabilities harder to exploit.

Change-Id: I354b425be7bef4713c85f6bab0e9738445e00182
2012-07-13 13:49:59 -07:00
..
2010-12-06 12:05:11 +01:00
2011-09-28 12:17:34 -07:00
2012-02-29 18:43:51 -08:00
2010-01-15 15:57:02 -08:00
2012-07-09 12:30:40 -07:00
2010-01-15 15:57:02 -08:00
2009-03-03 19:28:35 -08:00
2010-01-15 15:57:02 -08:00
2009-03-03 19:28:35 -08:00
2010-01-15 15:01:44 -08:00
2010-12-20 15:58:06 +01:00
2012-07-09 09:57:18 -07:00
2012-07-13 13:49:59 -07:00
2010-06-11 14:39:39 -07:00
2012-04-13 15:45:42 -07:00