Nick Kralevich
260bf8cfe0
FORTIFY_SOURCE: strlen check.
...
This test is designed to detect code such as:
int main() {
char buf[10];
memcpy(buf, "1234567890", sizeof(buf));
size_t len = strlen(buf); // segfault here with _FORTIFY_SOURCE
printf("%d\n", len);
return 0;
}
or anytime strlen reads beyond an object boundary. This should
help address memory leakage vulnerabilities and make other
unrelated vulnerabilities harder to exploit.
Change-Id: I354b425be7bef4713c85f6bab0e9738445e00182
2012-07-13 13:49:59 -07:00
..
2012-07-13 13:49:45 -07:00
2012-06-11 11:30:56 -07:00
2012-06-11 11:30:56 -07:00
2012-06-11 11:30:56 -07:00
2012-06-11 11:30:56 -07:00
2012-06-14 12:52:42 -07:00
2012-06-14 12:52:42 -07:00
2012-07-13 13:49:59 -07:00
2012-06-11 11:30:56 -07:00
2012-06-11 11:30:56 -07:00
2009-03-03 19:28:35 -08:00
2011-12-05 18:37:10 -08:00
2010-08-31 15:19:38 -07:00
2009-03-03 19:28:35 -08:00
2009-03-03 19:28:35 -08:00
2010-02-05 15:13:55 -08:00
2009-03-03 19:28:35 -08:00
2012-07-12 15:38:15 -07:00
2011-12-05 18:37:10 -08:00
2010-02-05 15:13:55 -08:00
2009-03-03 19:28:35 -08:00
2010-01-30 22:28:49 -02:00
2009-03-03 19:28:35 -08:00
2009-03-03 19:28:35 -08:00
2011-12-05 18:37:10 -08:00
2009-03-03 19:28:35 -08:00
2010-01-30 22:28:49 -02:00
2009-03-03 19:28:35 -08:00
2009-03-03 19:28:35 -08:00
2009-03-03 19:28:35 -08:00
2011-05-13 10:54:34 -07:00
2009-03-03 19:28:35 -08:00
2010-01-30 22:28:49 -02:00
2010-01-30 22:28:49 -02:00
2009-03-03 19:28:35 -08:00
2010-01-30 22:28:49 -02:00
2010-01-30 22:28:49 -02:00
2010-01-30 22:28:49 -02:00
2010-01-30 22:29:59 -02:00
2009-03-03 19:28:35 -08:00
2010-01-30 22:28:49 -02:00
2011-12-05 18:37:10 -08:00
2010-01-30 22:28:49 -02:00
2009-03-03 19:28:35 -08:00
2010-01-30 22:28:49 -02:00
2009-03-03 19:28:35 -08:00
2009-03-03 19:28:35 -08:00
2010-01-30 22:28:49 -02:00