Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Search for vulnerabilities resulting from the violation of this rule on the CERT website.

Related Guidelines

Bibliography

[Dowd 2006]Chapter 6, "C Language Issues"
[ISO/IEC 2003]Section 6.5.7, "Bitwise Shift Operators"
[Seacord 2005a]Chapter 5, "Integers"
[Viega 2005]Section 5.2.7, "Integer Overflow"

...