...
NOTE If the value does not conform, either the path is diverted to avoid using the value or a different, known-conforming value is substituted.
EXAMPLE Adding a null character to the end of a buffer before passing it as an argument to the strlen
function.
...
Anchor | ||||
---|---|---|---|---|
|
static analysis [Chess 2007]
Any process for assessing code without executing it [Chess 2007, (p. 3]).
Anchor | ||||
---|---|---|---|---|
|
strictly conforming [ISO/IEC 9899:2011]
A strictly conforming program is one that uses only those features of the language and library specified in the international standard. Strictly conforming programs are intended to be maximally portable among conforming implementations and cannot, for example, depend on implementation-defined behavior.
...
Anchor | ||||
---|---|---|---|---|
|
unsafe function-like macro
A function-like macro whose expansion causes one or more of its arguments not to be evaluated exactly once.
Anchor | ||||
---|---|---|---|---|
|
unsigned integer wrapping
Computation involving unsigned operands whose result is reduced modulo the number that is one greater than the largest value that can be represented by the resulting type.
Anchor | ||||
---|---|---|---|---|
|
unspecified behavior [ISO/IEC 9899:2011]
Behavior for which the standard provides two or more possibilities and imposes no further requirements on which is chosen in any instance.
Anchor | ||||
---|---|---|---|---|
|
unspecified value [ISO/IEC 9899:2011]
A valid value of the relevant type where the C Standard imposes no requirements on which value is chosen in any instance. An unspecified value cannot be a trap representation.
Anchor | ||||
---|---|---|---|---|
|
untrusted data [ISO/IEC 9899:2011]
Data originating from outside of a trust boundary.
Anchor | |||||
---|---|---|---|---|---|
|
valid pointer [ISO/IEC 9899:2011]
Pointer that refers to an element within an array or one past the last element of an array.
NOTE 1 For the purposes of this definition, a pointer to an object that is not an element of an array behaves the same as a pointer to the first element of an array of length one with the type of the object as its element type. (
...
See C Standard,
...
subclause 6.5.8, paragraph
...
4.)
NOTE 2 For the purposes of this definition, an object can be considered to be an array of a certain number of bytes; that number is the size of the object, as produced by the sizeof
operator. (See C Standard, subclause 6.3.2.3, paragraph 7.)
Anchor | ||||
---|---|---|---|---|
|
validation [IEC 61508-4]
Confirmation by examination and provision of objective evidence that the particular requirements for a specific intended use are fulfilled.
...
Anchor | ||||
---|---|---|---|---|
|
vulnerability [Seacord 2005a]
A set Set of conditions that allows an attacker to violate an explicit or implicit security policy.
unsigned integer wrapping
computation involving unsigned operands whose result is reduced modulo the number that is one greater than the largest value that can be represented by the resulting type
untrusted data
data originating from outside of a trust boundary [ISO/IEC 11889-1:2009]
valid pointer
pointer that refers to an element within an array or one past the last element of an array
NOTE 1 For the purposes of this definition, a pointer to an object that is not an element of an array behaves the same as a pointer to the first element of an array of length one with the type of the object as its element type. (See C, sec. 6.5.8, paragraph 4.)
NOTE 2 For the purposes of this definition, an object can be considered to be an array of a certain number of bytes; that number is the size of the object, as produced by the sizeof operator. (See C, sec. 6.3.2.3, paragraph 7.)
vulnerability
set of conditions that allows an attacker to violate an explicit or implicit security policy
...