Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

NOTE If the value does not conform, either the path is diverted to avoid using the value or a different, known-conforming value is substituted.
EXAMPLE Adding a null character to the end of a buffer before passing it as an argument to the strlen function.

...

Anchor
strictly conforming
strictly conforming

static analysis [Chess 2007]
Any process for assessing code without executing it [Chess 2007, (p. 3]).

Anchor
strictly conforming
strictly conforming

strictly conforming [ISO/IEC 9899:2011]
A strictly conforming program is one that uses only those features of the language and library specified in the international standard. Strictly conforming programs are intended to be maximally portable among conforming implementations and cannot, for example, depend on implementation-defined behavior.

...

Anchor
unsafe function-like macro
unsafe function-like macro

unsafe function-like macro
A function-like macro whose expansion causes one or more of its arguments not to be evaluated exactly once.

Anchor
unsigned integer wrapping
unsigned integer wrapping

unsigned integer wrapping
Computation involving unsigned operands whose result is reduced modulo the number that is one greater than the largest value that can be represented by the resulting type.

Anchor
unspecified behavior
unspecified behavior

unspecified behavior [ISO/IEC 9899:2011]
Behavior for which the standard provides two or more possibilities and imposes no further requirements on which is chosen in any instance.

Anchor
unspecified value
unspecified value

unspecified value [ISO/IEC 9899:2011]
A valid value of the relevant type where the C Standard imposes no requirements on which value is chosen in any instance. An unspecified value cannot be a trap representation.

Anchor
untrusted data
untrusted data

untrusted data [ISO/IEC 9899:2011]
Data originating from outside of a trust boundary.

Anchor
valid pointervalid pointer
valid pointer
A pointer
valid pointer [ISO/IEC 9899:2011]
Pointer that refers to an element within an array or one past the last element of an array.

NOTE 1 For the purposes of this definition, a pointer to an object that is not an element of an array behaves the same as a pointer to the first element of an array of length one with the type of the object as its element type. (

...

See C Standard,

...

subclause 6.5.8, paragraph

...

4.)
NOTE 2 For the purposes of this definition, an object can be considered to be an array of a certain number of bytes; that number is the size of the object, as produced by the sizeof operator. (See C Standard, subclause 6.3.2.3, paragraph 7.)

Anchor
validation
validation

validation [IEC 61508-4]
Confirmation by examination and provision of objective evidence that the particular requirements for a specific intended use are fulfilled.

...

Anchor
vulnerability
vulnerability

vulnerability [Seacord 2005a]
A set Set of conditions that allows an attacker to violate an explicit or implicit security policy.

unsigned integer wrapping
computation involving unsigned operands whose result is reduced modulo the number that is one greater than the largest value that can be represented by the resulting type

untrusted data
data originating from outside of a trust boundary [ISO/IEC 11889-1:2009]

valid pointer
pointer that refers to an element within an array or one past the last element of an array

NOTE 1 For the purposes of this definition, a pointer to an object that is not an element of an array behaves the same as a pointer to the first element of an array of length one with the type of the object as its element type. (See C, sec. 6.5.8, paragraph 4.)
NOTE 2 For the purposes of this definition, an object can be considered to be an array of a certain number of bytes; that number is the size of the object, as produced by the sizeof operator. (See C, sec. 6.3.2.3, paragraph 7.)

vulnerability
set of conditions that allows an attacker to violate an explicit or implicit security policy

 

...