...
Rule | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
INT32-C | 3 ( high ) 3 ( | likely ) | 1 ( high ) | P9 | L2 |
Automated Detection
Fortify SCA Version 5.0 with CERT C Rule Pack is able to detect violations of this rule.
...
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
A Linux kernel vmsplice exploit, described at http://www.avertlabs.com/research/blog/index.php/2008/02/13/analyzing-the-linux-kernel-vmsplice-exploit/,
documents a vulnerability and exploit arising directly out of unsigned integer wrapping.
...