Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Edited by NavBot (vkp) v1.0

...

This rule appears in the C Secure Coding Standard as ARR33-C. Guarantee that copies are made into storage of sufficient size.

...

Bibliography

Wiki Markup
\[[ISO/IEC PDTR 24772|AA. Bibliography#ISO/IEC PDTR 24772]\] "XYB Buffer Overflow in Heap," "XYW Buffer Overflow in Stack," and "XYZ Unchecked Array Indexing"
\[[Meyers 01|AA. Bibliography#Meyers 01]\] Item 30: Make sure destination ranges are big enough
\[[MITRE|AA. Bibliography#MITRE]\] [CWE ID 119|http://cwe.mitre.org/data/definitions/119.html], "Failure to Constrain Operations within the Bounds of an Allocated Memory Buffer"
\[MITRE\] [CWE ID 805|http://cwe.mitre.org/data/definitions/805.html], "Buffer Access with Incorrect Length Value"
\[[Seacord 05a|AA. Bibliography#Seacord 05]\] Chapter 2, "Strings"
\[[VU#196240|AA. Bibliography#VU196240]\]

...

Image RemovedARR32-CPP. Do not use iterators invalidated by container modification      06. Arrays and the STL (ARR)      VOID ARR34-CPP. Ensure that array types in expressions are compatibleUse Valid Iterator Ranges