...
Code Block | ||||
---|---|---|---|---|
| ||||
char *improved_strncpy(char * restrict s1, size_t s1count, const char * restrict s2, size_t s2count, size_t n); char *improved_strncat(char * restrict s1, size_t s1count, const char * restrict s2, size_t s2count, size_t n); |
...
Tool | Version | Checker | Description | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CodeSonar |
| BADFUNC.BO.* | A collection of checks that report uses of library functions prone to internal buffer overflows. | ||||||||||
Parasoft C/C++test |
| CERT_C-API02-a | Avoid using unsafe string functions which may cause buffer overflows | Polyspace Bug Finder | R2016a | Array access with tainted index | Functions that read or write to or from an array should take an argument to specify the source or target size |
Related Vulnerabilities
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
...
[ISO/IEC 9899:2011] | Annex K (normative) Bounds-checking Interfaces |
...