<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4a0dee04-7fe3-46db-a1fe-04828c17ef89"><ac:parameter ac:name=""> asynchronous-safe</ac:parameter></ac:structured-macro>
asynchronous-safe [[GNU Pth]]
A function is asynchronous-safe, or asynchronous-signal safe, if it can be called safely and without side effects from within a signal handler context. That is, it must be able to be interrupted at any point and run linearly out of sequence without causing an inconsistent state. Some asynchronous-safe operations are listed below:
- call the
signal()
function to reinstall a signal handler - unconditionally modify a
volatile sig_atomic_t
variable (as modification to this type is atomic) - call the
_Exit()
function to immediately terminate program execution - invoke an asynchronous-safe function, as specified by your implementation
Few functions are asynchronous-safe. If a function performs any other operations, it is probably not asynchronous-safe.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="74a05fc8-891c-457f-bf99-6998c24ae58b"><ac:parameter ac:name=""> exploit</ac:parameter></ac:structured-macro>
exploit [[Seacord 05]]
An exploit is a piece of software or technique that takes advantage of a security vulnerability to violate an explicit or implicit security policy.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7e8d50cb-5b06-4cba-bf2a-33b7c3833e6d"><ac:parameter ac:name=""> freestanding environment</ac:parameter></ac:structured-macro>
freestanding environment [[ISO/IEC 9899-1999]]
An environment in which C program execution may take place without any benefit of an operating system. Program startup might occur at some function other than main()
, complex types might not be implemented, and only certain minimal library facilities are guaranteed to be available.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c6f278ff-c867-496b-89df-1c023f024118"><ac:parameter ac:name=""> hosted environment</ac:parameter></ac:structured-macro>
hosted environment [[ISO/IEC 9899-1999]]
An environment that is not freestanding. Program startup occurs at main()
, complex types are implemented, and all C standard library facilities are available.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="226175b2-84d0-4157-866d-e1b6071786d6"><ac:parameter ac:name=""> implementation</ac:parameter></ac:structured-macro>
implementation [[ISO/IEC 9899-1999]]
Particular set of software, running in a particular translation environment under particular control options, that performs translation of programs for, and supports execution of functions in, a particular execution environment.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="64b31e5a-eeb2-46ec-9972-e4f6c98eb408"><ac:parameter ac:name=""> implementation-defined behavior</ac:parameter></ac:structured-macro>
implementation-defined behavior [[ISO/IEC 9899-1999]]
Unspecified behavior where each implementation documents how the choice is made.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d6e01428-b21c-4b3b-90c7-13bed69391cd"><ac:parameter ac:name=""> locale-specific behavior</ac:parameter></ac:structured-macro>
locale-specific behavior [[ISO/IEC 9899-1999]]
Behavior that depends on local conventions of nationality, culture, and language that each implementation documents.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c7ade45b-94d0-4932-bd21-ceed71cc2330"><ac:parameter ac:name=""> lvalue</ac:parameter></ac:structured-macro>
lvalue [[ISO/IEC 9899-1999]]
An lvalue is an expression with an object type or an incomplete type other than void
. The name "lvalue" comes originally from the assignment expression E1 = E2
, in which the left operand E1
is required to be a (modifiable) lvalue. It is perhaps better considered as representing an object "locator value".
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4117b29d-35c9-45d4-8dbf-ed82d9f9b67b"><ac:parameter ac:name=""> mitigation</ac:parameter></ac:structured-macro>
mitigation [[Seacord 05]]
Mitigations are methods, techniques, processes, tools, or runtime libraries that can prevent or limit exploits against vulnerabilities.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f5ea0dbe-2889-4c8a-abed-93a332317eb2"><ac:parameter ac:name=""> reentrant</ac:parameter></ac:structured-macro>
reentrant [[Dowd 06]]
A function is reentrant if multiple instances of the same function can run in the same address space concurrently without creating the potential for inconsistent states.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="db0cbdeb-aa04-4dbb-bf09-101688f5c310"><ac:parameter ac:name=""> rvalue</ac:parameter></ac:structured-macro>
rvalue [[ISO/IEC 9899-1999]]
Value of an expression.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7e5fcb26-4266-4137-9308-3303d4b31183"><ac:parameter ac:name=""> security flaw</ac:parameter></ac:structured-macro>
security flaw [[Seacord 05]]
A security flaw is a software defect that poses a potential security risk.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="aec866ea-7264-4e52-8a07-a040d8772f0d"><ac:parameter ac:name=""> security policy</ac:parameter></ac:structured-macro>
security policy [[Internet Society 00]]
A set of rules and practices that specify or regulate how a system or organization provides security services to protect sensitive and critical system resources.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="129f1ca3-e55f-4df3-9882-590f7ce6adeb"><ac:parameter ac:name=""> undefined behavior</ac:parameter></ac:structured-macro>
undefined behavior [[ISO/IEC 9899-1999]]
Behavior, upon use of a nonportable or erroneous program construct or of erroneous data, for which the standard imposes no requirements. An example of undefined behavior is the behavior on integer overflow.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ee8eb50e-002c-47cf-bea6-697f2bca9578"><ac:parameter ac:name=""> unspecified behavior</ac:parameter></ac:structured-macro>
unspecified behavior [[ISO/IEC 9899-1999]]
Behavior where the standard provides two or more possibilities and imposes no further requirements on which is chosen in any instance.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0a39e164-40a6-4f4d-a589-fe08e6dbf33c"><ac:parameter ac:name=""> validation</ac:parameter></ac:structured-macro>
validation [[IEC 61508-4]]
Confirmation by examination and provision of objective evidence that the particular requirements for a specific intended use are fulfilled.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="09e62d06-118b-4d07-b7b6-6d4b8fe14818"><ac:parameter ac:name=""> verification</ac:parameter></ac:structured-macro>
verification [[IEC 61508-4]]
Confirmation by examination and provision of objective evidence that the requirements have been fulfilled.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="919fc8f9-1929-484d-90b2-d5f6089b885a"><ac:parameter ac:name=""> verification</ac:parameter></ac:structured-macro>
vulnerability [[Seacord 05]]
A vulnerability is a set of conditions that allows an attacker to violate an explicit or implicit security policy.