Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Integer values can be invalidated due to excpetional conditions such as overflow, truncation, or sign error leading to exploitable vulnerabilities. Failure to provide proper range checking can also lead to exploitable vulnerabilities.

Recommendations

INT01. Use size_t for all integer values representing the size of an object

...

INT04. Enforce limits on integer values originating from untrusted sources

Rules

INT30. Do not make assumptions about the type of a bit-field when used in an expression

...