...
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
Related Guidelines
...
Key here (explains table format and definitions)
Taxonomy | Taxonomy item | Relationship |
|---|
CERT-CWE Mapping Notes
Key here for mapping notes
CWE-252/CWE-253/CWE-391 and ERR33-C/POS34-C
Independent( ERR33-C, POS54-C, FLP32-C, ERR34-C) Intersection( CWE-252, CWE-253) = Ø CWE-391 = Union( CWE-252, CWE-253) CWE-391 = Union( ERR33-C, POS34-C, list) where list =
- Ignoring return values of functions outside the C or POSIX standard libraries
...
Bibliography
| [Dowd 2006] | Chapter 10, "UNIX Processes" |
| [ISO/IEC 9899:2011] | Section 6.2.4, "Storage Durations of Objects" Section 7.22.3, "Memory Management Functions" |
| [Open Group 2004] | putenv()setenv() |
...