You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
After inspecting the source file cbmc/src/ansi-c/library/unistd.c, there seems to be dead code at line 216 which aids overcoming the issue. This code is shown below.
Follow-up to bb8cfaa. Also fixes all types of read, _read, write, _write to
match those specified by Visual Studio's documentation.
Fixes: diffblue#1771
Commit ID: 8360233
CBMC does not detect buffer overflows stemming from
read
functions. I have provided a simple test case highlighting this issue.Command: cbmc test.c --bounds-check --pointer-check --unwind 100
After inspecting the source file cbmc/src/ansi-c/library/unistd.c, there seems to be dead code at line 216 which aids overcoming the issue. This code is shown below.
If I set the value in the if statement to 1 and compile, CBMC detects the vulnerability.
Command: cbmc test.c --bounds-check --pointer-check --unwind 100
Not sure if I am missing something here which would otherwise solve the issue.
The text was updated successfully, but these errors were encountered: