<feed xmlns='http://www.w3.org/2005/Atom'>
<title>fortify-headers, branch 0.5</title>
<subtitle>Standalone portable header-based implementation of FORTIFY_SOURCE=3 
</subtitle>
<id>http://git.dustri.org/fortify-headers/atom?h=0.5</id>
<link rel='self' href='http://git.dustri.org/fortify-headers/atom?h=0.5'/>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/'/>
<updated>2015-05-29T11:38:17Z</updated>
<entry>
<title>Bump to 0.5</title>
<updated>2015-05-29T11:38:17Z</updated>
<author>
<name>sin</name>
</author>
<published>2015-05-29T11:38:10Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=ec970ecb88df2bdaa200990ed1ca1e3194471c84'/>
<id>urn:sha1:ec970ecb88df2bdaa200990ed1ca1e3194471c84</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Fix return-type of fortified FD_CLR and FD_SET</title>
<updated>2015-05-21T09:10:17Z</updated>
<author>
<name>Trutz Behn</name>
</author>
<published>2015-05-20T20:09:46Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=720c4f7414c3c3d980de8e6ddbc0f608d3e9050d'/>
<id>urn:sha1:720c4f7414c3c3d980de8e6ddbc0f608d3e9050d</id>
<content type='text'>
POSIX specifies them to have return-type void, not int.
</content>
</entry>
<entry>
<title>Be less verbose in README</title>
<updated>2015-05-19T09:22:59Z</updated>
<author>
<name>sin</name>
</author>
<published>2015-05-19T09:22:59Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=a81e053a1c4086c8f46e259cf2a76639b26957ee'/>
<id>urn:sha1:a81e053a1c4086c8f46e259cf2a76639b26957ee</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Wrap some overly long lines</title>
<updated>2015-05-13T11:18:35Z</updated>
<author>
<name>sin</name>
</author>
<published>2015-05-13T11:18:35Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=50e37c7f766ba94f42993e14bb3207807ff14b30'/>
<id>urn:sha1:50e37c7f766ba94f42993e14bb3207807ff14b30</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Add LICENSE header</title>
<updated>2015-05-13T11:15:36Z</updated>
<author>
<name>sin</name>
</author>
<published>2015-05-13T11:15:36Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=07adb509146e4185b9b7587baad26cdfb766c67e'/>
<id>urn:sha1:07adb509146e4185b9b7587baad26cdfb766c67e</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Add fortify_fn() helper in fortify-headers.h</title>
<updated>2015-05-13T11:05:29Z</updated>
<author>
<name>sin</name>
</author>
<published>2015-05-13T11:04:15Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=158782b3bb791eae3c97947944c7023452bfbc96'/>
<id>urn:sha1:158782b3bb791eae3c97947944c7023452bfbc96</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Minor style fix</title>
<updated>2015-05-07T17:04:01Z</updated>
<author>
<name>sin</name>
</author>
<published>2015-05-07T17:04:01Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=316a48653315b4bc36d8c50b542471b18441c9d5'/>
<id>urn:sha1:316a48653315b4bc36d8c50b542471b18441c9d5</id>
<content type='text'>
</content>
</entry>
<entry>
<title>fix realpath when stdlib.h is included before limits.h</title>
<updated>2015-05-07T14:02:11Z</updated>
<author>
<name>Natanael Copa</name>
</author>
<published>2015-05-07T12:50:03Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=c2bb9e106a32619726cfc5052a1509e96b90de9f'/>
<id>urn:sha1:c2bb9e106a32619726cfc5052a1509e96b90de9f</id>
<content type='text'>
If program includes stdlib.h before limits.h without _XOPEN_SOURCE,
_GNU_SOURCE or _BSD_SOURCE explicitly set, then will it always trigger
the trap with musl libc.

This is becase stdlib.h will pull in features.h which will set
_GNU_SOURCE. This means that the fortify stdlib.h will not include
limits.h but it will still trigger the fortified realpath(), but without
PATH_MAX set.

We fix this by including system stdlib.h before testing if limits.h
should be included.

Since PATH_MAX is known at compile time we can also error at compile
time, instead of compiling a broken realpath().
</content>
</entry>
<entry>
<title>Add read checks for bcopy()</title>
<updated>2015-04-08T14:25:47Z</updated>
<author>
<name>sin</name>
</author>
<published>2015-04-08T14:25:47Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=c7e82d4863992c2f3bbb6f5a31fa8e5fd0e1643f'/>
<id>urn:sha1:c7e82d4863992c2f3bbb6f5a31fa8e5fd0e1643f</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Check for out of bound reads for memcpy, memmove and mempcpy()</title>
<updated>2015-04-08T14:18:49Z</updated>
<author>
<name>sin</name>
</author>
<published>2015-04-08T14:18:49Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=2bd3091b3636a18360e4c8bc2393daaf475f43cb'/>
<id>urn:sha1:2bd3091b3636a18360e4c8bc2393daaf475f43cb</id>
<content type='text'>
</content>
</entry>
</feed>
