This is a standalone implementation of
fortify source
level 3, providing compile time security checks.
It is libc-agnostic and simply overlays the system headers by using the
#include_next
extension found in GCC, and
black magic
on Clang. It was initially intended to be used on
musl based
Linux distributions.
__builtin_trap()
.FORTIFY_USE_NATIVE_CHK
will make use of compiler-provided builtin _chk
functions, which might be a bit better in term of diagnostics,
but won't necessarily provide the same amount of security checks.FORTIFY_PEDANTIC_CHECKS
will enable pedantic checks, that while technically
correct, might break some programs relying on widely accepted
undefined-behaviours.If you want to quickly test it, you can try something like the following:
cat > fgets.c <<EOF
#include <stdio.h>
int
main(void)
{
char buf[BUFSIZ];
fgets(buf, sizeof(buf) + 1, stdin);
return 0;
}
EOF
cc -I<path-to-fortify-include-dir> -D_FORTIFY_SOURCE=3 -O1 fgets.c
./a.out
At this point, the program will safely and loudly crash.
FD_CLR
FD_SET
asprintf
bcopy
bzero
calloc
confstr
fdopen
fgets
fgetws
fmemopen
fopen
fprintf
fread
fwrite
getcwd
getdomainname
getgroups
gethostname
getlogin_r
malloc
mbsnrtowcs
mbsrtowcs
mbstowcs
memchr
memcpy
memmove
mempcpy
memset
poll
popen
ppoll
pread
printf
pwrite
qsort
read
readlink
readlinkat
realloc
reallocarray
realpath
recv
recvfrom
select
send
sendto
snprintf
sprintf
stpcpy
stpncpy
strcat
strchr
strcpy
strlcat
strlcpy
strlen
strncat
strncpy
strrchr
tmpfile
ttyname_r
umask
vfprintf
vprintf
vasprintf
vsnprintf
vsprintf
wcrtomb
wcscat
wcscpy
wcsncat
wcsncpy
wcsnrtombs
wcsrtombs
wcstombs
wctomb
wmemcpy
wmemmove
wmemset
write