Skip to content

Commit 0b27939

Browse files
committed
Add missing header markers to markdown files
1 parent cb66b8c commit 0b27939

File tree

2 files changed

+3
-2
lines changed

2 files changed

+3
-2
lines changed

c/cert/src/rules/DCL39-C/InformationLeakageAcrossTrustBoundariesC.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -249,7 +249,7 @@ In addition, this solution assumes that there are no integer padding bits in an
249249

250250
From this situation, it can be seen that special care must be taken because no solution to the bit-field padding issue will be 100% portable.
251251

252-
Risk Assessment
252+
## Risk Assessment
253253

254254
Padding units might contain sensitive data because the C Standard allows any padding to take [unspecified values](https://wiki.sei.cmu.edu/confluence/display/c/BB.+Definitions#BB.Definitions-unspecifiedvalue). A pointer to such a structure could be passed to other functions, causing information leakage.
255255

c/cert/src/rules/INT32-C/SignedIntegerOverflow.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -398,7 +398,8 @@ void func(signed long s_a) {
398398
}
399399
400400
```
401-
Risk Assessment
401+
402+
## Risk Assessment
402403

403404
Integer overflow can lead to buffer overflows and the execution of arbitrary code by an attacker.
404405

0 commit comments

Comments
 (0)