Christian Blichmann 33206c5d3f Use a longer string in the CRC4 buffer overflow example.
On some newer compiler versions, compiler optimizations and loop unrolling
change the memory layout so that 64 bytes are not enough to overwrite the
return address reliably.

PiperOrigin-RevId: 240343358
Change-Id: Ifb1a1dc1cb482793b7387887f0fd68a237879227
2019-03-26 07:28:15 -07:00
..
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-20 05:19:55 -07:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-19 03:41:32 -07:00
2019-03-18 19:00:48 +01:00
2019-03-19 03:41:32 -07:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-19 03:41:32 -07:00
2019-03-19 03:41:32 -07:00
2019-03-18 19:00:48 +01:00
2019-03-19 03:41:32 -07:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-19 03:41:32 -07:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-20 05:19:55 -07:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-20 05:19:55 -07:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-20 05:19:55 -07:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-19 03:41:32 -07:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00

Sandbox2

Sandbox2 is a C++ security sandbox for Linux which can be used to run untrusted programs or portions of programs in confined environments. The idea is that the runtime environment is so restricted that security bugs such as buffer overflows in the protected region cause no harm.

Who is it for?

Sandbox2 is aimed to sandbox C/C++ code or whole binaries in production.

See the sandboxing options overview page to make sure this is the type of sandboxing you are looking for.

How does it work?

Read our How it works page to learn everything about this technology.