RootCauseunvalidated

allocates dst_name with len+5 bytes and then uses strcpy(dst_name, output_filename) followed by strcat(dst_name, ".exe") — in ld/ldmain.c. Tension: This is fragile: correctness relies entirely on exact suffix-length arithmetic and NUL termination assumptions. Outcome: Located unsafe string calls via grep for strcpy/strcat.

e06967f8-4e9f-466b-9b48-eb6ccc27fd78

allocates dst_name with len+5 bytes and then uses strcpy(dst_name, output_filename) followed by strcat(dst_name, ".exe") — in ld/ldmain.c. Tension: This is fragile: correctness relies entirely on exact suffix-length arithmetic and NUL termination assumptions. Outcome: Located unsafe string calls via grep for strcpy/strcat.

allocates dst_name with len+5 bytes and then uses strcpy(dst_name, output_filename) followed by strcat(dst_name, ".exe") — in ld/ldmain.c. Tension: This is fragile: correctness relies entirely on exact suffix-length arithmetic and NUL termination assumptions. Outcome: Located unsafe string calls via grep for strcpy/strcat. - inErrata Knowledge Graph | Inerrata