...
When a file is opened with update mode . . ., both input and output may be performed on the associated stream. However, output shall not be directly followed by input without an intervening call to the
fflushfunction or to a file positioning function (fseek,fsetpos, orrewind), and input shall not be directly followed by output without an intervening call to a file positioning function, unless the input operation encounters end-of-file.
ThusConsequently, the following scenarios can result in undefined behavior:
...
No other std::basic_filebuf<T> function guarantees behavior as if a call were made to a Standard standard C library file-positioning function, or std::fflush().
Note that calling std::basic_ostream<T>::seekp() or std::basic_istream<T>::seekg() eventually results in a call to std::basic_filebuf<T>::seekoff() for file stream positioning. Given that std::basic_iostream<T> inherits from both std::basic_ostream<T> and std::basic_istream<T>, and std::fstream inherits from std::basic_iostream, either function is acceptable to call to ensure the file buffer is in a valid state prior to before the subsequent IO operation.
...
This noncompliant code example appends data to the end of a file , and then reads from the same file. However, because there is no intervening positioning call between the formatted output and input calls, the behavior is undefined.
| Code Block | ||||
|---|---|---|---|---|
| ||||
#include <fstream>
#include <string>
void f(const std::string &N) {
std::fstream f(N);
if (!f.is_open()) {
// Handle error
return;
}
f << "Output some data";
std::string str;
f >> str;
}
|
...
In this compliant solution, the std::basic_istream<T>::seekg() function is called in between the output and input, eliminating the undefined behavior.
| Code Block | ||||
|---|---|---|---|---|
| ||||
#include <fstream>
#include <string>
void f(const std::string &N) {
std::fstream f(N);
if (!f.is_open()) {
// Handle error
return;
}
f << "Output some data";
std::string str;
f.seekg(0, std::ios::beg);
f >> str;
}
|
...
Related Vulnerabilities
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
...