
...
Tool | Version | Checker | Description | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Astrée |
| function-argument-with-padding | Partially checked | |||||||||||||||
Axivion Bauhaus Suite |
| CertC-DCL39 | Detects composite structures with padding, in particular those passed to trust boundary routines. | |||||||||||||||
CodeSonar |
| MISC.PADDING.POTB | Padding Passed Across a Trust Boundary | |||||||||||||||
Helix QAC |
| C4941DF4941, C4942, C4943 C++4941, C++4942, C++4943 DF4942, DF4943 | ||||||||||||||||
Klocwork |
| Klocwork |
| PORTING.STORAGE.STRUCT | ||||||||||||||
Parasoft C/C++test |
| CERT_C-DCL39-a | A pointer to a structure should not be passed to a function that can copy data to the user space | |||||||||||||||
| CERT C: Rule DCL39-C | Checks for information leak via structure padding | ||||||||||||||||
PRQA QA-CRuleChecker |
PRQA QA-C_v | PRQA QA-C_v | | 4941, 4942, 4943 |
| function-argument-with-padding | Partially checked | PRQA QA-C++ | Include Page | | cplusplus:PRQA QA-C++_V | cplusplus:PRQA QA-C++_V | 4941, 4942, 4943
Related Vulnerabilities
Numerous vulnerabilities in the Linux Kernel have resulted from violations of this rule. CVE-2010-4083 describes a vulnerability in which the semctl()
system call allows unprivileged users to read uninitialized kernel stack memory because various fields of a semid_ds struct
declared on the stack are not altered or zeroed before being copied back to the user.
...