Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: REM Cost Reform

Expressions that have an integral type can be added to or subtracted from a pointer, resulting in a value of the pointer type. If the resulting pointer would is not be a valid member of the container, or one past the last element of the container, the behavior of the additive operator is undefined. The C++ Standard, [expr.add], paragraph 5 [ISO/IEC 14882-2014], states, in part in part, states the following:

If both the pointer operand and the result point to elements of the same array object, or one past the last element of the array object, the evaluation shall not produce an overflow; otherwise, the behavior is undefined.

Since Because iterators are a generalization of pointers, the same constraints apply to additive operators with random access iterators. Specifically, the C++ Standard, [iterator.requirements.general], paragraph 5, states the following:

Just as a regular pointer to an array guarantees that there is a pointer value pointing past the last element of the array, so for any iterator type there is an iterator value that points past the last element of a corresponding sequence. These values are called past-the-end values. Values of an iterator i for which the expression *i is defined are called dereferenceable. The library never assumes that past-the-end values are dereferenceable.

Do not allow an expression of integral type to add to or subtract from a pointer or random access iterator when the resulting value would overflow the bounds of the container.

Noncompliant Code Example (std::vector)

In this noncompliant code example, a random access iterator from a std::vector is used in an additive expression, but the resulting value could be outside of the bounds of the container , and not rather than a past-the-end value.

Code Block
bgColor#ffcccc
langcpp
#include <iostream>
#include <vector>
 
void f(const std::vector<int> &Cc) {
  for (auto Ii = Cc.begin(), Ee = Ii + 20; Ii != Ee; ++Ii) {
    std::cout << *Ii << std::endl;
  }
}

Compliant Solution (std::vector)

This compliant solution assumes that the programmer's intention was to process up to twenty 20 items in the container. Instead of assuming all containers will have twenty 20 or more elements, the size of the container is used to determine the upper bound on the addition.

Code Block
bgColor#ccccff
langcpp
#include <algorithm>
#include <vector>

void f(const std::vector<int> &Cc) {
  const std::vector<int>::size_type MaxSizemaxSize = 20;
  for (auto Ii = Cc.begin(), Ee = Ii + std::min(MaxSizemaxSize, Cc.size()); Ii != Ee; ++Ii) {
    // ...
  }
}

...

Non-Compliant Code Example (Linear Address Space)

In this noncompliant code example, an attempt is made to determine if a pointer addition will cause a linear address space wraparound:

Code Block
bgColor#ffcccc
langcpp
void f(const char *buf, size_t len) {
  // Check for overflow
  if (buf + len < buf) {
    len = -(size_t)buf - 1;
  }
}

This code resembles the test for wraparound from the sprint() function as implemented for the Plan 9 operating system. If buf + len < buf evaluates to true, len is assigned the remaining space, minus one byte. However, because the expression buf + len < buf constitutes undefined behavior, compilers can assume this condition will never occur and optimize away the entire conditional statement.

Implementation Details

In GCC versions 4.2 and later, code that performs checks for wrapping that depend on undefined behavior (such as the code in this noncompliant code example) are optimized away; no object code to perform the check appears in the resulting executable program [VU#162289]. This is of special concern because it often results in the silent elimination of code that was inserted to provide a safety or security check. For GCC 4.2.4 and later, this optimization may be disabled for with the -fno-strict-overflow option.

Compliant Solution (Linear Address Space)

In this compliant solution, both references to buf are cast to std::uintptr_t. Because std::uinptr_t is an unsigned integral type of sufficient size to store a pointer value, C++ guarantees that it has modulo behavior.

Code Block
bgColor#ccccff
langcpp
#include <cstdint>
 
void f(const char *buf, size_t len) {
  // Check for overflow
  auto bint = reinterpret_cast<std::uintptr_t>(buf);
  if (bint + len < bint) {
    len = -(size_t)bint - 1;
  }
}

This compliant solution works on architectures that provide a linear address space. Some word-oriented machines are likely to produce a word address with the high-order bits used as a byte selector, in which case this solution will fail. Consequently, this is not a portable solution.

Risk Assessment

If adding or subtracting an integer to a pointer results in a reference to an element outside the array or one past the last element of the array object, the behavior is undefined, but frequently leads to a buffer overflow or buffer underrun, which can often be exploited to run arbitrary code. Iterators and STL standard template library containers exhibit the same behavior and caveats as pointers and arrays.

Rule

Severity

Likelihood

Detectable

Remediation Cost

Repairable

Priority

Level

CTR38

CTR55-CPP

High

Likely

No

Medium

No

P18

P9

L1

L2

Automated Detection

Tool

Version

Checker

Description

   

Helix QAC

Include Page
Helix QAC_V
Helix QAC_V

DF3526, DF3527, DF3528, DF3529, DF3530, DF3531, DF3532, DF3533, DF3534


Klocwork
Include Page
Klocwork_V
Klocwork_V

ITER.ADVANCE.NONADJACENT


LDRA tool suite
Include Page
LDRA_V
LDRA_V

567 S

Enhanced Enforcement

Parasoft C/C++test

Include Page
Parasoft_V
Parasoft_V

CERT_CPP-CTR55-a

Do not add or subtract a constant with a value greater than one from an iterator

Polyspace Bug Finder

Include Page
Polyspace Bug Finder_V
Polyspace Bug Finder_V

CERT C++: CTR55-CPPChecks for possible iterator overflows (rule partially covered).
 

Related Vulnerabilities

Search for vulnerabilities resulting from the violation of this rule on the CERT website.

Related Guidelines

Bibliography

[Banahan 2003]Section 5.3, "Pointers"
Section 5.7, "Expressions Involving Pointers"
[ISO/IEC 14882-2014]

Subclause 5.7, "Additive Operators"
Subclause 24.2.1, "In General"

[
Banahan 03]5.3, "Pointers"
5.7, "Expressions involving pointers"

...


...

Image Modified Image Modified Image Modified