Do not use the same variable name in two scopes where one scope is contained in another. Examples include
Reusing variable names leads to programmer confusion about which variable is being modified. Additionally, if variable names are reused, generally one or both of the variable names are too generic.
strpcy()
)In this non-compliant code example, the programmer sets the value of the msg
variable, expecting to reuse it outside the block. Due to the reuse of the variable name, however, the outside msg
variable value is not changed.
char msg[100]; /* ... */ void error_message(char *error_msg) { char msg[80]; /* ... */ strcpy(msg, error_msg); /* error_msg is assumed to reference a NTBS of len 99 or less */ return; } |
Furthermore, if the length of the null-terminated byte string referenced by error_msg
is greater than 79 characters in length, a buffer overflow will occur on the stack, which may be exploitable.
strcpy_s()
)In this non-compliant code example, the call to {{strpcy()}} has been replaced with a call to {{strcpy_s()}}. See \[[STR00-A. Use TR 24731 for remediation of existing string manipulation code]\] for more information on using {{strcpy_s()}}. |
char msg[100]; /* ... */ void error_message(char *error_msg) { char msg[80]; /* ... */ /* error_msg is assumed to reference a NTBS of length 99 or less */ errno_t e = strcpy_s(msg, sizeof(msg), error_msg); if (e != 0) { /* handle strcpy_s() error */ } } |
This code fixes one of the two problems from the previous non-compliant code example: it eliminates the possibility of buffer overflow because two references to {{msg}} in {{strcpy_s()}} both refer to {{msg\[80\]}} defined in the subscope. The initial problem of not changing the value of the outside {{msg}} variable value remains. The call to {{strcpy_s()}} will also fail if the length of the null-terminated byte string referenced by {{error_msg}} is longer than 79 characters in length. |
This compliant solution uses different, more descriptive variable names. Also it uses strcpy_s()
.
char system_msg[100]; /* ... */ void error_message(char *error_msg) { char default_msg[80]; /* ... */ /* error_msg is assumed to reference a NTBS of length 99 or less */ errno_t e = strcpy_s(system_msg, sizeof(system_msg), error_msg); if (e != 0) { /* handle strcpy_s() error */ } } |
When the block is small, the danger of reusing variable names is mitigated by the visibility of the immediate declaration. Even in this case, however, variable name reuse is not desirable.
Reusing a variable name in a subscope can lead to unintended values for the variable.
Recommendation |
Severity |
Likelihood |
Remediation Cost |
Priority |
Level |
---|---|---|---|---|---|
DCL01-A |
1 (low) |
1 (unlikely) |
2 (medium) |
P2 |
L3 |
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
\[[ISO/IEC 9899-1999|AA. C References#ISO/IEC 9899-1999]\] Section 5.2.4.1, "Translation limits" \[[MISRA 04|AA. C References#MISRA 04]\] Rule 5.2 |
DCL00-A. Declare immutable values using enum or const 02. Declarations and Initialization (DCL) DCL02-A. Use visually distinct identifiers