Do not attempt to modify a variable, array, or pointer declared as const. The specification of const in variables and parameters implies to a maintainer or caller that, despite knowing some memory location, the code will not modify its content. Although C allows you to remove the specifier using typecasts, doing so violates the implication of the specifier.
Non-Compliant Code Example
In this example, the function f is passed a const char pointer. It then typecasts the const specification away, and proceeds to modify the contents.
void f(const char *str, int slen) {
char *p = (char*)str;
int i;
for (i = 0; i < slen && str[i]; i++) {
if (str[i] != ' ') *p++ = str[i];
}
}
Compliant Solution
In this compliant solution the function f is passed a non-const char pointer. The calling function must ensure that the null-terminated byte string passed to the function is not const by making a copy of the string or by other means.
void f(char *str, int slen) {
char *p = str;
int i;
for (i = 0; i < slen && str[i]; i++) {
if (str[i] != ' ') *p++ = str[i];
}
}
Non-Compliant Code Example
In this example, a const int array vals is declared and its content modified by memset() with the function, clearing the contents of the vals array.
const int vals[] = {3, 4, 5};
memset((int *)vals, 0, sizeof(vals));
Compliant Solution
If the intention is to allow the array values to be modified, do not declare the array as const.
int vals[] = {3, 4, 5};
memset((int *)vals, 0, sizeof(vals));
Otherwise, do not attempt to modify the contents of the array.
Priority: P6 Level: L2
If the object really is constant, the compiler may have put it in ROM or write-protected memory. Trying to modify such an object may lead to a program crash. This could allow an attacker to mount a denial of service attack.
Component |
Value |
|---|---|
Severity |
1 (low) |
Likelihood |
3 (likely) |
Remediation cost |
2 (low) |
References
- ISO/IEC 9899-1999 Section 6.7.3 Type qualifiers