CWE Rule 369
Description
Rule Description
The product divides a value by zero.
Polyspace Implementation
The rule checker checks for these issues:
Float division by zero
Integer division by zero
Tainted division operand
Tainted modulo operand
Examples
Float division by zero
This issue occurs when the denominator of a division operation can be a zero-valued floating point number.
A division by zero can result in a program crash.
The fix depends on the root cause of the defect. Often the result details (or source code tooltips in Polyspace as You Code) show a sequence of events that led to the defect. You can implement the fix on any event in the sequence. If the result details do not show this event history, you can search for previous references of variables relevant to the defect using right-click options in the source code and find related events. See also Interpret Bug Finder Results in Polyspace Desktop User Interface or Interpret Bug Finder Results in Polyspace Access Web Interface (Polyspace Access).
It is a good practice to check for zero values of a denominator before division and handle the error. Instead of performing the division directly:
res = num/den;
res = div(num, den);
See examples of fixes below.
If you do not want to fix the issue, for instance, when you handle infinities in your code, add comments to your result or code to avoid another review. See:
Address Results in Polyspace User Interface Through Bug Fixes or Justifications if you review results in the Polyspace user interface.
Address Results in Polyspace Access Through Bug Fixes or Justifications (Polyspace Access) if you review results in a web browser.
Annotate Code and Hide Known or Acceptable Results if you review results in an IDE.
By default, a Bug Finder analysis does not recognize infinities and
NaNs
. Operations that results in infinities and
NaNs
might be flagged as defects. To handle infinities and
NaN
values in your code, use the option Consider non finite floats
(-allow-non-finite-floats).
A default Bug Finder analysis might not raise this defect when the input values are unknown and only a subset of inputs cause an issue. To check for defects caused by specific system input values, run a stricter Bug Finder analysis. See Extend Bug Finder Checkers to Find Defects from Specific System Input Values.
float fraction(float num) { float denom = 0.0; float result = 0.0; result = num/denom; //Noncompliant return result; }
A division by zero error occurs at num
/
denom
because denom
is
zero.
float fraction(float num) { float denom = 0.0; float result = 0.0; if( ((int)denom) != 0) result = num/denom; return result; }
Before dividing, add a test to see if the denominator is zero,
checking before division occurs. If denom
is always
zero, this correction can produce a dead code defect in your Polyspace® results.
One possible correction is to change the denominator value so
that denom
is not zero.
float fraction(float num) { float denom = 2.0; float result = 0.0; result = num/denom; return result; }
Integer division by zero
This issue occurs when the denominator of a division or modulo operation can be a zero-valued integer.
A division by zero can result in a program crash.
The fix depends on the root cause of the defect. Often the result details (or source code tooltips in Polyspace as You Code) show a sequence of events that led to the defect. You can implement the fix on any event in the sequence. If the result details do not show this event history, you can search for previous references of variables relevant to the defect using right-click options in the source code and find related events. See also Interpret Bug Finder Results in Polyspace Desktop User Interface or Interpret Bug Finder Results in Polyspace Access Web Interface (Polyspace Access).
It is a good practice to check for zero values of a denominator before division and handle the error. Instead of performing the division directly:
res = num/den;
res = div(num, den);
See examples of fixes below.
If you do not want to fix the issue, add comments to your result or code to avoid another review. See:
Address Results in Polyspace User Interface Through Bug Fixes or Justifications if you review results in the Polyspace user interface.
Address Results in Polyspace Access Through Bug Fixes or Justifications (Polyspace Access) if you review results in a web browser.
Annotate Code and Hide Known or Acceptable Results if you review results in an IDE.
A default Bug Finder analysis might not raise this defect when the input values are unknown and only a subset of inputs cause an issue. To check for defects caused by specific system input values, run a stricter Bug Finder analysis. See Extend Bug Finder Checkers to Find Defects from Specific System Input Values.
int fraction(int num) { int denom = 0; int result = 0; result = num/denom; //Noncompliant return result; }
A division by zero error occurs at num
/
denom
because denom
is
zero.
int fraction(int num) { int denom = 0; int result = 0; if (denom != 0) result = num/denom; return result; }
Before dividing, add a test to see if the denominator is zero,
checking before division occurs. If denom
is always
zero, this correction can produce a dead code defect in your Polyspace results.
One possible correction is to change the denominator value so
that denom
is not zero.
int fraction(int num) { int denom = 2; int result = 0; result = num/denom; return result; }
int mod_arr(int input) { int arr[5]; for(int i = 0; i < 5; i++) { arr[i] = input % i; //Noncompliant } return arr[0]+arr[1]+arr[2]+arr[3]+arr[4]; }
In this example, Polyspace flags the modulo operation as
a division by zero. Because modulo is inherently a division operation,
the divisor (right hand argument) cannot be zero. The modulo operation
uses the for
loop index as the divisor. However,
the for
loop starts at zero, which cannot be an
iterator.
One possible correction is checking the divisor before the modulo
operation. In this example, see if the index i
is
zero before the modulo operation.
int mod_arr(int input) { int arr[5]; for(int i = 0; i < 5; i++) { if(i != 0) { arr[i] = input % i; } else { arr[i] = input; } } return arr[0]+arr[1]+arr[2]+arr[3]+arr[4]; }
Another possible correction is changing the divisor to a nonzero
integer. In this example, add one to the index before the %
operation
to avoid dividing by zero.
int mod_arr(int input) { int arr[5]; for(int i = 0; i < 5; i++) { arr[i] = input % (i+1); } return arr[0]+arr[1]+arr[2]+arr[3]+arr[4]; }
Tainted division operand
This issue occurs when one or both integer operands in a division operation comes from unsecure sources.
If the numerator is the minimum possible value and the denominator is
-1
, your division operation overflows because the result cannot be represented by the current variable size.If the denominator is zero, your division operation fails possibly causing your program to crash.
These risks can be used to execute arbitrary code. This code is usually outside the scope of a program's implicit security policy.
Before performing the division, validate the values of the operands.
Check for denominators of 0
or -1
,
and numerators of the minimum integer value.
By default, Polyspace assumes that data from external
sources are tainted. See Sources of Tainting in a Polyspace Analysis. To consider any data that does not originate in
the current scope of Polyspace analysis as tainted,
use the command line option -consider-analysis-perimeter-as-trust-boundary
.
#include <limits.h> #include <stdio.h> extern void print_int(int); int taintedintdivision(void) { long num, denum; scanf("%lf %lf", &num, &denum); int r = num/denum; //Noncompliant //Noncompliant print_int(r); return r; }
This example function divides two argument variables, then prints and returns the result. The argument values are unknown and can cause division by zero or integer overflow.
One possible correction is to check the values of the numerator and denominator before performing the division.
#include <limits.h> #include <stdio.h> extern void print_long(long); int taintedintdivision(void) { long num, denum; scanf("%lf %lf", &num, &denum); long res= 0; if (denum!=0 && !(num==INT_MIN && denum==-1)) { res = num/denum; } print_long(res); return res; }
Tainted modulo operand
This issue occurs when one or both integer operands in a remainder
operation (%
) comes from unsecure
sources.
If the second remainder operand is zero, your remainder operation fails, causing your program to crash.
If the second remainder operand is
-1
, your remainder operation can overflow if the remainder operation is implemented based on the division operation that can overflow.If one of the operands is negative, the operation result is uncertain. For C89, the modulo operation is not standardized, so the result from negative operands is implementation-defined.
These risks can be exploited by attackers to gain access to your program or the target in general.
Before performing the modulo operation, validate the values
of the operands. Check the second operand for values of 0
and -1
.
Check both operands for negative values.
By default, Polyspace assumes that data from external
sources are tainted. See Sources of Tainting in a Polyspace Analysis. To consider any data that does not originate in
the current scope of Polyspace analysis as tainted,
use the command line option -consider-analysis-perimeter-as-trust-boundary
.
#include <stdio.h> extern void print_int(int); int taintedintmod(void) { int userden; scanf("%d", &userden); int rem = 128%userden; //Noncompliant //Noncompliant print_int(rem); return rem; }
In this example, the function performs a modulo operation by using a user input. The input is not checked before calculating the remainder for values that can crash the program, such as 0 and -1.
One possible correction is to check the values of the operands before performing the modulo operation. In this corrected example, the modulo operation continues only if the second operand is greater than zero.
#include<stdio.h> extern void print_int(int); int taintedintmod(void) { int userden; scanf("%d", &userden); int rem = 0; if (userden > 0 ) { rem = 128 % userden; } print_int(rem); return rem; }
Check Information
Category: Numeric Errors |
Version History
Introduced in R2023a
See Also
External Websites
MATLAB Command
You clicked a link that corresponds to this MATLAB command:
Run the command by entering it in the MATLAB Command Window. Web browsers do not support MATLAB commands.
Select a Web Site
Choose a web site to get translated content where available and see local events and offers. Based on your location, we recommend that you select: .
You can also select a web site from the following list
How to Get Best Site Performance
Select the China site (in Chinese or English) for best site performance. Other MathWorks country sites are not optimized for visits from your location.
Americas
- América Latina (Español)
- Canada (English)
- United States (English)
Europe
- Belgium (English)
- Denmark (English)
- Deutschland (Deutsch)
- España (Español)
- Finland (English)
- France (Français)
- Ireland (English)
- Italia (Italiano)
- Luxembourg (English)
- Netherlands (English)
- Norway (English)
- Österreich (Deutsch)
- Portugal (English)
- Sweden (English)
- Switzerland
- United Kingdom (English)
Asia Pacific
- Australia (English)
- India (English)
- New Zealand (English)
- 中国
- 日本Japanese (日本語)
- 한국Korean (한국어)