CWE Rule 468
Description
Rule Description
In C and C++, one may often accidentally refer to the wrong memory due to the semantics of when math operations are implicitly scaled.
Polyspace Implementation
The rule checker checks for these issues:
Array access out of bounds
Incorrect pointer scaling
Pointer access out of bounds
Subtraction or comparison between pointers to different arrays
Examples
Array access out of bounds
This issue occurs
when an array index falls outside the range [0...array_size-1]
during
array access.
Accessing an array outside its bounds is undefined behavior. You can read an unpredictable value or try to access a location that is not allowed and encounter a segmentation fault.
The fix depends on the root cause of the defect. For instance, you accessed an array inside a loop and one of these situations happened:
The upper bound of the loop is too large.
You used an array index that is the same as the loop index instead of being one less than the loop index.
To fix the issue, you have to modify the loop bound or the array index.
Another reason why an array index can exceed array bounds is a prior conversion from signed to unsigned integers. The conversion can result in a wrap around of the index value, eventually causing the array index to exceed the array bounds.
Often the result details (or source code tooltips in Polyspace as You Code) show a sequence of events that led to the defect. You can implement the fix on any event in the sequence. If the result details do not show this event history, you can search for previous references of variables relevant to the defect using right-click options in the source code and find related events. See also Interpret Bug Finder Results in Polyspace Desktop User Interface or Interpret Bug Finder Results in Polyspace Access Web Interface (Polyspace Access).
See examples of fixes below.
If you do not want to fix the issue, add comments to your result or code to avoid another review. See:
Address Results in Polyspace User Interface Through Bug Fixes or Justifications if you review results in the Polyspace user interface.
Address Results in Polyspace Access Through Bug Fixes or Justifications (Polyspace Access) if you review results in a web browser.
Annotate Code and Hide Known or Acceptable Results if you review results in an IDE.
A default Bug Finder analysis might not raise this defect when the input values are unknown and only a subset of inputs cause an issue. To check for defects caused by specific system input values, run a stricter Bug Finder analysis. See Extend Bug Finder Checkers to Find Defects from Specific System Input Values.
#include <stdio.h> void fibonacci(void) { int i; int fib[10]; for (i = 0; i < 10; i++) { if (i < 2) fib[i] = 1; else fib[i] = fib[i-1] + fib[i-2]; } printf("The 10-th Fibonacci number is %i .\n", fib[i]); //Noncompliant /* Defect: Value of i is greater than allowed value of 9 */ }
The array fib
is assigned a size of 10. An array index
for fib
has allowed values of [0,1,2,...,9]
. The
variable i
has a value 10 when it comes out of the
for
-loop. Therefore, the printf
statement attempts to
access fib[10]
through i
.
One possible correction is to print fib[i-1]
instead of fib[i]
after the for
-loop.
#include <stdio.h> void fibonacci(void) { int i; int fib[10]; for (i = 0; i < 10; i++) { if (i < 2) fib[i] = 1; else fib[i] = fib[i-1] + fib[i-2]; } /* Fix: Print fib[9] instead of fib[10] */ printf("The 10-th Fibonacci number is %i .\n", fib[i-1]); }
The printf
statement accesses fib[9]
instead of
fib[10]
.
Incorrect pointer scaling
This issue occurs when Polyspace® Bug Finder™ considers that you are ignoring the implicit scaling in pointer arithmetic.
For instance, the defect can occur in the following situations.
Situation | Risk | Possible Fix |
---|---|---|
You use the sizeof operator in arithmetic
operations on a pointer. | The Pointer arithmetic
is already implicitly scaled by the size of the data type of the pointed
variable. Therefore, the use of | Do not use sizeof operator in pointer arithmetic. |
You perform arithmetic operations on a pointer, and then apply a cast. | Pointer arithmetic is implicitly scaled. If you do not consider this implicit scaling, casting the result of a pointer arithmetic produces unintended results. | Apply the cast before the pointer arithmetic. |
The fix depends on the root cause of the defect. See fixes in the table above and code examples with fixes below.
If you do not want to fix the issue, add comments to your result or code to avoid another review. See:
Address Results in Polyspace User Interface Through Bug Fixes or Justifications if you review results in the Polyspace user interface.
Address Results in Polyspace Access Through Bug Fixes or Justifications (Polyspace Access) if you review results in a web browser.
Annotate Code and Hide Known or Acceptable Results if you review results in an IDE.
void func(void) { int arr[5] = {1,2,3,4,5}; int *ptr = arr; int value_in_position_2 = *(ptr + 2*(sizeof(int))); //Noncompliant }
In this example, the operation 2*(sizeof(int))
returns
twice the size of an int
variable in bytes. However,
because pointer arithmetic is implicitly scaled, the number of bytes
by which ptr
is offset is 2*(sizeof(int))*(sizeof(int))
.
In this example, the incorrect scaling shifts ptr
outside
the bounds of the array. Therefore, a Pointer access out
of bounds error appears on the *
operation.
sizeof
OperatorOne possible correction is to remove the sizeof
operator.
void func(void) { int arr[5] = {1,2,3,4,5}; int *ptr = arr; int value_in_position_2 = *(ptr + 2); }
int func(void) { int x = 0; char r = *(char *)(&x + 1); //Noncompliant return r; }
In this example, the operation &x + 1
offsets &x
by sizeof(int)
.
Following the operation, the resulting pointer points outside the
allowed buffer. When you dereference the pointer, a Pointer
access out of bounds error appears on the *
operation.
If you want to access the second byte of x
,
first cast &x
to a char*
pointer
and then perform the pointer arithmetic. The resulting pointer is
offset by sizeof(char)
bytes and still points within
the allowed buffer, whose size is sizeof(int)
bytes.
int func(void) { int x = 0; char r = *((char *)(&x )+ 1); return r; }
Pointer access out of bounds
This issue occurs when a pointer is dereferenced outside its bounds.
When a pointer is assigned an address, a block of memory is associated with the pointer. You cannot access memory beyond that block using the pointer.
Dereferencing a pointer outside its bounds is undefined behavior. You can read an unpredictable value or try to access a location that is not allowed and encounter a segmentation fault.
The fix depends on the root cause of the defect. For instance, you dereferenced a pointer inside a loop and one of these situations happened:
The upper bound of the loop is too large.
You used pointer arithmetic to advance the pointer with an incorrect value for the pointer increment.
To fix the issue, you have to modify the loop bound or the pointer increment value.
Often the result details (or source code tooltips in Polyspace as You Code) show a sequence of events that led to the defect. You can implement the fix on any event in the sequence. If the result details do not show this event history, you can search for previous references of variables relevant to the defect using right-click options in the source code and find related events. See also Interpret Bug Finder Results in Polyspace Desktop User Interface or Interpret Bug Finder Results in Polyspace Access Web Interface (Polyspace Access).
See examples of fixes below.
If you do not want to fix the issue, add comments to your result or code to avoid another review. See:
Address Results in Polyspace User Interface Through Bug Fixes or Justifications if you review results in the Polyspace user interface.
Address Results in Polyspace Access Through Bug Fixes or Justifications (Polyspace Access) if you review results in a web browser.
Annotate Code and Hide Known or Acceptable Results if you review results in an IDE.
int* Initialize(void) { int arr[10]; int *ptr=arr; for (int i=0; i<=9;i++) { ptr++; *ptr=i; //Noncompliant /* Defect: ptr out of bounds for i=9 */ } return(arr); }
ptr
is assigned the address arr
that
points to a memory block of size 10*sizeof(int)
. In the
for
-loop, ptr
is incremented 10 times. In the last iteration
of the loop, ptr
points outside the memory block assigned to it. Therefore, it
cannot be dereferenced.
One possible correction is to reverse the order of increment and
dereference of ptr
.
int* Initialize(void) { int arr[10]; int *ptr=arr; for (int i=0; i<=9;i++) { /* Fix: Dereference pointer before increment */ *ptr=i; ptr++; } return(arr); }
After the last increment, even though ptr
points outside the memory block
assigned to it, it is not dereferenced more.
Subtraction or comparison between pointers to different arrays
This issue occurs when you subtract or compare pointers that are null or that point
to elements in different arrays. The relational operators for the comparison are
>
, <
, >=
, and
<=
.
When you subtract two pointers to elements in the same array, the result is the difference between the subscripts of the two array elements. Similarly, when you compare two pointers to array elements, the result is the positions of the pointers relative to each other. If the pointers are null or point to different arrays, a subtraction or comparison operation is undefined. If you use the subtraction result as a buffer index, it can cause a buffer overflow.
Before you subtract or use relational operators to compare pointers to array elements, check that they are non-null and that they point to the same array.
#include <stdio.h> #include <stdlib.h> #include <string.h> #define SIZE20 20 size_t func(void) { int nums[SIZE20]; int end; int *next_num_ptr = nums; size_t free_elements; /* Increment next_num_ptr as array fills */ /* Subtraction operation is undefined unless arraynums
is adjacent to variableend
in memory. */ free_elements = &end - next_num_ptr; //Noncompliant return free_elements; }
In this example, the array nums
is incrementally filled. Pointer
subtraction is then used to determine how many free elements remain. Unless
end
points to a memory location one past the last element of
nums
, the subtraction operation is undefined.
Subtract the pointer to the last element that was filled from the pointer to the last element in the array.
#include <stdio.h> #include <stdlib.h> #include <string.h> #define SIZE20 20 size_t func(void) { int nums[SIZE20]; int *next_num_ptr = nums; size_t free_elements; /* Increment next_num_ptr as array fills */ /* Subtraction operation involves pointers to the same array. */ free_elements = &(nums[SIZE20 - 1]) - next_num_ptr; return free_elements + 1; }
Check Information
Category: Pointer Issues |
Version History
Introduced in R2023a
See Also
External Websites
MATLAB Command
You clicked a link that corresponds to this MATLAB command:
Run the command by entering it in the MATLAB Command Window. Web browsers do not support MATLAB commands.
Select a Web Site
Choose a web site to get translated content where available and see local events and offers. Based on your location, we recommend that you select: .
You can also select a web site from the following list
How to Get Best Site Performance
Select the China site (in Chinese or English) for best site performance. Other MathWorks country sites are not optimized for visits from your location.
Americas
- América Latina (Español)
- Canada (English)
- United States (English)
Europe
- Belgium (English)
- Denmark (English)
- Deutschland (Deutsch)
- España (Español)
- Finland (English)
- France (Français)
- Ireland (English)
- Italia (Italiano)
- Luxembourg (English)
- Netherlands (English)
- Norway (English)
- Österreich (Deutsch)
- Portugal (English)
- Sweden (English)
- Switzerland
- United Kingdom (English)
Asia Pacific
- Australia (English)
- India (English)
- New Zealand (English)
- 中国
- 日本Japanese (日本語)
- 한국Korean (한국어)