Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Code Block
bgColor#FFcccc
struct buffer {
    size_t size;
    char buffer[50];
};

...

void func(struct buffer *buf) {

  /* assuming sizeof(size_t) is 4, sizeof(size_t)+sizeof(char)*50 equals 54 */
  struct buffer *buf_cpy = malloc(sizeof(size_t)+(sizeof(char)*50));

  if (buf_cpy == NULL) {
    /* Handle malloc() error */
  }
  ...
 /* with padding, sizeof(struct buffer) may be greater than 54, causing a
    small amount of data to be written outside the bounds of the memory allocated */
  memcpy(buf_cpy, buf, sizeof(struct buffer));
}

Risk Assessment

Failure to correctly determine the size of a structure can lead to subtle logic errors and buffer overflows.

Rule

Severity

Likelihood

Remediation Cost

Priority

Level

STR33-C

3 (medium)

3 (probable)

2 (medium)

P18

L1

Compliant Solution

Accounting for structure padding prevents these types of errors.

Code Block
bgColor#ccccff
struct buffer {
    size_t size;
    char buffer[50];
};

...

void func(struct buffer *buf) {

  struct buffer *buf_cpy = malloc((sizeof(struct buffer));
  if (buf_cpy == NULL) {
    /* Handle malloc() error */
  }

  ...

  memcpy(buf_cpy, buf, sizeof(struct buffer));
}

Risk Assessment

Failure to correctly determine the size of a structure can lead to subtle logic errors and buffer overflows.

Rule

Severity

Likelihood

Remediation Cost

Priority

Level

EXP03-A

 

 

 

 

 

References

Wiki Markup
\[[Dowd 06|AA. C References#Dowd 06]\] Chapter 6, "C Language Issues" (Structure Padding 284-287)
\[[ISO/IEC 9899-1999|AA. C References#ISO/IEC 9899-1999]\] Section 6.7.2.1, "Structure and union specifiers"

...