Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

The presence of unused values may indicate significant logic errors. To prevent such errors unused values should be identified and removed from code.

Non-Compliant Code Example

Wiki Markup
In this example, {{p2}} is assigned the value returned by {{bar()}}, but that value is never used. Note this example assumes that {{foo()}} and {{bar()}} return valid pointers \[[DCL30-C|DCL30-C. Do not refer to an object outside of its lifetime]\].

Code Block
bgColor#FFCCCC
int *p1, *p2;
p1 = foo();
p2 = bar();

if(baz())
   return p1;
else
    p2 = p1;
return p2;

Compliant Solution

This example can be corrected many different ways depending on the intent of the programmer. In this compliant solution, p2 is initialized to NULL rather than the result of bar().

Code Block
bgColor#ccccff
int *p1, *p2;
p1 = foo();
p2 = NULL;

if(baz())
   return p1;
else
    p2 = p1;
return p2;

Risk Assessment

The presence of unused values may indicate significant logic errors.

Recommendation

Severity

Likelihood

Remediation Cost

Priority

Level

MSC13-A

1 (low)

1 (unlikely)

2 (medium)

P2

L3

Automated Detection

The Coverity Prevent UNUSED_VALUE checker finds variables that are assigned pointer values returned from a function call but never used.. Coverity Prevent cannot discover all violations of this rule so further verification is necessary.

Related Vulnerabilities

Search for vulnerabilities resulting from the violation of this rule on the CERTwebsite.

References

*Coverity 07 Section 6.1.20, "UNUSED_VALUE"

References
Coverity 07 Coverity Prevent? User's Manual (3.3.0) (2007).