Some functions return a pointer to an object that cannot be modified without causing undefined behavior. These functions include getenv()
, setlocale()
, localeconv()
, asctime()
, and strerror()
. In such cases, the function call results must be treated as being const
-qualified.
The C Standard, 7.24.4.6, paragraph 4 [ISO/IEC 9899:2024], defines getenv()
as follows:
The
getenv
...
function returns a pointer to a
...
string associated with the matched list member. The string pointed to shall not be modified by the program, but may be overwritten by a subsequent call to the
getenv
function. If the specified
...
name cannot be found
...
, a null pointer is returned.
Do not modify If the value string returned by getenv()
must be altered, a local copy should be created. Altering the string returned by getenv()
is undefined behavior. (See undefined behavior 184.)
Similarly, subclause 7.11.1.1, paragraph 8 [ISO/IEC 9899:2024], defines setlocale()
as follows:
The pointer to string returned by the
setlocale
function
...
Non-Compliant Code Example
This non-compliant code example showing that modification of the string value returned by the function getenv()
. Characters in env
should not be changed directly.
is such that a subsequent call with that string value and its associated category will restore that part of the program's locale. The string pointed to shall not be modified by the program, but may be overwritten by a subsequent call to the
setlocale
function.
And subclause 7.11.2.1, paragraph 8 [ISO/IEC 9899:2024], defines localeconv()
as follows:
The
localeconv
function returns a pointer to the filled-in object. The structure pointed to by the return value shall not be modified by the program, but may be overwritten by a subsequent call to thelocaleconv
function. In addition, calls to thesetlocale
function with categoriesLC_ALL
,LC_MONETARY
, orLC_NUMERIC
may overwrite the contents of the structure.
Altering the string returned by setlocale()
or the structure returned by localeconv()
are undefined behaviors. (See undefined behaviors 120 and 121.) Furthermore, the C Standard imposes no requirements on the contents of the string by setlocale()
. Consequently, no assumptions can be made as to the string's internal contents or structure.
Finally, subclause 7.26.6.3, paragraph 4 [ISO/IEC 9899:2024], states
The
strerror
function returns a pointer to the string, the contents of which are locale-specific. The array pointed to shall not be modified by the program. The behavior is undefined if the returned value is used after a subsequent call to thestrerror
function, or after the thread which called the function to obtain the returned value has exited.
Altering the string returned by strerror()
is undefined behavior. (See undefined behavior 184.)
Noncompliant Code Example (getenv()
)
This noncompliant code example modifies the string returned by getenv()
by replacing all double quotation marks ("
) with underscores (_
):
Code Block | ||||
---|---|---|---|---|
| ||||
#include <stdlib.h>
void trstr(char *c_str, char orig, char rep) {
while (*c_str != '\0') {
if (*c_str == orig) {
*c_str = rep;
}
++c_str;
}
}
void func(void) {
char * | ||||
Code Block | ||||
| ||||
int foo() { char *env; env = getenv("TEST_ENV"); if (env[0] = 'a'; = NULL) { /*Do someHandle moreerror things*/ } return 0trstr(env,'"', '_'); } |
Compliant
...
This is a compliant code solution. If it is necessary to modify the value of the string returned by the function getenv()
, then the programmer should make a local copy of that string value, and then modify the local copy of that string. If it is necessary to propagate the changes back to the environment, use setenv()
.
Solution (getenv()
) (Environment Not Modified)
If the programmer does not intend to modify the environment, this compliant solution demonstrates how to modify a copy of the return value:
Code Block | ||||
---|---|---|---|---|
| ||||
#include <stdlib.h>
#include <string.h>
void trstr(char *c_str, char orig, char rep) {
while (*c_str != '\0') {
if (*c_str == orig) {
*c_str = rep;
}
++c_str;
}
}
void func(void) {
const char *env;
char *copy_of_env;
env = getenv("TEST_ENV");
if (env == NULL) {
/* Handle error */
}
copy_of_env = (char *)malloc(strlen(env) + 1);
if (copy_of_env == NULL) {
/* Handle error */
}
strcpy(copy_of_env, env);
trstr(copy_of_env,'"', '_');
/* ... */
free(copy_of_env);
} |
Compliant Solution (getenv()
) (Modifying the Environment in POSIX)
If the programmer's intent is to modify the environment, this compliant solution, which saves the altered string back into the environment by using the POSIX setenv()
and strdup()
functions, can be used:
Code Block | ||||
---|---|---|---|---|
| ||||
#include <stdlib.h>
#include <string.h>
void trstr(char *c_str, char orig, char rep) {
while (*c_str != '\0') {
if (*c_str == orig) {
*c_str = rep;
}
++c_str;
}
}
void func(void) {
const | ||||
Code Block | ||||
| ||||
int foo() { char *env; char *copy_of_env; env = getenv("TEST_ENV"); if (env == NULL) { /* Handle error */ } copy_of_env = mallocstrdup( strlen(env) + 1 );env); if (copy_of_env == NULL) { /* ErrorHandle handlingerror */ } strcpytrstr(copy_of_env,'"', '_'); if (setenv("TEST_ENV", copy_of_env); , 1) != 0) { /* Handle error */ } /* ... */ free(copy_of_env); } |
Noncompliant Code Example (localeconv()
)
In this noncompliant example, the object returned by localeconv()
is directly modified:
Code Block | ||||
---|---|---|---|---|
| ||||
#include <locale.h> void f2(void) { struct lconv *conv = localeconv(); if ('\0' == conv->decimal_point[0]) { conv->decimal_point = 'a'; "."; } } |
Compliant Solution (localeconv()
) (Copy)
This compliant solution modifies a copy of the object returned by localeconv()
:
Code Block | ||||
---|---|---|---|---|
| ||||
#include <locale.h> #include <stdlib.h> #include <string.h> void f2(void) { const struct lconv *conv = localeconv(); if (conv == NULL) { /*Do someHandle moreerror things*/ } struct lconv *copy_of_conv = (struct lconv *)malloc( sizeof(struct lconv)); if (copy_of_conv == NULL) { /* Handle error */ return 0; } |
Risk Assessment
The system will not be able to properly keep track of the size of environment variables, leading to memory management exploits.
}
memcpy(copy_of_conv, conv, sizeof(struct lconv));
if ('\0' == copy_of_conv->decimal_point[0]) {
copy_of_conv->decimal_point = ".";
}
/* ... */
free(copy_of_conv);
} |
Risk Assessment
Modifying the object pointed to by the return value of getenv()
, setlocale()
, localeconv()
, asctime()
, or strerror()
is undefined behavior. Even if the modification succeeds, the modified object can be overwritten by a subsequent call to the same function.
Rule | Severity | Likelihood |
---|
Rule
Severity
Remediation Cost | Priority | Level | |
---|---|---|---|
ENV30-C |
3 (high)
3 (probable)
3 (low)
P27
L1
References
Low | Probable | Medium | P4 | L3 |
Automated Detection
Tool | Version | Checker | Description | ||||||
---|---|---|---|---|---|---|---|---|---|
Astrée |
| stdlib-const-pointer-assign | Partially checked | ||||||
Axivion Bauhaus Suite |
| CertC-ENV30 | |||||||
CodeSonar |
| BADFUNC.GETENV | Use of getenv | ||||||
Compass/ROSE | Can detect violations of this rule. In particular, it ensures that the result of | ||||||||
Cppcheck Premium |
| premium-cert-env30-c | Fully implemented | ||||||
Helix QAC |
| C1492, C1493, C1494 DF4751, DF4752, DF4753 | |||||||
Klocwork |
| MISRA.STDLIB.CTYPE.RANGE.2012_AMD1 | |||||||
LDRA tool suite |
| 107 D | Partially Implemented | ||||||
Parasoft C/C++test |
| CERT_C-ENV30-a | The pointers returned by the Standard Library functions 'localeconv', 'getenv', 'setlocale' or, 'strerror' shall only be used as if they have pointer to const-qualified type | ||||||
Polyspace Bug Finder |
| Checks for modification of internal buffer returned from nonreentrant standard function (rule fully covered) | |||||||
PVS-Studio |
| V675 | |||||||
RuleChecker |
| stdlib-const-pointer-assign | Partially checked |
Related Vulnerabilities
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
Related Guidelines
Key here (explains table format and definitions)
Taxonomy | Taxonomy item | Relationship |
---|---|---|
ISO/IEC TS 17961:2013 | Modifying the string returned by getenv , localeconv , setlocale , and strerror [libmod] | Prior to 2018-01-12: CERT: Unspecified Relationship |
Bibliography
[IEEE Std 1003.1:2013] | XSH, System Interfaces, getenv XSH, System Interfaces, setlocale XSH, System Interfaces, localeconv |
[ISO/IEC 9899:2024] | 7.11.1.1, "The setlocale Function"7.11.2.1, "The localeconv Function"7.24.4.6, "The getenv Function"7.26.6.3, "The strerror Function" |
...
\[[ISO/IEC 9899-1999|AA. C References#ISO/IEC 9899-1999]\] Section 7.20.4.5, "The {{getenv}} function"
\[[Open Group 04|AA. C References#Open Group 04]\] [getenv|http://www.opengroup.org/onlinepubs/000095399/functions/getenv.html] Wiki Markup