Variable length arrays (VLAs), a conditionally supported language feature, are essentially the same as traditional C arrays except that they are declared with a size that is not a constant integer expression and can be declared only at block scope or function prototype scope and no linkage. When supported, a variable length array can be declared
{ /* Block scope */ char vla[size]; }
where the integer expression size
and the declaration of vla
are both evaluated at runtime. If the size argument supplied to a variable length array is not a positive integer value, the behavior is undefined (see undefined behavior 75). Additionally, if the magnitude of the argument is excessive, the program may behave in an unexpected way. An attacker may be able to leverage this behavior to overwrite critical program data [Griffiths 2006]. The programmer must ensure that size arguments to variable length arrays, especially those derived from untrusted data, are in a valid range.
Because variable length arrays are a conditionally supported feature of C11, their use in portable code should be guarded by testing the value of the macro __STDC_NO_VLA__
. Implementations that do not support variable length arrays indicate so by setting __STDC_NO_VLA__
to the integer constant 1.
Noncompliant Code Example
In this noncompliant code example, a variable length array of size size
is declared. The size
is declared as size_t
in compliance with INT01-C. Use rsize_t or size_t for all integer values representing the size of an object.
#include <stddef.h> extern void do_work(int *array, size_t size); void func(size_t size) { int vla[size]; do_work(vla, size); }
However, the value of size
may be zero or excessive, potentially giving rise to a security vulnerability.
Compliant Code Solution
This compliant solution ensures the size
argument used to allocate vla
is in a valid range (between 1 and a programmer-defined maximum); otherwise, it uses an algorithm that relies on dynamic memory allocation. The solution also avoids unsigned integer wrapping that, given a sufficiently large value of size
, would cause malloc
to allocate insufficient storage for the array.
#include <stdint.h> #include <stdlib.h> enum { MAX_ARRAY = 1024 }; extern void do_work(int *array, size_t size); void func(size_t size) { if (0 == size || SIZE_MAX / sizeof(int) < size) { /* Handle error */ return; } if (size < MAX_ARRAY) { int vla[size]; do_work(vla, size); } else { int *array = (int *)malloc(size * sizeof(int)); if (array == NULL) { /* Handle error */ } do_work(array, size); free(array); } }
Noncompliant Code Example (sizeof
)
The following noncompliant code example defines A
to be a variable length array type and then uses the sizeof
operator to compute its size at runtime. When the function is called with an argument greater than SIZE_MAX / (N * sizeof (int)
), the runtime sizeof
expression may wrap around, yielding a result that is smaller than the mathematical product N * n * sizeof (int)
. The call to malloc, when successful, will then allocate storage for fewer than n
elements of the array, causing one of the final memset
calls in the for
loop to write past the end of that storage.
#include <stdlib.h> #include <string.h> enum { N = 4096 }; void* func(size_t n) { typedef int A [n][N]; A *array = malloc(sizeof (A)); for (size_t i = 0; i != n; ++i) memset(array [i], 0, N * sizeof (int)); return array; }
Compliant Code Solution (sizeof
)
This compliant solution prevents sizeof
wrapping by detecting the condition before it occurs and avoiding the subsequent computation when the condition is detected.
#include <stdlib.h> #include <string.h> enum { N = 4096 }; void* func(size_t n) { if (n > SIZE_MAX / (N * sizeof (int))) { /* Prevent sizeof wrapping */ return NULL; } typedef int A [n][N]; A *array = malloc(sizeof (A)); if (array == NULL) { /* Handle malloc failure */ return NULL; } for (size_t i = 0; i != n; ++i) memset(array [i], 0, N * sizeof (int)); return array; }
Implementation Details
Microsoft
Variable length arrays are not supported by Microsoft compilers.
Risk Assessment
Failure to properly specify the size of a variable length array may allow arbitrary code execution or result in stack exhaustion.
Rule | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
ARR32-C | High | Probable | High | P6 | L2 |
Automated Detection
Tool | Version | Checker | Description |
---|---|---|---|
Coverity | 6.5 | REVERSE_NEGATIVE | Fully implemented |
LDRA tool suite | 9.7.1 | 621 S | Enhanced enforcement |
PRQA QA-C | Unable to render {include} The included page could not be found. | 1051 | Partially implemented |
Cppcheck | 2.15 | negativeArraySize | Context sensitive analysis |
Related Vulnerabilities
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
Related Guidelines
CERT C Secure Coding Standard | INT01-C. Use rsize_t or size_t for all integer values representing the size of an object |
ISO/IEC TR 24772:2013 | Unchecked Array Indexing [XYZ] |
ISO/IEC TS 17961:2013 | Tainted, potentially mutilated, or out-of-domain integer values are used in a restricted sink [taintsink] |
Bibliography