CERT-SEI

The CERT C Coding Standard, Second Edition

The CERT C Coding Standard: 98 Rules for Developing Safe, Reliable, and Secure Systems, Second EditionSecure programming in C can be more difficult than even many experienced programmers realize. To help programmers write more secure code, The CERT C Coding Standard, Second Edition, fully documents the second official release of the CERT standard for secure coding in C. The rules laid forth in this new edition help programmers ensure that their code fully complies with the new C11 standard; it also addresses earlier versions, including C99.

The new standard itemizes coding errors that are the root causes of current software vulnerabilities in C, prioritizing them by severity, likelihood of exploitation, and remediation costs. Each of the text's 98 guidelines includes examples of insecure code as well as secure, C11-conforming, alternative implementations. If uniformly applied, these guidelines eliminate critical coding errors that lead to buffer overflows, format-string vulnerabilities, integer overflow, and other common vulnerabilities.

Author Robert C. Seacord covers all aspects of the new standard, including best solutions, compliant solutions, and pertinent language and library extensions. He also offers advice on issues ranging from tools and testing to risk assessment.

This book reflects numerous experts' contributions to the open development and review of the rules and recommendations that comprise this standard. Coverage includes proprocessor, declarations and initialization, expressions, integers, floating point, arrays, characters and strings, memory management, input/output, environment, signals, error handling, concurrency, and miscellaneous issues.

Read the book's preface to learn more about the book and if it will meet your needs.

In Accessing Shared Atomic Objects from within a Signal Handler in C, an informIT article from April 2014, Robert Seacord describes how accessing shared objects in signal handlers can result in race conditions that can leave data in an inconsistent state.

Related Training, Products, and Tools

Secure Coding in C and C++ Training Course
This four-day course provides a detailed explanation of common programming errors in C and C++ and describes how these errors can lead to code that is vulnerable to exploitation. The course concentrates on security issues intrinsic to the C and C++ programming languages and associated libraries. The intent is for this course to be useful to anyone involved in developing secure C and C++ programs regardless of the specific application.

Secure Coding Training Course
An ongoing development effort in collaboration with the Software Engineering Institute's CERT Division, this course focuses on common security issues in C and C++ development. With security expert Robert Seacord serving as lead content author, the course addresses a key need in professional education for software developers. Topics to be covered include the secure and insecure use of integers, arrays, strings, dynamic memory, formatted input/output functions, and file I/O. Continued development is being funded by partnerships with industry.

Source Code Analysis Laboratory (SCALe)
SCALe consists of commercial, open source, and experimental analysis that is used to analyze various code bases, including those from the DoD, energy delivery systems, medical devices, and more. SCALe provides value to the customer, but it also aids research into the effectiveness of coding rules and analysis.

Rosecheckers Tool
The CERT Division's Rosecheckers tool performs static analysis on C/C++ source files. It is designed to enforce the rules in the CERT C Coding standard.

Integer Security Tool
The CERT Division's Secure Coding researchers are working on a number of solutions for addressing the issue of integer security, including our prototype tool and a secure integer library.

Robert Seacord in 2012Robert C. Seacord is a computer scientist, computer security specialist, and writer. He is the author of books on computer security, legacy system modernization, and component-based software engineering. He has a bachelor's degree in computer science from Rensselaer Polytechnic Institute.

Seacord manages the Secure Coding Initiative at the CERT Division, which is part of Carnegie Mellon University's Software Engineering Institute (SEI) in Pittsburgh, PA. The CERT Division, among other security related activities, regularly analyzes software vulnerability reports and assesses the risk to the internet and other critical infrastructure. Robert is an adjunct professor in the Carnegie Mellon University School of Computer Science and also in the Information Networking Institute.

Robert started programming professionally for IBM in 1982, working in communications and operating system software, processor development, and software engineering. Robert also has worked at the X Consortium, where he developed and maintained code for the Common Desktop Environment and the X Window System.

Preface

Chapter 1 Preprocessor (PRE)
PRE30-C. Do not create a universal character name through concatenation
PRE31-C. Do not perform side effects in arguments to unsafe macros
PRE32-C. Do not use preprocessor directives inside macro arguments

Chapter 2 Declarations and Initialization (DCL)
DCL30-C. Declare objects with appropriate storage durations
DCL31-C. Declare identifiers before using them
DCL36-C. Do not declare an identifier with conflicting linkage classifications
DCL37-C. Do not declare or define a reserved identifier
DCL38-C. Use the correct syntax when declaring flexible array members
DCL39-C. Avoid information leak in structure padding
DCL40-C. Do not create incompatible declarations of the same function or object
DCL41-C. Do not declare variables inside a switch statement before the first case label

Chapter 3 Expressions (EXP)
EXP30-C. Do not depend on order of evaluation for side effects
EXP32-C. Do not access a volatile object through a nonvolatile reference
EXP33-C. Do not read uninitialized memory
EXP34-C. Do not dereference null pointers
EXP35-C. Do not modify objects with temporary lifetime
EXP36-C. Do not convert pointers into more strictly aligned pointer types
EXP37-C. Call functions with the correct number and type of arguments
EXP39-C. Do not access a variable through a pointer of an incompatible type
EXP40-C. Do not modify constant objects
EXP42-C. Do not compare padding data
EXP43-C. Avoid undefined behaviors when using restrict-qualified pointers
EXP44-C. Do not use side effects in operands to sizeof, _Alignof, or _Generic
EXP45-C. Do not perform assignments in selection statements

Chapter 4 Integers (INT)
INT30-C. Ensure that unsigned integer operations do not wrap
INT31-C. Ensure that integer conversions do not result in lost or misinterpreted data
INT32-C. Ensure that operations on signed integers do not result in overflow
INT33-C. Ensure that division and remainder operations do not result in divide-by-zero errors
INT34-C. Do not shift a negative number of bits or more bits than exist in the operand
INT35-C. Use correct integer precisions
INT36-C. Converting a pointer to integer or integer to pointer

Chapter 5 Floating Point (FLP)
FLP30-C. Do not use floating-point variables as loop counters
FLP32-C. Prevent or detect domain and range errors in math functions
FLP34-C. Ensure that floating-point conversions are within range of the new type
FLP36-C. Preserve precision when converting integral values to floating-point type
FLP37-C. Cast the return value of a function that returns a floating-point type

Chapter 6 Arrays (ARR)
ARR30-C. Do not form or use out-of-bounds pointers or array subscripts
ARR32-C. Ensure size arguments for variable length arrays are in a valid range
ARR36-C. Do not subtract or compare two pointers that do not refer to the same array
ARR37-C. Do not add or subtract an integer to a pointer to a non-array object
ARR38-C. Guarantee that library functions do not form invalid pointers
ARR39-C. Do not add or subtract a scaled integer to a pointer

Chapter 7 Characters and Strings (STR)
STR30-C. Do not attempt to modify string literals
STR31-C. Guarantee that storage for strings has sufficient space for character data and the null terminator
STR32-C. Do not pass a non-null-terminated character sequence to a library function that expects a string
STR34-C. Cast characters to unsigned char before converting to larger integer sizes
STR37-C. Arguments to character-handling functions must be representable as an unsigned char
STR38-C. Do not confuse narrow and wide character strings and functions

Chapter 8 Memory Management (MEM)
MEM30-C. Do not access freed memory
MEM31-C. Free dynamically allocated memory when no longer needed
MEM33-C. Allocate and copy structures containing flexible array members dynamically
MEM34-C. Only free memory allocated dynamically
MEM35-C. Allocate sufficient memory for an object
MEM36-C. Do not modify the alignment of space by calling realloc()

Chapter 9 Input Output (FIO)
FIO30-C. Exclude user input from format strings
FIO31-C. Do not open a file that is already open
FIO32-C. Do not perform operations on devices that are only appropriate for files
FIO34-C. Distinguish between characters read from a file and EOF or WEOF
FIO37-C. Do not assume that fgets() or fgetws() returns a nonempty string when successful
FIO38-C. Do not copy a FILE object
FIO39-C. Do not alternately input and output from a stream without an intervening flush or positioning call
FIO40-C. Reset strings on fgets() or fgetws() failure
FIO41-C. Do not call getc(), putc(), getwc(), or putwc() with stream arguments that have side effects
FIO42-C. Close files when they are no longer needed
FIO44-C. Only use values for fsetpos() that are returned from fgetpos()
FIO45-C. Avoid TOCTOU race conditions while accessing files
FIO46-C. Do not access a closed file

Chapter 10 Environment (ENV)
ENV30-C. Do not modify the object referenced by the return value of certain functions
ENV31-C. Do not rely on an environment pointer following an operation that may invalidate it
ENV32-C. All exit handlers must return normally
ENV33-C. Do not call system()
ENV34-C. Do not store pointers returned by certain functions

Chapter 11 Signals (SIG)
SIG30-C. Call only asynchronous-safe functions within signal handlers
SIG31-C. Do not access shared objects in signal handlers
SIG34-C. Do not call signal() from within interruptible signal handlers
SIG35-C. Do not return from a computational exception signal handler

Chapter 12 Error Handling (ERR)
ERR30-C.   Set errno to zero before calling a library function known to set errno,   and check errno only after the function returns a value indicating   failure
ERR32-C. Do not rely on indeterminate values of errno
ERR33-C. Detect and handle standard library errors

Chapter 13 Concurrency (CON)
CON30-C. Clean up thread-specific storage
CON31-C. Do not destroy a mutex while it is locked
CON32-C. Prevent data races when accessing bit-fields from multiple threads
CON33-C. Avoid race conditions when using library functions
CON34-C. Declare objects shared between threads with appropriate storage durations
CON35-C. Avoid deadlock by locking in a predefined order
CON36-C. Wrap functions that can spuriously wake up in a loop
CON37-C. Do not call signal() in a multithreaded program
CON38-C. Notify all threads waiting on a condition variable
CON39-C. Do not join or detach a thread that was previously joined or detached
CON40-C. Do not refer to an atomic variable twice in an expression
CON41-C. Wrap functions that can fail spuriously in a loop

Chapter 14 Miscellaneous (MSC)
MSC30-C. Do not use the rand() function for generating pseudorandom numbers
MSC32-C. Properly seed pseudorandom number generators
MSC33-C. Do not pass invalid data to the asctime() function
MSC37-C. Ensure that control never reaches the end of a non-void function
MSC38-C. Do not treat a predefined identifier as an object if it might only be implemented as a macro
MSC39-C. Do not call va_arg() on a va_list that has an indeterminate value
MSC40-C. Do not violate constraints

Bibliography
A. Glossary
B. Undefined Behavior
C. Unspecified Behavior