CodeQL documentation

Unterminated variadic call

ID: cpp/unterminated-variadic-call Kind: problem Security severity: 8.8 Severity: warning Precision: medium Tags: - reliability - security - external/cwe/cwe-121 Query suites: - cpp-security-extended.qls - cpp-security-and-quality.qls 

Click to see the query in the CodeQL repository

The program calls a function that expects the variable argument list to be terminated with a sentinel value (typically NULL, 0 or -1). In this case, the sentinel value has been omitted as a final argument. This defect may result in incorrect behavior of the function and unintended stack memory access, leading to incorrect program results, instability, and even vulnerability to buffer overflow style attacks.

Recommendation

Each description of a defect highlighted by this rule includes a suggested value for the terminator. Check that this value is correct, then add it to the end of the call.

Example

#include<stdarg.h>voidpushStrings(char*firstString,...){va_listargs;char*arg;va_start(args,firstString);// process inputs, beginning with firstString, ending when NULL is reachedarg=firstString;while(arg!=NULL){// push the stringpushString(arg);// move on to the next inputarg=va_arg(args,char*);}va_end(args);}voidbadFunction(){pushStrings("hello","world",NULL);// OKpushStrings("apple","pear","banana",NULL);// OKpushStrings("car","bus","train");// BAD, not terminated with the expected NULL}

In this example, the third call to pushStrings is not correctly terminated. This call should be updated to include NULL as the fourth and final argument to this call.

References

  • Common Weakness Enumeration: CWE-121.

close