GitHub
CERT Secure Coding

ERR33-C. Detect and handle standard library errors

The majority of the standard library functions, including I/O functions and memory allocation functions, return either a valid value or a value of the correct return type that indicates an error (for example, −1 or a null pointer). Assuming that all calls to such functions will succeed and failing to check the return value for an indication of an error is a dangerous practice that may lead to unexpected or undefined behavior when an error occurs. It is essential that programs detect and appropriately handle all errors in accordance with an error-handling policy.

The successful completion or failure of each of the standard library functions listed in the following table shall be determined either by comparing the function’s return value with the value listed in the column labeled “Error Return” or by calling one of the library functions mentioned in the footnotes.

Standard Library Functions

FunctionSuccessful ReturnError Return
aligned_alloc () Pointer to spaceNULL
asctime_s () 0 Nonzero
at_quick_exit () 0 Nonzero
atexit () 0 Nonzero
bsearch () Pointer to matching elementNULL
bsearch_s () Pointer to matching elementNULL
btowc () Converted wide characterWEOF
c16rtomb () Number of bytes(size_t)(-1)
c32rtomb () Number of bytes(size_t)(-1)
calloc () Pointer to spaceNULL
clock () Processor time(clock_t)(-1)
cnd_broadcast () thrd_success thrd_error
cnd_init () thrd_success thrd_nomem or thrd_error
cnd_signal () thrd_success thrd_error
cnd_timedwait () thrd_success thrd_timedout or thrd_error
cnd_wait () thrd_success thrd_error
ctime_s () 0 Nonzero
fclose () 0 EOF (negative)
fflush () 0 EOF (negative)
fgetc () Character readEOF 1
fgetpos () 0 Nonzero, errno > 0
fgets () Pointer to stringNULL
fgetwc () Wide character readWEOF 1
fopen () Pointer to streamNULL
fopen_s () 0 Nonzero
fprintf () Number of characters (nonnegative)Negative
fprintf_s () Number of characters (nonnegative)Negative
fputc () Character writtenEOF 2
fputs () NonnegativeEOF (negative)
fputwc()Wide character writtenWEOF
fputws () NonnegativeEOF (negative)
fread () Elements readElements read
freopen () Pointer to streamNULL
freopen_s () 0 Nonzero
fscanf () Number of conversions (nonnegative)EOF (negative)
fscanf_s () Number of conversions (nonnegative)EOF (negative)
fseek () 0 Nonzero
fsetpos () 0 Nonzero, errno > 0
ftell () File position−1L , errno > 0
fwprintf () Number of wide characters (nonnegative)Negative
fwprintf_s () Number of wide characters (nonnegative)Negative
fwrite () Elements writtenElements written
fwscanf () Number of conversions (nonnegative)EOF (negative)
fwscanf_s () Number of conversions (nonnegative)EOF (negative)
getc () Character readEOF 1
getchar () Character readEOF 1
getenv () Pointer to stringNULL
getenv_s () Pointer to stringNULL
gets_s () Pointer to stringNULL
getwc () Wide character readWEOF
getwchar () Wide character readWEOF
gmtime () Pointer to broken-down timeNULL
gmtime_s () Pointer to broken-down timeNULL
localtime () Pointer to broken-down timeNULL
localtime_s () Pointer to broken-down timeNULL
malloc () Pointer to spaceNULL
mblen () , s != NULL Number of bytes−1
mbrlen () , s != NULL Number of bytes or status(size_t)(-1)
mbrtoc16 () Number of bytes or status(size_t)(-1) , errno == EILSEQ
mbrtoc32 () Number of bytes or status(size_t)(-1) , errno == EILSEQ
mbrtowc () , s != NULL Number of bytes or status(size_t)(-1) , errno == EILSEQ
mbsrtowcs () Number of non-null elements(size_t)(-1) , errno == EILSEQ
mbsrtowcs_s () 0 Nonzero
mbstowcs () Number of non-null elements(size_t)(-1)
mbstowcs_s () 0 Nonzero
mbtowc () , s != NULL Number of bytes−1
memchr () Pointer to located characterNULL
mktime () Calendar time(time_t)(-1)
mtx_init () thrd_success thrd_error
mtx_lock () thrd_success thrd_error
mtx_timedlock () thrd_success thrd_timedout or thrd_error
mtx_trylock () thrd_success thrd_busy or thrd_error
mtx_unlock () thrd_success thrd_error
printf_s () Number of characters (nonnegative)Negative
putc () Character writtenEOF 2
putwc () Wide character writtenWEOF
raise () 0 Nonzero
realloc () Pointer to spaceNULL
remove () 0 Nonzero
rename () 0 Nonzero
setlocale () Pointer to stringNULL
setvbuf () 0 Nonzero
scanf () Number of conversions (nonnegative)EOF (negative)
scanf_s () Number of conversions (nonnegative)EOF (negative)
signal () Pointer to previous functionSIG_ERR , errno > 0
snprintf () Number of characters that would be written (nonnegative)Negative
snprintf_s () Number of characters that would be written (nonnegative)Negative
sprintf () Number of non-null characters writtenNegative
sprintf_s () Number of non-null characters writtenNegative
sscanf () Number of conversions (nonnegative)EOF (negative)
sscanf_s () Number of conversions (nonnegative)EOF (negative)
strchr () Pointer to located characterNULL
strerror_s () 0 Nonzero
strftime () Number of non-null characters0
strpbrk () Pointer to located characterNULL
strrchr () Pointer to located characterNULL
strstr () Pointer to located stringNULL
strtod () Converted value0 , errno == ERANGE
strtof () Converted value0 , errno == ERANGE
strtoimax () Converted valueINTMAX_MAX or INTMAX_MIN , errno == ERANGE
strtok () Pointer to first character of a tokenNULL
strtok_s () Pointer to first character of a tokenNULL
strtol () Converted valueLONG_MAX or LONG_MIN , errno == ERANGE
strtold () Converted value 0, errno == ERANGE
strtoll () Converted valueLLONG_MAX or LLONG_MIN , errno == ERANGE
strtoumax () Converted valueUINTMAX_MAX , errno == ERANGE
strtoul () Converted valueULONG_MAX , errno == ERANGE
strtoull () Converted valueULLONG_MAX , errno == ERANGE
strxfrm () Length of transformed string >= n
swprintf () Number of non-null wide charactersNegative
swprintf_s () Number of non-null wide charactersNegative
swscanf () Number of conversions (nonnegative)EOF (negative)
swscanf_s () Number of conversions (nonnegative)EOF (negative)
thrd_create () thrd_success thrd_nomem or thrd_error
thrd_detach () thrd_success thrd_error
thrd_join () thrd_success thrd_error
thrd_sleep () 0 Negative
time () Calendar time(time_t)(-1)
timespec_get () Base0
tmpfile () Pointer to streamNULL
tmpfile_s () 0 Nonzero
tmpnam () Non-null pointerNULL
tmpnam_s () 0 Nonzero
tss_create () thrd_success thrd_error
tss_get () Value of thread-specific storage0
tss_set () thrd_success thrd_error
ungetc () Character pushed backEOF (see below )
ungetwc () Character pushed backWEOF
vfprintf () Number of characters (nonnegative)Negative
vfprintf_s () Number of characters (nonnegative)Negative
vfscanf () Number of conversions (nonnegative)EOF (negative)
vfscanf_s () Number of conversions (nonnegative)EOF (negative)
vfwprintf () Number of wide characters (nonnegative)Negative
vfwprintf_s () Number of wide characters (nonnegative)Negative
vfwscanf () Number of conversions (nonnegative)EOF (negative)
vfwscanf_s () Number of conversions (nonnegative)EOF (negative)
vprintf_s () Number of characters (nonnegative)Negative
vscanf () Number of conversions (nonnegative)EOF (negative)
vscanf_s () Number of conversions (nonnegative)EOF (negative)
vsnprintf () Number of characters that would be written (nonnegative)Negative
vsnprintf_s () Number of characters that would be written (nonnegative)Negative
vsprintf () Number of non-null characters (nonnegative)Negative
vsprintf_s () Number of non-null characters (nonnegative)Negative
vsscanf () Number of conversions (nonnegative)EOF (negative)
vsscanf_s () Number of conversions (nonnegative)EOF (negative)
vswprintf () Number of non-null wide charactersNegative
vswprintf_s () Number of non-null wide charactersNegative
vswscanf () Number of conversions (nonnegative)EOF (negative)
vswscanf_s () Number of conversions (nonnegative)EOF (negative)
vwprintf_s () Number of wide characters (nonnegative)Negative
vwscanf () Number of conversions (nonnegative)EOF (negative)
vwscanf_s () Number of conversions (nonnegative)EOF (negative)
wcrtomb () Number of bytes stored(size_t)(-1)
wcschr () Pointer to located wide characterNULL
wcsftime () Number of non-null wide characters0
wcspbrk () Pointer to located wide characterNULL
wcsrchr () Pointer to located wide characterNULL
wcsrtombs () Number of non-null bytes(size_t)(-1) , errno == EILSEQ
wcsrtombs_s () 0 Nonzero
wcsstr () Pointer to located wide stringNULL
wcstod () Converted value0 , errno == ERANGE
wcstof () Converted value0 , errno == ERANGE
wcstoimax () Converted valueINTMAX_MAX or INTMAX_MIN , errno == ERANGE
wcstok () Pointer to first wide character of a tokenNULL
wcstok_s () Pointer to first wide character of a tokenNULL
wcstol () Converted valueLONG_MAX or LONG_MIN , errno == ERANGE
wcstold () Converted value0 , errno == ERANGE
wcstoll () Converted valueLLONG_MAX or LLONG_MIN , errno == ERANGE
wcstombs () Number of non-null bytes(size_t)(-1)
wcstombs_s () 0 Nonzero
wcstoumax () Converted valueUINTMAX_MAX , errno == ERANGE
wcstoul () Converted valueULONG_MAX , errno == ERANGE
wcstoull () Converted valueULLONG_MAX , errno == ERANGE
wcsxfrm () Length of transformed wide string >= n
wctob () Converted characterEOF
wctomb () , s != NULL Number of bytes stored−1
wctomb_s () , s != NULL Number of bytes stored−1
wctrans () Valid argument to towctrans0
wctype () Valid argument to iswctype0
wmemchr () Pointer to located wide characterNULL
wprintf_s () Number of wide characters (nonnegative)Negative
wscanf () Number of conversions (nonnegative)EOF (negative)
wscanf_s () Number of conversions (nonnegative)EOF (negative)

Note: According to FIO35-C . Use feof() and ferror() to detect end-of-file and file errors when sizeof(int) == sizeof(char) , callers should verify end-of-file and file errors for the functions in this table as follows:

1 By calling ferror() and feof() 2 By calling ferror()

The ungetc() function does not set the error indicator even when it fails, so it is not possible to check for errors reliably unless it is known that the argument is not equal to EOF .

The C Standard 7.31.3.10 paragraph 3 [ ISO/IEC 9899:2024 ] states that

)ne wide character of pushback is guaranteed...

so this should not be an issue if, at most, one character is ever pushed back before reading again. (See FIO13-C . Never push back anything other than one read character .)

Noncompliant Code Example ( setlocale() )

In this noncompliant code example, the function utf8_to_wcs() attempts to convert a sequence of UTF-8 characters to wide characters . It first invokes setlocale() to set the global locale to the implementation-defined en_US.UTF-8 but does not check for failure. The setlocale() function will fail by returning a null pointer, for example, when the locale is not installed. The function may fail for other reasons as well, such as the lack of resources.  Depending on the sequence of characters pointed to by utf8 , the subsequent call to mbstowcs() may fail or result in the function storing an unexpected sequence of wide characters in the supplied buffer wcs .

Non-compliant code
#include <locale.h>
#include <stdlib.h>
 
int utf8_to_wcs(wchar_t *wcs, size_t n, const char *utf8,
                size_t *size) {
  if (NULL == size) {
    return -1;
  }
  setlocale(LC_CTYPE, "en_US.UTF-8");
  *size = mbstowcs(wcs, utf8, n);
  return 0;
}

Compliant Solution ( setlocale() )

This compliant solution checks the value returned by setlocale() and avoids calling mbstowcs() if the function fails. The function also takes care to restore the locale to its initial setting before returning control to the caller.

Compliant code
#include <locale.h>
#include <stdlib.h>
 
int utf8_to_wcs(wchar_t *wcs, size_t n, const char *utf8,
                size_t *size) {
  if (NULL == size) {
    return -1;
  }
  const char *save = setlocale(LC_CTYPE, "en_US.UTF-8");
  if (NULL == save) {
    return -1;
  }

  *size = mbstowcs(wcs, utf8, n);
  if (NULL == setlocale(LC_CTYPE, save)) {
    return -1;
  }
  return 0;
}

Noncompliant Code Example ( calloc() )

In this noncompliant code example, temp_num , tmp2 , and num_of_records are derived from a tainted source . Consequently, an attacker can easily cause calloc() to fail by providing a large value for num_of_records .

Non-compliant code
#include <stdlib.h>
#include <string.h>
 
enum { SIG_DESC_SIZE = 32 };

typedef struct {
  char sig_desc[SIG_DESC_SIZE];
} signal_info;
 
void func(size_t num_of_records, size_t temp_num,
          const char *tmp2, size_t tmp2_size_bytes) {
  signal_info *start = (signal_info *)calloc(num_of_records,
                                          sizeof(signal_info));

  if (tmp2 == NULL) {
    /* Handle error */
  } else if (temp_num > num_of_records || temp_num == 0) {
    /* Handle error */
  } else if (tmp2_size_bytes < SIG_DESC_SIZE) {
    /* Handle error */
  }

  signal_info *point = start + temp_num - 1;
  memcpy(point->sig_desc, tmp2, SIG_DESC_SIZE);
  point->sig_desc[SIG_DESC_SIZE - 1] = '\0';
  /* ... */
  free(start);
}

When calloc() fails, it returns a null pointer that is assigned to start . If start is null, an attacker can provide a value for temp_num that, when scaled by sizeof(signal_info) , references a writable address to which control is eventually transferred. The contents of the string referenced by tmp2 can then be used to overwrite the address, resulting in an arbitrary code execution vulnerability .

Compliant Solution ( calloc() )

To correct this error, ensure the pointer returned by calloc() is not null:

Compliant code
#include <stdlib.h>
#include <string.h>

enum { SIG_DESC_SIZE = 32 };

typedef struct {
  char sig_desc[SIG_DESC_SIZE];
} signal_info;
 
void func(size_t num_of_records, size_t temp_num,
          const char *tmp2, size_t tmp2_size_bytes) {
  signal_info *start = (signal_info *)calloc(num_of_records,
                                           sizeof(signal_info));
  if (start == NULL) {
    /* Handle allocation error */
  } else if (tmp2 == NULL) {
    /* Handle error */
  } else if (temp_num > num_of_records || temp_num == 0) {
    /* Handle error */
  } else if (tmp2_size_bytes < SIG_DESC_SIZE) {
    /* Handle error */
  }

  signal_info *point = start + temp_num - 1; 
  memcpy(point->sig_desc, tmp2, SIG_DESC_SIZE);
  point->sig_desc[SIG_DESC_SIZE - 1] = '\0';
  /* ... */
  free(start);
}

Noncompliant Code Example ( realloc() )

This noncompliant code example calls realloc() to resize the memory referred to by p . However, if realloc() fails, it returns a null pointer and the connection between the original block of memory and p is lost, resulting in a memory leak.

Non-compliant code
#include <stdlib.h>
 
void *p;
void func(size_t new_size) {
  if (new_size == 0) {
    /* Handle error */
  }
  p = realloc(p, new_size);
  if (p == NULL) {
   /* Handle error */
  }
}

This code example complies with MEM04-C . Do not perform zero-length allocations .

Compliant Solution ( realloc() )

In this compliant solution, the result of realloc() is assigned to the temporary pointer q and validated before it is assigned to the original pointer p :

Compliant code
#include <stdlib.h>
 
void *p;
void func(size_t new_size) {
  void *q;

  if (new_size == 0) {
    /* Handle error */
  }
 
  q = realloc(p, new_size);
  if (q == NULL) {
   /* Handle error */
  } else {
    p = q;
  }
}

Noncompliant Code Example ( fseek() )

In this noncompliant code example, the fseek() function is used to set the file position to a location offset in the file referred to by file prior to reading a sequence of bytes from the file. However, if an I/O error occurs during the seek operation, the subsequent read will fill the buffer with the wrong contents.

Non-compliant code
#include <stdio.h>
 
size_t read_at(FILE *file, long offset,
               void *buf, size_t nbytes) {
  fseek(file, offset, SEEK_SET);
  return fread(buf, 1, nbytes, file);
}

Compliant Solution ( fseek() )

According to the C Standard, the fseek() function returns a nonzero value to indicate that an error occurred. This compliant solution tests for this condition before reading from a file to eliminate the chance of operating on the wrong portion of the file if fseek() fails:

Compliant code
#include <stdio.h>
 
size_t read_at(FILE *file, long offset,
               void *buf, size_t nbytes) {
  if (fseek(file, offset, SEEK_SET) != 0) {
    /* Indicate error to caller */
    return 0;
  }
  return fread(buf, 1, nbytes, file);
}

Noncompliant Code Example ( snprintf() )

In this noncompliant code example, snprintf() is assumed to succeed. However, if the call fails (for example, because of insufficient memory, as described in GNU libc bug 441945 ), the subsequent call to log_message() has undefined behavior 174 because the character buffer is uninitialized and need not be null-terminated.

Non-compliant code
#include <stdio.h>
 
extern void log_message(const char *);

void f(int i, int width, int prec) {
  char buf[40];
  snprintf(buf, sizeof(buf), "i = %*.*i", width, prec, i);
  log_message(buf);
  /* ... */
}

Compliant Solution ( snprintf() )

This compliant solution does not assume that snprintf() will succeed regardless of its arguments. It tests the return value of snprintf() before subsequently using the formatted buffer. This compliant solution also treats the case where the static buffer is not large enough for snprintf() to append the terminating null character as an error.

Compliant code
#include <stdio.h>
#include <string.h>
 
extern void log_message(const char *);

void f(int i, int width, int prec) {
  char buf[40];
  int n;
  n = snprintf(buf, sizeof(buf), "i = %*.*i", width, prec, i);
  if (n < 0 || n >= sizeof(buf)) {
    /* Handle snprintf() error */
    strcpy(buf, "unknown error");
  }
  log_message(buf);
}

Compliant Solution ( snprintf( null ) )

If unknown, the length of the formatted string can be discovered by invoking snprintf() with a null buffer pointer to determine the size required for the output, then dynamically allocating a buffer of sufficient size, and finally calling snprintf() again to format the output into the dynamically allocated buffer. Even with this approach, the success of all calls still needs to be tested, and any errors must be appropriately handled. A possible optimization is to first attempt to format the string into a reasonably small buffer allocated on the stack and, only when the buffer turns out to be too small, dynamically allocate one of a sufficient size:

Compliant code
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
 
extern void log_message(const char *); 
 
void f(int i, int width, int prec) {
  char buffer[20];
  char *buf = buffer;
  int n  = sizeof(buffer);
  const char fmt[] = "i = %*.*i";

  n = snprintf(buf, n, fmt, width, prec, i);
  if (n < 0) {
    /* Handle snprintf() error */
    strcpy(buffer, "unknown error");
    goto write_log;
  }

  if (n < sizeof(buffer)) {
    goto write_log;
  }

  buf = (char *)malloc(n + 1);
  if (NULL == buf) {
    /* Handle malloc() error */
    strcpy(buffer, "unknown error");
    goto write_log;
  }

  n = snprintf(buf, n, fmt, width, prec, i);
  if (n < 0) {
    /* Handle snprintf() error */
    strcpy(buffer, "unknown error");
  }

write_log:
  log_message(buf);

  if (buf != buffer) {
    free(buf);
  }
}

This solution uses the goto statement, as suggested in MEM12-C . Consider using a goto chain when leaving a function on error when using and releasing resources .

Exceptions

ERR33-C-EX1: It is acceptable to ignore the return value of a function if:

  • that function cannot fail.
  • its return value is inconsequential; that is, it does not indicate an error.
  • it is one of a handful of functions whose return values are not traditionally checked.

These functions are listed in the following table:

Functions for which Return Values Need Not Be Checked

FunctionSuccessful ReturnError Return
putchar () Character writtenEOF
putwchar () Wide character writtenWEOF
puts () NonnegativeEOF (negative)
putws()NonnegativeWEOF
printf () , vprintf () Number of characters (nonnegative)Negative
wprintf () , vwprintf () Number of wide characters (nonnegative)Negative
kill_dependency()The input parameterNA
memcpy() , wmemcpy()The destination input parameterNA
memmove() , wmemmove()The destination input parameterNA
strcpy() , wcscpy()The destination input parameterNA
strncpy() , wcsncpy()The destination input parameterNA
strcat() , wcscat()The destination input parameterNA
strncat() , wcsncat()The destination input parameterNA
memset() , wmemset()The destination input parameterNA

The return value of a call to fprintf() or one of its variants ( vfprintf() , wfprintf() , vwfprintf() ) or one of the file output functions fputc() , fputwc() , fputs() , fputws() may be ignored if the output is being directed to stdout or stderr . Otherwise, the return value must be checked.

If a function's return value is to be ignored, it is recommended that the function's return value should be explicitly cast to void to signify the programmer's intent:

Compliant code
int main() {
  (void) fprintf(stdout, "Hello, world\n"); // fprintf() return value safely ignored
}

Risk Assessment

Failing to detect error conditions can lead to unpredictable results, including abnormal program termination and denial-of-service attacks or, in some situations, could even allow an attacker to run arbitrary code.

Rule Severity Likelihood Detectable Repairable Priority Level
ERR33-C High Likely Yes Yes P27 L1

Automated Detection

Tool

Version

Checker

Description

Astrée
25.10
error-information-unused
error-information-unused-computed
Partially checked
Axivion Bauhaus Suite

7.2.0

CertC-ERR33
CodeSonar
9.1p0

LANG.FUNCS.IRV
LANG.ERRCODE.NOTEST
LANG.ERRCODE.NZ

Ignored return value
Missing Test of Error Code
Non-zero Error Code
Compass/ROSE

Can detect violations of this recommendation when checking for violations of EXP12-C. Do not ignore values returned by functions and EXP34-C . Do not dereference null pointers

Coverity
2017.07

MISRA C 2012 Rule 22.8

MISRA C 2012 Rule 22.9

MISRA C 2012 Rule 22.10

Implemented
Cppcheck Premium

24.11.0

premium-cert-err33-c
Helix QAC

2025.2

C3200

C++3802, C++3803, C++3804

DF2820, DF2821, DF2822, DF2823, DF2824, DF2930, DF2931, DF2932, DF2933, DF2934


Klocwork
2025.2

NPD.CHECK.MUST
NPD.FUNC.MUST
SV.RVT.RETVAL_NOTTESTED


LDRA tool suite
9.7.1

80 D

Partially implemented
Parasoft C/C++test2025.2

CERT_C-ERR33-a
CERT_C-ERR33-d
CERT_C-ERR33-e

The value returned by a standard library function that may return an error should be used
Always check the returned value of non-void function
Provide error handling for file opening errors right next to the call to fopen

Parasoft Insure++

Runtime analysis
PC-lint Plus

1.4

534

Partially supported

Polyspace Bug Finder

R2025b

CERT C: Rule ERR33-C


Checks for:

  • Errno not checked
  • Return value of a sensitive function not checked
  • Unprotected dynamic memory allocation

Rule partially covered.

RuleChecker

25.10

error-information-unusedPartially checked
TrustInSoft Analyzer

1.38

pointer arithmeticExhaustively verified.

The vulnerability in Adobe Flash [ VU#159523 ] arises because Flash neglects to check the return value from calloc() . Even when calloc() returns a null pointer, Flash writes to an offset from the return value. Dereferencing a null pointer usually results in a program crash, but dereferencing an offset from a null pointer allows an exploit to succeed without crashing the program.

Search for vulnerabilities resulting from the violation of this rule on the CERT website .

Key here (explains table format and definitions)

TaxonomyTaxonomy itemRelationship
CERT C Secure Coding StandardERR00-C. Adopt and implement a consistent and comprehensive error-handling policyPrior to 2018-01-12: CERT: Unspecified Relationship
CERT C Secure Coding StandardEXP34-C . Do not dereference null pointersPrior to 2018-01-12: CERT: Unspecified Relationship
CERT C Secure Coding StandardFIO13-C . Never push back anything other than one read characterPrior to 2018-01-12: CERT: Unspecified Relationship
CERT C Secure Coding StandardMEM04-C . Do not perform zero-length allocationsPrior to 2018-01-12: CERT: Unspecified Relationship
CERT C Secure Coding StandardMEM12-C . Consider using a goto chain when leaving a function on error when using and releasing resourcesPrior to 2018-01-12: CERT: Unspecified Relationship
CERT CERR10-CPP. Check for error conditionsPrior to 2018-01-12: CERT: Unspecified Relationship
CERT CFIO04-CPP. Detect and handle input and output errorsPrior to 2018-01-12: CERT: Unspecified Relationship
ISO/IEC TS 17961:2013Failing to detect and handle standard library errors [liberr]Prior to 2018-01-12: CERT: Unspecified Relationship
CWE 2.11CWE-252 , Unchecked Return Value2017-07-06: CERT: Partial overlap
CWE 2.11CWE-253 , Incorrect Check of Function Return Value2017-07-06: CERT: Partial overlap
CWE 2.11CWE-391 , Unchecked Error Condition2017-07-06: CERT: Rule subset of CWE

CERT-CWE Mapping Notes

Key here for mapping notes

CWE-252/CWE-253/CWE-391 and ERR33-C/POS34-C

Independent( ERR33-C, POS54-C, FLP32-C, ERR34-C) Intersection( CWE-252, CWE-253) = Ø CWE-391 = Union( CWE-252, CWE-253) CWE-391 = Union( ERR33-C, POS34-C, list) where list =

  • Ignoring return values of functions outside the C or POSIX standard libraries

Bibliography

[ DHS 2006 ]Handle All Errors Safely
[ Henricson 1997 ]Recommendation 12.1, "Check for All Errors Reported from Functions"
[ ISO/IEC 9899:2024 ]Subclause 7.31.3.10, "The ungetc Function"
[ VU#159523 ]