A tool for static C/C++ code analysis

Edit Package cppcheck
http://cppcheck.wiki.sourceforge.net/

This program tries to detect bugs that your C/C++ compiler don't see. Cppcheck is versatile. You can check non-standard code that includes various compiler extensions, inline assembly code, etc. Checking covers for example these errors:

* Out of bounds
* Uninitialized member variable 'classname::varname'
* Using 'memfunc' on class
* Using 'memfunc' on struct that contains a 'std::classname'
* Class Base which is inherited by class Derived does not have a virtual destructor
* Memory leak: varname
* Resource leak: varname
* Deallocating a deallocated pointer: varname
* Using 'varname' after it is deallocated / released
* Invalid radix in call to strtol or strtoul. Must be 0 or 2-36
* Overlapping data buffer varname
* Unsigned division. The result will be wrong.
* Unusual pointer arithmetic

See http://cppcheck.wiki.sourceforge.net/ for more details.

Refresh
Refresh
Source Files
Filename Size Changed
CVE-2023-39070.patch 0000005359 5.23 KB
cppcheck-2.12.1.tar.gz 0003579702 3.41 MB
cppcheck.changes 0000042615 41.6 KB
cppcheck.spec 0000004750 4.64 KB
eb076d87.patch 0000003134 3.06 KB
werror-return-type.patch 0000001006 1006 Bytes
Revision 36 (latest revision is 46)
Ana Guerrero's avatar Ana Guerrero (anag+factory) accepted request 1134347 from Dirk Mueller's avatar Dirk Mueller (dirkmueller) (revision 36)
- add CVE-2023-39070.patch (CVE-2023-39070, bsc#1215233)
Comments 0
openSUSE Build Service is sponsored by