A tool for static C/C++ code analysis
This program tries to detect bugs that your C/C++ compiler don't see. Cppcheck is versatile. You can check non-standard code that includes various compiler extensions, inline assembly code, etc. Checking covers for example these errors:
* Out of bounds
* Uninitialized member variable 'classname::varname'
* Using 'memfunc' on class
* Using 'memfunc' on struct that contains a 'std::classname'
* Class Base which is inherited by class Derived does not have a virtual destructor
* Memory leak: varname
* Resource leak: varname
* Deallocating a deallocated pointer: varname
* Using 'varname' after it is deallocated / released
* Invalid radix in call to strtol or strtoul. Must be 0 or 2-36
* Overlapping data buffer varname
* Unsigned division. The result will be wrong.
* Unusual pointer arithmetic
See http://cppcheck.wiki.sourceforge.net/ for more details.
- Developed at devel:tools
- Sources inherited from project openSUSE:Factory
-
2
derived packages
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout openSUSE:Backports:SLE-15-SP4:FactoryCandidates/cppcheck && cd $_
- Create Badge
Source Files
Filename | Size | Changed |
---|---|---|
CVE-2023-39070.patch | 0000005359 5.23 KB | |
cppcheck-2.12.1.tar.gz | 0003579702 3.41 MB | |
cppcheck.changes | 0000042615 41.6 KB | |
cppcheck.spec | 0000004750 4.64 KB | |
eb076d87.patch | 0000003134 3.06 KB | |
werror-return-type.patch | 0000001006 1006 Bytes |
Revision 36 (latest revision is 46)
- add CVE-2023-39070.patch (CVE-2023-39070, bsc#1215233)
Comments 0