A tool for static C/C++ code analysis
This program tries to detect bugs that your C/C++ compiler don't see. Cppcheck is versatile. You can check non-standard code that includes various compiler extensions, inline assembly code, etc. Checking covers for example these errors:
* Out of bounds
* Uninitialized member variable 'classname::varname'
* Using 'memfunc' on class
* Using 'memfunc' on struct that contains a 'std::classname'
* Class Base which is inherited by class Derived does not have a virtual destructor
* Memory leak: varname
* Resource leak: varname
* Deallocating a deallocated pointer: varname
* Using 'varname' after it is deallocated / released
* Invalid radix in call to strtol or strtoul. Must be 0 or 2-36
* Overlapping data buffer varname
* Unsigned division. The result will be wrong.
* Unusual pointer arithmetic
See http://cppcheck.wiki.sourceforge.net/ for more details.
- Developed at devel:tools
- Sources inherited from project openSUSE:Factory
-
2
derived packages
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout openSUSE:Backports:SLE-15-SP4:FactoryCandidates/cppcheck && cd $_
- Create Badge
Source Files
Filename | Size | Changed |
---|---|---|
cppcheck-2.13.0.tar.gz | 0003643744 3.47 MB | |
cppcheck.changes | 0000043204 42.2 KB | |
cppcheck.spec | 0000004641 4.53 KB |
Revision 37 (latest revision is 46)
- update to 2.13.0 * newCheck passedByValueCallback for functions which take a parameter by value but are used as callbacks * newCheck returnImplicitInt for C functions without return type * newCheck iterateByValue for iterating by value in a range-based for loop when a const reference could be used - Drop patches werror-return-type.patch, eb076d87.patch, and CVE-2023-39070.patch which are part of upstream or fixed in a similar way.
Comments 0