A tool for static C/C++ code analysis

Edit Package cppcheck.18236

This program tries to detect bugs that your C/C++ compiler don't see. Cppcheck is versatile. You can check non-standard code that includes various compiler extensions, inline assembly code, etc. Checking covers for example these errors:

* Out of bounds
* Uninitialized member variable 'classname::varname'
* Using 'memfunc' on class
* Using 'memfunc' on struct that contains a 'std::classname'
* Class Base which is inherited by class Derived does not have a virtual destructor
* Memory leak: varname
* Resource leak: varname
* Deallocating a deallocated pointer: varname
* Using 'varname' after it is deallocated / released
* Invalid radix in call to strtol or strtoul. Must be 0 or 2-36
* Overlapping data buffer varname
* Unsigned division. The result will be wrong.
* Unusual pointer arithmetic

See http://cppcheck.wiki.sourceforge.net/ for more details.

Refresh
Refresh
Source Files
Filename Size Changed
CVE-2023-39070.patch 0000005359 5.23 KB
cppcheck-2.12.1.tar.gz 0003579702 3.41 MB
cppcheck.changes 0000042615 41.6 KB
cppcheck.spec 0000004750 4.64 KB
eb076d87.patch 0000003134 3.06 KB
werror-return-type.patch 0000001006 1006 Bytes
Latest Revision
Maintenance Automation's avatar Maintenance Automation (maintenance-robot) accepted request 1134409 from Maintenance Automation's avatar Maintenance Automation (maintenance-robot) (revision 1)
Release from openSUSE:Maintenance:18236 / cppcheck.openSUSE_Backports_SLE-15-SP5_Update
Comments 0
openSUSE Build Service is sponsored by