splint 1:3.1.2+dfsg-5 source package in Ubuntu
Changelog
splint (1:3.1.2+dfsg-5) unstable; urgency=medium * QA upload. * Workaround binary-all FTBFS by reverting the splint-data.install change and going back to debhelper compat 12. (Closes: #983028) -- Adrian Bunk <email address hidden> Sun, 21 Feb 2021 07:38:34 +0200
Upload details
- Uploaded by:
- Debian QA Group
- Uploaded to:
- Sid
- Original maintainer:
- Debian QA Group
- Architectures:
- any all
- Section:
- devel
- Urgency:
- Medium Urgency
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
splint_3.1.2+dfsg-5.dsc | 2.0 KiB | 1ee69fc7ffe6fae0ebea0fe16858fcb2656eea56ebecb32382356759226e5d7a |
splint_3.1.2+dfsg.orig.tar.xz | 1.1 MiB | 51cd7ba978a366ae1ededac2b927058fd5f45d5455e5a9d640b75ab4e45b748a |
splint_3.1.2+dfsg-5.debian.tar.xz | 104.7 KiB | 797f1bf017ed729476ba045df802d45bb1205843e96df658aef08ad0c6f4ff7f |
Available diffs
- diff from 1:3.1.2+dfsg-4 to 1:3.1.2+dfsg-5 (621 bytes)
No changes file available.
Binary packages built by this source
- splint: tool for statically checking C programs for bugs
splint is an annotation-assisted lightweight static checker. It is a tool for
statically checking C programs for security vulnerabilities and coding
mistakes. If additional effort is invested in adding annotations to programs,
splint can perform stronger checking.
.
splint does many of the traditional lint checks including unused declarations,
type inconsistencies, use before definition, unreachable code, ignored return
values, execution paths with no return, likely infinite loops, and fall
through cases. Problems detected by Splint include:
.
* Dereferencing a possibly null pointer
* Using or returning storage that is undefined or not properly defined
* Type mismatches, with greater precision and flexibility than by C compilers
* Memory management errors like use of dangling references and memory leaks
* Inconsistent (with specified interface) global variable modification or use
* Problematic control flow such as likely infinite loops etc.
* Buffer overflow vulnerabilities
* Dangerous macro implementations or invocations
* Violations of customized naming conventions
- splint-data: No summary available for splint-data in ubuntu impish.
No description available for splint-data in ubuntu impish.
- splint-dbgsym: debug symbols for splint
- splint-doc-html: No summary available for splint-doc-html in ubuntu kinetic.
No description available for splint-doc-html in ubuntu kinetic.