splint 1:3.1.2+dfsg-1build1 source package in Ubuntu

Changelog

splint (1:3.1.2+dfsg-1build1) bionic; urgency=medium

  * No-change rebuild to pick up the shared flex library.

 -- Matthias Klose <email address hidden>  Tue, 20 Feb 2018 07:10:37 +0000

Upload details

Uploaded by:
Matthias Klose on 2018-02-20
Uploaded to:
Bionic
Original maintainer:
Debian QA Group
Architectures:
any all
Section:
devel
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section
Eoan release on 2019-04-18 universe devel
Disco release on 2018-10-30 universe devel
Cosmic release on 2018-05-01 universe devel
Bionic release on 2018-02-20 universe devel

Downloads

File Size SHA-256 Checksum
splint_3.1.2+dfsg.orig.tar.xz 1.1 MiB 51cd7ba978a366ae1ededac2b927058fd5f45d5455e5a9d640b75ab4e45b748a
splint_3.1.2+dfsg-1build1.debian.tar.xz 104.6 KiB 3385588cec4bb62ae8fc4c10e6a8081da258d01c3bbb117f1ca780910ae583c3
splint_3.1.2+dfsg-1build1.dsc 2.0 KiB 33c92ea58fe6e7a53be51a65b36298343b2efe07d0a7afae199f60ef61632213

View changes file

Binary packages built by this source

splint: tool for statically checking C programs for bugs

 splint is an annotation-assisted lightweight static checker. It is a tool for
 statically checking C programs for security vulnerabilities and coding
 mistakes. If additional effort is invested in adding annotations to programs,
 splint can perform stronger checking.
 .
 splint does many of the traditional lint checks including unused declarations,
 type inconsistencies, use before definition, unreachable code, ignored return
 values, execution paths with no return, likely infinite loops, and fall
 through cases. Problems detected by Splint include:
 .
  * Dereferencing a possibly null pointer
  * Using or returning storage that is undefined or not properly defined
  * Type mismatches, with greater precision and flexibility than by C compilers
  * Memory management errors like use of dangling references and memory leaks
  * Inconsistent (with specified interface) global variable modification or use
  * Problematic control flow such as likely infinite loops etc.
  * Buffer overflow vulnerabilities
  * Dangerous macro implementations or invocations
  * Violations of customized naming conventions

splint-data: tool for statically checking C programs for bugs - data files

 splint is an annotation-assisted lightweight static checker. It is a tool for
 statically checking C programs for security vulnerabilities and coding
 mistakes. If additional effort is invested in adding annotations to programs,
 splint can perform stronger checking.
 .
 splint does many of the traditional lint checks including unused declarations,
 type inconsistencies, use before definition, unreachable code, ignored return
 values, execution paths with no return, likely infinite loops, and fall
 through cases. Problems detected by Splint include:
 .
  * Dereferencing a possibly null pointer
  * Using or returning storage that is undefined or not properly defined
  * Type mismatches, with greater precision and flexibility than by C compilers
  * Memory management errors like use of dangling references and memory leaks
  * Inconsistent (with specified interface) global variable modification or use
  * Problematic control flow such as likely infinite loops etc.
  * Buffer overflow vulnerabilities
  * Dangerous macro implementations or invocations
  * Violations of customized naming conventions
 .
 This package contains the data files that are necessary to use splint.

splint-dbgsym: debug symbols for splint
splint-doc-html: tool for statically checking C programs for bugs - HTML documentation

 splint is an annotation-assisted lightweight static checker. It is a tool for
 statically checking C programs for security vulnerabilities and coding
 mistakes. If additional effort is invested in adding annotations to programs,
 splint can perform stronger checking.
 .
 splint does many of the traditional lint checks including unused declarations,
 type inconsistencies, use before definition, unreachable code, ignored return
 values, execution paths with no return, likely infinite loops, and fall
 through cases. Problems detected by Splint include:
 .
  * Dereferencing a possibly null pointer
  * Using or returning storage that is undefined or not properly defined
  * Type mismatches, with greater precision and flexibility than by C compilers
  * Memory management errors like use of dangling references and memory leaks
  * Inconsistent (with specified interface) global variable modification or use
  * Problematic control flow such as likely infinite loops etc.
  * Buffer overflow vulnerabilities
  * Dangerous macro implementations or invocations
  * Violations of customized naming conventions
 .
 This package contains the manual (HTML documentation) for splint.