splint 1:3.1.2+dfsg-5 source package in Ubuntu

Changelog

splint (1:3.1.2+dfsg-5) unstable; urgency=medium

  * QA upload.
  * Workaround binary-all FTBFS by reverting the splint-data.install
    change and going back to debhelper compat 12. (Closes: #983028)

 -- Adrian Bunk <email address hidden>  Sun, 21 Feb 2021 07:38:34 +0200

Upload details

Uploaded by:
Debian QA Group
Uploaded to:
Sid
Original maintainer:
Debian QA Group
Architectures:
any all
Section:
devel
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section
Oracular release universe devel
Noble release universe devel
Mantic release universe devel
Lunar release universe devel
Jammy release universe devel

Downloads

File Size SHA-256 Checksum
splint_3.1.2+dfsg-5.dsc 2.0 KiB 1ee69fc7ffe6fae0ebea0fe16858fcb2656eea56ebecb32382356759226e5d7a
splint_3.1.2+dfsg.orig.tar.xz 1.1 MiB 51cd7ba978a366ae1ededac2b927058fd5f45d5455e5a9d640b75ab4e45b748a
splint_3.1.2+dfsg-5.debian.tar.xz 104.7 KiB 797f1bf017ed729476ba045df802d45bb1205843e96df658aef08ad0c6f4ff7f

Available diffs

No changes file available.

Binary packages built by this source

splint: tool for statically checking C programs for bugs

 splint is an annotation-assisted lightweight static checker. It is a tool for
 statically checking C programs for security vulnerabilities and coding
 mistakes. If additional effort is invested in adding annotations to programs,
 splint can perform stronger checking.
 .
 splint does many of the traditional lint checks including unused declarations,
 type inconsistencies, use before definition, unreachable code, ignored return
 values, execution paths with no return, likely infinite loops, and fall
 through cases. Problems detected by Splint include:
 .
  * Dereferencing a possibly null pointer
  * Using or returning storage that is undefined or not properly defined
  * Type mismatches, with greater precision and flexibility than by C compilers
  * Memory management errors like use of dangling references and memory leaks
  * Inconsistent (with specified interface) global variable modification or use
  * Problematic control flow such as likely infinite loops etc.
  * Buffer overflow vulnerabilities
  * Dangerous macro implementations or invocations
  * Violations of customized naming conventions

splint-data: No summary available for splint-data in ubuntu impish.

No description available for splint-data in ubuntu impish.

splint-dbgsym: debug symbols for splint
splint-doc-html: No summary available for splint-doc-html in ubuntu kinetic.

No description available for splint-doc-html in ubuntu kinetic.