Public bug reported: please sync package cppcheck from debian Unstable
Cppcheck is a programming tool for statically checking C programs and C++ programs for security vulnerabilities and coding mistakes. Most common errors it finds are memory leaks within a function range. It has found 18 confirmed and fixed bugs in the Linux kernel And many more from other open source projects. It can do check for example: * Bad usage of memset/memcpy/memmove * Memory leaks * Buffer overruns * Check class constructors (uninitialized member variables?) * Using old functions that should be avoided such as 'gets' and 'scanf' * Invalid function usage. A few extra checks when using standard functions. * Division with signed and unsigned operands Home page: http://cppcheck.wiki.sourceforge.net/ Package details in Debian: http://packages.debian.org/unstable/cppcheck ** Affects: ubuntu Importance: Undecided Status: New -- please sync package cppcheck from debian Unstable https://bugs.launchpad.net/bugs/306042 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs