...
Tool | Version | Checker | Description | ||||||
---|---|---|---|---|---|---|---|---|---|
Astrée |
| Supported, but no explicit checker | |||||||
CodeSonar |
| LANG.MEM.BO | Buffer overrun | ||||||
Coverity |
| BUFFER_SIZE BAD_SIZEOF BAD_ALLOC_STRLEN BAD_ALLOC_ARITHMETIC | Implemented | ||||||
5.0 | Can detect violations of this rule with CERT C Rule Pack | ||||||||
| ABV.ANY_SIZE_ARRAY | ||||||||
LDRA tool suite |
| 64 X, 66 X, 68 X, 69 X, 70 X, 71 X, 79 X | Partially Implmented | ||||||
Parasoft C/C++test |
| BD-PB-OVERFRD, BD-PB-OVERFWR, BD-PB-OVERFFMT, BD-PB-OVERFNZT | Fully implemented | ||||||
Parasoft Insure++ | Runtime analysis | ||||||||
Polyspace Bug FinderR2016a |
| , Buffer overflow from incorrect string format specifier, Destination buffer overflow in string manipulation , Destination buffer underflow in string manipulation , Invalid use of standard library memory routine Invalid use of standard library string routine, | Array index outside bounds during array access String format specifier causes buffer argument of standard library functions to overflow Function writes to buffer at offset greater than buffer size Function writes to buffer at a negative offset from beginning of buffer Standard library memory function called with invalid arguments Standard library string function called with invalid arguments Data size argument is not computed from actual data length Pointer dereference outside its bounds Use of Pointer from an unsecure source may be NULL or point to unknown memory Guarantee that library functions do not form invalid pointers | ||||||
PRQA QA-C |
| 2845, 2846, 2847, 2848, 2849, 2930, 2932, 2933, 2934 | Fully implemented | ||||||
PRQA QA-C++ |
| 2840, 2841, 2842, 2843, 2844 | Fully implemented | ||||||
|
...