...
Tool | Version | Checker | Description | ||||||
---|---|---|---|---|---|---|---|---|---|
Astrée |
| dangling_pointer_use | |||||||
Axivion Bauhaus Suite |
| CertC++-MEM50 | |||||||
Clang |
| clang-analyzer-cplusplus.NewDelete | Checked by clang-tidy , but does not catch all violations of this rule. | ||||||
CodeSonar |
| ALLOC.UAF | Use after free | ||||||
Compass/ROSE | |||||||||
| USE_AFTER_FREE | Can detect the specific instances where memory is deallocated more than once or read/written to the target of a freed pointer | |||||||
Klocwork |
| UFM.DEREF.MIGHT | |||||||
LDRA tool suite |
| 483 S, 484 S | Partially implemented | ||||||
Parasoft C/C++test |
| CERT_CPP-MEM50-a | Do not use resources that have been freed | ||||||
Parasoft Insure++ | Runtime detection | ||||||||
Polyspace Bug Finder |
| CERT C++: MEM50-CPP | Checks for:
Rule partially covered. | ||||||
PRQA QA-C++ |
| 4303, 4304 | |||||||
PVS-Studio |
| V586, V774 | |||||||
Splint |
| ||||||||
Helix QAC |
|
Related Vulnerabilities
VU#623332 describes a double-free vulnerability in the MIT Kerberos 5 function krb5_recvauth() [VU# 623332].
...