...
Tool | Version | Checker | Description | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Include Page | LDRA_V | LDRA_V | 484 S | Fully implemented. | |||||||||||
Fortify SCA | 5.0 | Double Free | |||||||||||||
Splint | |||||||||||||||
Include Page | Splint_V | Splint_V | Compass/ROSE | ||||||||||||
| RESOURCE_LEAK USE_AFTER_FREE | Finds resource leaks from variables that go out of scope while owning a resource. | |||||||||||||
Include Page | Coverity_V | Coverity_V | USE_AFTER_FREE | Can find the instances where a freed memory is freed again. Coverity Prevent cannot discover all violations of this rule, so further verification is necessary. | |||||||||||
Fortify SCA | 5.0 | Double Free | Compass/ROSE | Can detect some violations of this rule. In particular, false positives may be raised if a variable is freed by a different function than the one that allocated it. Also, it is unable to warn on cases where a call to free() happens inside of a for loop. | |||||||||||
| MLK | ||||||||||||||
| 484 S | Fully implemented. | |||||||||||||
Splint |
|
Related Vulnerabilities
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
...