...
Rule | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
DCL30-C | high | probable | high | P6 | L2 |
Automated Detection
Tool | Compliance |
---|---|
GCC | n/a |
Rose | partial |
LDRA | yes |
Fortify | yes |
Coverity | RETURN_LOCAL |
Splint | yes |
Klocwork | LOCRET |
The LDRA tool suite Version 7.6.0 can detect violations of this rule.
...
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
Other Languages
...
Cross References
Standard | Document |
---|---|
Cert C | n/a |
Cert C++ | n/a |
Cert Java | n/a |
MISRA | Rule 8.6 |
CWE | n/a |
References
Wiki Markup |
---|
\[[Coverity 07|AA. C References#Coverity 07]\] \[[ISO/IEC 9899:1999|AA. C References#ISO/IEC 9899-1999]\] Section 6.2.4, "Storage durations of objects," and Section 7.20.3, "Memory management functions" \[[ISO/IEC PDTR 24772|AA. C References#ISO/IEC PDTR 24772]\] "DCM Dangling references to stack frames" \[[MISRA 04|AA. C References#MISRA 04]\] Rule 8.6 |
...