...
Tool | Version | Checker | Description | ||||||
---|---|---|---|---|---|---|---|---|---|
| ARRAY_VS_SINGLETON | Can detect the access of memory past the end of a memory buffer/array. | |||||||
| NEGATIVE_RETURNS | Can detect when the loop bound may become negative. | |||||||
| OVERRUN_STATIC | Can detect the out-of-bound read/write to array allocated statically or dynamically. | |||||||
| ABV.ITERATOR SV.TAINTED.LOOP_BOUND | ||||||||
Compass/ROSE | Could be configured to catch violations of this rule. The way to catch the noncompliant code example is to first hunt for example code that follows this pattern: for (LPWSTR pwszTemp = pwszPath + 2; *pwszTemp != L'\\'; In particular, the iteration variable is a pointer, it gets incremented, and the loop condition does not set an upper bound on the pointer. Once this case is handled, we can handle cases like the real noncompliant code example, which is effectively the same semantics, just different syntax. | ||||||||
LDRA tool suite |
| 47 S | Partially implemented. | ||||||
PRQA QA-C |
| 3680 3681 3682 3683 3685 [(U]) 3686 3688 3689 [(U]) 3690 3692 | Partially implemented |
...