...
Tool | Version | Checker | Description | ||||||
---|---|---|---|---|---|---|---|---|---|
CodeSonar |
| LANG.MEM.NPD LANG.STRUCT.NTAD LANG.STRUCT.UPD | Null pointer dereference Null test after dereference Unchecked parameter dereference | ||||||
Compass/ROSE | Can detect violations of this rule. In particular, ROSE ensures that any pointer returned by | ||||||||
|
| CHECKED_RETURN NULL_RETURNS REVERSE_INULL FORWARD_NULL | Finds instances where a pointer is checked against Identifies functions that can return a null pointer but are not checked Identifies code that dereferences a pointer and then checks the pointer against Can find the instances where | ||||||
5.0 | |||||||||
| NPD.* *RNPD.* | ||||||||
| 45 D | Fully implemented | |||||||
PRQA QA-C |
| 2810, 2811, 2812, 2813, 2814, 2820, 2821, 2822, 2823, 2824 | Fully implemented | ||||||
| |||||||||
Cppcheck |
| nullPointer, nullPointerDefaultArg, nullPointerRedundantCheck | Context sensitive analysis. Detects when NULL is dereferenced. Array of pointers is not checked. Pointer members in struct is not checked. Finds instances where a pointer is checked against Identifies code that dereferences a pointer and then checks the pointer against Cppcheck does not guess that return values from malloc(), strchr(), etc can be NULL. The return value from malloc() is only NULL if there is OOM and the dev might not care to handle that. The return value from strchr() is often NULL but the dev might know that a specific strchr() function call will not return NULL. |
Related Vulnerabilities
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
...