...
Tool | Version | Checker | Description | ||||||
---|---|---|---|---|---|---|---|---|---|
CodeSonar |
| LANG.MEM.UVAR | Uninitialized variable | ||||||
Compass/ROSE | Automatically detects simple violations of this rule, although it may return some false positives. It may not catch more complex violations, such as initialization within functions taking uninitialized variables as arguments. It does catch the second noncompliant code example, and can be extended to catch the first as well | ||||||||
Coverity | 6.5 | UNINIT | Fully implemented | ||||||
Cppcheck |
| uninitvar | Detects uninitialized variables, uninitialized pointers, uninitialized struct members, and uninitialized array elements (however, if one element is initialized, then cppcheck assumes the array is initialized) | ||||||
Fortify SCA | Can detect violations of this rule but will return false positives if the initialization was done in another function | ||||||||
GCC | 4.3.5 | Can detect some violations of this rule when the | |||||||
9.1 | UNINIT.HEAP.MIGHT | ||||||||
| 53 D, 69 D, 631 S | Fully implemented | |||||||
PRQA QA-C |
| 2961, 2962, 2963, 2966, 2967, 2968, 2971, 2972, 2973, 2976, 2977, 2978 | Fully implemented | ||||||
Splint | 3.1.1 |
...
CERT C Secure Coding Standard | MSC00-C. Compile cleanly at high warning levels MSC01-C. Strive for logical completeness |
SEI CERT C++ Coding Standard | EXP53-CPP. Do not read uninitialized memory |
ISO/IEC TR 24772:2013 | Initialization of Variables [LAV] |
ISO/IEC TS 17961 | Referencing uninitialized memory [uninitref] |
MITRE CWE | CWE-119, Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-123, Write-what-where Condition CWE-125, Out-of-bounds Read CWE-665, Improper Initialization |
...