Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

ToolVersionCheckerDescription
Compass/ROSE  

Automatically detects simple violations of this rule, although it may return some false positives. It may not catch more complex violations, such as initialization within functions taking uninitialized variables as arguments. It does catch the second noncompliant code example, and can be extended to catch the first as well.

Coverity6.5UNINITFully Implemented

Coverity Prevent

5.0

NO_EFFECT

Can find cases of an uninitialized variable being used before it is initialized, although it cannot detect cases of uninitialized members of a struct. Because Coverity Prevent cannot discover all violations of this rule, further verification is necessary.
Fortify SCA  

Can detect violations of this rule, but will return false positives if the initialization was done in another function.

GCC4.3.5 

Can detect some   violations of this rule when the -Wuninitialized flag is used.

Klocwork

9.1

UNINIT.HEAP.MIGHT
UNINIT.HEAP.MUST
UNINIT.STACK.ARRAY.MIGHT
UNINIT.STACK.ARRAY.MUST UNINIT.STACK.ARRAY.PARTIAL.MUST
UNINIT.STACK.MUST

 

LDRA tool suite

Include Page
LDRA_V
LDRA_V

57 D
69 D

Fully implemented.

PRQA QA-C
Include Page
PRQA_V
PRQA_V
2961 (D)
2962 (A)
2963 (S)
2971 (D)
2972 (A)
Fully implemented.
Splint3.1.1  

...

Search for vulnerabilities resulting from the violation of this rule on the CERT website.

Related Guidelines

CERT C++ Secure Coding StandardEXP33-CPP. Do not reference uninitialized memory
ISO/IEC TR 24772Initialization of variables [LAV]
ISO/IEC TS 17961 (Draft)Referencing uninitialized memory [uninitref]

Bibliography

...