...
Tool | Version | Checker | Description | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Astrée |
| string-literal-modfication write-to-string-literal | Fully checked | |||||||||||||||
| Axivion Bauhaus Suite |
| CertC-STR30 | Fully implemented | |||||||||||||||
| Compass/ROSE | Can detect simple violations of this rule | |||||||||||||||||
| Coverity |
| PW | Deprecates conversion from a string literal to "char *" | |||||||||||||||
| Helix QAC |
| |||||||||||||||||
| ||||||||||||||||||
| LDRA tool suite |
| 157 S | Partially implemented | |||||||||||||||
| Parasoft C/C++test |
| CERT_C-STR30-a | A string literal shall not be modified | |||||||||||||||
| PC-lint Plus |
| 489, 1776 | Partially supported | |||||||||||||||
| Polyspace Bug Finder |
| CERT C: Rule STR30-C | Checks for writing to const qualified object (rule fully covered) | |||||||||||||||
| PRQA QA-C |
| 0556, 0752, 0753, 0754 | Partially implemented | |||||||||||||||
| PRQA QA-C++ |
| 3063, 3064, 3605, 3606, 3607, 3842 | ||||||||||||||||
| PVS-Studio |
| V675 | ||||||||||||||||
| RuleChecker |
| string-literal-modfication | Partially checked | |||||||||||||||
| Splint |
| |||||||||||||||||
| TrustInSoft Analyzer |
| mem_access | Exhaustively verified (see one compliant and one non-compliant example). | Helix QAC | ||||||||||||||
| Include Page | Helix QAC_V | Helix QAC_V | | Include Page | | java:Klocwork_V | java:Klocwork_V | CXX.OVERWRITE_CONST_CHAR
Related Vulnerabilities
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
...