
...
Tool | Version | Checker | Description | ||||||
---|---|---|---|---|---|---|---|---|---|
Astrée |
| Supported, but no explicit checker | |||||||
CodeSonar |
| (customization) | Users can add a custom check for allocator calls with size argument 0 (this includes literal 0, underconstrained tainted values, and computed values). | ||||||
Compass/ROSE | Can detect some violations of this rule. In particular, it warns when the argument to | ||||||||
Helix QAC |
| C4871 | |||||||
Parasoft C/C++test |
| CERT_C-MEM04-a | The validity of values passed to library functions shall be checked | ||||||
Polyspace Bug Finder |
| Checks for:
Rec. fully covered. |
Related Vulnerabilities
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
...