 
                            ...
| Tool | Version | Checker | Description | ||||||
|---|---|---|---|---|---|---|---|---|---|
| Astrée | 
 | stdlib-const-pointer-assign | Partially checked | ||||||
| Axivion Bauhaus Suite | 
 | CertC-ENV30 | |||||||
| CodeSonar | 
 | BADFUNC.GETENV | Use of getenv | ||||||
| Compass/ROSE | Can detect violations of this rule. In particular, it ensures that the result of  | ||||||||
| Cppcheck Premium | 
 | premium-cert-env30-c | |||||||
| Helix QAC | 
 | C1492, C1493, C1494 DF4751, DF4752, DF4753 | |||||||
| Klocwork | 
 | MISRA.STDLIB.CTYPE.RANGE.2012_AMD1 | |||||||
| LDRA tool suite | 
 | 107 D | Partially Implemented | ||||||
| Parasoft C/C++test | 
 | CERT_C-ENV30-a | The pointers returned by the Standard Library functions 'localeconv', 'getenv', 'setlocale' or, 'strerror' shall only be used as if they have pointer to const-qualified type | ||||||
| Polyspace Bug Finder | 
 | Checks for modification of internal buffer returned from nonreentrant standard function (rule fully covered) | |||||||
| PVS-Studio | 
 | V675 | |||||||
| RuleChecker | 
 | stdlib-const-pointer-assign | Partially checked | ||||||
| Security Reviewer - Static Reviewer | 
 | C27 | Fully implemented | 
Related Vulnerabilities
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
...