Parents (Total: 5)
The searched file hash is included in 5 parent files which include package known and seen by metalookup. A sample is included below:
Key |
Value |
MD5 | 22035A38C1555F05889EB4EFFDE28C37 |
PackageArch | x86_64 |
PackageDescription | This program tries to detect bugs that your C/C++ compiler don't see. Cppcheck
is versatile. You can check non-standard code that includes various compiler
extensions, inline assembly code, etc. Checking covers for example these
errors:
* Out of bounds
* Uninitialized member variable 'classname::varname'
* Using 'memfunc' on class
* Using 'memfunc' on struct that contains a 'std::classname'
* Class Base which is inherited by class Derived does not have a virtual
destructor
* Memory leak: varname
* Resource leak: varname
* Deallocating a deallocated pointer: varname
* Using 'varname' after it is deallocated / released
* Invalid radix in call to strtol or strtoul. Must be 0 or 2-36
* Overlapping data buffer varname
* Unsigned division. The result will be wrong.
* Unusual pointer arithmetic |
PackageMaintainer | https://bugs.opensuse.org |
PackageName | cppcheck |
PackageRelease | lp151.2.5 |
PackageVersion | 1.82 |
SHA-1 | E45871C60C0630E16F7B2CD0E4F5F149CCE6645B |
SHA-256 | 9859B1DCDBA688343493775FFFA7368BDB0AE856DB3AA6738FCE0BAE18660057 |
Key |
Value |
MD5 | 31A8F4EA8B611C94726CE60451E422D4 |
PackageArch | s390x |
PackageDescription | This program tries to detect bugs that your C/C++ compiler don't see. Cppcheck
is versatile. You can check non-standard code that includes various compiler
extensions, inline assembly code, etc. Checking covers for example these
errors:
* Out of bounds
* Uninitialized member variable 'classname::varname'
* Using 'memfunc' on class
* Using 'memfunc' on struct that contains a 'std::classname'
* Class Base which is inherited by class Derived does not have a virtual
destructor
* Memory leak: varname
* Resource leak: varname
* Deallocating a deallocated pointer: varname
* Using 'varname' after it is deallocated / released
* Invalid radix in call to strtol or strtoul. Must be 0 or 2-36
* Overlapping data buffer varname
* Unsigned division. The result will be wrong.
* Unusual pointer arithmetic |
PackageMaintainer | https://bugs.opensuse.org |
PackageName | cppcheck |
PackageRelease | bp153.1.20 |
PackageVersion | 1.82 |
SHA-1 | 19A106590CC455CFFDC7F996449183E15A1D6E11 |
SHA-256 | 10B0EF1D259C81B45916097F62483E8C4340B25C3871667DE272EB57B01B3B3C |
Key |
Value |
MD5 | 1EA5952AB8D452DFDA4D72CCEDE0D12F |
PackageArch | x86_64 |
PackageDescription | This program tries to detect bugs that your C/C++ compiler don't see. Cppcheck
is versatile. You can check non-standard code that includes various compiler
extensions, inline assembly code, etc. Checking covers for example these
errors:
* Out of bounds
* Uninitialized member variable 'classname::varname'
* Using 'memfunc' on class
* Using 'memfunc' on struct that contains a 'std::classname'
* Class Base which is inherited by class Derived does not have a virtual
destructor
* Memory leak: varname
* Resource leak: varname
* Deallocating a deallocated pointer: varname
* Using 'varname' after it is deallocated / released
* Invalid radix in call to strtol or strtoul. Must be 0 or 2-36
* Overlapping data buffer varname
* Unsigned division. The result will be wrong.
* Unusual pointer arithmetic |
PackageMaintainer | https://bugs.opensuse.org |
PackageName | cppcheck |
PackageRelease | lp152.3.9 |
PackageVersion | 1.82 |
SHA-1 | DD4A2775F851F0FC9647257A7699A7540D886B58 |
SHA-256 | B1E1CEE7E1FC11C906D1B58C247C7843D2EAFC22F0C8748D0FE83446255793C4 |
Key |
Value |
MD5 | 32F5DA49043DDEC12A1DEB400C80C278 |
PackageArch | x86_64 |
PackageDescription | This program tries to detect bugs that your C/C++ compiler don't see. Cppcheck
is versatile. You can check non-standard code that includes various compiler
extensions, inline assembly code, etc. Checking covers for example these
errors:
* Out of bounds
* Uninitialized member variable 'classname::varname'
* Using 'memfunc' on class
* Using 'memfunc' on struct that contains a 'std::classname'
* Class Base which is inherited by class Derived does not have a virtual
destructor
* Memory leak: varname
* Resource leak: varname
* Deallocating a deallocated pointer: varname
* Using 'varname' after it is deallocated / released
* Invalid radix in call to strtol or strtoul. Must be 0 or 2-36
* Overlapping data buffer varname
* Unsigned division. The result will be wrong.
* Unusual pointer arithmetic |
PackageMaintainer | https://bugs.opensuse.org |
PackageName | cppcheck |
PackageRelease | bp153.1.20 |
PackageVersion | 1.82 |
SHA-1 | D1184FBBFC8AEB140846C7A33812FE1BFD4C3440 |
SHA-256 | 3AC556A2B3C8EEACA609FBA0EFE2F2BA6E4F2E5EB7FA73A011BA491626FB8A6A |
Key |
Value |
MD5 | 70284D31652946DEAAF7A683E6B994D4 |
PackageArch | x86_64 |
PackageDescription | This program tries to detect bugs that your C/C++ compiler don't see. Cppcheck
is versatile. You can check non-standard code that includes various compiler
extensions, inline assembly code, etc. Checking covers for example these
errors:
* Out of bounds
* Uninitialized member variable 'classname::varname'
* Using 'memfunc' on class
* Using 'memfunc' on struct that contains a 'std::classname'
* Class Base which is inherited by class Derived does not have a virtual
destructor
* Memory leak: varname
* Resource leak: varname
* Deallocating a deallocated pointer: varname
* Using 'varname' after it is deallocated / released
* Invalid radix in call to strtol or strtoul. Must be 0 or 2-36
* Overlapping data buffer varname
* Unsigned division. The result will be wrong.
* Unusual pointer arithmetic |
PackageMaintainer | https://bugs.opensuse.org |
PackageName | cppcheck |
PackageRelease | lp150.1.1 |
PackageVersion | 1.82 |
SHA-1 | 5633F040D7DF16C96634B3A50A0C04944A1AE9F6 |
SHA-256 | 803CB75AC5B0190091E45F50587E9CECB4A335D86548131874A3D0C7A2E0D35F |