Parents (Total: 10)
The searched file hash is included in 10 parent files which include package known and seen by metalookup. A sample is included below:
Key |
Value |
MD5 | 13F5C6E6E4A45336B17FE495180194DE |
PackageArch | i586 |
PackageDescription | This program tries to detect bugs that your C/C++ compiler don't see. Cppcheck
is versatile. You can check non-standard code that includes various compiler
extensions, inline assembly code, etc. Checking covers for example these
errors:
* Out of bounds
* Uninitialized member variable 'classname::varname'
* Using 'memfunc' on class
* Using 'memfunc' on struct that contains a 'std::classname'
* Class Base which is inherited by class Derived does not have a virtual
destructor
* Memory leak: varname
* Resource leak: varname
* Deallocating a deallocated pointer: varname
* Using 'varname' after it is deallocated / released
* Invalid radix in call to strtol or strtoul. Must be 0 or 2-36
* Overlapping data buffer varname
* Unsigned division. The result will be wrong.
* Unusual pointer arithmetic |
PackageMaintainer | https://bugs.opensuse.org |
PackageName | cppcheck |
PackageRelease | 1.2 |
PackageVersion | 2.6.3 |
SHA-1 | 3DA24BFFB312881B3D6CF083A7FAE9E1B997F54A |
SHA-256 | 1FF05B904DB15B9D71E91B2231AD0D80B4110DFFF3CD4F7D3DB65753941F74EC |
Key |
Value |
MD5 | 298A43D440CF785D46E8705EC62FD087 |
PackageArch | x86_64 |
PackageDescription | This program tries to detect bugs that your C/C++ compiler don't see. Cppcheck
is versatile. You can check non-standard code that includes various compiler
extensions, inline assembly code, etc. Checking covers for example these
errors:
* Out of bounds
* Uninitialized member variable 'classname::varname'
* Using 'memfunc' on class
* Using 'memfunc' on struct that contains a 'std::classname'
* Class Base which is inherited by class Derived does not have a virtual
destructor
* Memory leak: varname
* Resource leak: varname
* Deallocating a deallocated pointer: varname
* Using 'varname' after it is deallocated / released
* Invalid radix in call to strtol or strtoul. Must be 0 or 2-36
* Overlapping data buffer varname
* Unsigned division. The result will be wrong.
* Unusual pointer arithmetic |
PackageName | cppcheck |
PackageRelease | 45.d_t.3 |
PackageVersion | 2.6.3 |
SHA-1 | F97535CA77F59CF3EA2712B32E0E109F5ADC8D02 |
SHA-256 | 282F0901A722429DFF09C80ACE815F83D49286D8D61DD28907230D3F0583D52C |
Key |
Value |
MD5 | 2D3652C073618F8F23A9B373244D1C64 |
PackageArch | armv7hl |
PackageDescription | This program tries to detect bugs that your C/C++ compiler don't see. Cppcheck
is versatile. You can check non-standard code that includes various compiler
extensions, inline assembly code, etc. Checking covers for example these
errors:
* Out of bounds
* Uninitialized member variable 'classname::varname'
* Using 'memfunc' on class
* Using 'memfunc' on struct that contains a 'std::classname'
* Class Base which is inherited by class Derived does not have a virtual
destructor
* Memory leak: varname
* Resource leak: varname
* Deallocating a deallocated pointer: varname
* Using 'varname' after it is deallocated / released
* Invalid radix in call to strtol or strtoul. Must be 0 or 2-36
* Overlapping data buffer varname
* Unsigned division. The result will be wrong.
* Unusual pointer arithmetic |
PackageName | cppcheck |
PackageRelease | 45.d_t.3 |
PackageVersion | 2.6.3 |
SHA-1 | 47AEFF32F48A989A0A65D44DDC4E0A8917327ACB |
SHA-256 | 8D5CCAE8C46A1C84033C9A3589C286CF38156D3CD021BBC8226DB7D5C41FD0F3 |
Key |
Value |
MD5 | 4C0EA8700DC92A80E445A7C054BEC8CB |
PackageArch | x86_64 |
PackageDescription | This program tries to detect bugs that your C/C++ compiler don't see. Cppcheck
is versatile. You can check non-standard code that includes various compiler
extensions, inline assembly code, etc. Checking covers for example these
errors:
* Out of bounds
* Uninitialized member variable 'classname::varname'
* Using 'memfunc' on class
* Using 'memfunc' on struct that contains a 'std::classname'
* Class Base which is inherited by class Derived does not have a virtual
destructor
* Memory leak: varname
* Resource leak: varname
* Deallocating a deallocated pointer: varname
* Using 'varname' after it is deallocated / released
* Invalid radix in call to strtol or strtoul. Must be 0 or 2-36
* Overlapping data buffer varname
* Unsigned division. The result will be wrong.
* Unusual pointer arithmetic |
PackageName | cppcheck |
PackageRelease | 45.d_t.4 |
PackageVersion | 2.6.3 |
SHA-1 | 4E639621A7A2A760999DAB47F16455BE2A3C8459 |
SHA-256 | BDD324BB80EFC2CE3AE02DBA6948B002025D010EBCADF0A82277821C84651960 |
Key |
Value |
MD5 | 331CB6957DAEA5615C969D28230DAF96 |
PackageArch | i586 |
PackageDescription | This program tries to detect bugs that your C/C++ compiler don't see. Cppcheck
is versatile. You can check non-standard code that includes various compiler
extensions, inline assembly code, etc. Checking covers for example these
errors:
* Out of bounds
* Uninitialized member variable 'classname::varname'
* Using 'memfunc' on class
* Using 'memfunc' on struct that contains a 'std::classname'
* Class Base which is inherited by class Derived does not have a virtual
destructor
* Memory leak: varname
* Resource leak: varname
* Deallocating a deallocated pointer: varname
* Using 'varname' after it is deallocated / released
* Invalid radix in call to strtol or strtoul. Must be 0 or 2-36
* Overlapping data buffer varname
* Unsigned division. The result will be wrong.
* Unusual pointer arithmetic |
PackageName | cppcheck |
PackageRelease | 45.d_t.4 |
PackageVersion | 2.6.3 |
SHA-1 | F0E56EDA40E632CA1CDDA40E95EA46234F2B4040 |
SHA-256 | 334FE4AF88B9AA85BE7B2044AF408C448DC381E83B0D5D218B82DD3CC60E2DF6 |
Key |
Value |
MD5 | FB29906BC2EE5D8A34363DCAAC18AE2E |
PackageArch | x86_64 |
PackageDescription | This program tries to detect bugs that your C/C++ compiler don't see. Cppcheck
is versatile. You can check non-standard code that includes various compiler
extensions, inline assembly code, etc. Checking covers for example these
errors:
* Out of bounds
* Uninitialized member variable 'classname::varname'
* Using 'memfunc' on class
* Using 'memfunc' on struct that contains a 'std::classname'
* Class Base which is inherited by class Derived does not have a virtual
destructor
* Memory leak: varname
* Resource leak: varname
* Deallocating a deallocated pointer: varname
* Using 'varname' after it is deallocated / released
* Invalid radix in call to strtol or strtoul. Must be 0 or 2-36
* Overlapping data buffer varname
* Unsigned division. The result will be wrong.
* Unusual pointer arithmetic |
PackageMaintainer | https://bugs.opensuse.org |
PackageName | cppcheck |
PackageRelease | 1.2 |
PackageVersion | 2.6.3 |
SHA-1 | 169A34562CEA26BC5E4E1B392372E42FAF7B65C3 |
SHA-256 | 603B72878CD51B05491C42F17B5D3C07CCB1AFD8AC593295DAC92C7165F2FC45 |
Key |
Value |
MD5 | 5550DBAE6A2E90BC296593D967644381 |
PackageArch | x86_64 |
PackageDescription | This program tries to detect bugs that your C/C++ compiler don't see. Cppcheck
is versatile. You can check non-standard code that includes various compiler
extensions, inline assembly code, etc. Checking covers for example these
errors:
* Out of bounds
* Uninitialized member variable 'classname::varname'
* Using 'memfunc' on class
* Using 'memfunc' on struct that contains a 'std::classname'
* Class Base which is inherited by class Derived does not have a virtual
destructor
* Memory leak: varname
* Resource leak: varname
* Deallocating a deallocated pointer: varname
* Using 'varname' after it is deallocated / released
* Invalid radix in call to strtol or strtoul. Must be 0 or 2-36
* Overlapping data buffer varname
* Unsigned division. The result will be wrong.
* Unusual pointer arithmetic |
PackageMaintainer | https://www.suse.com/ |
PackageName | cppcheck |
PackageRelease | 45.d_t.1 |
PackageVersion | 2.6.3 |
SHA-1 | 772C689714BBFE20AB5B6E8C801FC547909316A6 |
SHA-256 | 436702EF7B667B75DB56CE9F2F529558B73A0B84EF7BCF2F5EB40CEF2B65066F |
Key |
Value |
MD5 | 3AD6B72CF36AA17C0217F3E3BEA52C1D |
PackageArch | s390x |
PackageDescription | This program tries to detect bugs that your C/C++ compiler don't see. Cppcheck
is versatile. You can check non-standard code that includes various compiler
extensions, inline assembly code, etc. Checking covers for example these
errors:
* Out of bounds
* Uninitialized member variable 'classname::varname'
* Using 'memfunc' on class
* Using 'memfunc' on struct that contains a 'std::classname'
* Class Base which is inherited by class Derived does not have a virtual
destructor
* Memory leak: varname
* Resource leak: varname
* Deallocating a deallocated pointer: varname
* Using 'varname' after it is deallocated / released
* Invalid radix in call to strtol or strtoul. Must be 0 or 2-36
* Overlapping data buffer varname
* Unsigned division. The result will be wrong.
* Unusual pointer arithmetic |
PackageName | cppcheck |
PackageRelease | 45.d_t.4 |
PackageVersion | 2.6.3 |
SHA-1 | 882274B2C428730FA76679DD61EE21CD1C8F38A3 |
SHA-256 | B0819270B49FD770FDB3961F5B856F09FA01C34695255BEADDAB9751279B1DDE |
Key |
Value |
MD5 | E440A0D59B90B360ADDADD226B1C9EBF |
PackageArch | s390x |
PackageDescription | This program tries to detect bugs that your C/C++ compiler don't see. Cppcheck
is versatile. You can check non-standard code that includes various compiler
extensions, inline assembly code, etc. Checking covers for example these
errors:
* Out of bounds
* Uninitialized member variable 'classname::varname'
* Using 'memfunc' on class
* Using 'memfunc' on struct that contains a 'std::classname'
* Class Base which is inherited by class Derived does not have a virtual
destructor
* Memory leak: varname
* Resource leak: varname
* Deallocating a deallocated pointer: varname
* Using 'varname' after it is deallocated / released
* Invalid radix in call to strtol or strtoul. Must be 0 or 2-36
* Overlapping data buffer varname
* Unsigned division. The result will be wrong.
* Unusual pointer arithmetic |
PackageMaintainer | https://www.suse.com/ |
PackageName | cppcheck |
PackageRelease | 45.d_t.1 |
PackageVersion | 2.6.3 |
SHA-1 | 24291517CF98DB45345E524B0B569D670827DD23 |
SHA-256 | 989A8A40FBB961DFBDF4E892CF6792D59293678D43F6BB7C3A80559BA36AD014 |
Key |
Value |
MD5 | 1E9FBC88C9B1A9EF29DB7B8895DF5BD4 |
PackageArch | x86_64 |
PackageDescription | This program tries to detect bugs that your C/C++ compiler don't see. Cppcheck
is versatile. You can check non-standard code that includes various compiler
extensions, inline assembly code, etc. Checking covers for example these
errors:
* Out of bounds
* Uninitialized member variable 'classname::varname'
* Using 'memfunc' on class
* Using 'memfunc' on struct that contains a 'std::classname'
* Class Base which is inherited by class Derived does not have a virtual
destructor
* Memory leak: varname
* Resource leak: varname
* Deallocating a deallocated pointer: varname
* Using 'varname' after it is deallocated / released
* Invalid radix in call to strtol or strtoul. Must be 0 or 2-36
* Overlapping data buffer varname
* Unsigned division. The result will be wrong.
* Unusual pointer arithmetic |
PackageName | cppcheck |
PackageRelease | 45.d_t.2 |
PackageVersion | 2.6.3 |
SHA-1 | 718C01BB32E96636DCCED54C515088ED08BCE0F6 |
SHA-256 | F599C88EB176A06500C1E88BCB6BB50A68F472CB421269065018EAECA2B5FE03 |