How to Install and Uninstall splint Package on Ubuntu 21.10 (Impish Indri)

Last updated: May 19,2024

1. Install "splint" package

Please follow the step by step instructions below to install splint on Ubuntu 21.10 (Impish Indri)

$ sudo apt update $ sudo apt install splint

2. Uninstall "splint" package

Please follow the instructions below to uninstall splint on Ubuntu 21.10 (Impish Indri):

$ sudo apt remove splint $ sudo apt autoclean && sudo apt autoremove

3. Information about the splint package on Ubuntu 21.10 (Impish Indri)

Package: splint
Architecture: amd64
Version: 1:3.1.2+dfsg-5
Multi-Arch: foreign
Priority: optional
Section: universe/devel
Origin: Ubuntu
Maintainer: Ubuntu Developers
Original-Maintainer: Debian QA Group
Bugs: https://bugs.launchpad.net/ubuntu/+filebug
Installed-Size: 2332
Depends: splint-data (= 1:3.1.2+dfsg-5), libc6 (>= 2.33), libfl2 (>= 2.5.33)
Suggests: splint-doc-html
Breaks: splint-data (<< 1:3.1.2+dfsg-1)
Replaces: splint-data (<< 1:3.1.2+dfsg-1)
Filename: pool/universe/s/splint/splint_3.1.2+dfsg-5_amd64.deb
Size: 701952
MD5sum: f1fdc31ff0ba904c724b2f874ca2f668
SHA1: d5a1237a4a4b817661c115a16eb6be4b491fbf56
SHA256: 326975e2a7d223593f48cb692050f7fbb7888ae3d4c607c56bf125d772c95879
SHA512: 4d245e7773803202a5b20a2f164ac2c61d0448d5a5ecea3a5448df1902c5f5075625e65eaca2592302b6ad66f85ad13674e7de248a877b7f485faed91a00425d
Homepage: http://www.splint.org/
Description-en: tool for statically checking C programs for bugs
splint is an annotation-assisted lightweight static checker. It is a tool for
statically checking C programs for security vulnerabilities and coding
mistakes. If additional effort is invested in adding annotations to programs,
splint can perform stronger checking.
.
splint does many of the traditional lint checks including unused declarations,
type inconsistencies, use before definition, unreachable code, ignored return
values, execution paths with no return, likely infinite loops, and fall
through cases. Problems detected by Splint include:
.
* Dereferencing a possibly null pointer
* Using or returning storage that is undefined or not properly defined
* Type mismatches, with greater precision and flexibility than by C compilers
* Memory management errors like use of dangling references and memory leaks
* Inconsistent (with specified interface) global variable modification or use
* Problematic control flow such as likely infinite loops etc.
* Buffer overflow vulnerabilities
* Dangerous macro implementations or invocations
* Violations of customized naming conventions
Description-md5: 8e7e32bbdb6feca91226586802c3b837