How to Install and Uninstall splint Package on Ubuntu 16.04 LTS (Xenial Xerus)

Last updated: May 19,2024

1. Install "splint" package

Here is a brief guide to show you how to install splint on Ubuntu 16.04 LTS (Xenial Xerus)

$ sudo apt update $ sudo apt install splint

2. Uninstall "splint" package

Learn how to uninstall splint on Ubuntu 16.04 LTS (Xenial Xerus):

$ sudo apt remove splint $ sudo apt autoclean && sudo apt autoremove

3. Information about the splint package on Ubuntu 16.04 LTS (Xenial Xerus)

Package: splint
Priority: optional
Section: universe/devel
Installed-Size: 1840
Maintainer: Ubuntu MOTU Developers
Original-Maintainer: Y Giridhar Appaji Nag
Architecture: amd64
Version: 3.1.2.dfsg1-2
Depends: libc6 (>= 2.4), splint-data (= 3.1.2.dfsg1-2)
Suggests: splint-doc-html
Filename: pool/universe/s/splint/splint_3.1.2.dfsg1-2_amd64.deb
Size: 768374
MD5sum: 7074cbc3043aec202236b088bab300e2
SHA1: 80c3f9fbe36d40c1e35129d1e5a688d79106cbac
SHA256: 1569c9017e84e23e678fb5898518be1e8e045c152ba470571ddda5eb76bb18e9
Description-en: tool for statically checking C programs for bugs
splint is an annotation-assisted lightweight static checker. It is a tool for
statically checking C programs for security vulnerabilities and coding
mistakes. If additional effort is invested in adding annotations to programs,
splint can perform stronger checking.
.
splint does many of the traditional lint checks including unused declarations,
type inconsistencies, use before definition, unreachable code, ignored return
values, execution paths with no return, likely infinite loops, and fall
through cases. Problems detected by Splint include:
.
* Dereferencing a possibly null pointer
* Using or returning storage that is undefined or not properly defined
* Type mismatches, with greater precision and flexibility than by C compilers
* Memory management errors like use of dangling references and memory leaks
* Inconsistent (with specified interface) global variable modification or use
* Problematic control flow such as likely infinite loops etc.
* Buffer overflow vulnerabilities
* Dangerous macro implementations or invocations
* Violations of customized naming conventions
Description-md5: 8e7e32bbdb6feca91226586802c3b837
Homepage: http://www.splint.org/
Bugs: https://bugs.launchpad.net/ubuntu/+filebug
Origin: Ubuntu