...
Tool | Version | Checker | Description | ||||||
|---|---|---|---|---|---|---|---|---|---|
| Astrée |
| stdlib-use-rand | Fully checkedSupported, but no explicit checker | ||||||
| Axivion Bauhaus Suite |
| CertC-MSC30 | |||||||
| Clang |
| cert-msc30-c | Checked by clang-tidy | ||||||
| CodeSonar |
| BADFUNC.RANDOM.RAND | Use of rand | ||||||
| Compass/ROSE | |||||||||
| Coverity |
| DONTCALL | Implemented - weak support | ||||||
| CC2.MSC30 | Fully implemented | |||||||
| LDRA tool suite |
| 44 S | Enhanced enforcement | ||||||
| Parasoft C/C++test |
| CERT_C-MSC30-a | Do not use the rand() function for generating pseudorandom numbers | ||||||
| Polyspace Bug Finder |
| Vulnerable pseudo-random number generator | Using a cryptographically weak pseudo-random number generator | ||||||
| PRQA QA-C |
| 5022 | Fully implemented | ||||||
| RuleChecker |
| stdlib-use-rand | Fully checked |
Related Vulnerabilities
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
...