Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/aboot-1.0~pre20200212/utils.c
Examining data/aboot-1.0~pre20200212/srmbootfat/msdos.h
Examining data/aboot-1.0~pre20200212/srmbootfat/srmbootfat.c
Examining data/aboot-1.0~pre20200212/srmbootfat/srmbootraw.c
Examining data/aboot-1.0~pre20200212/fs/ext2.c
Examining data/aboot-1.0~pre20200212/fs/iso.c
Examining data/aboot-1.0~pre20200212/fs/ufs.c
Examining data/aboot-1.0~pre20200212/fs/dummy.c
Examining data/aboot-1.0~pre20200212/b2c.c
Examining data/aboot-1.0~pre20200212/netabootwrap.c
Examining data/aboot-1.0~pre20200212/disk.c
Examining data/aboot-1.0~pre20200212/net.c
Examining data/aboot-1.0~pre20200212/netwrap.h
Examining data/aboot-1.0~pre20200212/lib/isolib.c
Examining data/aboot-1.0~pre20200212/lib/vsprintf.c
Examining data/aboot-1.0~pre20200212/lib/string.c
Examining data/aboot-1.0~pre20200212/lib/memcpy.c
Examining data/aboot-1.0~pre20200212/lib/memset.c
Examining data/aboot-1.0~pre20200212/sdisklabel/swriteboot.c
Examining data/aboot-1.0~pre20200212/sdisklabel/library.c
Examining data/aboot-1.0~pre20200212/sdisklabel/sdisklabel.c
Examining data/aboot-1.0~pre20200212/sdisklabel/library.h
Examining data/aboot-1.0~pre20200212/zip/gzip.h
Examining data/aboot-1.0~pre20200212/zip/unzip.c
Examining data/aboot-1.0~pre20200212/zip/misc.c
Examining data/aboot-1.0~pre20200212/zip/inflate.c
Examining data/aboot-1.0~pre20200212/cons.c
Examining data/aboot-1.0~pre20200212/tools/bio.c
Examining data/aboot-1.0~pre20200212/tools/abootconf.c
Examining data/aboot-1.0~pre20200212/tools/isomarkboot.c
Examining data/aboot-1.0~pre20200212/tools/e2writeboot.c
Examining data/aboot-1.0~pre20200212/tools/objstrip.c
Examining data/aboot-1.0~pre20200212/tools/e2lib.h
Examining data/aboot-1.0~pre20200212/tools/bio.h
Examining data/aboot-1.0~pre20200212/tools/e2lib.c
Examining data/aboot-1.0~pre20200212/tools/elfencap.c
Examining data/aboot-1.0~pre20200212/aboot.c
Examining data/aboot-1.0~pre20200212/include/setjmp.h
Examining data/aboot-1.0~pre20200212/include/aboot.h
Examining data/aboot-1.0~pre20200212/include/isolib.h
Examining data/aboot-1.0~pre20200212/include/utils.h
Examining data/aboot-1.0~pre20200212/include/disklabel.h
Examining data/aboot-1.0~pre20200212/include/system.h
Examining data/aboot-1.0~pre20200212/include/config.h
Examining data/aboot-1.0~pre20200212/include/hwrpb.h
Examining data/aboot-1.0~pre20200212/include/ext4.h
Examining data/aboot-1.0~pre20200212/include/iso.h
Examining data/aboot-1.0~pre20200212/include/bootfs.h
Examining data/aboot-1.0~pre20200212/include/pal.h
Examining data/aboot-1.0~pre20200212/include/ufs.h
Examining data/aboot-1.0~pre20200212/include/cons.h

FINAL RESULTS:

data/aboot-1.0~pre20200212/aboot.c:268:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy((char*)start_addr + PARAM_OFFSET, kernel_args);
data/aboot-1.0~pre20200212/disk.c:671:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					strcpy(buf, p);
data/aboot-1.0~pre20200212/disk.c:683:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					strcpy(initrd_file, p);
data/aboot-1.0~pre20200212/disk.c:693:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					strcpy(kernel_args, p);
data/aboot-1.0~pre20200212/disk.c:707:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(p, extra_args);
data/aboot-1.0~pre20200212/disk.c:716:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(kernel_args, p);
data/aboot-1.0~pre20200212/disk.c:718:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(boot_file, buf);
data/aboot-1.0~pre20200212/disk.c:740:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(p, e);
data/aboot-1.0~pre20200212/disk.c:742:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(initrd_file, a);
data/aboot-1.0~pre20200212/disk.c:753:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(boot_file, boot_file + 2);
data/aboot-1.0~pre20200212/fs/ext2.c:457:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(namebuf, name);
data/aboot-1.0~pre20200212/fs/ext2.c:615:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(fullname, linkto);
data/aboot-1.0~pre20200212/include/aboot.h:57:5:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
int vsprintf(char *, const char *, va_list);
data/aboot-1.0~pre20200212/include/utils.h:11:6:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
int		printf (const char *fmt, ...);
data/aboot-1.0~pre20200212/lib/isolib.c:483:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy(de->name, retname);
data/aboot-1.0~pre20200212/lib/isolib.c:646:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(fullname, linkto);
data/aboot-1.0~pre20200212/lib/isolib.c:1073:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(dirent->name, rrname);
data/aboot-1.0~pre20200212/lib/string.c:19:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
char * strcpy(char * dest,const char *src)
data/aboot-1.0~pre20200212/lib/string.c:38:8:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
char * strcat(char * dest, const char * src)
data/aboot-1.0~pre20200212/lib/vsprintf.c:143:5:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
int vsprintf(char *buf, const char *fmt, va_list args)
data/aboot-1.0~pre20200212/lib/vsprintf.c:306:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
int sprintf(char * buf, const char *fmt, ...)
data/aboot-1.0~pre20200212/lib/vsprintf.c:312:4:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
	i=vsprintf(buf,fmt,args);
data/aboot-1.0~pre20200212/tools/e2lib.c:54:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
ext2_init (char * name, int access)
data/aboot-1.0~pre20200212/tools/e2lib.c:64:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if((access != O_RDONLY) && (access != O_RDWR)) {
data/aboot-1.0~pre20200212/tools/e2lib.c:64:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if((access != O_RDONLY) && (access != O_RDWR)) {
data/aboot-1.0~pre20200212/tools/e2lib.c:67:3:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		access);
data/aboot-1.0~pre20200212/tools/e2lib.c:72:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    fd = open(name, access);
data/aboot-1.0~pre20200212/tools/e2lib.c:114:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(filename, name);
data/aboot-1.0~pre20200212/tools/e2lib.c:845:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(namebuf, name);
data/aboot-1.0~pre20200212/tools/e2lib.h:6:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
int 			ext2_init(char * name, int access);
data/aboot-1.0~pre20200212/tools/e2writeboot.c:68:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(fsname, argv[1]);
data/aboot-1.0~pre20200212/tools/e2writeboot.c:133:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(dirname, namebuf);
data/aboot-1.0~pre20200212/tools/e2writeboot.c:137:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(filename, cp+1);
data/aboot-1.0~pre20200212/tools/e2writeboot.c:140:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(filename, dirname);
data/aboot-1.0~pre20200212/utils.c:16:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
int printf(const char *fmt, ...)
data/aboot-1.0~pre20200212/utils.c:24:8:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
	len = vsprintf(buf, fmt, args);
data/aboot-1.0~pre20200212/aboot.c:177:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if ((e = getenv("BOOTED_FILE"))) {
data/aboot-1.0~pre20200212/aboot.c:183:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if ((e = getenv("BOOTED_OSFLAGS"))) {
data/aboot-1.0~pre20200212/disk.c:815:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if ((e = getenv("BOOTED_DEV"))) {
data/aboot-1.0~pre20200212/sdisklabel/swriteboot.c:57:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
   while ((c=getopt(argc,argv,"f:c:v?"))!=EOF)
data/aboot-1.0~pre20200212/tools/e2lib.c:125:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if(getenv("EXT2_VERBOSE")) {
data/aboot-1.0~pre20200212/aboot.c:44:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char		boot_file[256] = "";
data/aboot-1.0~pre20200212/aboot.c:45:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char		initrd_file[256] = "";
data/aboot-1.0~pre20200212/aboot.c:46:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char		kernel_args[256] = "";
data/aboot-1.0~pre20200212/aboot.c:156:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			bss_start = (char *) (phdrs[i].p_vaddr +
data/aboot-1.0~pre20200212/aboot.c:181:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(boot_file, "vmlinux.gz");
data/aboot-1.0~pre20200212/aboot.c:196:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(boot_file, "vmlinux.gz");
data/aboot-1.0~pre20200212/b2c.c:18:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	*fd = open(fn, O_RDONLY);
data/aboot-1.0~pre20200212/b2c.c:51:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	tfd = fopen(tfn, "w");
data/aboot-1.0~pre20200212/cons.c:52:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[2];
data/aboot-1.0~pre20200212/cons.c:80:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[maxlen];
data/aboot-1.0~pre20200212/cons.c:85:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(envval, tmp, len);
data/aboot-1.0~pre20200212/cons.c:109:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char readbuf[SECT_SIZE];		/* minimize frame size */
data/aboot-1.0~pre20200212/cons.c:152:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(buf, readbuf + blockoffset, iosize);
data/aboot-1.0~pre20200212/cons.c:178:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char envval[256];
data/aboot-1.0~pre20200212/disk.c:94:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		dest = (char *) chunks[i].addr;
data/aboot-1.0~pre20200212/disk.c:156:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		dest = (char *) chunks[i].addr;
data/aboot-1.0~pre20200212/disk.c:205:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = (*bfs->open)(filename);
data/aboot-1.0~pre20200212/disk.c:232:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = (*bfs->open)(initrd_file);
data/aboot-1.0~pre20200212/disk.c:269:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char lsect[512];
data/aboot-1.0~pre20200212/disk.c:353:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	int fd = (*fs->open)(dir);
data/aboot-1.0~pre20200212/disk.c:382:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = (*fs->open)(configs[i]);
data/aboot-1.0~pre20200212/disk.c:574:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[256], *p;
data/aboot-1.0~pre20200212/disk.c:809:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char envval[256];
data/aboot-1.0~pre20200212/fs/ext2.c:450:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char namebuf[256];
data/aboot-1.0~pre20200212/fs/ext2.c:612:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char fullname[(end - base + 1) + strlen(linkto) + 1];
data/aboot-1.0~pre20200212/fs/ufs.c:301:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buf[SBSIZE];	/* minimize frame size */
data/aboot-1.0~pre20200212/fs/ufs.c:342:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char namebuf[MAXPATHLEN+1];
data/aboot-1.0~pre20200212/fs/ufs.c:358:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(namebuf, path, (unsigned)(strlen(path) + 1));
data/aboot-1.0~pre20200212/fs/ufs.c:398:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&namebuf[link_len], cp, len);
data/aboot-1.0~pre20200212/fs/ufs.c:401:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(namebuf, fp->i_symlink, link_len);
data/aboot-1.0~pre20200212/include/aboot.h:28:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char		boot_file[256];
data/aboot-1.0~pre20200212/include/aboot.h:29:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char		initrd_file[256];
data/aboot-1.0~pre20200212/include/aboot.h:30:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char		kernel_args[256];
data/aboot-1.0~pre20200212/include/bootfs.h:12:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	int	(*open)(const char *filename);
data/aboot-1.0~pre20200212/include/cons.h:12:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#define cons_open(d)   open(d, O_RDONLY)
data/aboot-1.0~pre20200212/include/cons.h:44:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dsd[0];
data/aboot-1.0~pre20200212/include/hwrpb.h:172:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char ssn[16];		/* system serial number: big bother is watching */
data/aboot-1.0~pre20200212/include/iso.h:12:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char type[ISODCL(1,1)]; /* 711 */
data/aboot-1.0~pre20200212/include/iso.h:13:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id[ISODCL(2,6)];
data/aboot-1.0~pre20200212/include/iso.h:14:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char version[ISODCL(7,7)];
data/aboot-1.0~pre20200212/include/iso.h:15:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char data[ISODCL(8,2048)];
data/aboot-1.0~pre20200212/include/iso.h:25:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char type			[ISODCL (  1,   1)]; /* 711 */
data/aboot-1.0~pre20200212/include/iso.h:26:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id				[ISODCL (  2,   6)];
data/aboot-1.0~pre20200212/include/iso.h:27:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char version			[ISODCL (  7,   7)]; /* 711 */
data/aboot-1.0~pre20200212/include/iso.h:28:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char unused1			[ISODCL (  8,   8)];
data/aboot-1.0~pre20200212/include/iso.h:29:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char system_id			[ISODCL (  9,  40)]; /* achars */
data/aboot-1.0~pre20200212/include/iso.h:30:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char volume_id			[ISODCL ( 41,  72)]; /* dchars */
data/aboot-1.0~pre20200212/include/iso.h:31:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char unused2			[ISODCL ( 73,  80)];
data/aboot-1.0~pre20200212/include/iso.h:32:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char volume_space_size		[ISODCL ( 81,  88)]; /* 733 */
data/aboot-1.0~pre20200212/include/iso.h:33:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char unused3			[ISODCL ( 89, 120)];
data/aboot-1.0~pre20200212/include/iso.h:34:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char volume_set_size		[ISODCL (121, 124)]; /* 723 */
data/aboot-1.0~pre20200212/include/iso.h:35:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char volume_sequence_number	[ISODCL (125, 128)]; /* 723 */
data/aboot-1.0~pre20200212/include/iso.h:36:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char logical_block_size		[ISODCL (129, 132)]; /* 723 */
data/aboot-1.0~pre20200212/include/iso.h:37:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path_table_size		[ISODCL (133, 140)]; /* 733 */
data/aboot-1.0~pre20200212/include/iso.h:38:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char type_l_path_table		[ISODCL (141, 144)]; /* 731 */
data/aboot-1.0~pre20200212/include/iso.h:39:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char opt_type_l_path_table	[ISODCL (145, 148)]; /* 731 */
data/aboot-1.0~pre20200212/include/iso.h:40:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char type_m_path_table		[ISODCL (149, 152)]; /* 732 */
data/aboot-1.0~pre20200212/include/iso.h:41:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char opt_type_m_path_table	[ISODCL (153, 156)]; /* 732 */
data/aboot-1.0~pre20200212/include/iso.h:42:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char root_directory_record	[ISODCL (157, 190)]; /* 9.1 */
data/aboot-1.0~pre20200212/include/iso.h:43:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char volume_set_id		[ISODCL (191, 318)]; /* dchars */
data/aboot-1.0~pre20200212/include/iso.h:44:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char publisher_id		[ISODCL (319, 446)]; /* achars */
data/aboot-1.0~pre20200212/include/iso.h:45:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char preparer_id		[ISODCL (447, 574)]; /* achars */
data/aboot-1.0~pre20200212/include/iso.h:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char application_id		[ISODCL (575, 702)]; /* achars */
data/aboot-1.0~pre20200212/include/iso.h:47:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char copyright_file_id		[ISODCL (703, 739)]; /* 7.5 dchars */
data/aboot-1.0~pre20200212/include/iso.h:48:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char abstract_file_id		[ISODCL (740, 776)]; /* 7.5 dchars */
data/aboot-1.0~pre20200212/include/iso.h:49:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char bibliographic_file_id	[ISODCL (777, 813)]; /* 7.5 dchars */
data/aboot-1.0~pre20200212/include/iso.h:50:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char creation_date		[ISODCL (814, 830)]; /* 8.4.26.1 */
data/aboot-1.0~pre20200212/include/iso.h:51:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char modification_date		[ISODCL (831, 847)]; /* 8.4.26.1 */
data/aboot-1.0~pre20200212/include/iso.h:52:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char expiration_date		[ISODCL (848, 864)]; /* 8.4.26.1 */
data/aboot-1.0~pre20200212/include/iso.h:53:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char effective_date		[ISODCL (865, 881)]; /* 8.4.26.1 */
data/aboot-1.0~pre20200212/include/iso.h:54:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char file_structure_version	[ISODCL (882, 882)]; /* 711 */
data/aboot-1.0~pre20200212/include/iso.h:55:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char unused4			[ISODCL (883, 883)];
data/aboot-1.0~pre20200212/include/iso.h:56:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char application_data		[ISODCL (884, 1395)];
data/aboot-1.0~pre20200212/include/iso.h:57:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char unused5			[ISODCL (1396, 2048)];
data/aboot-1.0~pre20200212/include/iso.h:64:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char foo			[ISODCL (  1,   8)]; /* 733 */
data/aboot-1.0~pre20200212/include/iso.h:65:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char type			[ISODCL (  9,   9)]; /* 711 */
data/aboot-1.0~pre20200212/include/iso.h:66:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id				[ISODCL ( 10,  14)];
data/aboot-1.0~pre20200212/include/iso.h:67:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char version			[ISODCL ( 15,  15)]; /* 711 */
data/aboot-1.0~pre20200212/include/iso.h:68:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char data[ISODCL(16,2048)];
data/aboot-1.0~pre20200212/include/iso.h:73:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char foo			[ISODCL (  1,   8)]; /* 733 */
data/aboot-1.0~pre20200212/include/iso.h:74:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char type			[ISODCL (  9,   9)]; /* 711 */
data/aboot-1.0~pre20200212/include/iso.h:75:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id				[ISODCL ( 10,  14)];
data/aboot-1.0~pre20200212/include/iso.h:76:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char version			[ISODCL ( 15,  15)]; /* 711 */
data/aboot-1.0~pre20200212/include/iso.h:77:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char unused1			[ISODCL ( 16,  16)]; /* 711 */
data/aboot-1.0~pre20200212/include/iso.h:78:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char system_id			[ISODCL ( 17,  48)]; /* achars */
data/aboot-1.0~pre20200212/include/iso.h:79:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char volume_id			[ISODCL ( 49,  80)]; /* dchars */
data/aboot-1.0~pre20200212/include/iso.h:80:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char unused2			[ISODCL ( 81,  88)]; /* 733 */
data/aboot-1.0~pre20200212/include/iso.h:81:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char volume_space_size		[ISODCL ( 89,  96)]; /* 733 */
data/aboot-1.0~pre20200212/include/iso.h:82:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char unused3			[ISODCL ( 97, 128)]; /* 733 */
data/aboot-1.0~pre20200212/include/iso.h:83:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char volume_set_size		[ISODCL (129, 132)]; /* 723 */
data/aboot-1.0~pre20200212/include/iso.h:84:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char volume_sequence_number	[ISODCL (133, 136)]; /* 723 */
data/aboot-1.0~pre20200212/include/iso.h:85:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char logical_block_size		[ISODCL (137, 140)]; /* 723 */
data/aboot-1.0~pre20200212/include/iso.h:86:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path_table_size		[ISODCL (141, 148)]; /* 733 */
data/aboot-1.0~pre20200212/include/iso.h:87:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char type_l_path_table		[ISODCL (149, 152)]; /* 731 */
data/aboot-1.0~pre20200212/include/iso.h:88:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char unused4			[ISODCL (153, 180)]; /* 733 */
data/aboot-1.0~pre20200212/include/iso.h:89:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char root_directory_record	[ISODCL (181, 214)]; /* 9.1 */
data/aboot-1.0~pre20200212/include/iso.h:95:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char  name_len[2];	/* 721 */
data/aboot-1.0~pre20200212/include/iso.h:96:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char extent[4];		/* 731 */
data/aboot-1.0~pre20200212/include/iso.h:97:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char  parent[2];	/* 721 */
data/aboot-1.0~pre20200212/include/iso.h:98:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[0];
data/aboot-1.0~pre20200212/include/iso.h:105:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char length			[ISODCL (1, 1)]; /* 711 */
data/aboot-1.0~pre20200212/include/iso.h:106:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ext_attr_length		[ISODCL (2, 2)]; /* 711 */
data/aboot-1.0~pre20200212/include/iso.h:107:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char extent			[ISODCL (3, 10)]; /* 733 */
data/aboot-1.0~pre20200212/include/iso.h:108:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char size			[ISODCL (11, 18)]; /* 733 */
data/aboot-1.0~pre20200212/include/iso.h:109:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char date			[ISODCL (19, 25)]; /* 7 by 711 */
data/aboot-1.0~pre20200212/include/iso.h:110:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char flags			[ISODCL (26, 26)];
data/aboot-1.0~pre20200212/include/iso.h:111:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char file_unit_size		[ISODCL (27, 27)]; /* 711 */
data/aboot-1.0~pre20200212/include/iso.h:112:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char interleave			[ISODCL (28, 28)]; /* 711 */
data/aboot-1.0~pre20200212/include/iso.h:113:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char volume_sequence_number	[ISODCL (29, 32)]; /* 723 */
data/aboot-1.0~pre20200212/include/iso.h:114:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char name_len		[ISODCL (33, 33)]; /* 711 */
data/aboot-1.0~pre20200212/include/iso.h:115:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name			[0];
data/aboot-1.0~pre20200212/include/iso.h:185:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char magic[2];
data/aboot-1.0~pre20200212/include/iso.h:190:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char extent[8];
data/aboot-1.0~pre20200212/include/iso.h:191:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char offset[8];
data/aboot-1.0~pre20200212/include/iso.h:192:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char size[8];
data/aboot-1.0~pre20200212/include/iso.h:200:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char data[0];
data/aboot-1.0~pre20200212/include/iso.h:204:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char flags[1];
data/aboot-1.0~pre20200212/include/iso.h:208:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char mode[8];
data/aboot-1.0~pre20200212/include/iso.h:209:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char n_links[8];
data/aboot-1.0~pre20200212/include/iso.h:210:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char uid[8];
data/aboot-1.0~pre20200212/include/iso.h:211:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char gid[8];
data/aboot-1.0~pre20200212/include/iso.h:215:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dev_high[8];
data/aboot-1.0~pre20200212/include/iso.h:216:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dev_low[8];
data/aboot-1.0~pre20200212/include/iso.h:223:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char text[0];
data/aboot-1.0~pre20200212/include/iso.h:233:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name[0];
data/aboot-1.0~pre20200212/include/iso.h:237:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char location[8];
data/aboot-1.0~pre20200212/include/iso.h:241:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char location[8];
data/aboot-1.0~pre20200212/include/iso.h:245:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char time[7];
data/aboot-1.0~pre20200212/include/iso.h:264:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char signature[2];
data/aboot-1.0~pre20200212/include/ufs.h:286:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	fs_fsmnt[MAXMNTLEN];	/* name mounted on */
data/aboot-1.0~pre20200212/include/ufs.h:405:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	cg_iused[256];		/* used inode map */
data/aboot-1.0~pre20200212/include/ufs.h:576:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	d_name[MAXNAMLEN + 1];	/* name with length <= MAXNAMLEN */
data/aboot-1.0~pre20200212/include/ufs.h:619:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char	ic_Msymlink[MAX_FASTLINK_SIZE];
data/aboot-1.0~pre20200212/include/ufs.h:674:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char		di_char[128];
data/aboot-1.0~pre20200212/lib/isolib.c:34:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char data_block[1024];
data/aboot-1.0~pre20200212/lib/isolib.c:35:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char big_data_block[2048];
data/aboot-1.0~pre20200212/lib/isolib.c:224:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cpnt, data_block + offset, frag1);
data/aboot-1.0~pre20200212/lib/isolib.c:234:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *)cpnt+frag1, data_block, offset);
data/aboot-1.0~pre20200212/lib/isolib.c:444:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(cpnt, data_block + old_offset, frag1);
data/aboot-1.0~pre20200212/lib/isolib.c:454:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((char *)cpnt+frag1, data_block, offset);
data/aboot-1.0~pre20200212/lib/isolib.c:480:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		  char retname[256];
data/aboot-1.0~pre20200212/lib/isolib.c:643:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char fullname[(end - basename + 1) + strlen(linkto) + 1];
data/aboot-1.0~pre20200212/lib/isolib.c:1023:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(big_data_block, data_block + oldoffset, fraglen);
data/aboot-1.0~pre20200212/lib/isolib.c:1068:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char rrname[256];
data/aboot-1.0~pre20200212/lib/isolib.c:1111:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(data_block, big_data_block + dirent_len, len);
data/aboot-1.0~pre20200212/lib/isolib.c:1518:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	   strcat(rpnt,"..");
data/aboot-1.0~pre20200212/lib/string.c:187:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
void * memcpy(void * dest,const void *src,size_t count)
data/aboot-1.0~pre20200212/lib/vsprintf.c:79:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char c,sign,tmp[66];
data/aboot-1.0~pre20200212/net.c:32:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char boot_file[256];
data/aboot-1.0~pre20200212/net.c:55:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buf, src, nbytes);
data/aboot-1.0~pre20200212/net.c:125:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(boot_file, "network");
data/aboot-1.0~pre20200212/net.c:130:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(src, kern_src, kern_size);
data/aboot-1.0~pre20200212/netabootwrap.c:27:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	*fd = open(fn, O_RDONLY);
data/aboot-1.0~pre20200212/netabootwrap.c:47:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[4096];
data/aboot-1.0~pre20200212/netabootwrap.c:146:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	tfd = open(tfn, O_RDWR|O_CREAT, 0644);
data/aboot-1.0~pre20200212/netwrap.h:5:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char boot_arg[200];
data/aboot-1.0~pre20200212/sdisklabel/library.c:33:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&buf[LABELOFFSET/sizeof(u_int64_t)],d,sizeof(*d));
data/aboot-1.0~pre20200212/sdisklabel/sdisklabel.c:39:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(d->d_typename, "SCSI", 5);
data/aboot-1.0~pre20200212/sdisklabel/sdisklabel.c:177:5:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd=open(argv[1],O_RDWR);
data/aboot-1.0~pre20200212/sdisklabel/sdisklabel.c:195:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			total_disk_size=atoi(argv[x+1]);
data/aboot-1.0~pre20200212/sdisklabel/sdisklabel.c:216:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				int partnum=atoi(argv[x]);
data/aboot-1.0~pre20200212/sdisklabel/sdisklabel.c:217:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				int offset=atoi(argv[x+1]);
data/aboot-1.0~pre20200212/sdisklabel/sdisklabel.c:218:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				int size=atoi(argv[x+2]);
data/aboot-1.0~pre20200212/sdisklabel/sdisklabel.c:219:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				int fstype=atoi(argv[x+3]);
data/aboot-1.0~pre20200212/sdisklabel/swriteboot.c:48:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[2048];
data/aboot-1.0~pre20200212/sdisklabel/swriteboot.c:64:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	 part = atoi(optarg);
data/aboot-1.0~pre20200212/sdisklabel/swriteboot.c:73:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	 bootpart = atoi(optarg);
data/aboot-1.0~pre20200212/sdisklabel/swriteboot.c:102:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   disk_fd=open(device,O_RDWR);
data/aboot-1.0~pre20200212/sdisklabel/swriteboot.c:103:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   file_fd=open(bootfile,O_RDONLY);
data/aboot-1.0~pre20200212/sdisklabel/swriteboot.c:115:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
     kernel_fd=open(kernel,O_RDONLY);
data/aboot-1.0~pre20200212/srmbootfat/msdos.h:23:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[8];			/*  0 file name */
data/aboot-1.0~pre20200212/srmbootfat/msdos.h:24:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ext[3];			/*  8 file extension */
data/aboot-1.0~pre20200212/srmbootfat/msdos.h:28:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char ctime[2];		/* 14 creation time */
data/aboot-1.0~pre20200212/srmbootfat/msdos.h:29:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char cdate[2];		/* 16 creation date */
data/aboot-1.0~pre20200212/srmbootfat/msdos.h:30:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char adate[2];		/* 18 last access date */
data/aboot-1.0~pre20200212/srmbootfat/msdos.h:31:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char startHi[2];	/* 20 start cluster, Hi */
data/aboot-1.0~pre20200212/srmbootfat/msdos.h:32:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char time[2];		/* 22 time stamp */
data/aboot-1.0~pre20200212/srmbootfat/msdos.h:33:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char date[2];		/* 24 date stamp */
data/aboot-1.0~pre20200212/srmbootfat/msdos.h:34:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char start[2];		/* 26 starting cluster number */
data/aboot-1.0~pre20200212/srmbootfat/msdos.h:35:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char size[4];		/* 28 size of the file */
data/aboot-1.0~pre20200212/srmbootfat/msdos.h:47:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char signature0[4];
data/aboot-1.0~pre20200212/srmbootfat/msdos.h:48:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char filler[0x1e0];
data/aboot-1.0~pre20200212/srmbootfat/msdos.h:49:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char signature[4];
data/aboot-1.0~pre20200212/srmbootfat/msdos.h:50:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char count[4];
data/aboot-1.0~pre20200212/srmbootfat/msdos.h:51:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char pos[4];
data/aboot-1.0~pre20200212/srmbootfat/msdos.h:60:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char bigFat[4];	/* 36 nb of sectors per FAT */
data/aboot-1.0~pre20200212/srmbootfat/msdos.h:61:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char extFlags[2];     	/* 40 extension flags */
data/aboot-1.0~pre20200212/srmbootfat/msdos.h:62:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char fsVersion[2];	/* 42 ? */
data/aboot-1.0~pre20200212/srmbootfat/msdos.h:63:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char rootCluster[4];	/* 44 start cluster of root dir */
data/aboot-1.0~pre20200212/srmbootfat/msdos.h:64:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char infoSector[2];	/* 48 changeable global info */
data/aboot-1.0~pre20200212/srmbootfat/msdos.h:65:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char backupBoot[2];	/* 50 back up boot sector */
data/aboot-1.0~pre20200212/srmbootfat/msdos.h:66:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char reserved[6];	/* 52 ? */
data/aboot-1.0~pre20200212/srmbootfat/msdos.h:73:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char serial[4];       	/* 39 serial number */
data/aboot-1.0~pre20200212/srmbootfat/msdos.h:74:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char label[11];			/* 43 disk label */
data/aboot-1.0~pre20200212/srmbootfat/msdos.h:75:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fat_type[8];		/* 54 FAT type */
data/aboot-1.0~pre20200212/srmbootfat/msdos.h:83:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char BootP[2];		/* 68 offset to boot program */
data/aboot-1.0~pre20200212/srmbootfat/msdos.h:84:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char Infp0[2];		/* 70 T1: information for track 0 */
data/aboot-1.0~pre20200212/srmbootfat/msdos.h:85:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char InfpX[2];		/* 72 T2: information for track<>0 */
data/aboot-1.0~pre20200212/srmbootfat/msdos.h:86:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char InfTm[2];		/* 74 T3: track sectors size table */
data/aboot-1.0~pre20200212/srmbootfat/msdos.h:87:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char DateF[2];		/* 76 Format date */
data/aboot-1.0~pre20200212/srmbootfat/msdos.h:88:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char TimeF[2];		/* 78 Format time */
data/aboot-1.0~pre20200212/srmbootfat/msdos.h:89:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char junk[1024 - 80];	/* 80 remaining data */
data/aboot-1.0~pre20200212/srmbootfat/msdos.h:93:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char jump[3];		/* 0  Jump to boot code */
data/aboot-1.0~pre20200212/srmbootfat/msdos.h:94:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char banner[8];		       	/* 3  OEM name & version */
data/aboot-1.0~pre20200212/srmbootfat/msdos.h:95:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char secsiz[2];	/* 11 Bytes per sector hopefully 512 */
data/aboot-1.0~pre20200212/srmbootfat/msdos.h:97:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char nrsvsect[2];	/* 14 Number of reserved (boot) sectors */
data/aboot-1.0~pre20200212/srmbootfat/msdos.h:99:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char dirents[2];	/* 17 Number of directory slots */
data/aboot-1.0~pre20200212/srmbootfat/msdos.h:100:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char psect[2]; 	/* 19 Total sectors on disk */
data/aboot-1.0~pre20200212/srmbootfat/msdos.h:102:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char fatlen[2];	/* 22 Sectors in FAT */
data/aboot-1.0~pre20200212/srmbootfat/msdos.h:103:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char nsect[2];		/* 24 Sectors/track */
data/aboot-1.0~pre20200212/srmbootfat/msdos.h:104:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char nheads[2];	/* 26 Heads */
data/aboot-1.0~pre20200212/srmbootfat/msdos.h:105:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char nhs[4];		/* 28 number of hidden sectors */
data/aboot-1.0~pre20200212/srmbootfat/msdos.h:106:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char bigsect[4];	/* 32 big total sectors */
data/aboot-1.0~pre20200212/srmbootfat/srmbootfat.c:40:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char textlabel[64];
data/aboot-1.0~pre20200212/srmbootfat/srmbootfat.c:41:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char disklabel[276];
data/aboot-1.0~pre20200212/srmbootfat/srmbootfat.c:42:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char unused[140];
data/aboot-1.0~pre20200212/srmbootfat/srmbootfat.c:114:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dosname[12];
data/aboot-1.0~pre20200212/srmbootfat/srmbootfat.c:119:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((f = open (argv[1], O_RDWR)) < 0)
data/aboot-1.0~pre20200212/srmbootfat/srmbootraw.c:31:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char textlabel[64];
data/aboot-1.0~pre20200212/srmbootfat/srmbootraw.c:32:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char disklabel[276];
data/aboot-1.0~pre20200212/srmbootfat/srmbootraw.c:33:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char unused[140];
data/aboot-1.0~pre20200212/srmbootfat/srmbootraw.c:57:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((device = open (argv[1], O_RDWR)) < 0)
data/aboot-1.0~pre20200212/srmbootfat/srmbootraw.c:59:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((image = open (argv[2], O_RDONLY)) < 0)
data/aboot-1.0~pre20200212/tools/abootconf.c:59:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	disk = open(argv[1], part < 0 ? O_RDONLY : O_RDWR);
data/aboot-1.0~pre20200212/tools/abootconf.c:113:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	sector[i + 1] = atoi(argv[2]);
data/aboot-1.0~pre20200212/tools/bio.c:80:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(blkbuf, buflist[i].data, bio_blocksize);
data/aboot-1.0~pre20200212/tools/bio.c:120:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(blkbuf, buflist[lowcount_buf].data, bio_blocksize);
data/aboot-1.0~pre20200212/tools/bio.c:140:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(buflist[i].data, blkbuf, bio_blocksize);
data/aboot-1.0~pre20200212/tools/bio.c:176:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buflist[lowcount_buf].data, blkbuf, bio_blocksize);
data/aboot-1.0~pre20200212/tools/e2lib.c:33:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char				filename[256];
data/aboot-1.0~pre20200212/tools/e2lib.c:72:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open(name, access);
data/aboot-1.0~pre20200212/tools/e2lib.c:202:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                        inobuf[EXT2_MAX_BLOCK_SIZE];
data/aboot-1.0~pre20200212/tools/e2lib.c:223:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ip, &(inobuf[byteoffset]), sizeof(struct ext2_inode));
data/aboot-1.0~pre20200212/tools/e2lib.c:242:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                        inobuf[EXT2_MAX_BLOCK_SIZE];
data/aboot-1.0~pre20200212/tools/e2lib.c:263:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&(inobuf[byteoffset]), ip, sizeof(struct ext2_inode));
data/aboot-1.0~pre20200212/tools/e2lib.c:499:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	blkbuf[EXT2_MAX_BLOCK_SIZE];
data/aboot-1.0~pre20200212/tools/e2lib.c:650:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char		blkbuf[EXT2_MAX_BLOCK_SIZE];
data/aboot-1.0~pre20200212/tools/e2lib.c:837:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char 	namebuf[256];
data/aboot-1.0~pre20200212/tools/e2lib.c:838:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char 	dirbuf[EXT2_MAX_BLOCK_SIZE];
data/aboot-1.0~pre20200212/tools/e2lib.c:929:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char dirbuf[EXT2_MAX_BLOCK_SIZE];
data/aboot-1.0~pre20200212/tools/e2writeboot.c:47:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char		fsname[512];
data/aboot-1.0~pre20200212/tools/e2writeboot.c:48:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char		iobuf[1024];
data/aboot-1.0~pre20200212/tools/e2writeboot.c:49:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char		namebuf[EXT2_NAME_LEN+1];
data/aboot-1.0~pre20200212/tools/e2writeboot.c:69:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(namebuf, "/linuxboot");
data/aboot-1.0~pre20200212/tools/e2writeboot.c:78:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    infile = open(argv[2], 0);
data/aboot-1.0~pre20200212/tools/e2writeboot.c:126:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	dirname[EXT2_NAME_LEN+1];
data/aboot-1.0~pre20200212/tools/e2writeboot.c:127:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	filename[EXT2_NAME_LEN+1];
data/aboot-1.0~pre20200212/tools/elfencap.c:16:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[8192];
data/aboot-1.0~pre20200212/tools/elfencap.c:23:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    ifd = open(argv[1], O_RDONLY);
data/aboot-1.0~pre20200212/tools/elfencap.c:37:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&h.ehdr.e_ident[1], "ELF", 4);
data/aboot-1.0~pre20200212/tools/isomarkboot.c:43:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy (dest, src, n);
data/aboot-1.0~pre20200212/tools/isomarkboot.c:96:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char root_start[100];
data/aboot-1.0~pre20200212/tools/isomarkboot.c:104:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	disk = open(argv[1], O_RDWR);
data/aboot-1.0~pre20200212/tools/isomarkboot.c:147:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy((char *) sector, "Linux/Alpha aboot for ISO filesystem.");
data/aboot-1.0~pre20200212/tools/isomarkboot.c:220:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(root_start,"ROOT START=%ld        ",rootbin_pos/2048);
data/aboot-1.0~pre20200212/tools/isomarkboot.c:222:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(vol_desc.application_data,root_start,strlen(root_start));
data/aboot-1.0~pre20200212/tools/objstrip.c:56:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[8192], *inname;
data/aboot-1.0~pre20200212/tools/objstrip.c:90:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open(inname, O_RDONLY);
data/aboot-1.0~pre20200212/tools/objstrip.c:98:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	ofd = open(argv[i++], O_WRONLY | O_CREAT | O_TRUNC, 0666);
data/aboot-1.0~pre20200212/tools/objstrip.c:124:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy((char *) bb, "Linux SRM bootblock");
data/aboot-1.0~pre20200212/utils.c:18:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buf[1024];
data/aboot-1.0~pre20200212/zip/inflate.c:423:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(slide + w, slide + d, e);
data/aboot-1.0~pre20200212/zip/misc.c:156:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char magic[2]; /* magic header */
data/aboot-1.0~pre20200212/zip/misc.c:272:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			(unsigned char *) chunks[chunk].addr + chunk_offset;
data/aboot-1.0~pre20200212/zip/misc.c:279:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			dest = (unsigned char *) chunks[chunk].addr;
data/aboot-1.0~pre20200212/zip/misc.c:302:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dest, src, to_copy);
data/aboot-1.0~pre20200212/zip/unzip.c:55:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[EXTHDR];        /* extended local header */
data/aboot-1.0~pre20200212/aboot.c:178:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(boot_file, e, sizeof(boot_file)-1);
data/aboot-1.0~pre20200212/aboot.c:184:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(kernel_args, e, sizeof(kernel_args)-1);
data/aboot-1.0~pre20200212/aboot.c:187:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
		strcpy(kernel_args, "i");
data/aboot-1.0~pre20200212/aboot.c:203:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
		strcpy(kernel_args, "i");
data/aboot-1.0~pre20200212/b2c.c:55:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while((red=read(sfd, buf, 1024*sizeof(int)))) {
data/aboot-1.0~pre20200212/cons.c:95:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return dispatch(CCB_OPEN, devname, strlen(devname));
data/aboot-1.0~pre20200212/disk.c:196:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(filename);
data/aboot-1.0~pre20200212/disk.c:610:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			buf[strlen(buf)-1] = 0;
data/aboot-1.0~pre20200212/disk.c:738:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
				strncpy(initrd_file, a, e-a);
data/aboot-1.0~pre20200212/disk.c:816:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(envval, e, sizeof(envval)-1);
data/aboot-1.0~pre20200212/disk.c:845:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
		strcpy(kernel_args, "i");
data/aboot-1.0~pre20200212/fs/ext2.c:475:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		component_length = strlen(component);
data/aboot-1.0~pre20200212/fs/ext2.c:612:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			char fullname[(end - base + 1) + strlen(linkto) + 1];
data/aboot-1.0~pre20200212/fs/ext2.c:613:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(fullname, base, end - base + 1);
data/aboot-1.0~pre20200212/fs/ufs.c:266:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(name);
data/aboot-1.0~pre20200212/fs/ufs.c:358:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	memcpy(namebuf, path, (unsigned)(strlen(path) + 1));
data/aboot-1.0~pre20200212/fs/ufs.c:389:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			len = strlen(cp) + 1;
data/aboot-1.0~pre20200212/include/cons.h:11:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define cons_puts(s,l) puts(s, strlen(s))
data/aboot-1.0~pre20200212/include/cons.h:14:47:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#define cons_read(d,b,c,o) ({ lseek(d, o, 0); read(d,b,c);})
data/aboot-1.0~pre20200212/include/cons.h:16:28:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#define cons_getchar()     getchar()
data/aboot-1.0~pre20200212/lib/isolib.c:570:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	while (last < (int) strlen(name)) {
data/aboot-1.0~pre20200212/lib/isolib.c:643:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			char fullname[(end - basename + 1) + strlen(linkto) + 1];
data/aboot-1.0~pre20200212/lib/isolib.c:644:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(fullname, basename, end - basename + 1);
data/aboot-1.0~pre20200212/lib/isolib.c:1233:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if((strlen(retname) + rr->len - 5) >= 254) {
data/aboot-1.0~pre20200212/lib/isolib.c:1234:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    int i = 254-strlen(retname);
data/aboot-1.0~pre20200212/lib/isolib.c:1235:6:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
	    strncat(retname, rr->u.NM.name, i);
data/aboot-1.0~pre20200212/lib/isolib.c:1240:2:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
	strncat(retname, rr->u.NM.name, rr->len - 5);
data/aboot-1.0~pre20200212/lib/isolib.c:1512:5:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
	   strncat(rpnt,slp->text, slp->len);
data/aboot-1.0~pre20200212/lib/isolib.c:1515:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	   strcat(rpnt,".");
data/aboot-1.0~pre20200212/lib/isolib.c:1522:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	   strcat(rpnt,"/");
data/aboot-1.0~pre20200212/lib/isolib.c:1540:41:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	       && ((oldslp->flags & 1) == 0) ) strcat(rpnt,"/");
data/aboot-1.0~pre20200212/lib/isolib.c:1548:38:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	    && ((oldslp->flags & 1) == 0) ) strcat(rpnt,"/");
data/aboot-1.0~pre20200212/lib/string.c:28:8:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
char * strncpy(char * dest,const char *src,size_t count)
data/aboot-1.0~pre20200212/lib/string.c:50:8:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
char * strncat(char *dest, const char *src, size_t count)
data/aboot-1.0~pre20200212/lib/string.c:107:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
size_t strlen(const char * s)
data/aboot-1.0~pre20200212/net.c:137:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(kernel_args, header->boot_arg, header_size - sizeof(int)*3);
data/aboot-1.0~pre20200212/netabootwrap.c:50:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while ((red=read(sfd, buf, 4096)))
data/aboot-1.0~pre20200212/netabootwrap.c:158:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(barg) >= 200) {
data/aboot-1.0~pre20200212/netabootwrap.c:162:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(hdr.boot_arg, barg, strlen(barg)+1);
data/aboot-1.0~pre20200212/netabootwrap.c:162:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strncpy(hdr.boot_arg, barg, strlen(barg)+1);
data/aboot-1.0~pre20200212/netabootwrap.c:163:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		hdr.header_size += strlen(barg)+1;
data/aboot-1.0~pre20200212/sdisklabel/library.c:12:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   if(read(fd,d,sizeof(*d))!=sizeof(*d)) {
data/aboot-1.0~pre20200212/sdisklabel/library.c:30:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if(read(fd,buf,64*sizeof(u_int64_t))!=(64*sizeof(u_int64_t))) {
data/aboot-1.0~pre20200212/sdisklabel/swriteboot.c:27:3:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  read(disk_fd, &bootsize, sizeof(bootsize));
data/aboot-1.0~pre20200212/sdisklabel/swriteboot.c:28:3:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  read(disk_fd, &bootsect, sizeof(bootsect));
data/aboot-1.0~pre20200212/sdisklabel/swriteboot.c:32:3:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  read(disk_fd, buf, SECT_SIZE);
data/aboot-1.0~pre20200212/sdisklabel/swriteboot.c:179:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   while((x=read(file_fd,buf,2048))>0) {
data/aboot-1.0~pre20200212/sdisklabel/swriteboot.c:195:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
     while((x=read(kernel_fd,buf,2048))>0)
data/aboot-1.0~pre20200212/sdisklabel/swriteboot.c:212:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
     read(disk_fd, buf, SECT_SIZE);
data/aboot-1.0~pre20200212/srmbootfat/srmbootfat.c:122:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (read (f, &boot, sizeof boot) != sizeof boot)
data/aboot-1.0~pre20200212/srmbootfat/srmbootfat.c:167:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	 || read (f, fat, i) != i
data/aboot-1.0~pre20200212/srmbootfat/srmbootfat.c:169:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	 || read (f, rootdir, dirents * MDIR_SIZE) != dirents * MDIR_SIZE)
data/aboot-1.0~pre20200212/srmbootfat/srmbootraw.c:63:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (read (device, &boot, sizeof boot) != sizeof boot)
data/aboot-1.0~pre20200212/srmbootfat/srmbootraw.c:71:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while ((len = read (image, buf, BUFSIZE)) > 0)
data/aboot-1.0~pre20200212/tools/abootconf.c:65:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	nbytes = read(disk, sector, sizeof(sector));
data/aboot-1.0~pre20200212/tools/abootconf.c:82:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	nbytes = read(disk, sector, sizeof(sector));
data/aboot-1.0~pre20200212/tools/bio.c:115:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if(read(bio_fd,buflist[lowcount_buf].data,bio_blocksize)!=bio_blocksize) {
data/aboot-1.0~pre20200212/tools/e2lib.c:84:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if(read(fd, &sb, sizeof(sb)) != sizeof(sb)) {
data/aboot-1.0~pre20200212/tools/e2lib.c:107:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if ((size_t) read(fd, gds, ngroups * sizeof(struct ext2_group_desc))
data/aboot-1.0~pre20200212/tools/e2lib.c:861:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	component_length = strlen(component);
data/aboot-1.0~pre20200212/tools/e2lib.c:932:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    namelen = strlen(name);
data/aboot-1.0~pre20200212/tools/e2lib.c:1004:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(entry_dp->name, name, namelen);
data/aboot-1.0~pre20200212/tools/e2lib.c:1011:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(entry_dp->name, name, namelen);
data/aboot-1.0~pre20200212/tools/e2writeboot.c:105:5:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    read(infile, bsbuf, bootstrap_size);
data/aboot-1.0~pre20200212/tools/e2writeboot.c:141:6:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
	    strcpy(dirname, "/");
data/aboot-1.0~pre20200212/tools/elfencap.c:54:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    while ((n = read(ifd, buf, sizeof(buf))) > 0) {
data/aboot-1.0~pre20200212/tools/isomarkboot.c:53:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	return read(disk, buf, size);
data/aboot-1.0~pre20200212/tools/isomarkboot.c:137:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	nbytes = read(disk, sector, sizeof(sector));
data/aboot-1.0~pre20200212/tools/isomarkboot.c:198:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	nbytes = read(disk, &vol_desc, sizeof(vol_desc));
data/aboot-1.0~pre20200212/tools/isomarkboot.c:222:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        memcpy(vol_desc.application_data,root_start,strlen(root_start));
data/aboot-1.0~pre20200212/tools/objstrip.c:142:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if (read(fd, buf, sizeof(buf)) < 0) {
data/aboot-1.0~pre20200212/tools/objstrip.c:170:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (read(fd, buf, sizeof(*elf_phdr)) != sizeof(*elf_phdr)) {
data/aboot-1.0~pre20200212/tools/objstrip.c:244:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if ((size_t) read(fd, buf, n) != n) {

ANALYSIS SUMMARY:

Hits = 381
Lines analyzed = 12204 in approximately 0.34 seconds (35970 lines/second)
Physical Source Lines of Code (SLOC) = 8793
Hits@level = [0] 368 [1]  73 [2] 267 [3]   5 [4]  36 [5]   0
Hits@level+ = [0+] 749 [1+] 381 [2+] 308 [3+]  41 [4+]  36 [5+]   0
Hits/KSLOC@level+ = [0+] 85.1814 [1+] 43.3299 [2+] 35.0279 [3+] 4.6628 [4+] 4.09417 [5+]   0
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.