Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/fence-agents-4.6.0/agents/kdump/fence_kdump.c
Examining data/fence-agents-4.6.0/agents/kdump/fence_kdump_send.c
Examining data/fence-agents-4.6.0/agents/kdump/list.h
Examining data/fence-agents-4.6.0/agents/kdump/message.h
Examining data/fence-agents-4.6.0/agents/kdump/options.h
Examining data/fence-agents-4.6.0/agents/kdump/version.h
Examining data/fence-agents-4.6.0/agents/zvm/fence_zvm.c
Examining data/fence-agents-4.6.0/agents/zvm/fence_zvm.h
Examining data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c

FINAL RESULTS:

data/fence-agents-4.6.0/agents/kdump/fence_kdump.c:46:9:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        fprintf (stdout, "[debug]: " fmt, ##args); \
data/fence-agents-4.6.0/agents/kdump/fence_kdump.c:47:9:  [4] (format) syslog:
  If syslog's format strings can be influenced by an attacker, they can be
  exploited (CWE-134). Use a constant format string for syslog.
        syslog (LOG_INFO, fmt, ##args);            \
data/fence-agents-4.6.0/agents/kdump/fence_kdump.c:54:9:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        fprintf (stderr, "[error]: " fmt, ##args); \
data/fence-agents-4.6.0/agents/kdump/fence_kdump.c:55:9:  [4] (format) syslog:
  If syslog's format strings can be influenced by an attacker, they can be
  exploited (CWE-134). Use a constant format string for syslog.
        syslog (LOG_ERR, fmt, ##args);             \
data/fence-agents-4.6.0/agents/kdump/fence_kdump_send.c:46:9:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        fprintf (stdout, "[debug]: " fmt, ##args); \
data/fence-agents-4.6.0/agents/kdump/fence_kdump_send.c:52:9:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        fprintf (stderr, "[error]: " fmt, ##args); \
data/fence-agents-4.6.0/agents/kdump/fence_kdump.c:427:19:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
    while ((opt = getopt_long (argc, argv, "n:p:f:o:t:v::Vh", options, NULL)) != EOF) {
data/fence-agents-4.6.0/agents/kdump/fence_kdump_send.c:170:19:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
    while ((opt = getopt_long (argc, argv, "p:f:c:i:v::Vh", options, NULL)) != EOF) {
data/fence-agents-4.6.0/agents/zvm/fence_zvm.c:782:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, optString, longopts, NULL)) != -1) {
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:751:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, optString, longopts, NULL)) != -1) {
data/fence-agents-4.6.0/agents/kdump/fence_kdump.c:88:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char addr[NI_MAXHOST];
data/fence-agents-4.6.0/agents/kdump/fence_kdump.c:89:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char port[NI_MAXSERV];
data/fence-agents-4.6.0/agents/kdump/fence_kdump.c:126:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    procFile = fopen(cmdline_path, "r");
data/fence-agents-4.6.0/agents/kdump/fence_kdump.c:467:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1024];
data/fence-agents-4.6.0/agents/kdump/options.h:69:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[FENCE_KDUMP_NAME_LEN];
data/fence-agents-4.6.0/agents/kdump/options.h:70:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char addr[FENCE_KDUMP_ADDR_LEN];
data/fence-agents-4.6.0/agents/kdump/options.h:71:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char port[FENCE_KDUMP_PORT_LEN];
data/fence-agents-4.6.0/agents/kdump/options.h:163:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    opts->ipport = atoi (arg);
data/fence-agents-4.6.0/agents/kdump/options.h:206:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    opts->count = atoi (arg);
data/fence-agents-4.6.0/agents/kdump/options.h:217:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    opts->interval = atoi (arg);
data/fence-agents-4.6.0/agents/kdump/options.h:228:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    opts->timeout = atoi (arg);
data/fence-agents-4.6.0/agents/kdump/options.h:240:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        opts->verbose = atoi (arg);
data/fence-agents-4.6.0/agents/zvm/fence_zvm.c:93:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char iucvprog[9] = "DMSRSRQU\0";
data/fence-agents-4.6.0/agents/zvm/fence_zvm.c:107:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&siucv_addr.siucv_user_id,zvm->smapiSrv,strlen(zvm->smapiSrv));
data/fence-agents-4.6.0/agents/zvm/fence_zvm.c:108:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&siucv_addr.siucv_name,&iucvprog,8);
data/fence-agents-4.6.0/agents/zvm/fence_zvm.c:109:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&siucv_addr.siucv_nodeid,zvm->node,strlen(zvm->node));
data/fence-agents-4.6.0/agents/zvm/fence_zvm.c:132:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	fName[13];
data/fence-agents-4.6.0/agents/zvm/fence_zvm.c:136:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	target[0];
data/fence-agents-4.6.0/agents/zvm/fence_zvm.c:144:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	failArray[0];
data/fence-agents-4.6.0/agents/zvm/fence_zvm.c:165:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(inPlist->target, zvm->target, inPlist->lTarget);
data/fence-agents-4.6.0/agents/zvm/fence_zvm.c:209:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	fName[16];
data/fence-agents-4.6.0/agents/zvm/fence_zvm.c:213:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	target[0];
data/fence-agents-4.6.0/agents/zvm/fence_zvm.c:217:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	forceTime[5];
data/fence-agents-4.6.0/agents/zvm/fence_zvm.c:225:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	failArray[0];
data/fence-agents-4.6.0/agents/zvm/fence_zvm.c:249:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(inPlist->target, zvm->target, inPlist->lTarget);
data/fence-agents-4.6.0/agents/zvm/fence_zvm.c:293:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	fName[14];
data/fence-agents-4.6.0/agents/zvm/fence_zvm.c:297:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	target[0];
data/fence-agents-4.6.0/agents/zvm/fence_zvm.c:305:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	failArray[0];
data/fence-agents-4.6.0/agents/zvm/fence_zvm.c:326:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(inPlist->target, zvm->target, inPlist->lTarget);
data/fence-agents-4.6.0/agents/zvm/fence_zvm.c:369:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	fName[18];
data/fence-agents-4.6.0/agents/zvm/fence_zvm.c:373:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	target[0];
data/fence-agents-4.6.0/agents/zvm/fence_zvm.c:379:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	nameArray[0];
data/fence-agents-4.6.0/agents/zvm/fence_zvm.c:400:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(inPlist->target, zvm->target, inPlist->lTarget);
data/fence-agents-4.6.0/agents/zvm/fence_zvm.c:553:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	fName[0];
data/fence-agents-4.6.0/agents/zvm/fence_zvm.c:556:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	fName[64];
data/fence-agents-4.6.0/agents/zvm/fence_zvm.c:559:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(fName, inParm->fName, inParm->lFName);
data/fence-agents-4.6.0/agents/zvm/fence_zvm.c:683:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buf[1024],
data/fence-agents-4.6.0/agents/zvm/fence_zvm.c:732:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(zvm->smapiSrv, arg, lSrvName);
data/fence-agents-4.6.0/agents/zvm/fence_zvm.c:748:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(zvm->node, arg, lSrvNode);
data/fence-agents-4.6.0/agents/zvm/fence_zvm.c:786:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(zvm->target, optarg, lTarget);
data/fence-agents-4.6.0/agents/zvm/fence_zvm.c:809:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(zvm->smapiSrv, optarg, lSrvName);
data/fence-agents-4.6.0/agents/zvm/fence_zvm.c:831:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(zvm->node, optarg, lSrvNode);
data/fence-agents-4.6.0/agents/zvm/fence_zvm.h:494:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char     array[0];		/* Start of array output */
data/fence-agents-4.6.0/agents/zvm/fence_zvm.h:511:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	share[0];
data/fence-agents-4.6.0/agents/zvm/fence_zvm.h:515:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	share[5];
data/fence-agents-4.6.0/agents/zvm/fence_zvm.h:521:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	cpuArray[0];
data/fence-agents-4.6.0/agents/zvm/fence_zvm.h:526:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	cpuStruct[0];
data/fence-agents-4.6.0/agents/zvm/fence_zvm.h:532:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	cpuId[16];
data/fence-agents-4.6.0/agents/zvm/fence_zvm.h:542:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	devArray[0];
data/fence-agents-4.6.0/agents/zvm/fence_zvm.h:547:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	devStruct[0];
data/fence-agents-4.6.0/agents/zvm/fence_zvm.h:566:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	 target[9];
data/fence-agents-4.6.0/agents/zvm/fence_zvm.h:567:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	 authUser[9];
data/fence-agents-4.6.0/agents/zvm/fence_zvm.h:568:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	 authPass[9];
data/fence-agents-4.6.0/agents/zvm/fence_zvm.h:569:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	 node[9];
data/fence-agents-4.6.0/agents/zvm/fence_zvm.h:570:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	 smapiSrv[128];
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:129:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	fName[13];
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:133:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	 userId[0];
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:137:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	 password[0];
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:141:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char    target[0];
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:149:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	failArray[0];
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:176:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(authUser->userId, zvm->authUser, strlen(zvm->authUser));
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:178:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(authPass->password, zvm->authPass, strlen(zvm->authPass));
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:224:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	fName[16];
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:228:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	 userId[0];
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:232:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	 password[0];
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:236:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char    target[0];
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:240:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	forceTime[5];
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:248:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	failArray[0];
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:277:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(authUser->userId, zvm->authUser, strlen(zvm->authUser));
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:279:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(authPass->password, zvm->authPass, strlen(zvm->authPass));
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:281:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(image->target, zvm->target, strlen(zvm->target));
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:327:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	fName[14];
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:331:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	 userId[0];
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:335:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	 password[0];
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:339:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char    target[0];
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:347:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	failArray[0];
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:374:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(authUser->userId, zvm->authUser, strlen(zvm->authUser));
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:376:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(authPass->password, zvm->authPass, strlen(zvm->authPass));
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:378:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(image->target, zvm->target, strlen(zvm->target));
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:421:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	fName[18];
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:425:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	target[0];
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:431:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	nameArray[0];
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:452:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(inPlist->target, zvm->target, inPlist->lTarget);
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:606:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	fName[0];
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:609:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	fName[64];
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:612:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(fName, inParm->fName, inParm->lFName);
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:658:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buf[1024],
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:706:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(zvm->smapiSrv, arg, lSrvName);
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:710:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(zvm->authUser, arg, lSrvName);
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:714:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(zvm->authPass, arg, lSrvName);
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:755:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(zvm->smapiSrv, optarg, lSrvName);
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:759:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(zvm->target, optarg, lTarget);
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:782:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(zvm->authPass, optarg, lSrvName);
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:786:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(zvm->authUser, optarg, lSrvName);
data/fence-agents-4.6.0/agents/kdump/fence_kdump.c:67:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen (str);
data/fence-agents-4.6.0/agents/kdump/fence_kdump.c:79:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    memmove (str, p, strlen (p) + 1);
data/fence-agents-4.6.0/agents/kdump/fence_kdump.c:81:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return (strlen (str));
data/fence-agents-4.6.0/agents/kdump/fence_kdump.c:355:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy (node->name, opts->nodename, sizeof (node->name) - 1);
data/fence-agents-4.6.0/agents/kdump/fence_kdump_send.c:119:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy (node->name, opts->nodename, sizeof (node->name) - 1);
data/fence-agents-4.6.0/agents/zvm/fence_zvm.c:107:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			memcpy(&siucv_addr.siucv_user_id,zvm->smapiSrv,strlen(zvm->smapiSrv));
data/fence-agents-4.6.0/agents/zvm/fence_zvm.c:109:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			memcpy(&siucv_addr.siucv_nodeid,zvm->node,strlen(zvm->node));
data/fence-agents-4.6.0/agents/zvm/fence_zvm.c:157:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	lInPlist = sizeof(*inPlist) + strlen(zvm->target);
data/fence-agents-4.6.0/agents/zvm/fence_zvm.c:164:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		inPlist->lTarget = strlen(zvm->target);
data/fence-agents-4.6.0/agents/zvm/fence_zvm.c:238:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	lInPlist = sizeof(*inPlist) + strlen(zvm->target) + sizeof(*deactTime);
data/fence-agents-4.6.0/agents/zvm/fence_zvm.c:244:65:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		deactTime = (void *) ((intptr_t) inPlist + sizeof(*inPlist) + strlen(zvm->target));
data/fence-agents-4.6.0/agents/zvm/fence_zvm.c:248:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		inPlist->lTarget = strlen(zvm->target);
data/fence-agents-4.6.0/agents/zvm/fence_zvm.c:318:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	lInPlist = sizeof(*inPlist) + strlen(zvm->target);
data/fence-agents-4.6.0/agents/zvm/fence_zvm.c:325:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		inPlist->lTarget = strlen(zvm->target);
data/fence-agents-4.6.0/agents/zvm/fence_zvm.c:392:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	lInPlist = sizeof(*inPlist) + strlen(zvm->target);
data/fence-agents-4.6.0/agents/zvm/fence_zvm.c:399:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		inPlist->lTarget = strlen(zvm->target);
data/fence-agents-4.6.0/agents/zvm/fence_zvm.c:580:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen (str);
data/fence-agents-4.6.0/agents/zvm/fence_zvm.c:592:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	memmove(str, p, strlen (p) + 1);
data/fence-agents-4.6.0/agents/zvm/fence_zvm.c:594:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return (strlen (str));
data/fence-agents-4.6.0/agents/zvm/fence_zvm.c:731:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			lSrvName = MIN(strlen(arg), sizeof(zvm->smapiSrv));
data/fence-agents-4.6.0/agents/zvm/fence_zvm.c:735:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			lTarget = MIN(strlen(arg), sizeof(zvm->target)-1);
data/fence-agents-4.6.0/agents/zvm/fence_zvm.c:736:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(zvm->target, arg, lTarget);
data/fence-agents-4.6.0/agents/zvm/fence_zvm.c:747:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			lSrvNode = MIN(strlen(arg), sizeof(zvm->node));
data/fence-agents-4.6.0/agents/zvm/fence_zvm.c:785:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			lTarget = MIN(strlen(optarg), sizeof(zvm->target));
data/fence-agents-4.6.0/agents/zvm/fence_zvm.c:808:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			lSrvName = MIN(strlen(optarg), sizeof(zvm->smapiSrv));
data/fence-agents-4.6.0/agents/zvm/fence_zvm.c:830:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			lSrvNode = MIN(strlen(optarg), sizeof(zvm->node));
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:162:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	lInPlist = sizeof(*inPlist) + sizeof(*authUser) + strlen(zvm->authUser) +
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:163:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		   sizeof(*authPass) + strlen(zvm->authPass) + sizeof(*image) + 
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:164:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		   + strlen(zvm->target);
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:169:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			   strlen(zvm->authUser));
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:171:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			   strlen(zvm->authPass));
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:175:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		authUser->lAuthUser = strlen(zvm->authUser);
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:176:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		memcpy(authUser->userId, zvm->authUser, strlen(zvm->authUser));
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:177:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		authPass->lAuthPass = strlen(zvm->authPass);
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:178:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		memcpy(authPass->password, zvm->authPass, strlen(zvm->authPass));
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:179:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		image->lTarget = strlen(zvm->target);
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:180:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(image->target, zvm->target, strlen(zvm->target));
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:180:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strncpy(image->target, zvm->target, strlen(zvm->target));
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:261:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	lInPlist = sizeof(*inPlist) + sizeof(*authUser) + strlen(zvm->authUser) +
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:262:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		   sizeof(*authPass) + strlen(zvm->authPass) + sizeof(*image) + 
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:263:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		   sizeof(*deactTime) + strlen(zvm->target);
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:268:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			    strlen(zvm->authUser));
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:270:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			    strlen(zvm->authPass));
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:272:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			    strlen(zvm->target));
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:276:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		authUser->lAuthUser = strlen(zvm->authUser);
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:277:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		memcpy(authUser->userId, zvm->authUser, strlen(zvm->authUser));
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:278:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		authPass->lAuthPass = strlen(zvm->authPass);
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:279:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		memcpy(authPass->password, zvm->authPass, strlen(zvm->authPass));
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:280:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		image->lTarget = strlen(zvm->target);
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:281:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		memcpy(image->target, zvm->target, strlen(zvm->target));
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:360:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	lInPlist = sizeof(*inPlist) + sizeof(*authUser) + strlen(zvm->authUser) +
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:361:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		   sizeof(*authPass) + strlen(zvm->authPass) + sizeof(*image) + 
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:362:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		   strlen(zvm->target);
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:367:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			   strlen(zvm->authUser));
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:369:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			   strlen(zvm->authPass));
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:373:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		authUser->lAuthUser = strlen(zvm->authUser);
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:374:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		memcpy(authUser->userId, zvm->authUser, strlen(zvm->authUser));
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:375:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		authPass->lAuthPass = strlen(zvm->authPass);
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:376:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		memcpy(authPass->password, zvm->authPass, strlen(zvm->authPass));
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:377:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		image->lTarget = strlen(zvm->target);
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:378:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		memcpy(image->target, zvm->target, strlen(zvm->target));
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:444:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	lInPlist = sizeof(*inPlist) + strlen(zvm->target);
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:451:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		inPlist->lTarget = strlen(zvm->target);
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:633:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen (str);
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:645:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	memmove(str, p, strlen (p) + 1);
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:647:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return (strlen (str));
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:705:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			lSrvName = MIN(strlen(arg), sizeof(zvm->smapiSrv)-1);
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:709:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			lSrvName = MIN(strlen(arg), sizeof(zvm->authUser)-1);
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:713:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			lSrvName = MIN(strlen(arg), sizeof(zvm->authPass)-1);
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:717:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			lTarget = MIN(strlen(arg), sizeof(zvm->target)-1);
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:718:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(zvm->target, arg, lTarget);
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:754:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			lSrvName = MIN(strlen(optarg), sizeof(zvm->smapiSrv)-1);
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:758:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			lTarget = MIN(strlen(optarg), sizeof(zvm->target)-1);
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:781:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			lSrvName = MIN(strlen(optarg), 8);
data/fence-agents-4.6.0/agents/zvm/fence_zvmip.c:785:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			lSrvName = MIN(strlen(optarg), 8);

ANALYSIS SUMMARY:

Hits = 179
Lines analyzed = 4246 in approximately 0.21 seconds (19812 lines/second)
Physical Source Lines of Code (SLOC) = 3175
Hits@level = [0] 271 [1]  75 [2]  94 [3]   4 [4]   6 [5]   0
Hits@level+ = [0+] 450 [1+] 179 [2+] 104 [3+]  10 [4+]   6 [5+]   0
Hits/KSLOC@level+ = [0+] 141.732 [1+] 56.378 [2+] 32.7559 [3+] 3.14961 [4+] 1.88976 [5+]   0
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.