Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/api/ipmi-api.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/api/ipmi-chassis-cmds-api.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/api/ipmi-dcmi-cmds-api.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/api/ipmi-device-global-cmds-api.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/api/ipmi-event-cmds-api.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/api/ipmi-firmware-firewall-command-discovery-cmds-api.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/api/ipmi-fru-inventory-device-cmds-api.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/api/ipmi-lan-cmds-api.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/api/ipmi-messaging-support-cmds-api.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/api/ipmi-oem-intel-node-manager-cmds-api.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/api/ipmi-pef-and-alerting-cmds-api.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/api/ipmi-rmcpplus-support-and-payload-cmds-api.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/api/ipmi-sdr-repository-cmds-api.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/api/ipmi-sensor-cmds-api.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/api/ipmi-sel-cmds-api.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/api/ipmi-serial-modem-cmds-api.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/api/ipmi-sol-cmds-api.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/cmds/ipmi-bmc-watchdog-timer-cmds.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/cmds/ipmi-chassis-cmds.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/cmds/ipmi-dcmi-cmds.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/cmds/ipmi-dcmi-oem-cmds.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/cmds/ipmi-device-global-cmds.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/cmds/ipmi-event-cmds.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/cmds/ipmi-firmware-firewall-command-discovery-cmds.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/cmds/ipmi-fru-inventory-device-cmds.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/cmds/ipmi-lan-cmds.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/cmds/ipmi-messaging-support-cmds.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/cmds/ipmi-oem-intel-node-manager-cmds.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/cmds/ipmi-pef-and-alerting-cmds.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/cmds/ipmi-rmcpplus-support-and-payload-cmds.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/cmds/ipmi-sdr-repository-cmds.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/cmds/ipmi-sel-cmds.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/cmds/ipmi-sensor-cmds.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/cmds/ipmi-serial-modem-cmds.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/cmds/ipmi-sol-cmds.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/cmds/rmcp-cmds.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/debug/ipmi-debug.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/driver/ipmi-inteldcmi-driver.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/driver/ipmi-kcs-driver.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/driver/ipmi-openipmi-driver.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/driver/ipmi-sunbmc-driver.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/driver/ipmi-ssif-driver.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/fiid/fiid.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/fru/ipmi-fru.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/interface/ipmi-interface.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/interface/rmcp-interface.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/interface/ipmi-ipmb-interface.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/interface/ipmi-kcs-interface.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/interface/ipmi-lan-interface.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/interface/ipmi-rmcpplus-interface.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/interpret/ipmi-interpret.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/locate/ipmi-locate.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/payload/ipmi-sol-payload.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/record-format/oem/ipmi-fru-wistron-oem-record-format.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/record-format/oem/ipmi-sdr-oem-intel-node-manager-record-format.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/record-format/oem/ipmi-sdr-oem-intel-record-format.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/record-format/oem/ipmi-sel-oem-intel-record-format.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/record-format/oem/ipmi-sel-oem-linux-kernel-record-format.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/record-format/ipmi-cipher-suite-record-format.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/record-format/ipmi-fru-dimmspd-record-format.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/record-format/ipmi-fru-information-record-format.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/record-format/ipmi-fru-oem-record-format.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/record-format/ipmi-platform-event-trap-record-format.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/record-format/ipmi-sdr-record-format.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/record-format/ipmi-sdr-oem-record-format.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/record-format/ipmi-sel-record-format.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/record-format/ipmi-sel-oem-record-format.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/sdr/oem/ipmi-sdr-oem-intel-node-manager.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/sdr/ipmi-sdr.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/sdr/ipmi-sdr-oem.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/sel/ipmi-sel.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/sensor-read/ipmi-sensor-read.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-cmd-oem-dell-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-cmd-oem-fujitsu-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-cmd-oem-gigabyte-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-cmd-oem-ibm-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-cmd-oem-intel-node-manager-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-cmd-oem-intel-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-cmd-oem-inventec-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-cmd-oem-quanta-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-cmd-oem-sun-microsystems-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-cmd-oem-supermicro-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-cmd-oem-wistron-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-comp-code-oem-dell-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-comp-code-oem-fujitsu-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-comp-code-oem-intel-node-manager-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-comp-code-oem-intel-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-comp-code-oem-wistron-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-event-reading-type-code-oem-dell-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-event-reading-type-code-oem-hp-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-event-reading-type-code-oem-intel-node-manager-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-event-reading-type-code-oem-intel-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-event-reading-type-code-oem-inventec-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-event-reading-type-code-oem-supermicro-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-lan-configuration-parameters-oem-inventec-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-lan-configuration-parameters-oem-wistron-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-netfn-oem-dell-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-netfn-oem-fujitsu-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-netfn-oem-ibm-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-netfn-oem-intel-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-netfn-oem-inventec-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-netfn-oem-quanta-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-netfn-oem-supermicro-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-netfn-oem-wistron-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-oem-dell-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-oem-fujitsu-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-oem-gigabyte-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-oem-ibm-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-oem-intel-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-oem-inventec-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-oem-quanta-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-oem-sun-microsystems-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-oem-supermicro-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-oem-wistron-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-sensor-and-event-code-tables-oem-dell-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-sensor-and-event-code-tables-oem-fujitsu-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-sensor-and-event-code-tables-oem-gigabyte-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-sensor-and-event-code-tables-oem-hp-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-sensor-and-event-code-tables-oem-intel-node-manager-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-sensor-and-event-code-tables-oem-intel-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-sensor-and-event-code-tables-oem-inventec-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-sensor-and-event-code-tables-oem-quanta-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-sensor-and-event-code-tables-oem-supermicro-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-sensor-and-event-code-tables-oem-wistron-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-sensor-numbers-oem-dell-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-sensor-numbers-oem-intel-node-manager-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-sensor-numbers-oem-intel-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-sensor-numbers-oem-inventec-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-sensor-numbers-oem-quanta-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-sensor-numbers-oem-wistron-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-sensor-types-oem-dell-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-sensor-types-oem-fujitsu-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-sensor-types-oem-hp-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-sensor-types-oem-intel-node-manager-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-sensor-types-oem-inventec-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-sensor-types-oem-intel-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-sensor-types-oem-supermicro-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-sensor-types-oem-wistron-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-slave-address-oem-intel-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-slave-address-oem-inventec-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-slave-address-oem-linux-kernel-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-slave-address-oem-quanta-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-slave-address-oem-wistron-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-sol-configuration-parameters-oem-inventec-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-sol-configuration-parameters-oem-wistron-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-system-info-parameters-oem-dell-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/oem/ipmi-system-info-parameters-oem-wistron-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/ipmi-authentication-type-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/ipmi-channel-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/ipmi-cmd-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/ipmi-cmd-dcmi-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/ipmi-comp-code-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/ipmi-comp-code-dcmi-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/ipmi-comp-code-oem-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/ipmi-device-types-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/ipmi-device-types-oem-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/ipmi-entity-ids-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/ipmi-event-reading-type-code-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/ipmi-event-reading-type-code-oem-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/ipmi-fru-chassis-types-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/ipmi-fru-language-codes-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/ipmi-iana-enterprise-numbers-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/ipmi-ipmb-lun-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/ipmi-jedec-manufacturer-identification-code-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/ipmi-lan-configuration-parameters-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/ipmi-lan-configuration-parameters-oem-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/ipmi-netfn-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/ipmi-netfn-oem-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/ipmi-oem-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/ipmi-pef-configuration-parameters-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/ipmi-pef-configuration-parameters-oem-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/ipmi-privilege-level-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/ipmi-product-id-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/ipmi-rmcpplus-status-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/ipmi-sensor-and-event-code-tables-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/ipmi-sensor-and-event-code-tables-oem-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/ipmi-sensor-numbers-oem-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/ipmi-sensor-types-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/ipmi-sensor-types-oem-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/ipmi-sensor-units-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/ipmi-serial-modem-configuration-parameters-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/ipmi-serial-modem-configuration-parameters-oem-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/ipmi-slave-address-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/ipmi-slave-address-oem-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/ipmi-sol-configuration-parameters-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/ipmi-sol-configuration-parameters-oem-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/ipmi-system-boot-option-parameters-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/ipmi-system-boot-option-parameters-oem-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/ipmi-system-info-parameters-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/ipmi-system-info-parameters-oem-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/ipmi-system-software-id-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/spec/ipmi-timestamp-spec.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/templates/oem/ipmi-sdr-oem-intel-node-manager-record-format-templates.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/templates/ipmi-bmc-watchdog-timer-cmds-templates.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/templates/ipmi-chassis-cmds-templates.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/templates/ipmi-dcmi-cmds-templates.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/templates/ipmi-device-global-cmds-templates.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/templates/ipmi-event-cmds-templates.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/templates/ipmi-firmware-firewall-command-discovery-cmds-templates.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/templates/ipmi-fru-dimmspd-record-format-templates.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/templates/ipmi-fru-inventory-device-cmds-templates.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/templates/ipmi-lan-cmds-templates.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/templates/ipmi-messaging-support-cmds-templates.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/templates/ipmi-oem-intel-node-manager-cmds-templates.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/templates/ipmi-pef-and-alerting-cmds-templates.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/templates/ipmi-rmcpplus-support-and-payload-cmds-templates.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/templates/ipmi-sdr-repository-cmds-templates.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/templates/ipmi-sel-cmds-templates.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/templates/ipmi-sensor-cmds-templates.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/templates/ipmi-serial-modem-cmds-templates.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/templates/ipmi-sol-cmds-templates.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/templates/ipmi-sol-payload-templates.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/templates/rmcp-cmds-templates.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/templates/ipmi-ipmb-interface-templates.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/templates/ipmi-kcs-interface-templates.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/templates/ipmi-lan-interface-templates.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/templates/ipmi-rmcpplus-interface-templates.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/templates/rmcp-interface-templates.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/templates/ipmi-cipher-suite-record-format-templates.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/templates/ipmi-fru-information-record-format-templates.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/templates/ipmi-sdr-record-format-templates.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/templates/ipmi-sel-record-format-templates.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/util/ipmi-channel-util.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/util/ipmi-cipher-suite-util.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/util/ipmi-device-types-util.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/util/ipmi-entity-ids-util.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/util/ipmi-error-util.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/util/ipmi-error-dcmi-util.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/util/ipmi-iana-enterprise-numbers-util.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/util/ipmi-ipmb-util.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/util/ipmi-jedec-manufacturer-identification-code-util.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/util/ipmi-lan-util.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/util/ipmi-outofband-util.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/util/ipmi-rmcpplus-util.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/util/ipmi-sensor-and-event-code-tables-util.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/util/ipmi-sensor-util.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/util/ipmi-timestamp-util.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/util/ipmi-util.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/util/ipmi-dcmi-util.h
Examining data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/util/rmcp-util.h
Examining data/freeipmi-1.6.4/libfreeipmi/api/ipmi-api.c
Examining data/freeipmi-1.6.4/libfreeipmi/api/ipmi-api-defs.h
Examining data/freeipmi-1.6.4/libfreeipmi/api/ipmi-api-trace.h
Examining data/freeipmi-1.6.4/libfreeipmi/api/ipmi-api-util.c
Examining data/freeipmi-1.6.4/libfreeipmi/api/ipmi-api-util.h
Examining data/freeipmi-1.6.4/libfreeipmi/api/ipmi-chassis-cmds-api.c
Examining data/freeipmi-1.6.4/libfreeipmi/api/ipmi-dcmi-cmds-api.c
Examining data/freeipmi-1.6.4/libfreeipmi/api/ipmi-device-global-cmds-api.c
Examining data/freeipmi-1.6.4/libfreeipmi/api/ipmi-event-cmds-api.c
Examining data/freeipmi-1.6.4/libfreeipmi/api/ipmi-firmware-firewall-command-discovery-cmds-api.c
Examining data/freeipmi-1.6.4/libfreeipmi/api/ipmi-fru-inventory-device-cmds-api.c
Examining data/freeipmi-1.6.4/libfreeipmi/api/ipmi-inteldcmi-driver-api.c
Examining data/freeipmi-1.6.4/libfreeipmi/api/ipmi-inteldcmi-driver-api.h
Examining data/freeipmi-1.6.4/libfreeipmi/api/ipmi-kcs-driver-api.c
Examining data/freeipmi-1.6.4/libfreeipmi/api/ipmi-kcs-driver-api.h
Examining data/freeipmi-1.6.4/libfreeipmi/api/ipmi-lan-cmds-api.c
Examining data/freeipmi-1.6.4/libfreeipmi/api/ipmi-lan-interface-api.c
Examining data/freeipmi-1.6.4/libfreeipmi/api/ipmi-lan-interface-api.h
Examining data/freeipmi-1.6.4/libfreeipmi/api/ipmi-lan-session-common.c
Examining data/freeipmi-1.6.4/libfreeipmi/api/ipmi-lan-session-common.h
Examining data/freeipmi-1.6.4/libfreeipmi/api/ipmi-messaging-support-cmds-api.c
Examining data/freeipmi-1.6.4/libfreeipmi/api/ipmi-oem-intel-node-manager-cmds-api.c
Examining data/freeipmi-1.6.4/libfreeipmi/api/ipmi-openipmi-driver-api.c
Examining data/freeipmi-1.6.4/libfreeipmi/api/ipmi-openipmi-driver-api.h
Examining data/freeipmi-1.6.4/libfreeipmi/api/ipmi-pef-and-alerting-cmds-api.c
Examining data/freeipmi-1.6.4/libfreeipmi/api/ipmi-rmcpplus-support-and-payload-cmds-api.c
Examining data/freeipmi-1.6.4/libfreeipmi/api/ipmi-sel-cmds-api.c
Examining data/freeipmi-1.6.4/libfreeipmi/api/ipmi-sdr-repository-cmds-api.c
Examining data/freeipmi-1.6.4/libfreeipmi/api/ipmi-sensor-cmds-api.c
Examining data/freeipmi-1.6.4/libfreeipmi/api/ipmi-serial-modem-cmds-api.c
Examining data/freeipmi-1.6.4/libfreeipmi/api/ipmi-sol-cmds-api.c
Examining data/freeipmi-1.6.4/libfreeipmi/api/ipmi-ssif-driver-api.c
Examining data/freeipmi-1.6.4/libfreeipmi/api/ipmi-ssif-driver-api.h
Examining data/freeipmi-1.6.4/libfreeipmi/api/ipmi-sunbmc-driver-api.c
Examining data/freeipmi-1.6.4/libfreeipmi/api/ipmi-sunbmc-driver-api.h
Examining data/freeipmi-1.6.4/libfreeipmi/cmds/ipmi-bmc-watchdog-timer-cmds.c
Examining data/freeipmi-1.6.4/libfreeipmi/cmds/ipmi-chassis-cmds.c
Examining data/freeipmi-1.6.4/libfreeipmi/cmds/ipmi-dcmi-cmds.c
Examining data/freeipmi-1.6.4/libfreeipmi/cmds/ipmi-device-global-cmds.c
Examining data/freeipmi-1.6.4/libfreeipmi/cmds/ipmi-event-cmds.c
Examining data/freeipmi-1.6.4/libfreeipmi/cmds/ipmi-firmware-firewall-command-discovery-cmds.c
Examining data/freeipmi-1.6.4/libfreeipmi/cmds/ipmi-fru-inventory-device-cmds.c
Examining data/freeipmi-1.6.4/libfreeipmi/cmds/ipmi-lan-cmds.c
Examining data/freeipmi-1.6.4/libfreeipmi/cmds/ipmi-messaging-support-cmds.c
Examining data/freeipmi-1.6.4/libfreeipmi/cmds/ipmi-oem-intel-node-manager-cmds.c
Examining data/freeipmi-1.6.4/libfreeipmi/cmds/ipmi-pef-and-alerting-cmds.c
Examining data/freeipmi-1.6.4/libfreeipmi/cmds/ipmi-rmcpplus-support-and-payload-cmds.c
Examining data/freeipmi-1.6.4/libfreeipmi/cmds/ipmi-sdr-repository-cmds.c
Examining data/freeipmi-1.6.4/libfreeipmi/cmds/ipmi-sel-cmds.c
Examining data/freeipmi-1.6.4/libfreeipmi/cmds/ipmi-sensor-cmds.c
Examining data/freeipmi-1.6.4/libfreeipmi/cmds/ipmi-serial-modem-cmds.c
Examining data/freeipmi-1.6.4/libfreeipmi/cmds/ipmi-sol-cmds.c
Examining data/freeipmi-1.6.4/libfreeipmi/cmds/rmcp-cmds.c
Examining data/freeipmi-1.6.4/libfreeipmi/debug/ipmi-debug.c
Examining data/freeipmi-1.6.4/libfreeipmi/debug/ipmi-debug-common.c
Examining data/freeipmi-1.6.4/libfreeipmi/debug/ipmi-debug-common.h
Examining data/freeipmi-1.6.4/libfreeipmi/debug/ipmi-debug-inband.c
Examining data/freeipmi-1.6.4/libfreeipmi/debug/ipmi-debug-lan.c
Examining data/freeipmi-1.6.4/libfreeipmi/debug/ipmi-debug-rmcp.c
Examining data/freeipmi-1.6.4/libfreeipmi/debug/ipmi-debug-rmcpplus.c
Examining data/freeipmi-1.6.4/libfreeipmi/debug/ipmi-debug-sdr.c
Examining data/freeipmi-1.6.4/libfreeipmi/driver/freeipmi_bmc_intf.h
Examining data/freeipmi-1.6.4/libfreeipmi/driver/ipmi-driver-trace.h
Examining data/freeipmi-1.6.4/libfreeipmi/driver/ipmi-semaphores.c
Examining data/freeipmi-1.6.4/libfreeipmi/driver/ipmi-semaphores.h
Examining data/freeipmi-1.6.4/libfreeipmi/driver/ipmi-inteldcmi-driver.c
Examining data/freeipmi-1.6.4/libfreeipmi/driver/ipmi-kcs-driver.c
Examining data/freeipmi-1.6.4/libfreeipmi/driver/ipmi-openipmi-driver.c
Examining data/freeipmi-1.6.4/libfreeipmi/driver/ipmi-sunbmc-driver.c
Examining data/freeipmi-1.6.4/libfreeipmi/driver/ipmi-ssif-driver.c
Examining data/freeipmi-1.6.4/libfreeipmi/fiid/fiid.c
Examining data/freeipmi-1.6.4/libfreeipmi/fru/ipmi-fru.c
Examining data/freeipmi-1.6.4/libfreeipmi/fru/ipmi-fru-common.c
Examining data/freeipmi-1.6.4/libfreeipmi/fru/ipmi-fru-common.h
Examining data/freeipmi-1.6.4/libfreeipmi/fru/ipmi-fru-data.c
Examining data/freeipmi-1.6.4/libfreeipmi/fru/ipmi-fru-defs.h
Examining data/freeipmi-1.6.4/libfreeipmi/fru/ipmi-fru-trace.h
Examining data/freeipmi-1.6.4/libfreeipmi/fru/ipmi-fru-util.c
Examining data/freeipmi-1.6.4/libfreeipmi/fru/ipmi-fru-util.h
Examining data/freeipmi-1.6.4/libfreeipmi/interface/ipmi-ipmb-interface.c
Examining data/freeipmi-1.6.4/libfreeipmi/interface/ipmi-kcs-interface.c
Examining data/freeipmi-1.6.4/libfreeipmi/interface/ipmi-lan-interface.c
Examining data/freeipmi-1.6.4/libfreeipmi/interface/ipmi-network.c
Examining data/freeipmi-1.6.4/libfreeipmi/interface/ipmi-network.h
Examining data/freeipmi-1.6.4/libfreeipmi/interface/ipmi-rmcpplus-interface.c
Examining data/freeipmi-1.6.4/libfreeipmi/interface/rmcp-interface.c
Examining data/freeipmi-1.6.4/libfreeipmi/interpret/ipmi-interpret.c
Examining data/freeipmi-1.6.4/libfreeipmi/interpret/ipmi-interpret-config-common.c
Examining data/freeipmi-1.6.4/libfreeipmi/interpret/ipmi-interpret-config-common.h
Examining data/freeipmi-1.6.4/libfreeipmi/interpret/ipmi-interpret-config-sel.c
Examining data/freeipmi-1.6.4/libfreeipmi/interpret/ipmi-interpret-config-sel.h
Examining data/freeipmi-1.6.4/libfreeipmi/interpret/ipmi-interpret-config-sensor.c
Examining data/freeipmi-1.6.4/libfreeipmi/interpret/ipmi-interpret-config-sensor.h
Examining data/freeipmi-1.6.4/libfreeipmi/interpret/ipmi-interpret-defs.h
Examining data/freeipmi-1.6.4/libfreeipmi/interpret/ipmi-interpret-util.c
Examining data/freeipmi-1.6.4/libfreeipmi/interpret/ipmi-interpret-util.h
Examining data/freeipmi-1.6.4/libfreeipmi/interpret/ipmi-interpret-trace.h
Examining data/freeipmi-1.6.4/libfreeipmi/libcommon/ipmi-bit-ops.c
Examining data/freeipmi-1.6.4/libfreeipmi/libcommon/ipmi-bit-ops.h
Examining data/freeipmi-1.6.4/libfreeipmi/libcommon/ipmi-crypt.c
Examining data/freeipmi-1.6.4/libfreeipmi/libcommon/ipmi-crypt.h
Examining data/freeipmi-1.6.4/libfreeipmi/libcommon/ipmi-fiid-util.c
Examining data/freeipmi-1.6.4/libfreeipmi/libcommon/ipmi-fiid-util.h
Examining data/freeipmi-1.6.4/libfreeipmi/libcommon/ipmi-fill-util.h
Examining data/freeipmi-1.6.4/libfreeipmi/libcommon/ipmi-md2.c
Examining data/freeipmi-1.6.4/libfreeipmi/libcommon/ipmi-md2.h
Examining data/freeipmi-1.6.4/libfreeipmi/libcommon/ipmi-md5.c
Examining data/freeipmi-1.6.4/libfreeipmi/libcommon/ipmi-md5.h
Examining data/freeipmi-1.6.4/libfreeipmi/libcommon/ipmi-trace.h
Examining data/freeipmi-1.6.4/libfreeipmi/locate/ipmi-locate.c
Examining data/freeipmi-1.6.4/libfreeipmi/locate/ipmi-locate-acpi-spmi.c
Examining data/freeipmi-1.6.4/libfreeipmi/locate/ipmi-locate-defaults.c
Examining data/freeipmi-1.6.4/libfreeipmi/locate/ipmi-locate-defs.h
Examining data/freeipmi-1.6.4/libfreeipmi/locate/ipmi-locate-dmidecode.c
Examining data/freeipmi-1.6.4/libfreeipmi/locate/ipmi-locate-pci.c
Examining data/freeipmi-1.6.4/libfreeipmi/locate/ipmi-locate-smbios.c
Examining data/freeipmi-1.6.4/libfreeipmi/locate/ipmi-locate-trace.h
Examining data/freeipmi-1.6.4/libfreeipmi/locate/ipmi-locate-util.c
Examining data/freeipmi-1.6.4/libfreeipmi/locate/ipmi-locate-util.h
Examining data/freeipmi-1.6.4/libfreeipmi/payload/ipmi-sol-payload.c
Examining data/freeipmi-1.6.4/libfreeipmi/record-format/ipmi-cipher-suite-record-format.c
Examining data/freeipmi-1.6.4/libfreeipmi/record-format/ipmi-fru-dimmspd-record-format.c
Examining data/freeipmi-1.6.4/libfreeipmi/record-format/ipmi-fru-information-record-format.c
Examining data/freeipmi-1.6.4/libfreeipmi/record-format/ipmi-sdr-record-format.c
Examining data/freeipmi-1.6.4/libfreeipmi/record-format/ipmi-sdr-oem-intel-node-manager-record-format.c
Examining data/freeipmi-1.6.4/libfreeipmi/record-format/ipmi-sel-record-format.c
Examining data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr.c
Examining data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-common.c
Examining data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-common.h
Examining data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-cache-create.c
Examining data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-defs.h
Examining data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-cache-delete.c
Examining data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-cache-read.c
Examining data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-oem-intel-node-manager.c
Examining data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-parse.c
Examining data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-parse-util.c
Examining data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-stats.c
Examining data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-trace.h
Examining data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-util.c
Examining data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-util.h
Examining data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel.c
Examining data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-common.c
Examining data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-common.h
Examining data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-defs.h
Examining data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string.c
Examining data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string.h
Examining data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-dell-poweredge.c
Examining data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-fujitsu-irmc-common.c
Examining data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-gigabyte-common.c
Examining data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-gigabyte-common.h
Examining data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-gigabyte-md90fs0zb.c
Examining data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-gigabyte-mg20op0zb.c
Examining data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-intel-node-manager.c
Examining data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-intel-node-manager.h
Examining data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-intel-s5500wb.c
Examining data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-intel-quanta-qssc-s4r.c
Examining data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-intel-s2600jf.c
Examining data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-intel-s2600wp.c
Examining data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-intel-windmill.c
Examining data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-intel-e52600v3-common.c
Examining data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-intel-e52600v3-common.h
Examining data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-intel-s2600kp.c
Examining data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-intel-s2600gz.c
Examining data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-intel-s2600wt-common.c
Examining data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-inventec-common.c
Examining data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-inventec-common.h
Examining data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-inventec-5441.c
Examining data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-inventec-5442.c
Examining data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-linux-kernel.c
Examining data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-linux-kernel.h
Examining data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-quanta-s99q.c
Examining data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-sun-x4140.c
Examining data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-supermicro-common.c
Examining data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-supermicro-common.h
Examining data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-supermicro-overheat-common.c
Examining data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-supermicro-magnum-technologies-x8dtl.c
Examining data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-supermicro-peppercon-common.c
Examining data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-supermicro-x10dimm-common.c
Examining data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-wistron-c6220.c
Examining data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-trace.h
Examining data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-util.c
Examining data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-util.h
Examining data/freeipmi-1.6.4/libfreeipmi/sensor-read/ipmi-sensor-read.c
Examining data/freeipmi-1.6.4/libfreeipmi/sensor-read/ipmi-sensor-read-defs.h
Examining data/freeipmi-1.6.4/libfreeipmi/sensor-read/ipmi-sensor-read-trace.h
Examining data/freeipmi-1.6.4/libfreeipmi/sensor-read/ipmi-sensor-read-util.c
Examining data/freeipmi-1.6.4/libfreeipmi/sensor-read/ipmi-sensor-read-util.h
Examining data/freeipmi-1.6.4/libfreeipmi/spec/ipmi-device-types-spec.c
Examining data/freeipmi-1.6.4/libfreeipmi/spec/ipmi-entity-ids-spec.c
Examining data/freeipmi-1.6.4/libfreeipmi/spec/ipmi-fru-chassis-types-spec.c
Examining data/freeipmi-1.6.4/libfreeipmi/spec/ipmi-fru-language-codes-spec.c
Examining data/freeipmi-1.6.4/libfreeipmi/spec/ipmi-iana-enterprise-numbers-spec.c
Examining data/freeipmi-1.6.4/libfreeipmi/spec/ipmi-jedec-manufacturer-identification-code-spec.c
Examining data/freeipmi-1.6.4/libfreeipmi/spec/ipmi-sensor-and-event-code-tables-spec.c
Examining data/freeipmi-1.6.4/libfreeipmi/spec/ipmi-sensor-and-event-code-tables-oem-dell-spec.c
Examining data/freeipmi-1.6.4/libfreeipmi/spec/ipmi-sensor-and-event-code-tables-oem-fujitsu-spec.c
Examining data/freeipmi-1.6.4/libfreeipmi/spec/ipmi-sensor-and-event-code-tables-oem-hp-spec.c
Examining data/freeipmi-1.6.4/libfreeipmi/spec/ipmi-sensor-and-event-code-tables-oem-intel-spec.c
Examining data/freeipmi-1.6.4/libfreeipmi/spec/ipmi-sensor-and-event-code-tables-oem-wistron-spec.c
Examining data/freeipmi-1.6.4/libfreeipmi/spec/ipmi-sensor-types-spec.c
Examining data/freeipmi-1.6.4/libfreeipmi/spec/ipmi-sensor-units-spec.c
Examining data/freeipmi-1.6.4/libfreeipmi/util/ipmi-channel-util.c
Examining data/freeipmi-1.6.4/libfreeipmi/util/ipmi-cipher-suite-util.c
Examining data/freeipmi-1.6.4/libfreeipmi/util/ipmi-dcmi-util.c
Examining data/freeipmi-1.6.4/libfreeipmi/util/ipmi-device-types-util.c
Examining data/freeipmi-1.6.4/libfreeipmi/util/ipmi-entity-ids-util.c
Examining data/freeipmi-1.6.4/libfreeipmi/util/ipmi-error-dcmi-util.c
Examining data/freeipmi-1.6.4/libfreeipmi/util/ipmi-error-util.c
Examining data/freeipmi-1.6.4/libfreeipmi/util/ipmi-iana-enterprise-numbers-util.c
Examining data/freeipmi-1.6.4/libfreeipmi/util/ipmi-ipmb-util.c
Examining data/freeipmi-1.6.4/libfreeipmi/util/ipmi-jedec-manufacturer-identification-code-util.c
Examining data/freeipmi-1.6.4/libfreeipmi/util/ipmi-lan-util.c
Examining data/freeipmi-1.6.4/libfreeipmi/util/ipmi-outofband-util.c
Examining data/freeipmi-1.6.4/libfreeipmi/util/ipmi-rmcpplus-util.c
Examining data/freeipmi-1.6.4/libfreeipmi/util/ipmi-sensor-and-event-code-tables-util.c
Examining data/freeipmi-1.6.4/libfreeipmi/util/ipmi-sensor-util.c
Examining data/freeipmi-1.6.4/libfreeipmi/util/ipmi-timestamp-util.c
Examining data/freeipmi-1.6.4/libfreeipmi/util/ipmi-util.c
Examining data/freeipmi-1.6.4/libfreeipmi/util/rmcp-util.c
Examining data/freeipmi-1.6.4/common/debugutil/debug-util.c
Examining data/freeipmi-1.6.4/common/debugutil/debug-util.h
Examining data/freeipmi-1.6.4/common/miscutil/cbuf.c
Examining data/freeipmi-1.6.4/common/miscutil/cbuf.h
Examining data/freeipmi-1.6.4/common/miscutil/conffile.c
Examining data/freeipmi-1.6.4/common/miscutil/conffile.h
Examining data/freeipmi-1.6.4/common/miscutil/error.c
Examining data/freeipmi-1.6.4/common/miscutil/error.h
Examining data/freeipmi-1.6.4/common/miscutil/fd.c
Examining data/freeipmi-1.6.4/common/miscutil/fd.h
Examining data/freeipmi-1.6.4/common/miscutil/fi_hostlist.c
Examining data/freeipmi-1.6.4/common/miscutil/fi_hostlist.h
Examining data/freeipmi-1.6.4/common/miscutil/hash.c
Examining data/freeipmi-1.6.4/common/miscutil/hash.h
Examining data/freeipmi-1.6.4/common/miscutil/heap.c
Examining data/freeipmi-1.6.4/common/miscutil/heap.h
Examining data/freeipmi-1.6.4/common/miscutil/hostlist.c
Examining data/freeipmi-1.6.4/common/miscutil/hostlist.h
Examining data/freeipmi-1.6.4/common/miscutil/list.c
Examining data/freeipmi-1.6.4/common/miscutil/list.h
Examining data/freeipmi-1.6.4/common/miscutil/network.c
Examining data/freeipmi-1.6.4/common/miscutil/network.h
Examining data/freeipmi-1.6.4/common/miscutil/secure.c
Examining data/freeipmi-1.6.4/common/miscutil/secure.h
Examining data/freeipmi-1.6.4/common/miscutil/timeval.c
Examining data/freeipmi-1.6.4/common/miscutil/timeval.h
Examining data/freeipmi-1.6.4/common/miscutil/thread.c
Examining data/freeipmi-1.6.4/common/miscutil/thread.h
Examining data/freeipmi-1.6.4/common/parsecommon/parse-common.c
Examining data/freeipmi-1.6.4/common/parsecommon/parse-common.h
Examining data/freeipmi-1.6.4/common/pingtool/ping-tool-common.c
Examining data/freeipmi-1.6.4/common/pingtool/ping-tool-common.h
Examining data/freeipmi-1.6.4/common/portability/freeipmi-portability.c
Examining data/freeipmi-1.6.4/common/portability/freeipmi-portability.h
Examining data/freeipmi-1.6.4/common/portability/freeipmi-argp.h
Examining data/freeipmi-1.6.4/common/portability/freeipmi-argp-ba.c
Examining data/freeipmi-1.6.4/common/portability/freeipmi-argp-eexst.c
Examining data/freeipmi-1.6.4/common/portability/freeipmi-argp-fmtstream.c
Examining data/freeipmi-1.6.4/common/portability/freeipmi-argp-fmtstream.h
Examining data/freeipmi-1.6.4/common/portability/freeipmi-argp-help.c
Examining data/freeipmi-1.6.4/common/portability/freeipmi-argp-namefrob.h
Examining data/freeipmi-1.6.4/common/portability/freeipmi-argp-parse.c
Examining data/freeipmi-1.6.4/common/portability/freeipmi-argp-pv.c
Examining data/freeipmi-1.6.4/common/portability/freeipmi-argp-pvh.c
Examining data/freeipmi-1.6.4/common/toolcommon/pstdout.c
Examining data/freeipmi-1.6.4/common/toolcommon/pstdout.h
Examining data/freeipmi-1.6.4/common/toolcommon/tool-common.c
Examining data/freeipmi-1.6.4/common/toolcommon/tool-common.h
Examining data/freeipmi-1.6.4/common/toolcommon/tool-config-file-common.c
Examining data/freeipmi-1.6.4/common/toolcommon/tool-config-file-common.h
Examining data/freeipmi-1.6.4/common/toolcommon/tool-cmdline-common.c
Examining data/freeipmi-1.6.4/common/toolcommon/tool-cmdline-common.h
Examining data/freeipmi-1.6.4/common/toolcommon/tool-daemon-common.c
Examining data/freeipmi-1.6.4/common/toolcommon/tool-daemon-common.h
Examining data/freeipmi-1.6.4/common/toolcommon/tool-event-common.c
Examining data/freeipmi-1.6.4/common/toolcommon/tool-event-common.h
Examining data/freeipmi-1.6.4/common/toolcommon/tool-hostrange-common.c
Examining data/freeipmi-1.6.4/common/toolcommon/tool-hostrange-common.h
Examining data/freeipmi-1.6.4/common/toolcommon/tool-oem-common.c
Examining data/freeipmi-1.6.4/common/toolcommon/tool-oem-common.h
Examining data/freeipmi-1.6.4/common/toolcommon/tool-sdr-cache-common.c
Examining data/freeipmi-1.6.4/common/toolcommon/tool-sdr-cache-common.h
Examining data/freeipmi-1.6.4/common/toolcommon/tool-sensor-common.c
Examining data/freeipmi-1.6.4/common/toolcommon/tool-sensor-common.h
Examining data/freeipmi-1.6.4/common/toolcommon/tool-util-common.c
Examining data/freeipmi-1.6.4/common/toolcommon/tool-util-common.h
Examining data/freeipmi-1.6.4/libipmiconsole/ipmiconsole.c
Examining data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_checks.c
Examining data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_checks.h
Examining data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_ctx.c
Examining data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_ctx.h
Examining data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_debug.c
Examining data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_debug.h
Examining data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_defs.h
Examining data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_engine.c
Examining data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_engine.h
Examining data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_garbage_collector.c
Examining data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_garbage_collector.h
Examining data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_packet.c
Examining data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_packet.h
Examining data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_processing.c
Examining data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_processing.h
Examining data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_util.c
Examining data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_util.h
Examining data/freeipmi-1.6.4/libipmiconsole/scbuf.c
Examining data/freeipmi-1.6.4/libipmiconsole/scbuf.h
Examining data/freeipmi-1.6.4/libipmimonitoring/ipmi_monitoring_bitmasks.h
Examining data/freeipmi-1.6.4/libipmimonitoring/ipmi_monitoring_offsets.h
Examining data/freeipmi-1.6.4/libipmimonitoring/ipmi_monitoring_debug.h
Examining data/freeipmi-1.6.4/libipmimonitoring/ipmi_monitoring_defs.h
Examining data/freeipmi-1.6.4/libipmimonitoring/ipmi_monitoring_ipmi_communication.h
Examining data/freeipmi-1.6.4/libipmimonitoring/ipmi_monitoring_parse_common.h
Examining data/freeipmi-1.6.4/libipmimonitoring/ipmi_monitoring_sdr_cache.h
Examining data/freeipmi-1.6.4/libipmimonitoring/ipmi_monitoring_sel.h
Examining data/freeipmi-1.6.4/libipmimonitoring/ipmi_monitoring_sensor_reading.h
Examining data/freeipmi-1.6.4/libipmimonitoring/ipmi_monitoring.c
Examining data/freeipmi-1.6.4/libipmimonitoring/ipmi_monitoring_debug.c
Examining data/freeipmi-1.6.4/libipmimonitoring/ipmi_monitoring_ipmi_communication.c
Examining data/freeipmi-1.6.4/libipmimonitoring/ipmi_monitoring_parse_common.c
Examining data/freeipmi-1.6.4/libipmimonitoring/ipmi_monitoring_sdr_cache.c
Examining data/freeipmi-1.6.4/libipmimonitoring/ipmi_monitoring_sel.c
Examining data/freeipmi-1.6.4/libipmimonitoring/ipmi_monitoring_sensor_reading.c
Examining data/freeipmi-1.6.4/libipmidetect/ipmidetect.c
Examining data/freeipmi-1.6.4/bmc-info/bmc-info.c
Examining data/freeipmi-1.6.4/bmc-info/bmc-info.h
Examining data/freeipmi-1.6.4/bmc-info/bmc-info-argp.c
Examining data/freeipmi-1.6.4/bmc-info/bmc-info-argp.h
Examining data/freeipmi-1.6.4/bmc-device/bmc-device.c
Examining data/freeipmi-1.6.4/bmc-device/bmc-device.h
Examining data/freeipmi-1.6.4/bmc-device/bmc-device-argp.c
Examining data/freeipmi-1.6.4/bmc-device/bmc-device-argp.h
Examining data/freeipmi-1.6.4/bmc-watchdog/bmc-watchdog.c
Examining data/freeipmi-1.6.4/bmc-watchdog/bmc-watchdog.h
Examining data/freeipmi-1.6.4/bmc-watchdog/bmc-watchdog-argp.c
Examining data/freeipmi-1.6.4/bmc-watchdog/bmc-watchdog-argp.h
Examining data/freeipmi-1.6.4/ipmi-chassis/ipmi-chassis.c
Examining data/freeipmi-1.6.4/ipmi-chassis/ipmi-chassis.h
Examining data/freeipmi-1.6.4/ipmi-chassis/ipmi-chassis-argp.c
Examining data/freeipmi-1.6.4/ipmi-chassis/ipmi-chassis-argp.h
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config.c
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config.h
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-argp.c
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-argp.h
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-chassis-boot-flags.c
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-chassis-boot-flags.h
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-chassis-front-panel-buttons.c
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-chassis-front-panel-buttons.h
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-chassis-power-conf.c
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-chassis-power-conf.h
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-chassis-sections.c
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-chassis-sections.h
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-common-pef-conf-section.c
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-common-pef-conf-section.h
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-channel-common.c
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-channel-common.h
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan-channel-section.c
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan-channel-section.h
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan-conf-auth-section.c
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan-conf-auth-section.h
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan-conf-misc-section.c
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan-conf-misc-section.h
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan-conf-section.c
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan-conf-section.h
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan-conf-security-keys-section.c
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan-conf-security-keys-section.h
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan-conf-user-security-section.c
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan-conf-user-security-section.h
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.h
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-misc-section.c
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-misc-section.h
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-pef-conf-section.c
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-pef-conf-section.h
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-rmcpplus-conf-privilege-section.c
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-rmcpplus-conf-privilege-section.h
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-sections.c
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-sections.h
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-serial-channel-section.c
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-serial-channel-section.h
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-serial-conf-section.c
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-serial-conf-section.h
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-sol-conf-section.c
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-sol-conf-section.h
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-user-sections.c
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-user-sections.h
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-dcmi-dcmi-conf-section.c
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-dcmi-dcmi-conf-section.h
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-dcmi-sections.c
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-dcmi-sections.h
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-alert-policy-table.c
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-alert-policy-table.h
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-alert-string.c
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-alert-string.h
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-community-string.c
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-community-string.h
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-event-filter-table.c
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-event-filter-table.h
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-lan-alert-destination.c
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-lan-alert-destination.h
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-pef-conf-section.c
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-pef-conf-section.h
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-sections.c
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-sections.h
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-sensors-discrete-section.c
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-sensors-discrete-section.h
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-sensors-sections.c
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-sensors-sections.h
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-sensors-sensor-event-enable-common.c
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-sensors-sensor-event-enable-common.h
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-sensors-threshold-section.c
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-sensors-threshold-section.h
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-sensors-utils.c
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-sensors-utils.h
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-checkout.c
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-checkout.h
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-comment.c
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-comment.h
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-commit.c
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-commit.h
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-diff.c
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-diff.h
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-legacy-pef-info.c
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-legacy-pef-info.h
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-map.c
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-map.h
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-parse.c
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-parse.h
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-section.c
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-section.h
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-utils.c
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-utils.h
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-validate.c
Examining data/freeipmi-1.6.4/ipmi-config/ipmi-config-validate.h
Examining data/freeipmi-1.6.4/ipmi-dcmi/ipmi-dcmi.c
Examining data/freeipmi-1.6.4/ipmi-dcmi/ipmi-dcmi.h
Examining data/freeipmi-1.6.4/ipmi-dcmi/ipmi-dcmi-argp.c
Examining data/freeipmi-1.6.4/ipmi-dcmi/ipmi-dcmi-argp.h
Examining data/freeipmi-1.6.4/ipmi-fru/ipmi-fru.c
Examining data/freeipmi-1.6.4/ipmi-fru/ipmi-fru_.h
Examining data/freeipmi-1.6.4/ipmi-fru/ipmi-fru-argp.c
Examining data/freeipmi-1.6.4/ipmi-fru/ipmi-fru-argp.h
Examining data/freeipmi-1.6.4/ipmi-fru/ipmi-fru-oem-wistron.c
Examining data/freeipmi-1.6.4/ipmi-fru/ipmi-fru-oem-wistron.h
Examining data/freeipmi-1.6.4/ipmi-fru/ipmi-fru-output.c
Examining data/freeipmi-1.6.4/ipmi-fru/ipmi-fru-output.h
Examining data/freeipmi-1.6.4/ipmi-oem/ipmi-oem.c
Examining data/freeipmi-1.6.4/ipmi-oem/ipmi-oem.h
Examining data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-argp.c
Examining data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-argp.h
Examining data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-common.c
Examining data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-common.h
Examining data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c
Examining data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.h
Examining data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-fujitsu.c
Examining data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-fujitsu.h
Examining data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-gigabyte.c
Examining data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-gigabyte.h
Examining data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-ibm.c
Examining data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-ibm.h
Examining data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-intel.c
Examining data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-intel.h
Examining data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-intelnm.c
Examining data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-intelnm.h
Examining data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-inventec.c
Examining data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-inventec.h
Examining data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-quanta.c
Examining data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-quanta.h
Examining data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-sun.c
Examining data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-sun.h
Examining data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-supermicro.c
Examining data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-supermicro.h
Examining data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-thirdparty.c
Examining data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-thirdparty.h
Examining data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-wistron.c
Examining data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-wistron.h
Examining data/freeipmi-1.6.4/ipmi-pet/ipmi-pet.c
Examining data/freeipmi-1.6.4/ipmi-pet/ipmi-pet.h
Examining data/freeipmi-1.6.4/ipmi-pet/ipmi-pet-argp.c
Examining data/freeipmi-1.6.4/ipmi-pet/ipmi-pet-argp.h
Examining data/freeipmi-1.6.4/ipmi-raw/ipmi-raw.c
Examining data/freeipmi-1.6.4/ipmi-raw/ipmi-raw.h
Examining data/freeipmi-1.6.4/ipmi-raw/ipmi-raw-argp.c
Examining data/freeipmi-1.6.4/ipmi-raw/ipmi-raw-argp.h
Examining data/freeipmi-1.6.4/ipmi-sel/ipmi-sel.c
Examining data/freeipmi-1.6.4/ipmi-sel/ipmi-sel_.h
Examining data/freeipmi-1.6.4/ipmi-sel/ipmi-sel-argp.c
Examining data/freeipmi-1.6.4/ipmi-sel/ipmi-sel-argp.h
Examining data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors.c
Examining data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors.h
Examining data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-argp.c
Examining data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-argp.h
Examining data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-detailed-output.c
Examining data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-detailed-output.h
Examining data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-oem-intel.c
Examining data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-oem-intel.h
Examining data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-oem-intel-node-manager.c
Examining data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-oem-intel-node-manager.h
Examining data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-oem-intel-s5500wb.c
Examining data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-oem-intel-s5500wb.h
Examining data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-oem-intel-s2600jf.c
Examining data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-oem-intel-s2600jf.h
Examining data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-oem-intel-s2600wp.c
Examining data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-oem-intel-s2600wp.h
Examining data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-oem-intel-quanta-qssc-s4r.c
Examining data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-oem-intel-quanta-qssc-s4r.h
Examining data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-oem-inventec.c
Examining data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-oem-inventec.h
Examining data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-oem-inventec-5441.c
Examining data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-oem-inventec-5441.h
Examining data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-oem-inventec-5442.c
Examining data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-oem-inventec-5442.h
Examining data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-oem-quanta.c
Examining data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-oem-quanta.h
Examining data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-oem-quanta-s99q.c
Examining data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-oem-quanta-s99q.h
Examining data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-oem-wistron.c
Examining data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-oem-wistron.h
Examining data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-oem-wistron-c6220.c
Examining data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-oem-wistron-c6220.h
Examining data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-output-common.c
Examining data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-output-common.h
Examining data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-simple-output.c
Examining data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-simple-output.h
Examining data/freeipmi-1.6.4/ipmi-locate/ipmi-locate.c
Examining data/freeipmi-1.6.4/ipmi-locate/ipmi-locate_.h
Examining data/freeipmi-1.6.4/ipmi-locate/ipmi-locate-argp.c
Examining data/freeipmi-1.6.4/ipmi-locate/ipmi-locate-argp.h
Examining data/freeipmi-1.6.4/ipmiconsole/ipmiconsole.c
Examining data/freeipmi-1.6.4/ipmiconsole/ipmiconsole_.h
Examining data/freeipmi-1.6.4/ipmiconsole/ipmiconsole-argp.c
Examining data/freeipmi-1.6.4/ipmiconsole/ipmiconsole-argp.h
Examining data/freeipmi-1.6.4/ipmidetect/ipmidetect.c
Examining data/freeipmi-1.6.4/ipmidetect/ipmidetect_.h
Examining data/freeipmi-1.6.4/ipmidetect/ipmidetect-argp.c
Examining data/freeipmi-1.6.4/ipmidetect/ipmidetect-argp.h
Examining data/freeipmi-1.6.4/ipmidetectd/ipmidetectd.c
Examining data/freeipmi-1.6.4/ipmidetectd/ipmidetectd.h
Examining data/freeipmi-1.6.4/ipmidetectd/ipmidetectd-argp.c
Examining data/freeipmi-1.6.4/ipmidetectd/ipmidetectd-argp.h
Examining data/freeipmi-1.6.4/ipmidetectd/ipmidetectd-config.c
Examining data/freeipmi-1.6.4/ipmidetectd/ipmidetectd-config.h
Examining data/freeipmi-1.6.4/ipmiping/ipmiping.c
Examining data/freeipmi-1.6.4/ipmipower/argv.c
Examining data/freeipmi-1.6.4/ipmipower/argv.h
Examining data/freeipmi-1.6.4/ipmipower/ipmipower.c
Examining data/freeipmi-1.6.4/ipmipower/ipmipower.h
Examining data/freeipmi-1.6.4/ipmipower/ipmipower_argp.c
Examining data/freeipmi-1.6.4/ipmipower/ipmipower_argp.h
Examining data/freeipmi-1.6.4/ipmipower/ipmipower_check.c
Examining data/freeipmi-1.6.4/ipmipower/ipmipower_check.h
Examining data/freeipmi-1.6.4/ipmipower/ipmipower_connection.c
Examining data/freeipmi-1.6.4/ipmipower/ipmipower_connection.h
Examining data/freeipmi-1.6.4/ipmipower/ipmipower_error.c
Examining data/freeipmi-1.6.4/ipmipower/ipmipower_error.h
Examining data/freeipmi-1.6.4/ipmipower/ipmipower_oem.c
Examining data/freeipmi-1.6.4/ipmipower/ipmipower_oem.h
Examining data/freeipmi-1.6.4/ipmipower/ipmipower_output.c
Examining data/freeipmi-1.6.4/ipmipower/ipmipower_output.h
Examining data/freeipmi-1.6.4/ipmipower/ipmipower_packet.c
Examining data/freeipmi-1.6.4/ipmipower/ipmipower_packet.h
Examining data/freeipmi-1.6.4/ipmipower/ipmipower_ping.c
Examining data/freeipmi-1.6.4/ipmipower/ipmipower_ping.h
Examining data/freeipmi-1.6.4/ipmipower/ipmipower_powercmd.c
Examining data/freeipmi-1.6.4/ipmipower/ipmipower_powercmd.h
Examining data/freeipmi-1.6.4/ipmipower/ipmipower_prompt.c
Examining data/freeipmi-1.6.4/ipmipower/ipmipower_prompt.h
Examining data/freeipmi-1.6.4/ipmipower/ipmipower_util.c
Examining data/freeipmi-1.6.4/ipmipower/ipmipower_util.h
Examining data/freeipmi-1.6.4/ipmiseld/ipmiseld.c
Examining data/freeipmi-1.6.4/ipmiseld/ipmiseld.h
Examining data/freeipmi-1.6.4/ipmiseld/ipmiseld-argp.c
Examining data/freeipmi-1.6.4/ipmiseld/ipmiseld-argp.h
Examining data/freeipmi-1.6.4/ipmiseld/ipmiseld-cache.c
Examining data/freeipmi-1.6.4/ipmiseld/ipmiseld-cache.h
Examining data/freeipmi-1.6.4/ipmiseld/ipmiseld-common.c
Examining data/freeipmi-1.6.4/ipmiseld/ipmiseld-common.h
Examining data/freeipmi-1.6.4/ipmiseld/ipmiseld-debug.c
Examining data/freeipmi-1.6.4/ipmiseld/ipmiseld-debug.h
Examining data/freeipmi-1.6.4/ipmiseld/ipmiseld-ipmi-communication.c
Examining data/freeipmi-1.6.4/ipmiseld/ipmiseld-ipmi-communication.h
Examining data/freeipmi-1.6.4/ipmiseld/ipmiseld-threadpool.c
Examining data/freeipmi-1.6.4/ipmiseld/ipmiseld-threadpool.h
Examining data/freeipmi-1.6.4/rmcpping/rmcpping.c
Examining data/freeipmi-1.6.4/contrib/libipmimonitoring/ipmimonitoring-sel.c
Examining data/freeipmi-1.6.4/contrib/libipmimonitoring/ipmimonitoring-sensors.c

FINAL RESULTS:

data/freeipmi-1.6.4/bmc-device/bmc-device-argp.c:542:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (access (cmd_args->read_fru_filename, F_OK) == 0)
data/freeipmi-1.6.4/bmc-device/bmc-device-argp.c:544:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          if (access (cmd_args->read_fru_filename, W_OK) < 0)
data/freeipmi-1.6.4/bmc-device/bmc-device-argp.c:590:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (access (cmd_args->write_fru_filename, R_OK) < 0)
data/freeipmi-1.6.4/common/debugutil/debug-util.c:86:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    len = snprintf (hdrbuf,
data/freeipmi-1.6.4/common/debugutil/debug-util.c:101:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      len = snprintf (hdrbuf,
data/freeipmi-1.6.4/common/miscutil/conffile.c:164:14:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        rv = snprintf(errbuf, CONFFILE_MAX_ERRMSGLEN,
data/freeipmi-1.6.4/common/miscutil/conffile.c:168:14:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        rv = snprintf(errbuf, CONFFILE_MAX_ERRMSGLEN,
data/freeipmi-1.6.4/common/miscutil/conffile.c:175:14:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        rv = snprintf(errbuf, CONFFILE_MAX_ERRMSGLEN,
data/freeipmi-1.6.4/common/miscutil/conffile.c:184:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(buf, errbuf);
data/freeipmi-1.6.4/common/miscutil/conffile.c:226:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access(filename, R_OK) < 0) {
data/freeipmi-1.6.4/common/miscutil/conffile.c:761:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(cf->optionname, cf->options[i].optionname);
data/freeipmi-1.6.4/common/miscutil/error.c:84:3:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  vsnprintf(buf, ERROR_BUFLEN, fmt, ap);
data/freeipmi-1.6.4/common/miscutil/fi_hostlist.c:191:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (newp, p);
data/freeipmi-1.6.4/common/miscutil/hostlist.c:351:11:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    len = vsnprintf(buf, 1024, msg, ap);
data/freeipmi-1.6.4/common/miscutil/hostlist.c:2352:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat (buf, i->hr->prefix);
data/freeipmi-1.6.4/common/miscutil/hostlist.c:2353:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat (buf, suffix);
data/freeipmi-1.6.4/common/pingtool/ping-tool-common.c:164:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf (stderr, buf, ap);
data/freeipmi-1.6.4/common/portability/freeipmi-argp-fmtstream.h:77:33:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define __argp_fmtstream_printf fprintf
data/freeipmi-1.6.4/common/portability/freeipmi-argp-fmtstream.h:78:31:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define argp_fmtstream_printf fprintf
data/freeipmi-1.6.4/common/portability/freeipmi-argp-help.c:1776:11:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
          vfprintf (stream, fmt, ap);
data/freeipmi-1.6.4/common/portability/freeipmi-argp-help.c:1822:15:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
              vfprintf (stream, fmt, ap);
data/freeipmi-1.6.4/common/portability/freeipmi-argp-namefrob.h:90:21:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define __vsnprintf vsnprintf
data/freeipmi-1.6.4/common/portability/freeipmi-argp-parse.c:698:13:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
            fprintf (parser->state.err_stream,
data/freeipmi-1.6.4/common/portability/freeipmi-argp-parse.c:967:13:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
            fprintf (parser->state.err_stream,
data/freeipmi-1.6.4/common/portability/freeipmi-argp-parse.c:972:13:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
            fprintf (parser->state.err_stream,
data/freeipmi-1.6.4/common/portability/freeipmi-argp-parse.c:997:19:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                  fprintf (parser->state.err_stream,
data/freeipmi-1.6.4/common/portability/freeipmi-argp-parse.c:1126:21:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                    fprintf (parser->state.err_stream,
data/freeipmi-1.6.4/common/portability/freeipmi-argp-parse.c:1143:23:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                      fprintf (parser->state.err_stream,
data/freeipmi-1.6.4/common/portability/freeipmi-argp-parse.c:1149:23:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                      fprintf (parser->state.err_stream,
data/freeipmi-1.6.4/common/portability/freeipmi-argp-parse.c:1167:27:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                          fprintf (parser->state.err_stream,
data/freeipmi-1.6.4/common/portability/freeipmi-argp-parse.c:1173:27:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                          fprintf (parser->state.err_stream,
data/freeipmi-1.6.4/common/portability/freeipmi-portability.c:227:10:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  size = vsnprintf (NULL, 0, fmt, arg);
data/freeipmi-1.6.4/common/portability/freeipmi-portability.c:243:8:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  rv = vsnprintf (str, size, fmt, arg);
data/freeipmi-1.6.4/common/portability/freeipmi-portability.c:346:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (pbuf, *p);              /* copy alias strings */
data/freeipmi-1.6.4/common/portability/freeipmi-portability.c:353:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (pbuf, ph->h_name);          /* copy alias strings */
data/freeipmi-1.6.4/common/toolcommon/pstdout.c:547:14:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      wlen = vsnprintf(buf, buflen, format, vacpy);
data/freeipmi-1.6.4/common/toolcommon/pstdout.c:1598:10:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    rv = vprintf(format, ap);
data/freeipmi-1.6.4/common/toolcommon/pstdout.c:1622:10:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    rv = vfprintf(stream, format, ap);
data/freeipmi-1.6.4/common/toolcommon/tool-cmdline-common.c:244:13:  [4] (misc) getpass:
  This function is obsolete and not portable. It was in SUSv2 but removed by
  POSIX.2. What it does exactly varies considerably between systems,
  particularly in where its prompt is displayed and where it gets its data
  (e.g., /dev/tty, stdin, stderr, etc.). In addition, some implementations
  overflow buffers. (CWE-676, CWE-120, CWE-20). Make the specific calls to do
  exactly what you want. If you continue to use it, or write your own, be
  sure to zero the password as soon as possible to avoid leaving the
  cleartext password visible in the process' address space.
      arg = getpass ("Password: ");
data/freeipmi-1.6.4/common/toolcommon/tool-cmdline-common.c:293:15:  [4] (misc) getpass:
  This function is obsolete and not portable. It was in SUSv2 but removed by
  POSIX.2. What it does exactly varies considerably between systems,
  particularly in where its prompt is displayed and where it gets its data
  (e.g., /dev/tty, stdin, stderr, etc.). In addition, some implementations
  overflow buffers. (CWE-676, CWE-120, CWE-20). Make the specific calls to do
  exactly what you want. If you continue to use it, or write your own, be
  sure to zero the password as soon as possible to avoid leaving the
  cleartext password visible in the process' address space.
        arg = getpass ("K_g: ");
data/freeipmi-1.6.4/common/toolcommon/tool-cmdline-common.c:585:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (access (common_args->driver_device, R_OK|W_OK) < 0)
data/freeipmi-1.6.4/common/toolcommon/tool-cmdline-common.c:659:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (access (common_args->sdr_cache_directory, R_OK|W_OK|X_OK) < 0)
data/freeipmi-1.6.4/common/toolcommon/tool-sdr-cache-common.c:126:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (!access (pwd.pw_dir, R_OK|W_OK|X_OK))
data/freeipmi-1.6.4/common/toolcommon/tool-sdr-cache-common.c:136:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          strcpy (buf, pwd.pw_dir);
data/freeipmi-1.6.4/common/toolcommon/tool-sdr-cache-common.c:160:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access (buf, R_OK|W_OK|X_OK) < 0)
data/freeipmi-1.6.4/common/toolcommon/tool-sdr-cache-common.c:219:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (tbuf, cache_dir);
data/freeipmi-1.6.4/common/toolcommon/tool-sdr-cache-common.c:221:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (access (tbuf, R_OK|W_OK|X_OK) < 0)
data/freeipmi-1.6.4/common/toolcommon/tool-sdr-cache-common.c:371:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (access (common_args->sdr_cache_file, R_OK) < 0)
data/freeipmi-1.6.4/common/toolcommon/tool-sdr-cache-common.c:386:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
              strcpy (cachedirbuf, common_args->sdr_cache_file);
data/freeipmi-1.6.4/common/toolcommon/tool-sensor-common.c:215:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
              strcpy (sensor_type_cmdline, ipmi_sensor_types[j]);
data/freeipmi-1.6.4/common/toolcommon/tool-sensor-common.c:232:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          strcpy (sensor_type_cmdline, ipmi_oem_sensor_type);
data/freeipmi-1.6.4/ipmi-config/ipmi-config-argp.c:644:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          if (access (cmd_args->filename, R_OK) < 0)
data/freeipmi-1.6.4/ipmi-config/ipmi-config-argp.c:654:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          if (access (cmd_args->filename, F_OK) == 0)
data/freeipmi-1.6.4/ipmi-config/ipmi-config-argp.c:656:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
              if (access (cmd_args->filename, W_OK) < 0)
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-user-sections.c:490:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          strcpy (username, IPMI_CONFIG_USERNAME_NOT_SET_YET_STR);
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-user-sections.c:2353:7:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      snprintf (section_comment,
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-alert-policy-table.c:761:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
          strcat (description, tempbuf);
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-lan-alert-destination.c:711:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (da.alert_ip, kv->value_input);
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-lan-alert-destination.c:761:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (da.alert_mac, kv->value_input);
data/freeipmi-1.6.4/ipmi-config/ipmi-config-comment.c:95:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat (out, tok);
data/freeipmi-1.6.4/ipmi-config/ipmi-config-utils.c:277:10:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    rv = vfprintf (stream, format, ap);
data/freeipmi-1.6.4/ipmi-fru/ipmi-fru-argp.c:218:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (access (cmd_args->fru_file, R_OK) < 0)
data/freeipmi-1.6.4/ipmi-pet/ipmi-pet.c:647:15:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
              printf (fmt, SENSORS_HEADER_NAME_STR);
data/freeipmi-1.6.4/ipmi-pet/ipmi-pet.c:657:15:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
              printf (fmt,
data/freeipmi-1.6.4/ipmi-pet/ipmi-pet.c:910:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf (fmt,
data/freeipmi-1.6.4/ipmi-pet/ipmi-pet.c:950:7:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      printf (fmt, outbuf, data->system_id);
data/freeipmi-1.6.4/ipmi-pet/ipmi-pet.c:963:7:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      printf (fmt, data->manufacturer_id, data->system_id);
data/freeipmi-1.6.4/ipmi-pet/ipmi-pet.c:1220:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
          strcat (outbuf, tmpbuf);
data/freeipmi-1.6.4/ipmidetect/ipmidetect.c:358:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf (stdout, detectedfmt, detected_count);
data/freeipmi-1.6.4/ipmidetect/ipmidetect.c:366:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf (stdout, undetectedfmt, undetected_count);
data/freeipmi-1.6.4/ipmipower/ipmipower_check.c:830:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy (username_buf, cmd_args.common_args.username);
data/freeipmi-1.6.4/ipmipower/ipmipower_error.c:101:3:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  vsnprintf (errbuf, IPMIPOWER_ERROR_BUFLEN, fmt, ap);
data/freeipmi-1.6.4/ipmipower/ipmipower_error.c:130:3:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  vsnprintf (errbuf, IPMIPOWER_ERROR_BUFLEN, fmt, ap);
data/freeipmi-1.6.4/ipmipower/ipmipower_error.c:164:3:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  vsnprintf (buffer, IPMIPOWER_ERROR_BUFLEN, fmt, ap);
data/freeipmi-1.6.4/ipmipower/ipmipower_error.h:72:15:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      __len = snprintf (__err,                                                  \
data/freeipmi-1.6.4/ipmipower/ipmipower_error.h:97:17:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        __len = snprintf (__err,                                                \
data/freeipmi-1.6.4/ipmipower/ipmipower_packet.c:651:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy (username_buf, username);
data/freeipmi-1.6.4/ipmipower/ipmipower_powercmd.c:1791:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy (username_buf, cmd_args.common_args.username);
data/freeipmi-1.6.4/ipmipower/ipmipower_prompt.c:722:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat (strbuf, str);
data/freeipmi-1.6.4/ipmipower/ipmipower_util.c:197:9:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  len = vsnprintf (buf, IPMIPOWER_OUTPUT_BUFLEN, fmt, ap);
data/freeipmi-1.6.4/ipmiseld/ipmiseld-argp.c:479:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (access (cmd_args->cache_directory, R_OK|W_OK|X_OK) < 0)
data/freeipmi-1.6.4/ipmiseld/ipmiseld-cache.c:345:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access (filename, F_OK) < 0)
data/freeipmi-1.6.4/ipmiseld/ipmiseld-cache.c:358:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (access (filename, R_OK) < 0)
data/freeipmi-1.6.4/ipmiseld/ipmiseld-cache.c:486:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access (filename, F_OK) < 0)
data/freeipmi-1.6.4/ipmiseld/ipmiseld-cache.c:496:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (access (filename, W_OK) < 0)
data/freeipmi-1.6.4/ipmiseld/ipmiseld-common.c:154:3:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  vsnprintf(buf, IPMISELD_ERR_BUFLEN, message, ap);
data/freeipmi-1.6.4/ipmiseld/ipmiseld-common.c:195:7:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      vsnprintf(buf, IPMISELD_ERR_BUFLEN, message, ap);
data/freeipmi-1.6.4/ipmiseld/ipmiseld-common.c:222:3:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  vsnprintf(buf, IPMISELD_ERR_BUFLEN, message, ap);
data/freeipmi-1.6.4/ipmiseld/ipmiseld-debug.c:52:3:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  vsnprintf (buffer, IPMISELD_DEBUG_BUFFER_LEN, fmt, ap);
data/freeipmi-1.6.4/ipmiseld/ipmiseld-debug.h:52:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    __len = snprintf (__err, \
data/freeipmi-1.6.4/ipmiseld/ipmiseld-debug.h:78:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    __len = snprintf (__err, \
data/freeipmi-1.6.4/ipmiseld/ipmiseld.c:304:1:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
_snprintf (char *buf,
data/freeipmi-1.6.4/ipmiseld/ipmiseld.c:319:9:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  ret = vsnprintf (buf + *wlen, buflen - *wlen, fmt, ap);
data/freeipmi-1.6.4/ipmiseld/ipmiseld.c:350:19:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
              if (_snprintf (fmtbuf, fmtbuf_len, &wlen, "%%"))
data/freeipmi-1.6.4/ipmiseld/ipmiseld.c:360:15:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
          if (_snprintf (fmtbuf, fmtbuf_len, &wlen, "%s",
data/freeipmi-1.6.4/ipmiseld/ipmiseld.c:369:19:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
              if (_snprintf (fmtbuf, fmtbuf_len, &wlen, "%%%c", *ptr))
data/freeipmi-1.6.4/ipmiseld/ipmiseld.c:375:19:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
              if (_snprintf (fmtbuf, fmtbuf_len, &wlen, "%c", *ptr))
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-lan-session-common.c:3754:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy (username_buf, ctx->io.outofband.username);
data/freeipmi-1.6.4/libfreeipmi/debug/ipmi-debug-common.c:83:9:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  len = vsnprintf (buf, IPMI_DEBUG_MAX_BUF_LEN, fmt, ap);
data/freeipmi-1.6.4/libfreeipmi/libcommon/ipmi-trace.h:45:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf (stderr,                                    \
data/freeipmi-1.6.4/libfreeipmi/libcommon/ipmi-trace.h:59:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf (stderr,                                                    \
data/freeipmi-1.6.4/libfreeipmi/libcommon/ipmi-trace.h:73:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf (stderr,                                                    \
data/freeipmi-1.6.4/libfreeipmi/locate/ipmi-locate-pci.c:230:15:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
      items = sscanf (buf, "%x %x %x " FORMAT_X64 " " FORMAT_X64 " " FORMAT_X64 " " FORMAT_X64 " " FORMAT_X64 " " FORMAT_X64,
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-supermicro-common.c:204:9:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    n = sprintf(desc,DIMM_UNKNOWN);  /* invalid */
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string.c:116:9:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  ret = vsnprintf (buf + *wlen, buflen - *wlen, fmt, ap);
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-error-dcmi-util.c:45:7:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      snprintf (errstr, len, arg);              \
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-error-util.c:45:7:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      snprintf (errstr, len, arg);              \
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-sensor-and-event-code-tables-util.c:98:1:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
_snprintf (char *buf, unsigned int buflen, const char * const fmt, ...)
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-sensor-and-event-code-tables-util.c:106:8:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  rv = vsnprintf (buf, buflen, fmt, ap);
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-sensor-and-event-code-tables-util.c:131:13:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    return (_snprintf (buf, buflen, ipmi_sensor_type_system_firmware_progress_event_data2_offset_system_firmware_error[event_data2]));
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-sensor-and-event-code-tables-util.c:134:13:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    return (_snprintf (buf, buflen, ipmi_sensor_type_system_firmware_progress_event_data2_offset_system_firmware_hang[event_data2]));
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-sensor-and-event-code-tables-util.c:137:13:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    return (_snprintf (buf, buflen, ipmi_sensor_type_system_firmware_progress_event_data2_offset_system_firmware_progress[event_data2]));
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-sensor-and-event-code-tables-util.c:239:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat (buf, ipmi_sensor_type_system_event_event_data2_offset_pef_action[index]);
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-sensor-and-event-code-tables-util.c:242:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
          strcat (buf, _ipmi_event_message_separator);
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-sensor-and-event-code-tables-util.c:454:13:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    return (_snprintf (buf, buflen, ipmi_sensor_type_chip_set_event_data2_offset_soft_power_control_failure[event_data2]));
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-sensor-and-event-code-tables-util.c:496:14:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        rv = _snprintf (buf, buflen, ipmi_sensor_type_system_boot_initiated_event_data2_offset_system_restart_restart_cause[val]);
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-sensor-and-event-code-tables-util.c:541:10:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    rv = _snprintf (buf, buflen, ipmi_sensor_type_slot_connector_event_data2_offset_slot_holds_spare_device_slot_connector_type[val]);
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-sensor-and-event-code-tables-util.c:748:13:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    return (_snprintf (buf, buflen, ipmi_sensor_type_version_change_event_data2_offset_software_or_fw_change_detected_with_associated_entity_was_successful_version_change_type[event_data2]));
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-sensor-and-event-code-tables-util.c:853:14:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        rv = _snprintf (buf, buflen, ipmi_sensor_type_power_supply_event_data3_offset_configuration_error_error_type[val]);
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-sensor-and-event-code-tables-util.c:1015:13:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    return (_snprintf (buf, buflen, ipmi_sensor_type_chip_set_event_data3_offset_soft_power_control_failure[event_data3]));
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole.c:181:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (default_config.username, data->string);
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole.c:205:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (default_config.password, data->string);
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_checks.c:646:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy (username_buf, c->config.username);
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_ctx.c:182:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (c->config.hostname, hostname);
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_ctx.c:187:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (c->config.username, ipmi_config->username);
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_ctx.c:189:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (c->config.username, default_config.username);
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_ctx.c:192:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (c->config.password, ipmi_config->password);
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_ctx.c:194:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (c->config.password, default_config.password);
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_debug.c:125:3:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  vsnprintf (errbuf, IPMICONSOLE_DEBUG_ERROR_BUFLEN, fmt, ap);
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_debug.c:221:3:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  vsnprintf (errbuf, IPMICONSOLE_DEBUG_ERROR_BUFLEN, fmt, ap);
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_debug.c:308:3:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  vsnprintf (buffer, IPMICONSOLE_DEBUG_ERROR_BUFLEN, fmt, ap);
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_debug.h:46:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    __len = snprintf (__err,                                                    \
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_debug.h:69:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    __len = snprintf (__err,                                                    \
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_packet.c:488:14:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  if ((len = snprintf (hdr, hdrlen, fmt, str)) < 0)
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_packet.c:792:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy (username_buf, c->config.username);
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_processing.c:2033:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy (username_buf, c->config.username);
data/freeipmi-1.6.4/libipmidetect/ipmidetect.c:290:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (conf->hostnames[i], data->stringlist[i]);
data/freeipmi-1.6.4/libipmidetect/ipmidetect.c:566:13:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      num = sscanf (buf, "%s %lu\n", hostname, &localtime);
data/freeipmi-1.6.4/libipmimonitoring/ipmi_monitoring_debug.c:60:3:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  vsnprintf (errbuf, IPMI_MONITORING_DEBUG_ERROR_BUFLEN, fmt, ap);
data/freeipmi-1.6.4/libipmimonitoring/ipmi_monitoring_debug.c:89:3:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  vsnprintf (buffer, IPMI_MONITORING_DEBUG_ERROR_BUFLEN, fmt, ap);
data/freeipmi-1.6.4/libipmimonitoring/ipmi_monitoring_debug.h:41:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    __len = snprintf (__err,                                                        \
data/freeipmi-1.6.4/libipmimonitoring/ipmi_monitoring_sdr_cache.c:154:19:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                  strcat (&sdr_cache_filename[index], local_hostname);
data/freeipmi-1.6.4/libipmimonitoring/ipmi_monitoring_sdr_cache.c:165:19:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                  strcat (&sdr_cache_filename[index], hostname);
data/freeipmi-1.6.4/common/pingtool/ping-tool-common.c:233:15:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  while ((c = getopt (argc, argv, options)) != -1)
data/freeipmi-1.6.4/common/pingtool/ping-tool-common.c:526:3:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  srand (time (NULL));
data/freeipmi-1.6.4/common/portability/freeipmi-argp-help.c:178:48:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const unsigned char *var = (unsigned char *) getenv ("ARGP_HELP_FMT");
data/freeipmi-1.6.4/common/portability/freeipmi-argp-parse.c:557:29:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  parser->posixly_correct = getenv ("POSIXLY_CORRECT");
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-api.c:891:3:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  srand (seedp);
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-lan-session-common.c:1558:3:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  srand (seedp);
data/freeipmi-1.6.4/bmc-device/bmc-device-argp.c:557:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
          if ((fd = open (cmd_args->read_fru_filename, O_CREAT, 0644)) < 0)
data/freeipmi-1.6.4/bmc-device/bmc-device.c:346:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char statestrbuf[1024];
data/freeipmi-1.6.4/bmc-device/bmc-device.c:348:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char verbosestrbuf[1024];
data/freeipmi-1.6.4/bmc-device/bmc-device.c:964:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *str_args[BMC_DEVICE_MAX_REARM_SENSOR_ARGS];
data/freeipmi-1.6.4/bmc-device/bmc-device.c:1180:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char timestr[BMC_DEVICE_TIME_BUFLEN + 1];
data/freeipmi-1.6.4/bmc-device/bmc-device.c:1314:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char timestr[BMC_DEVICE_TIME_BUFLEN + 1];
data/freeipmi-1.6.4/bmc-device/bmc-device.c:1595:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *str_args[BMC_DEVICE_MAX_PLATFORM_EVENT_ARGS];
data/freeipmi-1.6.4/bmc-device/bmc-device.c:1808:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *str_args[BMC_DEVICE_SET_SENSOR_READING_AND_EVENT_STATUS_ARGS];
data/freeipmi-1.6.4/bmc-device/bmc-device.c:2008:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char timestr[BMC_DEVICE_TIME_BUFLEN + 1];
data/freeipmi-1.6.4/bmc-device/bmc-device.c:2789:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((fd = open (state_data->prog_data->args->read_fru_filename, O_CREAT | O_WRONLY, 0600)) < 0)
data/freeipmi-1.6.4/bmc-device/bmc-device.c:2906:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fd = open (state_data->prog_data->args->write_fru_filename, O_RDONLY)) < 0)
data/freeipmi-1.6.4/bmc-info/bmc-info.c:195:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char iana_buf[BMC_INFO_IANA_STRING_MAX + 1];
data/freeipmi-1.6.4/bmc-info/bmc-info.c:703:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char string[BMC_INFO_SYSTEM_INFO_STRING_MAX + 1];
data/freeipmi-1.6.4/bmc-info/bmc-info.c:1230:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char iana_buf[BMC_INFO_IANA_STRING_MAX + 1];
data/freeipmi-1.6.4/bmc-watchdog/bmc-watchdog.c:78:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char comp_code_errbuf[BMC_WATCHDOG_ERR_BUFLEN];
data/freeipmi-1.6.4/common/miscutil/cbuf.c:271:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (cb->data - CBUF_MAGIC_LEN, (void *) &cb->magic, CBUF_MAGIC_LEN);
data/freeipmi-1.6.4/common/miscutil/cbuf.c:272:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (cb->data + cb->size + 1, (void *) &cb->magic, CBUF_MAGIC_LEN);
data/freeipmi-1.6.4/common/miscutil/cbuf.c:295:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (cb->data - CBUF_MAGIC_LEN, (void *) &cb->magic, CBUF_MAGIC_LEN);
data/freeipmi-1.6.4/common/miscutil/cbuf.c:296:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (cb->data + cb->size + 1, (void *) &cb->magic, CBUF_MAGIC_LEN);
data/freeipmi-1.6.4/common/miscutil/cbuf.c:1300:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (dstbuf, *psrcbuf, len);
data/freeipmi-1.6.4/common/miscutil/cbuf.c:1338:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (*pdstbuf, srcbuf, len);
data/freeipmi-1.6.4/common/miscutil/cbuf.c:1406:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy (&dst->data[i_dst], &src->data[i_src], n);
data/freeipmi-1.6.4/common/miscutil/cbuf.c:1707:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (cb->data + cb->size + 1, (void *) &cb->magic, CBUF_MAGIC_LEN);
data/freeipmi-1.6.4/common/miscutil/conffile.c:79:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char optionname[CONFFILE_MAX_OPTIONNAMELEN];
data/freeipmi-1.6.4/common/miscutil/conffile.c:148:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char errbuf[CONFFILE_MAX_ERRMSGLEN];
data/freeipmi-1.6.4/common/miscutil/conffile.c:231:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((cf->fd = open(filename, O_RDONLY)) < 0) {
data/freeipmi-1.6.4/common/miscutil/conffile.c:312:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[CONFFILE_MAX_LINELEN];
data/freeipmi-1.6.4/common/miscutil/conffile.c:347:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(linebuf + len, buf, ret);
data/freeipmi-1.6.4/common/miscutil/conffile.c:403:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char *linebuf,
data/freeipmi-1.6.4/common/miscutil/conffile.c:404:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char args[CONFFILE_MAX_ARGS][CONFFILE_MAX_ARGLEN])
data/freeipmi-1.6.4/common/miscutil/conffile.c:479:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char args[CONFFILE_MAX_ARGS][CONFFILE_MAX_ARGLEN];
data/freeipmi-1.6.4/common/miscutil/conffile.c:702:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char linebuf[CONFFILE_MAX_LINELEN];
data/freeipmi-1.6.4/common/miscutil/conffile.c:823:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    ((char *)option_ptr)[option_data - 1] = '\0';
data/freeipmi-1.6.4/common/miscutil/conffile.h:220:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char string[CONFFILE_MAX_ARGLEN];
data/freeipmi-1.6.4/common/miscutil/conffile.h:225:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringlist[CONFFILE_MAX_ARGS][CONFFILE_MAX_ARGLEN];
data/freeipmi-1.6.4/common/miscutil/error.c:80:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[ERROR_BUFLEN];
data/freeipmi-1.6.4/common/miscutil/fi_hostlist.c:241:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (new, host, pl - host);
data/freeipmi-1.6.4/common/miscutil/fi_hostlist.c:244:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (new + len, FI_LEFT_BRACKET, strlen (FI_LEFT_BRACKET));
data/freeipmi-1.6.4/common/miscutil/fi_hostlist.c:251:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (new + len, pl, pr - pl);
data/freeipmi-1.6.4/common/miscutil/fi_hostlist.c:254:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (new + len, FI_RIGHT_BRACKET, strlen (FI_RIGHT_BRACKET));
data/freeipmi-1.6.4/common/miscutil/fi_hostlist.c:258:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (new + len, pr, host + strlen (host) - pr);
data/freeipmi-1.6.4/common/miscutil/hostlist.c:347:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    buf[1024];
data/freeipmi-1.6.4/common/miscutil/hostlist.c:525:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(hn->prefix, hostname, idx + 1);
data/freeipmi-1.6.4/common/miscutil/hostlist.c:1275:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char prefix[256] = "";
data/freeipmi-1.6.4/common/miscutil/hostlist.c:1320:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(prefix, tok, (size_t) pos * sizeof(char));
data/freeipmi-1.6.4/common/miscutil/hostlist.c:1499:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char host[4096];
data/freeipmi-1.6.4/common/miscutil/hostlist.c:1524:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cur_tok[1024];
data/freeipmi-1.6.4/common/miscutil/hostlist.c:1751:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[MAXHOSTRANGELEN + 1];
data/freeipmi-1.6.4/common/miscutil/hostlist.c:1784:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1024];
data/freeipmi-1.6.4/common/miscutil/hostlist.c:1855:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[MAXHOSTNAMELEN + 16];
data/freeipmi-1.6.4/common/miscutil/hostlist.c:2330:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char suffix[16];
data/freeipmi-1.6.4/common/miscutil/hostlist.c:2361:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[MAXHOSTRANGELEN + 1];
data/freeipmi-1.6.4/common/miscutil/hostlist.c:2632:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1024];
data/freeipmi-1.6.4/common/miscutil/hostlist.c:2673:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1024000];
data/freeipmi-1.6.4/common/miscutil/secure.c:96:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fd = open ("/dev/zero", O_RDWR)) < 0)
data/freeipmi-1.6.4/common/parsecommon/parse-common.c:146:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[WORKAROUND_FLAG_BUFLEN+1];
data/freeipmi-1.6.4/common/parsecommon/parse-common.c:351:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[3] = { 0, 0, 0};
data/freeipmi-1.6.4/common/parsecommon/parse-common.c:394:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (out, in, strlen (in));
data/freeipmi-1.6.4/common/pingtool/ping-tool-common.c:121:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char pingtool_dest[MAXHOSTNAMELEN+1];
data/freeipmi-1.6.4/common/pingtool/ping-tool-common.c:122:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char pingtool_dest_ip[INET6_ADDRSTRLEN+1];
data/freeipmi-1.6.4/common/pingtool/ping-tool-common.c:156:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[IPMI_PING_MAX_ERR_LEN];
data/freeipmi-1.6.4/common/pingtool/ping-tool-common.c:343:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char port_str[MAXPORTBUFLEN + 1];
data/freeipmi-1.6.4/common/pingtool/ping-tool-common.c:364:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy (&pingtool_destaddr4, ai->ai_addr, ai->ai_addrlen);
data/freeipmi-1.6.4/common/pingtool/ping-tool-common.c:393:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy (&pingtool_srcaddr4.sin_addr,
data/freeipmi-1.6.4/common/pingtool/ping-tool-common.c:417:27:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                          memcpy (&tmpaddr, ifa->ifa_addr, sizeof (struct sockaddr_in));
data/freeipmi-1.6.4/common/pingtool/ping-tool-common.c:436:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy (&pingtool_destaddr6, ai->ai_addr, ai->ai_addrlen);
data/freeipmi-1.6.4/common/pingtool/ping-tool-common.c:483:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		      memcpy (&tmpaddr, ifa->ifa_addr, sizeof (struct sockaddr_in6));
data/freeipmi-1.6.4/common/pingtool/ping-tool-common.c:617:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
              char fromstr[INET6_ADDRSTRLEN+1];
data/freeipmi-1.6.4/common/pingtool/ping-tool-common.c:678:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy (&from4, &from6, fromlen);
data/freeipmi-1.6.4/common/portability/freeipmi-argp-fmtstream.c:400:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (__fs->p, __str, __len);
data/freeipmi-1.6.4/common/portability/freeipmi-argp-fmtstream.h:220:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (__fs->p, __str, __len);
data/freeipmi-1.6.4/common/portability/freeipmi-argp-help.c:222:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                val = atoi (arg);
data/freeipmi-1.6.4/common/portability/freeipmi-argp-parse.c:148:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      _argp_hang = atoi (arg ? arg : "3600");
data/freeipmi-1.6.4/common/portability/freeipmi-portability.c:48:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (to, from, size);
data/freeipmi-1.6.4/common/portability/freeipmi-portability.c:68:18:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  return (char *)memcpy (new, s, len);
data/freeipmi-1.6.4/common/portability/freeipmi-portability.c:336:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (pbuf, *p, ph->h_length);              /* copy address bytes */
data/freeipmi-1.6.4/common/portability/freeipmi-portability.h:104:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (char *) memcpy (__new, __old, __len);      \
data/freeipmi-1.6.4/common/portability/freeipmi-portability.h:116:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define memcpy freeipmi_memcpy
data/freeipmi-1.6.4/common/toolcommon/pstdout.c:620:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              memcpy(*whichbuffer + *whichbufferlen, linebuf, linelen);
data/freeipmi-1.6.4/common/toolcommon/pstdout.c:642:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              memcpy(*whichbuffer + *whichbufferlen,
data/freeipmi-1.6.4/common/toolcommon/pstdout.c:645:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              memcpy(*whichbuffer + *whichbufferlen + hostname_len,
data/freeipmi-1.6.4/common/toolcommon/pstdout.c:648:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              memcpy(*whichbuffer + *whichbufferlen + hostname_len + 2,
data/freeipmi-1.6.4/common/toolcommon/pstdout.c:1189:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char hbuf[PSTDOUT_BUFLEN + 1];
data/freeipmi-1.6.4/common/toolcommon/tool-config-file-common.c:5434:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char buf[CONFFILE_MAX_ERRMSGLEN];
data/freeipmi-1.6.4/common/toolcommon/tool-config-file-common.c:5481:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (common_args->k_g, common_cmd_args_config.k_g, IPMI_MAX_K_G_LENGTH);
data/freeipmi-1.6.4/common/toolcommon/tool-config-file-common.c:5508:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (bmc_info_data_ptr,
data/freeipmi-1.6.4/common/toolcommon/tool-config-file-common.c:5515:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (bmc_watchdog_data_ptr,
data/freeipmi-1.6.4/common/toolcommon/tool-config-file-common.c:5522:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (ipmi_config_data_ptr,
data/freeipmi-1.6.4/common/toolcommon/tool-config-file-common.c:5529:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (ipmi_dcmi_data_ptr,
data/freeipmi-1.6.4/common/toolcommon/tool-config-file-common.c:5536:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (ipmi_fru_data_ptr,
data/freeipmi-1.6.4/common/toolcommon/tool-config-file-common.c:5543:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (ipmi_oem_data_ptr,
data/freeipmi-1.6.4/common/toolcommon/tool-config-file-common.c:5550:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (ipmi_pet_data_ptr,
data/freeipmi-1.6.4/common/toolcommon/tool-config-file-common.c:5557:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (ipmi_sel_data_ptr,
data/freeipmi-1.6.4/common/toolcommon/tool-config-file-common.c:5564:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (ipmi_sensors_data_ptr,
data/freeipmi-1.6.4/common/toolcommon/tool-config-file-common.c:5571:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (ipmiconsole_data_ptr,
data/freeipmi-1.6.4/common/toolcommon/tool-config-file-common.c:5578:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (ipmipower_data_ptr,
data/freeipmi-1.6.4/common/toolcommon/tool-config-file-common.c:5585:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (ipmiseld_data_ptr,
data/freeipmi-1.6.4/common/toolcommon/tool-config-file-common.h:152:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sensor_types[CONFIG_FILE_MAX_SENSOR_TYPES][CONFIG_FILE_MAX_SENSOR_TYPES_STRING_LENGTH+1];
data/freeipmi-1.6.4/common/toolcommon/tool-config-file-common.h:155:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char exclude_sensor_types[CONFIG_FILE_MAX_SENSOR_TYPES][CONFIG_FILE_MAX_SENSOR_TYPES_STRING_LENGTH+1];
data/freeipmi-1.6.4/common/toolcommon/tool-config-file-common.h:200:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sensor_types[CONFIG_FILE_MAX_SENSOR_TYPES][CONFIG_FILE_MAX_SENSOR_TYPES_STRING_LENGTH+1];
data/freeipmi-1.6.4/common/toolcommon/tool-config-file-common.h:203:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char exclude_sensor_types[CONFIG_FILE_MAX_SENSOR_TYPES][CONFIG_FILE_MAX_SENSOR_TYPES_STRING_LENGTH+1];
data/freeipmi-1.6.4/common/toolcommon/tool-config-file-common.h:292:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sensor_types[CONFIG_FILE_MAX_SENSOR_TYPES][CONFIG_FILE_MAX_SENSOR_TYPES_STRING_LENGTH+1];
data/freeipmi-1.6.4/common/toolcommon/tool-config-file-common.h:295:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char exclude_sensor_types[CONFIG_FILE_MAX_SENSOR_TYPES][CONFIG_FILE_MAX_SENSOR_TYPES_STRING_LENGTH+1];
data/freeipmi-1.6.4/common/toolcommon/tool-daemon-common.c:102:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (!(pf = fopen (pidfile, "w")))
data/freeipmi-1.6.4/common/toolcommon/tool-event-common.c:125:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                          char outbuf[EVENT_OUTPUT_BUFLEN + 1],
data/freeipmi-1.6.4/common/toolcommon/tool-event-common.c:162:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char outbuf[EVENT_OUTPUT_BUFLEN+1];
data/freeipmi-1.6.4/common/toolcommon/tool-event-common.c:222:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fmt[EVENT_FMT_BUFLEN + 1];
data/freeipmi-1.6.4/common/toolcommon/tool-event-common.c:223:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char outbuf[EVENT_OUTPUT_BUFLEN+1];
data/freeipmi-1.6.4/common/toolcommon/tool-event-common.c:274:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fmt[EVENT_FMT_BUFLEN + 1];
data/freeipmi-1.6.4/common/toolcommon/tool-event-common.c:304:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fmt[EVENT_FMT_BUFLEN + 1];
data/freeipmi-1.6.4/common/toolcommon/tool-event-common.c:305:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char outbuf[EVENT_OUTPUT_BUFLEN+1];
data/freeipmi-1.6.4/common/toolcommon/tool-event-common.c:355:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fmt[EVENT_FMT_BUFLEN + 1];
data/freeipmi-1.6.4/common/toolcommon/tool-event-common.c:384:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char outbuf[EVENT_OUTPUT_BUFLEN+1];
data/freeipmi-1.6.4/common/toolcommon/tool-event-common.c:431:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char outbuf[EVENT_OUTPUT_BUFLEN+1];
data/freeipmi-1.6.4/common/toolcommon/tool-event-common.c:490:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char outbuf[EVENT_OUTPUT_BUFLEN+1];
data/freeipmi-1.6.4/common/toolcommon/tool-hostrange-common.c:48:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char hostbuf[FI_HOSTLIST_BUFLEN + 1];
data/freeipmi-1.6.4/common/toolcommon/tool-sdr-cache-common.c:196:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tbuf[MAXPATHLEN+1];
data/freeipmi-1.6.4/common/toolcommon/tool-sdr-cache-common.c:273:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tbuf[MAXPATHLEN+1];
data/freeipmi-1.6.4/common/toolcommon/tool-sdr-cache-common.c:314:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sdrcachebuf[MAXPATHLEN+1];
data/freeipmi-1.6.4/common/toolcommon/tool-sdr-cache-common.c:324:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char hostnamebuf[MAXHOSTNAMELEN+1];
data/freeipmi-1.6.4/common/toolcommon/tool-sdr-cache-common.c:384:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
              char cachedirbuf[MAXPATHLEN+1];
data/freeipmi-1.6.4/common/toolcommon/tool-sdr-cache-common.c:426:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char configbuf[MAXPATHLEN+1];
data/freeipmi-1.6.4/common/toolcommon/tool-sdr-cache-common.c:427:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cachebuf[MAXPATHLEN+1];
data/freeipmi-1.6.4/common/toolcommon/tool-sdr-cache-common.c:503:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cachedirectorybuf[MAXPATHLEN+1];
data/freeipmi-1.6.4/common/toolcommon/tool-sdr-cache-common.c:528:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cachefilenamebuf[MAXPATHLEN+1];
data/freeipmi-1.6.4/common/toolcommon/tool-sdr-cache-common.c:600:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cachefilenamebuf[MAXPATHLEN+1];
data/freeipmi-1.6.4/common/toolcommon/tool-sdr-cache-common.c:709:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cachefilenamebuf[MAXPATHLEN+1];
data/freeipmi-1.6.4/common/toolcommon/tool-sensor-common.c:127:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
parse_sensor_types (const char *special_string,
data/freeipmi-1.6.4/common/toolcommon/tool-sensor-common.c:128:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                    char sensor_types[MAX_SENSOR_TYPES][MAX_SENSOR_TYPES_STRING_LENGTH+1],
data/freeipmi-1.6.4/common/toolcommon/tool-sensor-common.c:213:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
              char sensor_type_cmdline[MAX_SENSOR_TYPES_STRING_LENGTH];
data/freeipmi-1.6.4/common/toolcommon/tool-sensor-common.c:230:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char sensor_type_cmdline[MAX_SENSOR_TYPES_STRING_LENGTH];
data/freeipmi-1.6.4/common/toolcommon/tool-sensor-common.c:496:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sensor_name[IPMI_SDR_MAX_SENSOR_NAME_LENGTH + 1];
data/freeipmi-1.6.4/common/toolcommon/tool-sensor-common.c:497:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char record_id_buf[RECORD_ID_BUFLEN + 1];
data/freeipmi-1.6.4/common/toolcommon/tool-sensor-common.c:627:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char sensor_units_buf[SENSOR_UNITS_BUFLEN + 1];
data/freeipmi-1.6.4/common/toolcommon/tool-sensor-common.h:78:31:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int parse_sensor_types (const char *special_string,
data/freeipmi-1.6.4/common/toolcommon/tool-sensor-common.h:79:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                        char sensor_types[MAX_SENSOR_TYPES][MAX_SENSOR_TYPES_STRING_LENGTH+1],
data/freeipmi-1.6.4/common/toolcommon/tool-util-common.c:157:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf (p, "%02x", k_g_ptr[i]);
data/freeipmi-1.6.4/contrib/libipmimonitoring/ipmimonitoring-sel.c:383:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char oem_data[64];
data/freeipmi-1.6.4/ipmi-chassis/ipmi-chassis.c:766:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char policy_supported[100];
data/freeipmi-1.6.4/ipmi-chassis/ipmi-chassis.c:780:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat (policy_supported, "always-off ");
data/freeipmi-1.6.4/ipmi-chassis/ipmi-chassis.c:792:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat (policy_supported, "always-on ");
data/freeipmi-1.6.4/ipmi-chassis/ipmi-chassis.c:804:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat (policy_supported, "Restore");
data/freeipmi-1.6.4/ipmi-config/ipmi-config-argp.c:669:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
              if ((fd = open (cmd_args->filename, O_CREAT, 0644)) < 0)
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-chassis-power-conf.c:188:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                         atoi (kv->value_input),
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-common-pef-conf-section.c:883:68:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                                                   atoi (kv->value_input),
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-common-pef-conf-section.c:1000:74:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                                                         atoi (kv->value_input),
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan-conf-misc-section.c:370:74:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                                                         atoi (kv->value_input),
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan-conf-section.c:197:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ip_address_str[BMC_MAXIPADDRLEN + 1];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan-conf-section.c:351:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char mac_address_str[BMC_MAXMACADDRLEN+1];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan-conf-section.c:504:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char subnet_mask_str[BMC_MAXIPADDRLEN + 1];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan-conf-section.c:658:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ip_address_str[BMC_MAXIPADDRLEN + 1];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan-conf-section.c:813:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char mac_address_str[BMC_MAXMACADDRLEN+1];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan-conf-section.c:966:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ip_address_str[BMC_MAXIPADDRLEN + 1];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan-conf-section.c:1120:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char mac_address_str[BMC_MAXMACADDRLEN+1];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan-conf-section.c:1442:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  vi.vlan_id = atoi (kv->value_input);
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan-conf-section.c:1613:64:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                                               atoi (kv->value_input),
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan-conf-section.c:2078:75:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                                                          atoi (kv->value_input),
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan-conf-section.c:2207:77:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                                                            atoi (kv->value_input),
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan-conf-security-keys-section.c:116:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (key, buf, buf_len);
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan-conf-security-keys-section.c:253:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char k_g_str[IPMI_MAX_K_G_LENGTH*2+3];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan-conf-user-security-section.c:243:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  bpt.bad_password_threshold_number = atoi (kv->value_input);
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan-conf-user-security-section.c:285:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  bpt.attempt_count_reset_interval = atoi (kv->value_input);
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan-conf-user-security-section.c:327:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  bpt.user_lockout_interval = atoi (kv->value_input);
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:746:40:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                       atoi (kv->key->key_name + strlen ("IPv6_Static_Address_Source_")),
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:777:40:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                       atoi (kv->key->key_name + strlen ("IPv6_Static_Address_Source_")),
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:785:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                    atoi (kv->key->key_name + strlen ("IPv6_Static_Address_Source_")),
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:820:40:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                       atoi (kv->key->key_name + strlen ("IPv6_Static_Address_Enable_")),
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:851:40:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                       atoi (kv->key->key_name + strlen ("IPv6_Static_Address_Enable_")),
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:859:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                    atoi (kv->key->key_name + strlen ("IPv6_Static_Address_Enable_")),
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:869:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char address_str[BMC_MAXIPV6ADDRLEN + 1];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:879:40:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                       atoi (kv->key->key_name + strlen ("IPv6_Static_Address_")),
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:925:40:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                       atoi (kv->key->key_name + strlen ("IPv6_Static_Address_")),
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:939:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (ipv6_data.address, &addr, IPMI_IPV6_BYTES);
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:943:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                    atoi (kv->key->key_name + strlen ("IPv6_Static_Address_")),
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:962:40:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                       atoi (kv->key->key_name + strlen ("IPv6_Static_Address_Prefix_Length_")),
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:993:40:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                       atoi (kv->key->key_name + strlen ("IPv6_Static_Address_Prefix_Length_")),
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:1001:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                    atoi (kv->key->key_name + strlen ("IPv6_Static_Address_Prefix_Length_")),
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:1020:40:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                       atoi (kv->key->key_name + strlen ("IPv6_Static_Address_Status_")),
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:1180:41:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                        atoi (kv->key->key_name + strlen ("IPv6_Dynamic_Address_Source_")),
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:1219:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char address_str[BMC_MAXIPV6ADDRLEN + 1];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:1229:41:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                        atoi (kv->key->key_name + strlen ("IPv6_Dynamic_Address_")),
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:1275:41:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                        atoi (kv->key->key_name + strlen ("IPv6_Dynamic_Address_Prefix_Length_")),
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:1307:41:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                        atoi (kv->key->key_name + strlen ("IPv6_Dynamic_Address_Status_")),
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:1518:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char address_str[BMC_MAXIPV6ADDRLEN + 1];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:1530:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  num = atoi (kv->key->key_name + strlen ("IPv6_Static_Router_Address_"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:1642:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  num = atoi (kv->key->key_name + strlen ("IPv6_Static_Router_Address_"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:1711:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char router_mac_address_str[BMC_MAXMACADDRLEN+1];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:1724:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  num = atoi (kv->key->key_name + strlen ("IPv6_Static_Router_Mac_Address_"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:1837:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  num = atoi (kv->key->key_name + strlen ("IPv6_Static_Router_Mac_Address_"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:1909:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  num = atoi (kv->key->key_name + strlen ("IPv6_Static_Router_Prefix_Length_"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:2005:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  num = atoi (kv->key->key_name + strlen ("IPv6_Static_Router_Prefix_Length_"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:2007:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  prefix_length = atoi (kv->value_input);
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:2067:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char prefix_value_str[BMC_MAXIPV6ADDRLEN + 1];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:2079:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  num = atoi (kv->key->key_name + strlen ("IPv6_Static_Router_Prefix_Value_"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:2191:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  num = atoi (kv->key->key_name + strlen ("IPv6_Static_Router_Prefix_Value_"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:2260:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key_name[IPMI_CONFIG_MAX_KEY_NAME_LEN];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-rmcpplus-conf-privilege-section.c:167:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char field[IPMI_CONFIG_FIELD_LENGTH_MAX + 1];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-rmcpplus-conf-privilege-section.c:255:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char field[IPMI_CONFIG_FIELD_LENGTH_MAX + 1];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-rmcpplus-conf-privilege-section.c:430:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (privs, state_data->cipher_suite_priv, IPMI_CONFIG_CIPHER_SUITE_LEN);
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-rmcpplus-conf-privilege-section.c:461:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
              char keynametmp[IPMI_CONFIG_MAX_KEY_NAME_LEN + 1];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-rmcpplus-conf-privilege-section.c:555:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  uint8_t id = atoi (kv->key->key_name + strlen ("Maximum_Privilege_Cipher_Suite_Id_"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-rmcpplus-conf-privilege-section.c:564:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  uint8_t id = atoi (kv->key->key_name + strlen ("Maximum_Privilege_Cipher_Suite_Id_"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-serial-conf-section.c:488:71:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                                                      atoi (kv->value_input),
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-serial-conf-section.c:617:68:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                                                   atoi (kv->value_input),
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-sol-conf-section.c:631:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  it.character_accumulate_interval = atoi (kv->value_input);
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-sol-conf-section.c:674:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  it.character_send_threshold = atoi (kv->value_input);
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-sol-conf-section.c:852:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  sr.retry_count = atoi (kv->value_input);
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-sol-conf-section.c:895:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  sr.retry_interval = atoi (kv->value_input);
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-sol-conf-section.c:1263:74:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                                                         atoi (kv->value_input),
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-user-sections.c:71:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      (*channel_number) = atoi (ptr + strlen ("Channel_"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-user-sections.c:116:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  userid = atoi (section_name + strlen ("User"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-user-sections.c:302:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  userid = atoi (section_name + strlen ("User"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-user-sections.c:325:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char keynametmp[IPMI_CONFIG_MAX_KEY_NAME_LEN + 1];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-user-sections.c:350:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        ua->session_limit = atoi (kvtmp->value_input);
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-user-sections.c:448:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char username[IPMI_MAX_USER_NAME_LENGTH*2+1];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-user-sections.c:454:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  userid = atoi (section_name + strlen ("User"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-user-sections.c:517:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy (username, "NULL");
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-user-sections.c:573:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  userid = atoi (section_name + strlen ("User"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-user-sections.c:618:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char username[IPMI_MAX_USER_NAME_LENGTH+1];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-user-sections.c:696:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  userid = atoi (section_name + strlen ("User"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-user-sections.c:808:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      userid = atoi (section_name + strlen ("User"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-user-sections.c:864:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  userid = atoi (section_name + strlen ("User"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-user-sections.c:981:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      userid = atoi (section_name + strlen ("User"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-user-sections.c:1016:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  userid = atoi (section_name + strlen ("User"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-user-sections.c:1080:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  userid = atoi (section_name + strlen ("User"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-user-sections.c:1202:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char password[IPMI_1_5_MAX_PASSWORD_LENGTH];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-user-sections.c:1212:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  userid = atoi (section_name + strlen ("User"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-user-sections.c:1791:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  userid = atoi (section_name + strlen ("User"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-user-sections.c:1890:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  userid = atoi (section_name + strlen ("User"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-user-sections.c:2310:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char section_name[IPMI_CONFIG_MAX_SECTION_NAME_LEN];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-user-sections.c:2340:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char section_comment[4096];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-dcmi-dcmi-conf-section.c:54:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char asset_tag_data[IPMI_DCMI_MAX_ASSET_TAG_LENGTH + 1];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-dcmi-dcmi-conf-section.c:173:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char data_buf[IPMI_DCMI_MAX_ASSET_TAG_LENGTH + 1];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-dcmi-dcmi-conf-section.c:207:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (data_buf, kv->value_input, strlen (kv->value_input));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-dcmi-dcmi-conf-section.c:304:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char management_controller_identifier_string_data[IPMI_DCMI_MAX_MANAGEMENT_CONTROLLER_IDENTIFIER_STRING_LENGTH + 1];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-dcmi-dcmi-conf-section.c:407:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char data_buf[IPMI_DCMI_MAX_MANAGEMENT_CONTROLLER_IDENTIFIER_STRING_LENGTH + 1];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-dcmi-dcmi-conf-section.c:438:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (data_buf, kv->value_input, strlen (kv->value_input));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-dcmi-dcmi-conf-section.c:755:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        gpld->power_limit_requested = atoi (kv->value_input);
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-dcmi-dcmi-conf-section.c:761:67:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        gpld->management_application_statistics_sampling_period = atoi (kv->value_input);
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-dcmi-dcmi-conf-section.c:896:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  gpld.power_limit_requested = atoi (kv->value_input);
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-dcmi-dcmi-conf-section.c:1003:60:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  gpld.management_application_statistics_sampling_period = atoi (kv->value_input);
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-alert-policy-table.c:64:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  alert_policy_entry_number = atoi (section_name + strlen ("Alert_Policy_"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-alert-policy-table.c:197:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  alert_policy_entry_number = atoi (section_name + strlen ("Alert_Policy_"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-alert-policy-table.c:260:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            apt->policy_number = atoi (kv->value_input);
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-alert-policy-table.c:264:41:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            apt->destination_selector = atoi (kv->value_input);
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-alert-policy-table.c:268:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            apt->channel_number = atoi (kv->value_input);
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-alert-policy-table.c:272:46:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            apt->alert_string_set_selector = atoi (kv->value_input);
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-alert-policy-table.c:474:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  apt.policy_number = atoi (kv->value_input);
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-alert-policy-table.c:523:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  apt.destination_selector = atoi (kv->value_input);
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-alert-policy-table.c:572:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  apt.channel_number = atoi (kv->value_input);
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-alert-policy-table.c:621:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  apt.alert_string_set_selector = atoi (kv->value_input);
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-alert-policy-table.c:681:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char section_name[IPMI_CONFIG_MAX_SECTION_NAME_LEN];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-alert-policy-table.c:682:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char description[IPMI_CONFIG_MAX_DESCRIPTION_LEN];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-alert-policy-table.c:746:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char tempbuf[IPMI_CONFIG_MAX_DESCRIPTION_LEN];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-alert-string.c:66:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  string_selector = atoi (section_name + strlen ("Alert_String_"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-alert-string.c:139:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  string_selector = atoi (section_name + strlen ("Alert_String_"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-alert-string.c:221:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  ask.event_filter_number = atoi (kv->value_input);
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-alert-string.c:270:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  ask.alert_string_set = atoi (kv->value_input);
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-alert-string.c:282:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char alert_string[PEF_ALERT_STRING_MAX_LEN+1];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-alert-string.c:293:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  string_selector = atoi (section_name + strlen ("Alert_String_"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-alert-string.c:393:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  string_selector = atoi (section_name + strlen ("Alert_String_"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-alert-string.c:417:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (alert_string_buf, kv->value_input, alert_string_len);
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-alert-string.c:487:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[IPMI_CONFIG_MAX_SECTION_NAME_LEN];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-community-string.c:43:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char community_string[IPMI_MAX_COMMUNITY_STRING_LENGTH+1];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-event-filter-table.c:76:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[IPMI_CONFIG_PARSE_BUFLEN];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-event-filter-table.c:81:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf (buf, "0x%02X", value_output);
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-event-filter-table.c:100:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  filter_number = atoi (section_name + strlen ("Event_Filter_"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-event-filter-table.c:434:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  filter_number = atoi (section_name + strlen ("Event_Filter_"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-event-filter-table.c:982:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  eft.alert_policy_number = atoi (kv->value_input);
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-event-filter-table.c:1031:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  eft.group_control_selector = atoi (kv->value_input);
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-event-filter-table.c:1862:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[IPMI_CONFIG_MAX_SECTION_NAME_LEN];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-lan-alert-destination.c:52:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char alert_ip[IPMI_CONFIG_CATEGORY_PEF_MAXIPADDRLEN+1];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-lan-alert-destination.c:53:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char alert_mac[IPMI_CONFIG_CATEGORY_PEF_MAXMACADDRLEN+1];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-lan-alert-destination.c:72:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  destination_selector = atoi (section_name + strlen ("Lan_Alert_Destination_"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-lan-alert-destination.c:172:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  destination_selector = atoi (section_name + strlen ("Lan_Alert_Destination_"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-lan-alert-destination.c:359:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  dt.alert_acknowledge_timeout = atoi (kv->value_input);
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-lan-alert-destination.c:408:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  dt.alert_retries = atoi (kv->value_input);
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-lan-alert-destination.c:447:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  destination_selector = atoi (section_name + strlen ("Lan_Alert_Destination_"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-lan-alert-destination.c:563:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  destination_selector = atoi (section_name + strlen ("Lan_Alert_Destination_"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-lan-alert-destination.c:775:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char section_name_base[IPMI_CONFIG_MAX_SECTION_NAME_LEN];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-sensors-discrete-section.c:44:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char section_name[IPMI_CONFIG_MAX_SECTION_NAME_LEN + 1];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-sensors-sensor-event-enable-common.c:1064:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key_name[KEY_NAME_MAX_LEN];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-sensors-sensor-event-enable-common.c:1510:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key_name[KEY_NAME_MAX_LEN];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-sensors-sensor-event-enable-common.c:1920:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key_name[KEY_NAME_MAX_LEN];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-sensors-threshold-section.c:1199:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char description_hysteresis[IPMI_CONFIG_MAX_DESCRIPTION_LEN + 1];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-sensors-threshold-section.c:1266:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char section_name[IPMI_CONFIG_MAX_SECTION_NAME_LEN + 1];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-sensors-threshold-section.c:1277:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char description[IPMI_CONFIG_MAX_DESCRIPTION_LEN + 1];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-sensors-threshold-section.c:1278:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sensor_units_buf[IPMI_CONFIG_CATEGORY_SENSORS_UNITS_BUFLEN+1];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-sensors-utils.c:63:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char id_string[IPMI_SDR_MAX_ID_STRING_LENGTH + 1];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-checkout.c:155:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char obuf[IPMI_CONFIG_OUTPUT_BUFLEN];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-comment.c:71:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf (out, "# ");
data/freeipmi-1.6.4/ipmi-config/ipmi-config-comment.c:86:11:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
          strcat (out, "\n# ");
data/freeipmi-1.6.4/ipmi-config/ipmi-config-comment.c:121:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char section_name_buf[FORMAT_COMMENT_BUFLEN];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-comment.c:122:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[FORMAT_COMMENT_BUFLEN];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-map.c:572:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      device_instance_selector = atoi (str + strlen ("external-"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-map.c:580:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      device_instance_selector = atoi (str + strlen ("internal-"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-parse.c:41:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[IPMI_CONFIG_PARSE_BUFLEN];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-section.c:163:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char section_name[IPMI_CONFIG_MAX_SECTION_NAME_LEN];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-section.c:164:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char section_comment_section_name[IPMI_CONFIG_MAX_SECTION_NAME_LEN];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-section.c:399:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char key_name[IPMI_CONFIG_MAX_KEY_NAME_LEN];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-section.c:536:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[IPMI_CONFIG_PARSE_BUFLEN];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-section.c:558:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[IPMI_CONFIG_PARSE_BUFLEN];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-section.c:580:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[IPMI_CONFIG_PARSE_BUFLEN];
data/freeipmi-1.6.4/ipmi-config/ipmi-config-utils.c:490:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          (*channel_number) = atoi (ptr + strlen ("Channel_Channel_"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-utils.c:497:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          (*channel_number) = atoi (ptr + strlen ("Channel_"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-utils.c:552:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          (*channel_number) = atoi (ptr + strlen ("Channel_Channel_"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-utils.c:559:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          (*channel_number) = atoi (ptr + strlen ("Channel_"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-utils.c:614:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          (*channel_number) = atoi (ptr + strlen ("Channel_"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config.c:193:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
          if (!(fp = fopen (prog_data->args->filename, "w")))
data/freeipmi-1.6.4/ipmi-config/ipmi-config.c:209:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
          if (!(fp = fopen (prog_data->args->filename, "r")))
data/freeipmi-1.6.4/ipmi-config/ipmi-config.c:319:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                      userid = atoi (section->section_name + strlen ("User"));
data/freeipmi-1.6.4/ipmi-dcmi/ipmi-dcmi.c:1188:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char data_buf[IPMI_DCMI_MAX_ASSET_TAG_LENGTH + 1];
data/freeipmi-1.6.4/ipmi-dcmi/ipmi-dcmi.c:1215:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (data_buf,
data/freeipmi-1.6.4/ipmi-dcmi/ipmi-dcmi.c:1288:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char management_controller_identifier_string_data[IPMI_DCMI_MAX_MANAGEMENT_CONTROLLER_IDENTIFIER_STRING_LENGTH + 1];
data/freeipmi-1.6.4/ipmi-dcmi/ipmi-dcmi.c:1378:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char data_buf[IPMI_DCMI_MAX_MANAGEMENT_CONTROLLER_IDENTIFIER_STRING_LENGTH + 1];
data/freeipmi-1.6.4/ipmi-dcmi/ipmi-dcmi.c:1402:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (data_buf,
data/freeipmi-1.6.4/ipmi-dcmi/ipmi-dcmi.c:1676:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char timestr[IPMI_DCMI_TIME_BUFLEN + 1];
data/freeipmi-1.6.4/ipmi-dcmi/ipmi-dcmi.c:2059:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char errorbuf[IPMI_DCMI_ERROR_BUFLEN + 1];
data/freeipmi-1.6.4/ipmi-dcmi/ipmi-dcmi.c:2140:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char errorbuf[IPMI_DCMI_ERROR_BUFLEN + 1];
data/freeipmi-1.6.4/ipmi-fru/ipmi-fru-oem-wistron.c:62:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char string[IPMI_OEM_WISTRON_PROPRIETARY_STRING_MAX + 1];
data/freeipmi-1.6.4/ipmi-fru/ipmi-fru-oem-wistron.c:71:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy (string,
data/freeipmi-1.6.4/ipmi-fru/ipmi-fru-output.c:69:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char strbuf[IPMI_FRU_AREA_STRING_MAX + 1];
data/freeipmi-1.6.4/ipmi-fru/ipmi-fru-output.c:200:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char mfg_date_time_buf[IPMI_FRU_STR_BUFLEN + 1];
data/freeipmi-1.6.4/ipmi-fru/ipmi-fru-output.c:941:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char iana_buf[IPMI_FRU_STR_BUFLEN + 1];
data/freeipmi-1.6.4/ipmi-fru/ipmi-fru-output.c:1035:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char iana_buf[IPMI_FRU_STR_BUFLEN + 1];
data/freeipmi-1.6.4/ipmi-fru/ipmi-fru-output.c:1126:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char iana_buf[IPMI_FRU_STR_BUFLEN + 1];
data/freeipmi-1.6.4/ipmi-fru/ipmi-fru-output.c:1272:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char module_part_number[IPMI_FRU_STR_BUFLEN + 1];
data/freeipmi-1.6.4/ipmi-fru/ipmi-fru-output.c:1929:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char module_part_number[IPMI_FRU_STR_BUFLEN + 1];
data/freeipmi-1.6.4/ipmi-fru/ipmi-fru.c:344:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char device_id_string[IPMI_SDR_MAX_DEVICE_ID_STRING_LENGTH+1];
data/freeipmi-1.6.4/ipmi-fru/ipmi-fru.c:530:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char device_id_string[IPMI_SDR_MAX_DEVICE_ID_STRING_LENGTH+1];
data/freeipmi-1.6.4/ipmi-fru/ipmi-fru.c:1103:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((fd = open (state_data->prog_data->args->fru_file, O_RDONLY)) < 0)
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-common.c:72:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char errbuf[IPMI_OEM_ERR_BUFLEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-common.c:441:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (stringbuf,
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-common.c:525:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (string,
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:168:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (string,
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:295:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (string + string_count,
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:355:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (string + string_count,
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:460:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (bytes, configuration_parameter_data, len);
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:598:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (&idrac_info[idrac_info_len],
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:690:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (idrac_firmware_version_buf,
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:706:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ip_address_buf[IPMI_OEM_STR_BUFLEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:707:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char idrac_firmware_version_buf[IPMI_OEM_STR_BUFLEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:807:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ip_str_buf[IPMI_OEM_STR_BUFLEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:808:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cmc_firmware_version_buf[IPMI_OEM_STR_BUFLEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:940:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (&cmc_info[cmc_info_len],
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:1006:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (ip_str_buf,
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:1016:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (cmc_firmware_version_buf,
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:1106:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ipv6_str_buf[IPMI_OEM_STR_BUFLEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:1223:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (&cmc_ipv6_info[cmc_ipv6_info_len],
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:1267:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (ipv6_str_buf,
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:1296:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ipv6_str_buf[IPMI_OEM_STR_BUFLEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:1427:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (&ipv6_snmp_trap_destination_addresses[ipv6_snmp_trap_destination_addresses_len],
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:1491:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (&ipv6_snmp_trap_destination_addresses[ipv6_snmp_trap_destination_addresses_len],
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:1540:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (ipv6_str_buf,
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:1823:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char string[IPMI_OEM_DELL_SYSTEM_INFO_MAX_STRING_BYTES+1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:3353:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (token_data + offset,
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:3476:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy (&bytes_rq[15],
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:3489:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy (&bytes_rq[10],
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:4217:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ad_root_domain_string[IPMI_OEM_DELL_TOKEN_STRING_MAX+1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:4219:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ad_rac_domain_string[IPMI_OEM_DELL_TOKEN_STRING_MAX+1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:4221:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ad_rac_name_string[IPMI_OEM_DELL_TOKEN_STRING_MAX+1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:4228:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ad_dc_filter1_string[IPMI_OEM_DELL_TOKEN_STRING_MAX+1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:4230:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ad_dc_filter2_string[IPMI_OEM_DELL_TOKEN_STRING_MAX+1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:4232:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ad_dc_filter3_string[IPMI_OEM_DELL_TOKEN_STRING_MAX+1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:4234:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ad_gc_filter1_string[IPMI_OEM_DELL_TOKEN_STRING_MAX+1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:4236:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ad_gc_filter2_string[IPMI_OEM_DELL_TOKEN_STRING_MAX+1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:4238:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ad_gc_filter3_string[IPMI_OEM_DELL_TOKEN_STRING_MAX+1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:4334:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (ad_root_domain_string,
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:4345:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (ad_rac_domain_string,
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:4356:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (ad_rac_name_string,
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:4379:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (ad_dc_filter1_string,
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:4390:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (ad_dc_filter2_string,
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:4401:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (ad_dc_filter3_string,
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:4412:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (ad_gc_filter1_string,
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:4423:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (ad_gc_filter2_string,
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:4434:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (ad_gc_filter3_string,
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:4527:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ad_root_domain_string[IPMI_OEM_DELL_TOKEN_STRING_MAX+1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:4529:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ad_rac_domain_string[IPMI_OEM_DELL_TOKEN_STRING_MAX+1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:4531:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ad_rac_name_string[IPMI_OEM_DELL_TOKEN_STRING_MAX+1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:4537:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ad_dc_filter1_string[IPMI_OEM_DELL_TOKEN_STRING_MAX+1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:4539:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ad_dc_filter2_string[IPMI_OEM_DELL_TOKEN_STRING_MAX+1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:4541:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ad_dc_filter3_string[IPMI_OEM_DELL_TOKEN_STRING_MAX+1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:4543:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ad_gc_filter1_string[IPMI_OEM_DELL_TOKEN_STRING_MAX+1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:4545:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ad_gc_filter2_string[IPMI_OEM_DELL_TOKEN_STRING_MAX+1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:4547:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ad_gc_filter3_string[IPMI_OEM_DELL_TOKEN_STRING_MAX+1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:4833:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (&token_data[offset],
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:4843:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (&token_data[offset],
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:4853:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (&token_data[offset],
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:4875:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (&token_data[offset],
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:4885:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (&token_data[offset],
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:4895:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (&token_data[offset],
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:4905:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (&token_data[offset],
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:4915:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (&token_data[offset],
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:4925:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (&token_data[offset],
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:5061:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char time_buf[IPMI_OEM_TIME_BUFLEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:5412:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char firmwareversion[IPMI_OEM_MAX_BYTES];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:5417:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char sensor_name_buf[IPMI_SDR_MAX_SENSOR_NAME_LENGTH + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:5486:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(firmwareversion, &(bytes_rs[12]), 8);
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:5776:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char time_buf[IPMI_OEM_TIME_BUFLEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:7165:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char post_code_string[IPMI_OEM_STR_BUFLEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-dell.c:7222:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (post_code_string, &bytes_rs[4], string_length);
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-fujitsu.c:138:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str[IPMI_OEM_STR_BUFLEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-fujitsu.c:214:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str[IPMI_OEM_STR_BUFLEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-fujitsu.c:1208:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char time_buf[IPMI_OEM_TIME_BUFLEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-fujitsu.c:1209:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char data_buf[IPMI_OEM_FUJITSU_SEL_ENTRY_LONG_TEXT_MAX_DATA_LENGTH + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-fujitsu.c:1399:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy (data_buf + offset,
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-fujitsu.c:1406:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy (data_buf + offset,
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-ibm.c:447:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (&common_args, &state_data->prog_data->args->common_args, sizeof (struct common_cmd_args));
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-ibm.c:495:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fmt[IPMI_OEM_FMT_BUFLEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-ibm.c:496:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char led_name[IPMI_OEM_IBM_LED_NAME_BUFLEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-ibm.c:497:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char led_pointer_name[IPMI_OEM_IBM_LED_NAME_BUFLEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-ibm.c:498:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char id_string[IPMI_OEM_IBM_LED_ID_STRING_BUFLEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-ibm.c:499:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char led_info[IPMI_OEM_IBM_LED_INFO_BUFLEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-intel.c:230:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (buf, &bytes_rs[2], rs_len - 2);
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-intel.c:379:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (string + string_count, buf, buflen);
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-intel.c:478:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char smtp_user_name[IPMI_OEM_INTEL_SMTP_CONFIGURATION_PARAMETER_STRING_LENGTH_MAX + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-intel.c:479:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char email_address[IPMI_OEM_INTEL_SMTP_CONFIGURATION_PARAMETER_STRING_LENGTH_MAX + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-intel.c:480:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char subject[IPMI_OEM_INTEL_SMTP_CONFIGURATION_PARAMETER_STRING_LENGTH_MAX + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-intel.c:481:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char message_content[IPMI_OEM_INTEL_SMTP_CONFIGURATION_PARAMETER_STRING_LENGTH_MAX + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-intel.c:482:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char sender_email_address[IPMI_OEM_INTEL_SMTP_CONFIGURATION_PARAMETER_STRING_LENGTH_MAX + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-intel.c:483:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char smtp_host_name[IPMI_OEM_INTEL_SMTP_CONFIGURATION_PARAMETER_STRING_LENGTH_MAX + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-intel.c:650:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (&bytes_rq[5], buf, buflen);
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-intel.c:806:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (buf, string, strlen (string));
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-intel.c:837:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char smtp_user_name[IPMI_OEM_INTEL_SMTP_CONFIGURATION_PARAMETER_STRING_LENGTH_MAX + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-intel.c:838:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char user_password[IPMI_OEM_INTEL_SMTP_CONFIGURATION_PARAMETER_STRING_LENGTH_MAX + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-intel.c:839:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char email_address[IPMI_OEM_INTEL_SMTP_CONFIGURATION_PARAMETER_STRING_LENGTH_MAX + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-intel.c:840:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char subject[IPMI_OEM_INTEL_SMTP_CONFIGURATION_PARAMETER_STRING_LENGTH_MAX + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-intel.c:841:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char message_content[IPMI_OEM_INTEL_SMTP_CONFIGURATION_PARAMETER_STRING_LENGTH_MAX + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-intel.c:842:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sender_email_address[IPMI_OEM_INTEL_SMTP_CONFIGURATION_PARAMETER_STRING_LENGTH_MAX + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-intel.c:843:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char smtp_host_name[IPMI_OEM_INTEL_SMTP_CONFIGURATION_PARAMETER_STRING_LENGTH_MAX + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-intelnm.c:1330:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char domain_id_str[IPMI_OEM_INTELNM_STRING_MAX + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-intelnm.c:1399:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char limiting_domain_id_str[IPMI_OEM_INTELNM_STRING_MAX + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-intelnm.c:1631:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char thermal_str[IPMI_OEM_INTELNM_STRING_MAX + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-intelnm.c:2176:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char domain_id_str[IPMI_OEM_INTELNM_STRING_MAX + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-intelnm.c:3439:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char domain_id_str[IPMI_OEM_INTELNM_STRING_MAX + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-intelnm.c:4051:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char domain_id_str[IPMI_OEM_INTELNM_STRING_MAX + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-intelnm.c:4177:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char start_time_field[IPMI_OEM_STR_BUFLEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-intelnm.c:4178:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char stop_time_field[IPMI_OEM_STR_BUFLEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-intelnm.c:4179:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char monday_field[IPMI_OEM_STR_BUFLEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-intelnm.c:4180:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char tuesday_field[IPMI_OEM_STR_BUFLEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-intelnm.c:4181:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char wednesday_field[IPMI_OEM_STR_BUFLEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-intelnm.c:4182:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char thursday_field[IPMI_OEM_STR_BUFLEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-intelnm.c:4183:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char friday_field[IPMI_OEM_STR_BUFLEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-intelnm.c:4184:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char saturday_field[IPMI_OEM_STR_BUFLEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-intelnm.c:4185:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char sunday_field[IPMI_OEM_STR_BUFLEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-intelnm.c:4650:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[IPMI_OEM_STR_BUFLEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-inventec.c:288:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char mac_address_str[IPMI_OEM_INVENTEC_MAX_MACADDRLEN+1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-inventec.c:433:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (&bytes_rq[1],
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-inventec.c:735:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char uri[IPMI_OEM_INVENTEC_EXTENDED_ATTRIBUTE_ID_FIRMWARE_UPDATE_URI_LEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-inventec.c:855:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char uri[IPMI_OEM_INVENTEC_EXTENDED_ATTRIBUTE_ID_FIRMWARE_UPDATE_URI_LEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-inventec.c:942:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy (&uri[1], value, value_len);
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-inventec.c:1036:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name[IPMI_OEM_INVENTEC_EXTENDED_ATTRIBUTE_ID_FIRMWARE_INFORMATION_NAME_LEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-inventec.c:1037:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char description[IPMI_OEM_INVENTEC_EXTENDED_ATTRIBUTE_ID_FIRMWARE_INFORMATION_DESCRIPTION_LEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-inventec.c:1040:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char product_info[IPMI_OEM_INVENTEC_EXTENDED_ATTRIBUTE_ID_FIRMWARE_INFORMATION_PRODUCT_INFO_LEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-inventec.c:1041:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char firmware_version[IPMI_OEM_INVENTEC_EXTENDED_ATTRIBUTE_ID_FIRMWARE_INFORMATION_FIRMWARE_VERSION_LEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-inventec.c:1042:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char branch[IPMI_OEM_INVENTEC_EXTENDED_ATTRIBUTE_ID_FIRMWARE_INFORMATION_BRANCH_LEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-inventec.c:1043:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char build_information[IPMI_OEM_INVENTEC_EXTENDED_ATTRIBUTE_ID_FIRMWARE_INFORMATION_BUILD_INFORMATION_LEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-inventec.c:2391:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char strbuf[IPMI_OEM_BUFLEN];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-sun.c:66:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fmt[IPMI_OEM_FMT_BUFLEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-sun.c:67:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char device_id_string[IPMI_SDR_MAX_DEVICE_ID_STRING_LENGTH + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-sun.c:68:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sensor_name_buf[IPMI_SDR_MAX_SENSOR_NAME_LENGTH + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-supermicro.c:52:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char firmware_tag[IPMI_OEM_SUPERMICRO_STRING_MAX+1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-supermicro.c:132:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (firmware_tag, &bytes_rs[19], rs_len - 19);
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-thirdparty.c:162:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (string + string_count,
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-thirdparty.c:222:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (string + string_count,
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-thirdparty.c:542:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (buf, &bytes_rs[7], rs_len - 7);
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-thirdparty.c:729:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (&bytes_rq[9], buf, buflen);
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-thirdparty.c:1168:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char user_name[IPMI_MAX_USER_NAME_LENGTH + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-thirdparty.c:1265:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dnsbmchostname[IPMI_OEM_INVENTEC_EXTENDED_CONFIG_DNS_DNS_BMC_HOST_NAME_MAX + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-thirdparty.c:1267:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dnsdomainname[IPMI_OEM_INVENTEC_EXTENDED_CONFIG_DNS_DNS_DOMAIN_NAME_MAX + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-thirdparty.c:1393:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dnsbmchostname[IPMI_OEM_INVENTEC_EXTENDED_CONFIG_DNS_DNS_BMC_HOST_NAME_MAX + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-thirdparty.c:1395:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dnsdomainname[IPMI_OEM_INVENTEC_EXTENDED_CONFIG_DNS_DNS_DOMAIN_NAME_MAX + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-wistron.c:59:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char assettag[IPMI_SYSTEM_INFO_PARAMETER_OEM_WISTRON_ASSET_TAG_MAX_LEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-wistron.c:60:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char servicetag[IPMI_SYSTEM_INFO_PARAMETER_OEM_WISTRON_SERVICE_TAG_MAX_LEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-wistron.c:61:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char productname[IPMI_OEM_WISTRON_SYSTEM_INFO_MAX_STRING_BYTES + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-wistron.c:471:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dnsbmchostname[IPMI_OEM_WISTRON_EXTENDED_CONFIG_DNS_DNS_BMC_HOST_NAME_MAX + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-wistron.c:473:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dnsdomainname[IPMI_OEM_WISTRON_EXTENDED_CONFIG_DNS_DNS_DOMAIN_NAME_MAX + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-wistron.c:603:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dnsbmchostname[IPMI_OEM_WISTRON_EXTENDED_CONFIG_DNS_DNS_BMC_HOST_NAME_MAX + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-wistron.c:605:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dnsdomainname[IPMI_OEM_WISTRON_EXTENDED_CONFIG_DNS_DNS_DOMAIN_NAME_MAX + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-wistron.c:1154:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name[IPMI_OEM_WISTRON_EXTENDED_ATTRIBUTE_ID_FIRMWARE_INFORMATION_NAME_LEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-wistron.c:1155:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char description[IPMI_OEM_WISTRON_EXTENDED_ATTRIBUTE_ID_FIRMWARE_INFORMATION_DESCRIPTION_LEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-wistron.c:1158:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char product_info[IPMI_OEM_WISTRON_EXTENDED_ATTRIBUTE_ID_FIRMWARE_INFORMATION_PRODUCT_INFO_LEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-wistron.c:1159:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char firmware_version[IPMI_OEM_WISTRON_EXTENDED_ATTRIBUTE_ID_FIRMWARE_INFORMATION_FIRMWARE_VERSION_LEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-wistron.c:1160:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char branch[IPMI_OEM_WISTRON_EXTENDED_ATTRIBUTE_ID_FIRMWARE_INFORMATION_BRANCH_LEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-wistron.c:1161:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char build_information[IPMI_OEM_WISTRON_EXTENDED_ATTRIBUTE_ID_FIRMWARE_INFORMATION_BUILD_INFORMATION_LEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-wistron.c:1330:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ipv6address[IPMI_OEM_WISTRON_EXTENDED_ATTRIBUTE_ID_IPV6_SETTING_IPV6_ADDRESS_LEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-wistron.c:1331:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ipv6gatewayipaddress[IPMI_OEM_WISTRON_EXTENDED_ATTRIBUTE_ID_IPV6_SETTING_IPV6_GATEWAY_IP_ADDRESS_LEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-wistron.c:1334:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ipv6linklocaladdress[IPMI_OEM_WISTRON_EXTENDED_ATTRIBUTE_ID_IPV6_SETTING_IPV6_LINK_LOCAL_ADDRESS_LEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-wistron.c:1336:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ipv6dnsserver1[IPMI_OEM_WISTRON_EXTENDED_ATTRIBUTE_ID_IPV6_SETTING_IPV6_DNS_SERVER1_LEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-wistron.c:1337:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ipv6dnsserver2[IPMI_OEM_WISTRON_EXTENDED_ATTRIBUTE_ID_IPV6_SETTING_IPV6_DNS_SERVER2_LEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-wistron.c:1471:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ipv6address[IPMI_OEM_WISTRON_EXTENDED_ATTRIBUTE_ID_IPV6_SETTING_IPV6_ADDRESS_LEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-wistron.c:1472:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ipv6gatewayipaddress[IPMI_OEM_WISTRON_EXTENDED_ATTRIBUTE_ID_IPV6_SETTING_IPV6_GATEWAY_IP_ADDRESS_LEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-wistron.c:1475:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ipv6linklocaladdress[IPMI_OEM_WISTRON_EXTENDED_ATTRIBUTE_ID_IPV6_SETTING_IPV6_LINK_LOCAL_ADDRESS_LEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-wistron.c:1477:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ipv6dnsserver1[IPMI_OEM_WISTRON_EXTENDED_ATTRIBUTE_ID_IPV6_SETTING_IPV6_DNS_SERVER1_LEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-wistron.c:1478:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ipv6dnsserver2[IPMI_OEM_WISTRON_EXTENDED_ATTRIBUTE_ID_IPV6_SETTING_IPV6_DNS_SERVER2_LEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-wistron.c:1690:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ipv6snmptrapaddress[IPMI_OEM_WISTRON_EXTENDED_ATTRIBUTE_ID_IPV6_SNMP_TRAP_DESTINATION_ADDRESS_LEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-wistron.c:1792:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ipv6snmptrapaddress[IPMI_OEM_WISTRON_EXTENDED_ATTRIBUTE_ID_IPV6_SNMP_TRAP_DESTINATION_ADDRESS_LEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-wistron.c:2219:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char time_buf[IPMI_OEM_TIME_BUFLEN + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-wistron.c:3047:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char string[IPMI_OEM_WISTRON_PROPRIETARY_STRING_MAX + 1];
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-wistron.c:3111:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (string, &bytes_rs[4], bytes_rs[3]);
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-wistron.c:3172:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (&bytes_rq[3],
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem.h:43:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *oem_options[IPMI_OEM_MAX_ARGS];
data/freeipmi-1.6.4/ipmi-pet/ipmi-pet.c:636:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char fmt[EVENT_FMT_BUFLEN+1];
data/freeipmi-1.6.4/ipmi-pet/ipmi-pet.c:719:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char outbuf[EVENT_OUTPUT_BUFLEN+1];
data/freeipmi-1.6.4/ipmi-pet/ipmi-pet.c:886:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fmt[EVENT_FMT_BUFLEN + 1];
data/freeipmi-1.6.4/ipmi-pet/ipmi-pet.c:887:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char outbuf[EVENT_OUTPUT_BUFLEN+1];
data/freeipmi-1.6.4/ipmi-pet/ipmi-pet.c:1128:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char outbuf[EVENT_OUTPUT_BUFLEN+1];
data/freeipmi-1.6.4/ipmi-pet/ipmi-pet.c:1142:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char tmpbuf[EVENT_OUTPUT_BUFLEN+1];
data/freeipmi-1.6.4/ipmi-pet/ipmi-pet.c:1209:15:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
              strcat (outbuf, " ; ");
data/freeipmi-1.6.4/ipmi-pet/ipmi-pet.c:1813:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (input.variable_bindings,
data/freeipmi-1.6.4/ipmi-pet/ipmi-pet.c:1946:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (input.variable_bindings,
data/freeipmi-1.6.4/ipmi-pet/ipmi-pet.c:2046:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (!(infile = fopen (args->cmd_file, "r")))
data/freeipmi-1.6.4/ipmi-raw/ipmi-raw.c:367:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (!(infile = fopen (args->cmd_file, "r")))
data/freeipmi-1.6.4/ipmi-sel/ipmi-sel.c:65:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char timestr[IPMI_SEL_TIME_BUFLEN + 1];
data/freeipmi-1.6.4/ipmi-sel/ipmi-sel.c:560:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fmtbuf[EVENT_FMT_BUFLEN+1];
data/freeipmi-1.6.4/ipmi-sel/ipmi-sel.c:561:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char outbuf[EVENT_OUTPUT_BUFLEN+1];
data/freeipmi-1.6.4/ipmi-sel/ipmi-sel.c:647:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy (fmtbuf, "%i:%d %t:%T %s:%e");
data/freeipmi-1.6.4/ipmi-sel/ipmi-sel.c:663:13:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
            strcat (fmtbuf, ":%f");
data/freeipmi-1.6.4/ipmi-sel/ipmi-sel.c:673:13:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
            strcat (fmtbuf, ":%h");
data/freeipmi-1.6.4/ipmi-sel/ipmi-sel.c:721:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fmt[EVENT_FMT_BUFLEN + 1];
data/freeipmi-1.6.4/ipmi-sel/ipmi-sel.c:722:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char outbuf[EVENT_OUTPUT_BUFLEN+1];
data/freeipmi-1.6.4/ipmi-sel/ipmi-sel.c:768:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char outbuf[EVENT_OUTPUT_BUFLEN+1];
data/freeipmi-1.6.4/ipmi-sel/ipmi-sel.c:1029:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char outbuf[EVENT_OUTPUT_BUFLEN+1];
data/freeipmi-1.6.4/ipmi-sel/ipmi-sel.c:1072:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char outbuf[EVENT_OUTPUT_BUFLEN+1];
data/freeipmi-1.6.4/ipmi-sel/ipmi-sel.c:1145:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fmt[EVENT_FMT_BUFLEN + 1];
data/freeipmi-1.6.4/ipmi-sel/ipmi-sel.c:1645:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char outbuf[EVENT_OUTPUT_BUFLEN+1];
data/freeipmi-1.6.4/ipmi-sel/ipmi-sel_.h:99:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sensor_types[MAX_SENSOR_TYPES][MAX_SENSOR_TYPES_STRING_LENGTH+1];
data/freeipmi-1.6.4/ipmi-sel/ipmi-sel_.h:101:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char exclude_sensor_types[MAX_SENSOR_TYPES][MAX_SENSOR_TYPES_STRING_LENGTH+1];
data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-detailed-output.c:194:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char id_string[IPMI_SDR_MAX_ID_STRING_LENGTH + 1];
data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-detailed-output.c:756:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sensor_units_buf[IPMI_SENSORS_UNITS_BUFLEN+1];
data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-detailed-output.c:1430:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sensor_units_buf[IPMI_SENSORS_UNITS_BUFLEN+1];
data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-detailed-output.c:1760:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char device_id_string[IPMI_SDR_MAX_DEVICE_ID_STRING_LENGTH + 1];
data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-detailed-output.c:1795:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char device_type_modifier_buf[IPMI_SENSORS_DEVICE_TYPE_BUFLEN + 1];
data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-detailed-output.c:2149:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char iana_buf[IPMI_SENSORS_IANA_LEN + 1];
data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-output-common.c:52:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char spcbuf[IPMI_SENSORS_SPACE_BUFFER + 1];
data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-simple-output.c:87:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char id_string[IPMI_SDR_MAX_ID_STRING_LENGTH + 1];
data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-simple-output.c:192:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char sensor_units_buf[IPMI_SENSORS_UNITS_BUFLEN+1];
data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-simple-output.c:315:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char id_string[IPMI_SDR_MAX_ID_STRING_LENGTH + 1];
data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-simple-output.c:422:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char sensor_units_buf[IPMI_SENSORS_UNITS_BUFLEN+1];
data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-simple-output.c:532:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fmt[IPMI_SENSORS_FMT_BUFLEN + 1];
data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-simple-output.c:533:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sensor_name[IPMI_SDR_MAX_SENSOR_NAME_LENGTH + 1];
data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-simple-output.c:684:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fmt[IPMI_SENSORS_FMT_BUFLEN + 1];
data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-simple-output.c:721:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char sensor_units_buf[IPMI_SENSORS_UNITS_BUFLEN+1];
data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-simple-output.c:771:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char thresholdfmt[IPMI_SENSORS_FMT_BUFLEN + 1];
data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-simple-output.c:772:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char nafmt[IPMI_SENSORS_FMT_BUFLEN + 1];
data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-simple-output.c:885:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
              char sensor_units_buf[IPMI_SENSORS_UNITS_BUFLEN+1];
data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-simple-output.c:1003:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char fmt[IPMI_SENSORS_FMT_BUFLEN + 1];
data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-simple-output.c:1065:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fmt[IPMI_SENSORS_FMT_BUFLEN + 1];
data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors.c:70:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char timestr[IPMI_SENSORS_TIME_BUFLEN + 1];
data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors.c:731:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char policy_interface_capability_str[IPMI_SENSORS_MESSAGE_LENGTH + 1];
data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors.c:732:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char monitoring_capability_str[IPMI_SENSORS_MESSAGE_LENGTH + 1];
data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors.c:733:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char power_limiting_capability_str[IPMI_SENSORS_MESSAGE_LENGTH + 1];
data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors.h:73:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sensor_types[MAX_SENSOR_TYPES][MAX_SENSOR_TYPES_STRING_LENGTH+1];
data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors.h:75:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char exclude_sensor_types[MAX_SENSOR_TYPES][MAX_SENSOR_TYPES_STRING_LENGTH+1];
data/freeipmi-1.6.4/ipmiconsole/ipmiconsole.c:80:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (&tty, &saved_tty, sizeof (struct termios));
data/freeipmi-1.6.4/ipmiconsole/ipmiconsole.c:123:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tbuf[IPMICONSOLE_BUFLEN];
data/freeipmi-1.6.4/ipmiconsole/ipmiconsole.c:435:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[IPMICONSOLE_BUFLEN];
data/freeipmi-1.6.4/ipmidetect/ipmidetect-argp.c:117:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[IPMIDETECT_STDIN_BUFFERLEN];
data/freeipmi-1.6.4/ipmidetect/ipmidetect.c:81:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char detected_nodes[IPMIDETECT_BUFFERLEN];
data/freeipmi-1.6.4/ipmidetect/ipmidetect.c:82:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char undetected_nodes[IPMIDETECT_BUFFERLEN];
data/freeipmi-1.6.4/ipmidetect/ipmidetect.c:83:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char detectedfmt[IPMIDETECT_FORMATLEN];
data/freeipmi-1.6.4/ipmidetect/ipmidetect.c:84:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char undetectedfmt[IPMIDETECT_FORMATLEN];
data/freeipmi-1.6.4/ipmidetect/ipmidetect.c:224:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char tbuf[IPMIDETECT_BUFFERLEN];
data/freeipmi-1.6.4/ipmidetectd/ipmidetectd-config.c:165:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char buf[CONFFILE_MAX_ERRMSGLEN];
data/freeipmi-1.6.4/ipmidetectd/ipmidetectd.c:106:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ipstr[IPMIDETECTD_BUFLEN + 1];
data/freeipmi-1.6.4/ipmidetectd/ipmidetectd.c:221:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char port_str[IPMIDETECTD_BUFLEN + 1];
data/freeipmi-1.6.4/ipmidetectd/ipmidetectd.c:278:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
              char tmpipv4buf[IPMIDETECTD_BUFLEN + 1];
data/freeipmi-1.6.4/ipmidetectd/ipmidetectd.c:279:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
              char tmpipv6buf[IPMIDETECTD_BUFLEN + 1];
data/freeipmi-1.6.4/ipmidetectd/ipmidetectd.c:282:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              memcpy (&(info->destaddr4), ai->ai_addr, ai->ai_addrlen);
data/freeipmi-1.6.4/ipmidetectd/ipmidetectd.c:320:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              memcpy (&(info->destaddr6), ai->ai_addr, ai->ai_addrlen);
data/freeipmi-1.6.4/ipmidetectd/ipmidetectd.c:514:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ipbuf[IPMIDETECTD_BUFLEN + 1];
data/freeipmi-1.6.4/ipmidetectd/ipmidetectd.c:578:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (&from4, from, fromlen);
data/freeipmi-1.6.4/ipmidetectd/ipmidetectd.c:617:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[IPMIDETECTD_BUFLEN];
data/freeipmi-1.6.4/ipmiping/ipmiping.c:130:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char hdrbuf[DEBUG_UTIL_HDR_BUFLEN];
data/freeipmi-1.6.4/ipmiping/ipmiping.c:202:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char hdrbuf[DEBUG_UTIL_HDR_BUFLEN];
data/freeipmi-1.6.4/ipmipower/argv.c:87:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(cpy, word, len);
data/freeipmi-1.6.4/ipmipower/ipmipower.c:361:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (&from4, from, fromlen);
data/freeipmi-1.6.4/ipmipower/ipmipower.c:623:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char errbuf[IPMIPOWER_OUTPUT_BUFLEN + 1];
data/freeipmi-1.6.4/ipmipower/ipmipower.h:469:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char hostname[MAXHOSTNAMELEN+1];
data/freeipmi-1.6.4/ipmipower/ipmipower_check.c:806:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char username_buf[IPMI_MAX_USER_NAME_LENGTH+1];
data/freeipmi-1.6.4/ipmipower/ipmipower_connection.c:137:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char port_str[MAXPORTBUFLEN + 1];
data/freeipmi-1.6.4/ipmipower/ipmipower_connection.c:336:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy (&(ic->destaddr4), ai->ai_addr, ai->ai_addrlen);
data/freeipmi-1.6.4/ipmipower/ipmipower_connection.c:349:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy (&(ic->destaddr6), ai->ai_addr, ai->ai_addrlen);
data/freeipmi-1.6.4/ipmipower/ipmipower_error.c:97:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char errbuf[IPMIPOWER_ERROR_BUFLEN];
data/freeipmi-1.6.4/ipmipower/ipmipower_error.c:126:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char errbuf[IPMIPOWER_ERROR_BUFLEN];
data/freeipmi-1.6.4/ipmipower/ipmipower_error.h:68:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char __err[IPMIPOWER_ERROR_BUFLEN + 1];                                     \
data/freeipmi-1.6.4/ipmipower/ipmipower_error.h:92:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char __err[IPMIPOWER_ERROR_BUFLEN + 1];                                     \
data/freeipmi-1.6.4/ipmipower/ipmipower_output.c:116:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[IPMIPOWER_OUTPUT_BUFLEN + 1];
data/freeipmi-1.6.4/ipmipower/ipmipower_packet.c:202:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char hdrbuf[DEBUG_UTIL_HDR_BUFLEN + 1];
data/freeipmi-1.6.4/ipmipower/ipmipower_packet.c:608:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char username_buf[IPMI_MAX_USER_NAME_LENGTH+1];
data/freeipmi-1.6.4/ipmipower/ipmipower_ping.c:232:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                  char hdrbuf[DEBUG_UTIL_HDR_BUFLEN + 1];
data/freeipmi-1.6.4/ipmipower/ipmipower_ping.c:307:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                  char hdrbuf[DEBUG_UTIL_HDR_BUFLEN + 1];
data/freeipmi-1.6.4/ipmipower/ipmipower_ping.c:412:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                  char hdrbuf[DEBUG_UTIL_HDR_BUFLEN + 1];
data/freeipmi-1.6.4/ipmipower/ipmipower_ping.c:506:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                  char hdrbuf[DEBUG_UTIL_HDR_BUFLEN + 1];
data/freeipmi-1.6.4/ipmipower/ipmipower_powercmd.c:1769:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char username_buf[IPMI_MAX_USER_NAME_LENGTH+1];
data/freeipmi-1.6.4/ipmipower/ipmipower_prompt.c:241:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[IPMI_MAX_K_G_LENGTH*2+3];
data/freeipmi-1.6.4/ipmipower/ipmipower_prompt.c:611:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char errbuf[IPMIPOWER_OUTPUT_BUFLEN + 1];
data/freeipmi-1.6.4/ipmipower/ipmipower_prompt.c:754:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char kgbuf[IPMI_MAX_K_G_LENGTH*2+3];
data/freeipmi-1.6.4/ipmipower/ipmipower_prompt.c:756:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char strbuf[IPMIPOWER_OUTPUT_BUFLEN];
data/freeipmi-1.6.4/ipmipower/ipmipower_prompt.c:777:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[IPMIPOWER_OUTPUT_BUFLEN];
data/freeipmi-1.6.4/ipmipower/ipmipower_util.c:189:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[IPMIPOWER_OUTPUT_BUFLEN];
data/freeipmi-1.6.4/ipmiseld/ipmiseld-cache.c:128:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename[MAXPATHLEN+1];
data/freeipmi-1.6.4/ipmiseld/ipmiseld-cache.c:329:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename[MAXPATHLEN+1];
data/freeipmi-1.6.4/ipmiseld/ipmiseld-cache.c:365:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fd = open (filename, O_RDONLY)) < 0)
data/freeipmi-1.6.4/ipmiseld/ipmiseld-cache.c:467:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename[MAXPATHLEN+1];
data/freeipmi-1.6.4/ipmiseld/ipmiseld-cache.c:510:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fd = open (filename, open_flags, 0644)) < 0)
data/freeipmi-1.6.4/ipmiseld/ipmiseld-common.c:151:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[IPMISELD_ERR_BUFLEN + 1];
data/freeipmi-1.6.4/ipmiseld/ipmiseld-common.c:193:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[IPMISELD_ERR_BUFLEN + 1];
data/freeipmi-1.6.4/ipmiseld/ipmiseld-common.c:214:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[IPMISELD_ERR_BUFLEN + 1];
data/freeipmi-1.6.4/ipmiseld/ipmiseld-debug.h:49:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char __err[IPMISELD_DEBUG_BUFFER_LEN + 1]; \
data/freeipmi-1.6.4/ipmiseld/ipmiseld-debug.h:75:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char __err[IPMISELD_DEBUG_BUFFER_LEN + 1]; \
data/freeipmi-1.6.4/ipmiseld/ipmiseld.c:390:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fmtbuf[IPMISELD_FORMAT_BUFLEN + 1];
data/freeipmi-1.6.4/ipmiseld/ipmiseld.c:391:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char outbuf[IPMISELD_EVENT_OUTPUT_BUFLEN + 1];
data/freeipmi-1.6.4/ipmiseld/ipmiseld.c:614:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char sel_record[IPMI_SEL_RECORD_MAX_RECORD_LENGTH];
data/freeipmi-1.6.4/ipmiseld/ipmiseld.c:1115:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (&(host_data->last_host_state),
data/freeipmi-1.6.4/ipmiseld/ipmiseld.c:1232:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (&(host_data->now_host_state.sel_info), &tmp_sel_info, sizeof (ipmiseld_sel_info_t));
data/freeipmi-1.6.4/ipmiseld/ipmiseld.h:106:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sensor_types[MAX_SENSOR_TYPES][MAX_SENSOR_TYPES_STRING_LENGTH+1];
data/freeipmi-1.6.4/ipmiseld/ipmiseld.h:108:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char exclude_sensor_types[MAX_SENSOR_TYPES][MAX_SENSOR_TYPES_STRING_LENGTH+1];
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-api-defs.h:124:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char hostname[MAXHOSTNAMELEN+1];
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-api-defs.h:137:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char username[IPMI_MAX_USER_NAME_LENGTH+1];
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-api-defs.h:138:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char password[IPMI_2_0_MAX_PASSWORD_LENGTH+1];
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-api-trace.h:47:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char __rserrstr[IPMI_ERR_STR_MAX_LEN + 1];                              \
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-api.c:337:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char port_str[MAXPORTBUFLEN + 1];
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-api.c:391:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy (&(ctx->io.outofband.remote_host4), ai->ai_addr, ai->ai_addrlen);
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-api.c:397:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy (&(ctx->io.outofband.remote_host6), ai->ai_addr, ai->ai_addrlen);
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-api.c:528:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (ctx->io.outofband.username,
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-api.c:533:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (ctx->io.outofband.password,
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-api.c:682:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (ctx->io.outofband.username,
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-api.c:688:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (ctx->io.outofband.password,
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-api.c:709:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (ctx->io.outofband.k_g,
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-api.c:1661:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char hdrbuf[DEBUG_UTIL_HDR_BUFLEN];
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-api.c:1795:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char hdrbuf[DEBUG_UTIL_HDR_BUFLEN];
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-api.c:1885:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (&ctx->target, &target_save, sizeof (target_save));
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-api.c:1961:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char hdrbuf[DEBUG_UTIL_HDR_BUFLEN];
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-api.c:2083:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char hdrbuf[DEBUG_UTIL_HDR_BUFLEN];
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-api.c:2157:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (&ctx->target, &target_save, sizeof (target_save));
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-kcs-driver-api.c:93:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char hdrbuf[DEBUG_UTIL_HDR_BUFLEN];
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-kcs-driver-api.c:481:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (&ctx->target, &target_save, sizeof (target_save));
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-kcs-driver-api.c:545:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (&ctx->target, &target_save, sizeof (target_save));
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-lan-session-common.c:323:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char hdrbuf[DEBUG_UTIL_HDR_BUFLEN];
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-lan-session-common.c:380:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char hdrbuf[DEBUG_UTIL_HDR_BUFLEN];
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-lan-session-common.c:1229:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (&ctx->target, &target_save, sizeof (target_save));
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-lan-session-common.c:2104:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char hdrbuf[DEBUG_UTIL_HDR_BUFLEN + 1];
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-lan-session-common.c:2204:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char hdrbuf[DEBUG_UTIL_HDR_BUFLEN + 1];
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-lan-session-common.c:3383:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char username_buf[IPMI_MAX_USER_NAME_LENGTH+1];
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-ssif-driver-api.c:92:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char hdrbuf[DEBUG_UTIL_HDR_BUFLEN];
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-ssif-driver-api.c:490:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (&ctx->target, &target_save, sizeof (target_save));
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-ssif-driver-api.c:554:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (&ctx->target, &target_save, sizeof (target_save));
data/freeipmi-1.6.4/libfreeipmi/cmds/ipmi-lan-cmds.c:1883:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[IPMI_MAX_COMMUNITY_STRING_LENGTH];
data/freeipmi-1.6.4/libfreeipmi/cmds/ipmi-messaging-support-cmds.c:1485:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (stringbuf, string_block, string_block_length);
data/freeipmi-1.6.4/libfreeipmi/cmds/ipmi-messaging-support-cmds.c:1526:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (stringbuf, string_block, string_block_length);
data/freeipmi-1.6.4/libfreeipmi/cmds/ipmi-messaging-support-cmds.c:1912:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[IPMI_MAX_USER_NAME_LENGTH];
data/freeipmi-1.6.4/libfreeipmi/cmds/ipmi-messaging-support-cmds.c:1981:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (buf, challenge_string, challenge_string_len);
data/freeipmi-1.6.4/libfreeipmi/cmds/ipmi-messaging-support-cmds.c:2189:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy (buf, key_value, key_value_len);
data/freeipmi-1.6.4/libfreeipmi/cmds/ipmi-messaging-support-cmds.c:2284:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[IPMI_MAX_USER_NAME_LENGTH];
data/freeipmi-1.6.4/libfreeipmi/cmds/ipmi-messaging-support-cmds.c:2385:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[IPMI_2_0_MAX_PASSWORD_LENGTH];
data/freeipmi-1.6.4/libfreeipmi/debug/ipmi-debug-common.c:80:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[IPMI_DEBUG_MAX_BUF_LEN];
data/freeipmi-1.6.4/libfreeipmi/debug/ipmi-debug-common.c:103:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat (buf, ": ");
data/freeipmi-1.6.4/libfreeipmi/debug/ipmi-debug-inband.c:67:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char prefix_buf[IPMI_DEBUG_MAX_PREFIX_LEN];
data/freeipmi-1.6.4/libfreeipmi/debug/ipmi-debug-lan.c:66:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char prefix_buf[IPMI_DEBUG_MAX_PREFIX_LEN];
data/freeipmi-1.6.4/libfreeipmi/debug/ipmi-debug-rmcp.c:55:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char prefix_buf[IPMI_DEBUG_MAX_PREFIX_LEN];
data/freeipmi-1.6.4/libfreeipmi/debug/ipmi-debug-rmcpplus.c:634:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (iv, pkt, IPMI_CRYPT_AES_CBC_128_BLOCK_LENGTH);
data/freeipmi-1.6.4/libfreeipmi/debug/ipmi-debug-rmcpplus.c:636:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (payload_buf, pkt + indx, payload_data_len);
data/freeipmi-1.6.4/libfreeipmi/debug/ipmi-debug-rmcpplus.c:1154:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char prefix_buf[IPMI_DEBUG_MAX_PREFIX_LEN];
data/freeipmi-1.6.4/libfreeipmi/debug/ipmi-debug-sdr.c:52:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char prefix_buf[IPMI_DEBUG_MAX_PREFIX_LEN];
data/freeipmi-1.6.4/libfreeipmi/debug/ipmi-debug.c:79:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char prefix_buf[IPMI_DEBUG_MAX_PREFIX_LEN];
data/freeipmi-1.6.4/libfreeipmi/debug/ipmi-debug.c:211:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char prefix_buf[IPMI_DEBUG_MAX_PREFIX_LEN];
data/freeipmi-1.6.4/libfreeipmi/debug/ipmi-debug.c:306:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char prefix_buf[IPMI_DEBUG_MAX_PREFIX_LEN];
data/freeipmi-1.6.4/libfreeipmi/driver/ipmi-inteldcmi-driver.c:441:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((ctx->device_fd = open (driver_device, O_RDWR)) < 0)
data/freeipmi-1.6.4/libfreeipmi/driver/ipmi-inteldcmi-driver.c:528:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (rq_buf, &rq_temp[1], len - 1);
data/freeipmi-1.6.4/libfreeipmi/driver/ipmi-inteldcmi-driver.c:641:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (rs_data + 1, rs_buf, rs_len);
data/freeipmi-1.6.4/libfreeipmi/driver/ipmi-kcs-driver.c:505:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((ctx->dev_fd = open ("/dev/io", O_RDONLY)) < 0)
data/freeipmi-1.6.4/libfreeipmi/driver/ipmi-openipmi-driver.c:370:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((ctx->device_fd = open (driver_device,
data/freeipmi-1.6.4/libfreeipmi/driver/ipmi-openipmi-driver.c:452:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (rq_buf, &rq_buf_temp[1], len - 1);
data/freeipmi-1.6.4/libfreeipmi/driver/ipmi-openipmi-driver.c:583:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (rs_buf + 1, rs_buf_temp, rs_packet.msg.data_len);
data/freeipmi-1.6.4/libfreeipmi/driver/ipmi-ssif-driver.c:701:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((ctx->device_fd = open (ctx->driver_device,
data/freeipmi-1.6.4/libfreeipmi/driver/ipmi-sunbmc-driver.c:321:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((ctx->device_fd = open (driver_device,
data/freeipmi-1.6.4/libfreeipmi/driver/ipmi-sunbmc-driver.c:440:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (rq_buf, &rq_buf_temp[1], len - 1);
data/freeipmi-1.6.4/libfreeipmi/driver/ipmi-sunbmc-driver.c:465:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (req->data, rq_buf, rq_buf_len);
data/freeipmi-1.6.4/libfreeipmi/driver/ipmi-sunbmc-driver.c:606:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (&(rs_buf[2]), rsp->data, rsp->datalength);
data/freeipmi-1.6.4/libfreeipmi/driver/ipmi-sunbmc-driver.c:698:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy (rq_buf, &rq_buf_temp[1], len - 1);
data/freeipmi-1.6.4/libfreeipmi/driver/ipmi-sunbmc-driver.c:734:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (rs_buf + 2, reqrsp.rsp.data, reqrsp.rsp.datalength);
data/freeipmi-1.6.4/libfreeipmi/fiid/fiid.c:47:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key[FIID_FIELD_MAX_KEY_LEN + 1];
data/freeipmi-1.6.4/libfreeipmi/fiid/fiid.c:1078:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (dest_obj->data, src_obj->data, src_obj->data_len);
data/freeipmi-1.6.4/libfreeipmi/fiid/fiid.c:1086:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (dest_obj->field_data,
data/freeipmi-1.6.4/libfreeipmi/fiid/fiid.c:1379:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (tmpl[i].key, obj->field_data[i].key, FIID_FIELD_MAX_KEY_LEN);
data/freeipmi-1.6.4/libfreeipmi/fiid/fiid.c:1870:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (temp_data, obj->data, obj->data_len);
data/freeipmi-1.6.4/libfreeipmi/fiid/fiid.c:1916:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (obj->data, temp_data, obj->data_len);
data/freeipmi-1.6.4/libfreeipmi/fiid/fiid.c:2160:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy ((obj->data + field_offset), data, data_len);
data/freeipmi-1.6.4/libfreeipmi/fiid/fiid.c:2226:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (data, (obj->data + field_offset), bytes_len);
data/freeipmi-1.6.4/libfreeipmi/fiid/fiid.c:2280:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (obj->data, data, data_len);
data/freeipmi-1.6.4/libfreeipmi/fiid/fiid.c:2333:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (data, obj->data, bytes_len);
data/freeipmi-1.6.4/libfreeipmi/fiid/fiid.c:2374:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy (data + data_index,
data/freeipmi-1.6.4/libfreeipmi/fiid/fiid.c:2554:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy ((obj->data + field_offset), data, data_len);
data/freeipmi-1.6.4/libfreeipmi/fiid/fiid.c:2652:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (data, (obj->data + field_offset), block_bytes_set_len);
data/freeipmi-1.6.4/libfreeipmi/fiid/fiid.c:2693:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy (data + data_index,
data/freeipmi-1.6.4/libfreeipmi/fru/ipmi-fru-common.c:86:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char hdrbuf[DEBUG_UTIL_HDR_BUFLEN + 1];
data/freeipmi-1.6.4/libfreeipmi/fru/ipmi-fru-common.c:124:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char hdrbuf[DEBUG_UTIL_HDR_BUFLEN + 1];
data/freeipmi-1.6.4/libfreeipmi/fru/ipmi-fru-data.c:144:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (field->type_length_field,
data/freeipmi-1.6.4/libfreeipmi/fru/ipmi-fru.c:395:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (frubuf,
data/freeipmi-1.6.4/libfreeipmi/fru/ipmi-fru.c:483:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (frubuf + num_bytes_read,
data/freeipmi-1.6.4/libfreeipmi/fru/ipmi-fru.c:558:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (ctx->frudata,
data/freeipmi-1.6.4/libfreeipmi/fru/ipmi-fru.c:1223:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (areabuf, (frubuf + info_area_header_length), (*area_length));
data/freeipmi-1.6.4/libfreeipmi/fru/ipmi-fru.c:1363:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (areabuf, frubuf, record_length);
data/freeipmi-1.6.4/libfreeipmi/fru/ipmi-fru.c:1410:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (areabuf, frubuf, len);
data/freeipmi-1.6.4/libfreeipmi/fru/ipmi-fru.c:1627:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (databuf, &type_length_buf[start_offset], number_of_data_bytes);
data/freeipmi-1.6.4/libfreeipmi/fru/ipmi-fru.c:1747:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char strtmpbuf[IPMI_FRU_AREA_STRING_MAX+1];
data/freeipmi-1.6.4/libfreeipmi/fru/ipmi-fru.c:1853:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (strtmpbuf, databuf, number_of_data_bytes);
data/freeipmi-1.6.4/libfreeipmi/fru/ipmi-fru.c:1863:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (strbuf, strtmpbuf, strtmpbuflen);
data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/fiid/fiid.h:155:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key[FIID_FIELD_MAX_KEY_LEN];
data/freeipmi-1.6.4/libfreeipmi/include/freeipmi/locate/ipmi-locate.h:87:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char driver_device[IPMI_LOCATE_PATH_MAX];
data/freeipmi-1.6.4/libfreeipmi/interface/ipmi-lan-interface.c:460:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (ipmi_msg_len_ptr,
data/freeipmi-1.6.4/libfreeipmi/interface/ipmi-lan-interface.c:493:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy (authentication_code_field_ptr,
data/freeipmi-1.6.4/libfreeipmi/interface/ipmi-lan-interface.c:500:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy (pwbuf,
data/freeipmi-1.6.4/libfreeipmi/interface/ipmi-lan-interface.c:506:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              memcpy (authentication_code_field_ptr,
data/freeipmi-1.6.4/libfreeipmi/interface/ipmi-lan-interface.c:550:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy (authentication_code_field_ptr, digest, IPMI_1_5_MAX_PASSWORD_LENGTH);
data/freeipmi-1.6.4/libfreeipmi/interface/ipmi-lan-interface.c:568:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy (authentication_code_field_ptr, digest, IPMI_1_5_MAX_PASSWORD_LENGTH);
data/freeipmi-1.6.4/libfreeipmi/interface/ipmi-rmcpplus-interface.c:1164:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy (pwbuf, authentication_code_data, authentication_code_data_len);
data/freeipmi-1.6.4/libfreeipmi/interface/ipmi-rmcpplus-interface.c:1166:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (hash_data + hash_data_len,
data/freeipmi-1.6.4/libfreeipmi/interface/ipmi-rmcpplus-interface.c:1172:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (hash_data + hash_data_len, pkt_data, pkt_data_len);
data/freeipmi-1.6.4/libfreeipmi/interface/ipmi-rmcpplus-interface.c:1177:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (hash_data + hash_data_len,
data/freeipmi-1.6.4/libfreeipmi/interface/ipmi-rmcpplus-interface.c:1208:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (authentication_code_buf, integrity_digest, copy_digest_len);
data/freeipmi-1.6.4/libfreeipmi/interface/ipmi-rmcpplus-interface.c:1678:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy (pkt + indx, authentication_code_buf, authentication_code_len);
data/freeipmi-1.6.4/libfreeipmi/interface/ipmi-rmcpplus-interface.c:1934:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (iv, pkt, IPMI_CRYPT_AES_CBC_128_BLOCK_LENGTH);
data/freeipmi-1.6.4/libfreeipmi/interface/ipmi-rmcpplus-interface.c:1936:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (payload_buf, pkt + indx, payload_data_len);
data/freeipmi-1.6.4/libfreeipmi/interpret/ipmi-interpret-config-common.c:109:57:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                                  const char *str,
data/freeipmi-1.6.4/libfreeipmi/interpret/ipmi-interpret-config-common.h:49:61:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                                      const char *str,
data/freeipmi-1.6.4/libfreeipmi/interpret/ipmi-interpret-config-sel.c:1017:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char keybuf[IPMI_OEM_HASH_KEY_BUFLEN + 1];
data/freeipmi-1.6.4/libfreeipmi/interpret/ipmi-interpret-config-sel.c:1043:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (tmp_oem_conf->key, keybuf, IPMI_OEM_HASH_KEY_BUFLEN);
data/freeipmi-1.6.4/libfreeipmi/interpret/ipmi-interpret-config-sel.c:2596:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char keybuf[IPMI_OEM_HASH_KEY_BUFLEN + 1];
data/freeipmi-1.6.4/libfreeipmi/interpret/ipmi-interpret-config-sel.c:2732:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              memcpy (oem_conf->key, keybuf, IPMI_OEM_HASH_KEY_BUFLEN);
data/freeipmi-1.6.4/libfreeipmi/interpret/ipmi-interpret-config-sel.c:2800:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char keybuf[IPMI_OEM_HASH_KEY_BUFLEN + 1];
data/freeipmi-1.6.4/libfreeipmi/interpret/ipmi-interpret-config-sel.c:2925:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              memcpy (oem_conf->key, keybuf, IPMI_OEM_HASH_KEY_BUFLEN);
data/freeipmi-1.6.4/libfreeipmi/interpret/ipmi-interpret-config-sel.c:2957:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              memcpy (oem_conf->oem_record[oem_conf->oem_record_count].oem_bytes,
data/freeipmi-1.6.4/libfreeipmi/interpret/ipmi-interpret-config-sensor.c:1039:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char keybuf[IPMI_OEM_HASH_KEY_BUFLEN + 1];
data/freeipmi-1.6.4/libfreeipmi/interpret/ipmi-interpret-config-sensor.c:1065:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (tmp_oem_conf->key, keybuf, IPMI_OEM_HASH_KEY_BUFLEN);
data/freeipmi-1.6.4/libfreeipmi/interpret/ipmi-interpret-config-sensor.c:2425:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char keybuf[IPMI_OEM_HASH_KEY_BUFLEN + 1];
data/freeipmi-1.6.4/libfreeipmi/interpret/ipmi-interpret-config-sensor.c:2526:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              memcpy (oem_conf->key, keybuf, IPMI_OEM_HASH_KEY_BUFLEN);
data/freeipmi-1.6.4/libfreeipmi/interpret/ipmi-interpret-defs.h:101:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key[IPMI_OEM_HASH_KEY_BUFLEN + 1];
data/freeipmi-1.6.4/libfreeipmi/interpret/ipmi-interpret-defs.h:122:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key[IPMI_OEM_HASH_KEY_BUFLEN + 1];
data/freeipmi-1.6.4/libfreeipmi/interpret/ipmi-interpret-defs.h:224:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key[IPMI_OEM_HASH_KEY_BUFLEN + 1];
data/freeipmi-1.6.4/libfreeipmi/interpret/ipmi-interpret.c:387:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char keybuf[IPMI_OEM_HASH_KEY_BUFLEN + 1];
data/freeipmi-1.6.4/libfreeipmi/interpret/ipmi-interpret.c:542:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char keybuf[IPMI_OEM_HASH_KEY_BUFLEN + 1];
data/freeipmi-1.6.4/libfreeipmi/interpret/ipmi-interpret.c:1076:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char keybuf[IPMI_OEM_HASH_KEY_BUFLEN + 1];
data/freeipmi-1.6.4/libfreeipmi/libcommon/ipmi-crypt.c:230:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (digest, digestPtr, gcry_md_digest_len);
data/freeipmi-1.6.4/libfreeipmi/libcommon/ipmi-md2.c:48:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char padding[16][16] =
data/freeipmi-1.6.4/libfreeipmi/libcommon/ipmi-md2.c:68:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char S[256] =
data/freeipmi-1.6.4/libfreeipmi/libcommon/ipmi-md2.c:195:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (M + Mlen, buf, bufcount);
data/freeipmi-1.6.4/libfreeipmi/libcommon/ipmi-md2.c:200:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy (M, buf + bufcount, MD2_BLOCK_LENGTH);
data/freeipmi-1.6.4/libfreeipmi/libcommon/ipmi-md2.c:207:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy (M, buf + bufcount, Mlen);
data/freeipmi-1.6.4/libfreeipmi/libcommon/ipmi-md2.c:212:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (M + Mlen, buf, buflen);
data/freeipmi-1.6.4/libfreeipmi/libcommon/ipmi-md2.c:244:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (digest, X, MD2_DIGEST_LENGTH);
data/freeipmi-1.6.4/libfreeipmi/libcommon/ipmi-md5.c:292:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (M + Mlen, buf, bufcount);
data/freeipmi-1.6.4/libfreeipmi/libcommon/ipmi-md5.c:298:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy (M, buf + bufcount, MD5_BLOCK_LENGTH);
data/freeipmi-1.6.4/libfreeipmi/libcommon/ipmi-md5.c:307:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy (M, buf + bufcount, Mlen);
data/freeipmi-1.6.4/libfreeipmi/libcommon/ipmi-md5.c:314:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (M + Mlen, buf, buflen);
data/freeipmi-1.6.4/libfreeipmi/libcommon/ipmi-md5.c:326:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char length[8];
data/freeipmi-1.6.4/libfreeipmi/libcommon/ipmi-md5.c:390:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (digest, buf, MD5_DIGEST_LENGTH);
data/freeipmi-1.6.4/libfreeipmi/libcommon/ipmi-trace.h:56:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char __errnostr[ERR_WRAPPER_STR_MAX_LEN + 1];                       \
data/freeipmi-1.6.4/libfreeipmi/libcommon/ipmi-trace.h:70:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char __errorstr[ERR_WRAPPER_STR_MAX_LEN + 1];                       \
data/freeipmi-1.6.4/libfreeipmi/locate/ipmi-locate-acpi-spmi.c:724:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((mem_fd = open ("/dev/mem",
data/freeipmi-1.6.4/libfreeipmi/locate/ipmi-locate-acpi-spmi.c:789:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (data, virtual_address, length);
data/freeipmi-1.6.4/libfreeipmi/locate/ipmi-locate-acpi-spmi.c:973:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy (obj_acpi_rsdp_descriptor, memdata, acpi_rsdp_descriptor_len);
data/freeipmi-1.6.4/libfreeipmi/locate/ipmi-locate-acpi-spmi.c:1129:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (*acpi_table, table, table_length);
data/freeipmi-1.6.4/libfreeipmi/locate/ipmi-locate-acpi-spmi.c:1196:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((sysfs_acpi_fd = open (sysfs_path, O_RDONLY)) < 0)
data/freeipmi-1.6.4/libfreeipmi/locate/ipmi-locate-acpi-spmi.c:1208:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((sysfs_acpi_fd = open (sysfs_path, O_RDONLY)) < 0)
data/freeipmi-1.6.4/libfreeipmi/locate/ipmi-locate-acpi-spmi.c:1521:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (*sign_table_data, acpi_table, *sign_table_data_length);
data/freeipmi-1.6.4/libfreeipmi/locate/ipmi-locate-acpi-spmi.c:1810:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (info, &linfo, sizeof (struct ipmi_locate_info));
data/freeipmi-1.6.4/libfreeipmi/locate/ipmi-locate-defaults.c:106:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (info, &linfo, sizeof (struct ipmi_locate_info));
data/freeipmi-1.6.4/libfreeipmi/locate/ipmi-locate-dmidecode.c:196:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fd = open (devmem, O_RDONLY)) < 0)
data/freeipmi-1.6.4/libfreeipmi/locate/ipmi-locate-dmidecode.c:237:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (p, (fipmiu8 *) mmp + mmoffset, len);
data/freeipmi-1.6.4/libfreeipmi/locate/ipmi-locate-dmidecode.c:456:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char linebuf[64];
data/freeipmi-1.6.4/libfreeipmi/locate/ipmi-locate-dmidecode.c:488:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy (info, &locate_info, sizeof (struct ipmi_locate_info));
data/freeipmi-1.6.4/libfreeipmi/locate/ipmi-locate-dmidecode.c:496:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (((efi_systab = fopen (filename = "/proc/efi/systab", "r")))
data/freeipmi-1.6.4/libfreeipmi/locate/ipmi-locate-dmidecode.c:497:25:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      || ((efi_systab = fopen (filename = "/sys/firmware/efi/systab", "r"))))
data/freeipmi-1.6.4/libfreeipmi/locate/ipmi-locate-dmidecode.c:575:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (info, &locate_info, sizeof (struct ipmi_locate_info));
data/freeipmi-1.6.4/libfreeipmi/locate/ipmi-locate-pci.c:103:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname[128];
data/freeipmi-1.6.4/libfreeipmi/locate/ipmi-locate-pci.c:112:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (!(fp = fopen (fname, "r")))
data/freeipmi-1.6.4/libfreeipmi/locate/ipmi-locate-pci.c:193:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[512];
data/freeipmi-1.6.4/libfreeipmi/locate/ipmi-locate-pci.c:220:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (!(fp_devices = fopen ("/proc/bus/pci/devices", "r")))
data/freeipmi-1.6.4/libfreeipmi/locate/ipmi-locate-pci.c:262:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              memcpy (info, &linfo, sizeof (struct ipmi_locate_info));
data/freeipmi-1.6.4/libfreeipmi/locate/ipmi-locate-pci.c:269:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              memcpy (info, &linfo, sizeof (struct ipmi_locate_info));
data/freeipmi-1.6.4/libfreeipmi/locate/ipmi-locate-smbios.c:211:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static const char smbios_entry_sig[4] = { '_', 'S', 'M', '_' };
data/freeipmi-1.6.4/libfreeipmi/locate/ipmi-locate-smbios.c:212:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static const char smbios_entry_anchor[5] = { '_', 'D', 'M', 'I', '_' };
data/freeipmi-1.6.4/libfreeipmi/locate/ipmi-locate-smbios.c:305:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((mem_fd = open ("/dev/mem", O_RDONLY|O_SYNC)) < 0)
data/freeipmi-1.6.4/libfreeipmi/locate/ipmi-locate-smbios.c:402:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy (result, dev_info_p, size);
data/freeipmi-1.6.4/libfreeipmi/locate/ipmi-locate-smbios.c:522:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (info, &linfo, sizeof (struct ipmi_locate_info));
data/freeipmi-1.6.4/libfreeipmi/locate/ipmi-locate.c:152:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy (info, &linfo, sizeof (struct ipmi_locate_info));
data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-cache-create.c:86:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sdr_cache_magic_buf[4];
data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-cache-create.c:87:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sdr_cache_version_buf[4];
data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-cache-create.c:88:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char record_count_buf[2];
data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-cache-create.c:89:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char most_recent_addition_timestamp_buf[4];
data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-cache-create.c:90:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char most_recent_erase_timestamp_buf[4];
data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-cache-create.c:119:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&header_checksum_buf[header_checksum_buf_len], sdr_cache_magic_buf, 4);
data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-cache-create.c:139:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&header_checksum_buf[header_checksum_buf_len], sdr_cache_version_buf, 4);
data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-cache-create.c:154:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&header_checksum_buf[header_checksum_buf_len], &sdr_version, 1);
data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-cache-create.c:173:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&header_checksum_buf[header_checksum_buf_len], record_count_buf, 2);
data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-cache-create.c:194:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&header_checksum_buf[header_checksum_buf_len], most_recent_addition_timestamp_buf, 4);
data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-cache-create.c:215:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&header_checksum_buf[header_checksum_buf_len], most_recent_erase_timestamp_buf, 4);
data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-cache-create.c:242:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char total_bytes_written_buf[4];
data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-cache-create.c:463:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (record_buf, temp_record_buf, sdr_record_len);
data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-cache-create.c:555:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (record_buf, record_header_buf, sdr_record_header_len);
data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-cache-create.c:829:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fd = open (filename, open_flags, 0644)) < 0)
data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-cache-create.c:943:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                  char hdrbuf[IPMI_SDR_CACHE_DEBUG_BUFLEN + 1];
data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-cache-read.c:79:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sdr_cache_magic_buf[4];
data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-cache-read.c:80:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sdr_cache_version_buf[4];
data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-cache-read.c:81:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char record_count_buf[2];
data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-cache-read.c:82:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char most_recent_addition_timestamp_buf[4];
data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-cache-read.c:83:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char most_recent_erase_timestamp_buf[4];
data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-cache-read.c:126:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((ctx->fd = open (filename, O_RDONLY)) < 0)
data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-cache-read.c:145:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (sdr_cache_magic_buf, ctx->sdr_cache + ctx->records_start_offset, 4);
data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-cache-read.c:147:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (sdr_cache_version_buf, ctx->sdr_cache + ctx->records_start_offset, 4);
data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-cache-read.c:149:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (&sdr_version_buf, ctx->sdr_cache + ctx->records_start_offset, 1);
data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-cache-read.c:151:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (record_count_buf, ctx->sdr_cache + ctx->records_start_offset, 2);
data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-cache-read.c:153:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (most_recent_addition_timestamp_buf, ctx->sdr_cache + ctx->records_start_offset, 4);
data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-cache-read.c:155:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (most_recent_erase_timestamp_buf, ctx->sdr_cache + ctx->records_start_offset, 4);
data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-cache-read.c:220:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char total_bytes_written_buf[4];
data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-cache-read.c:241:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (&header_checksum_cache, ctx->sdr_cache + ctx->records_start_offset, 1);
data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-cache-read.c:244:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&header_checksum_buf[header_checksum_buf_len], sdr_cache_magic_buf, 4);
data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-cache-read.c:246:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&header_checksum_buf[header_checksum_buf_len], sdr_cache_version_buf, 4);
data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-cache-read.c:248:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&header_checksum_buf[header_checksum_buf_len], &sdr_version_buf, 1);
data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-cache-read.c:250:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&header_checksum_buf[header_checksum_buf_len], record_count_buf, 2);
data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-cache-read.c:252:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&header_checksum_buf[header_checksum_buf_len], most_recent_addition_timestamp_buf, 4);
data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-cache-read.c:254:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&header_checksum_buf[header_checksum_buf_len], most_recent_erase_timestamp_buf, 4);
data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-cache-read.c:266:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (total_bytes_written_buf, ctx->sdr_cache + ctx->file_size - 5, 4);
data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-cache-read.c:267:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (&trailer_checksum_cache, ctx->sdr_cache + ctx->file_size - 1, 1);
data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-cache-read.c:704:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (buf, ctx->sdr_cache + ctx->current_offset.offset, record_length + IPMI_SDR_RECORD_HEADER_LENGTH);
data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-cache-read.c:723:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (saved_offset, &ctx->current_offset, sizeof (struct ipmi_sdr_offset));
data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-cache-read.c:753:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (&ctx->current_offset, saved_offset, sizeof (struct ipmi_sdr_offset));
data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-common.c:284:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char hdrbuf[IPMI_SDR_CACHE_DEBUG_BUFLEN + 1];
data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-parse-util.c:168:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char id_string[IPMI_SDR_MAX_ID_STRING_LENGTH + 1];
data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-parse-util.c:169:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char device_id_string[IPMI_SDR_MAX_DEVICE_ID_STRING_LENGTH + 1];
data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-parse-util.c:271:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char id_string[IPMI_SDR_MAX_ID_STRING_LENGTH + 1];
data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-parse-util.c:272:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char device_id_string[IPMI_SDR_MAX_DEVICE_ID_STRING_LENGTH + 1];
data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-parse-util.c:273:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char entity_name_buf[IPMI_SDR_ENTITY_NAME_BUFLEN + 1];
data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-parse-util.c:397:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
              char sensor_name_buf[IPMI_SDR_MAX_SENSOR_NAME_LENGTH + 1];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-dell-poweredge.c:1560:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dimmstr[DELL_EVENT_BUFFER_LENGTH + 1];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-dell-poweredge.c:1841:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char dimmstr[DELL_EVENT_BUFFER_LENGTH + 1];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-dell-poweredge.c:2235:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char data2_number_str[DELL_EVENT_BUFFER_LENGTH + 1];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-dell-poweredge.c:2236:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char data3_number_str[DELL_EVENT_BUFFER_LENGTH + 1];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-fujitsu-irmc-common.c:81:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char data_buf[IPMI_OEM_FUJITSU_SEL_ENTRY_LONG_TEXT_MAX_DATA_LENGTH + 1];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-fujitsu-irmc-common.c:82:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char string_buf[IPMI_OEM_FUJITSU_SEL_ENTRY_LONG_TEXT_MAX_STRING_LENGTH + 1];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-fujitsu-irmc-common.c:233:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy (data_buf + offset,
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-fujitsu-irmc-common.c:240:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy (data_buf + offset,
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-fujitsu-irmc-common.c:307:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (buf, string_buf, strlen (string_buf));
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-fujitsu-irmc-common.c:415:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char selbuf[IPMI_OEM_FUJITSU_SEL_ENTRY_LONG_TEXT_MAX_STRING_LENGTH + 1];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-fujitsu-irmc-common.c:463:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char selbuf[IPMI_OEM_FUJITSU_SEL_ENTRY_LONG_TEXT_MAX_STRING_LENGTH + 1];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-fujitsu-irmc-common.c:528:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char selbuf[IPMI_OEM_FUJITSU_SEL_ENTRY_LONG_TEXT_MAX_STRING_LENGTH + 1];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-intel-e52600v3-common.c:431:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char cpu_bitmask_str[INTEL_EVENT_BUFFER_LENGTH + 1];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-intel-e52600v3-common.c:902:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char failed_register_type_str[INTEL_EVENT_BUFFER_LENGTH + 1];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-intel-e52600v3-common.c:1209:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char memory_str[INTEL_EVENT_BUFFER_LENGTH + 1];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-intel-e52600v3-common.c:1371:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char cpu_str[INTEL_EVENT_BUFFER_LENGTH + 1];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-intel-e52600v3-common.c:2293:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char dimm_str[INTEL_EVENT_BUFFER_LENGTH + 1];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-intel-node-manager.c:628:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char domain_id_str[INTEL_NODE_MANAGER_EVENT_BUFFER_LENGTH + 1];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-intel-node-manager.c:654:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char domain_id_str[INTEL_NODE_MANAGER_EVENT_BUFFER_LENGTH + 1];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-intel-node-manager.c:713:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char domain_id_str[INTEL_NODE_MANAGER_EVENT_BUFFER_LENGTH + 1];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-intel-node-manager.c:802:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char domain_id_str[INTEL_NODE_MANAGER_EVENT_BUFFER_LENGTH + 1];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-intel-quanta-qssc-s4r.c:857:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char memory_board_buf[INTEL_EVENT_BUFFER_LENGTH + 1];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-intel-quanta-qssc-s4r.c:858:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char dimm_slot_buf[INTEL_EVENT_BUFFER_LENGTH + 1];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-intel-quanta-qssc-s4r.c:897:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char memory_board_buf[INTEL_EVENT_BUFFER_LENGTH + 1];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-intel-quanta-qssc-s4r.c:898:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char smi_link_buf[INTEL_EVENT_BUFFER_LENGTH + 1];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-intel-quanta-qssc-s4r.c:929:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char memory_board_buf[INTEL_EVENT_BUFFER_LENGTH + 1];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-intel-quanta-qssc-s4r.c:1059:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char sparing_type_buf[INTEL_EVENT_BUFFER_LENGTH + 1];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-intel-quanta-qssc-s4r.c:1061:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char index_of_spared_memory_board_buf[INTEL_EVENT_BUFFER_LENGTH + 1];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-intel-quanta-qssc-s4r.c:1064:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char spared_dimm_information_buf[INTEL_EVENT_BUFFER_LENGTH + 1];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-intel-quanta-qssc-s4r.c:1165:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char memory_board_buf[INTEL_EVENT_BUFFER_LENGTH + 1];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-intel-quanta-qssc-s4r.c:1166:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char dimm_slot_buf[INTEL_EVENT_BUFFER_LENGTH + 1];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-intel-quanta-qssc-s4r.c:1243:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char error_code_buf[INTEL_EVENT_BUFFER_LENGTH + 1];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-intel-s5500wb.c:452:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char channel_number_str[INTEL_EVENT_BUFFER_LENGTH + 1];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-intel-s5500wb.c:1059:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char channel_number_str[INTEL_EVENT_BUFFER_LENGTH + 1];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-intel-s5500wb.c:1212:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char mirroring_domain_local_subinstance_buf[INTEL_EVENT_BUFFER_LENGTH + 1];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-intel-s5500wb.c:1213:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char socket_id_buf[INTEL_EVENT_BUFFER_LENGTH + 1];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-intel-s5500wb.c:1277:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char first_socket_id_buf[INTEL_EVENT_BUFFER_LENGTH + 1];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-intel-s5500wb.c:1278:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char second_socket_id_buf[INTEL_EVENT_BUFFER_LENGTH + 1];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-linux-kernel.c:74:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char panic_str[LINUX_KERNEL_EVENT_BUFFER_LENGTH];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-linux-kernel.c:136:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char panic_str[LINUX_KERNEL_EVENT_BUFFER_LENGTH];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-linux-kernel.c:161:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (panic_str, &sel_entry->sel_event_record[5], 11);
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-quanta-s99q.c:313:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char dimmbuf[QUANTA_EVENT_BUFFER_LENGTH];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-supermicro-common.c:190:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char rgpair[NPAIRS] = "ABCDEFGHIJKLMNOPQRSTUVWXYZ";
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-supermicro-common.c:206:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    n = sprintf(desc,"P%d_DIMM%c%d",cpu,rgpair[pair],dimm);
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string.c:777:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmpbuf[SEL_BUFFER_LENGTH + 1];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string.c:834:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmpbuf[SEL_BUFFER_LENGTH + 1];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string.c:960:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sensor_name_buf[SENSOR_NAME_LENGTH + 1];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string.c:1069:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmpbuf[EVENT_BUFFER_LENGTH + 1];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string.c:1267:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmpbuf[EVENT_BUFFER_LENGTH + 1];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string.c:1296:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char sensor_units_buf[UNITS_BUFFER_LENGTH+1];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string.c:1412:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char tmppreviousbuf[EVENT_BUFFER_LENGTH];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string.c:1413:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char tmpseveritybuf[EVENT_BUFFER_LENGTH];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string.c:1652:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmpbuf[EVENT_BUFFER_LENGTH + 1];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string.c:1681:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char sensor_units_buf[UNITS_BUFFER_LENGTH+1];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string.c:1964:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmpbufdata2[EVENT_BUFFER_LENGTH + 1];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string.c:1965:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmpbufdata3[EVENT_BUFFER_LENGTH + 1];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string.c:2160:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmpbuf[EVENT_BUFFER_LENGTH + 1];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string.c:2161:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmpstatebuf[EVENT_BUFFER_LENGTH];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string.c:2354:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmpbufeventdata1[EVENT_BUFFER_LENGTH + 1];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string.c:2355:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmpbufeventdata23[EVENT_BUFFER_LENGTH + 1];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string.c:2531:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char iana_buf[IANA_LENGTH + 1];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string.c:2745:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (sel_entry.sel_event_record, sel_record, IPMI_SEL_RECORD_LENGTH);
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel.c:640:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char hdrbuf[DEBUG_UTIL_HDR_BUFLEN + 1];
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel.c:1487:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (buf,
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel.c:1525:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (sel_entry_buf->sel_event_record,
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel.c:1643:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (sel_entry_buf.sel_event_record,
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-channel-util.c:290:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (channel_numbers,
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-iana-enterprise-numbers-util.c:63:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      str = (char *)ipmi_iana_enterprise_numbers[manufacturer_id];
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-iana-enterprise-numbers-util.c:79:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        str = (char *)ipmi_iana_enterprise_numbers[IPMI_IANA_ENTERPRISE_ID_SUPERMICRO];
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-lan-util.c:202:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (authentication_code_calc, authentication_code_data, authentication_code_data_len);
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-lan-util.c:236:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (pwbuf, authentication_code_data, authentication_code_data_len);
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-lan-util.c:451:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (pwbuf, authentication_code_data, authentication_code_data_len);
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-lan-util.c:499:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy (authentication_code_buf, authentication_code_data, authentication_code_data_len);
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-rmcpplus-util.c:143:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (hash_data + hash_data_len,
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-rmcpplus-util.c:148:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (hash_data + hash_data_len,
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-rmcpplus-util.c:163:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (hash_data + hash_data_len, (void *)user_name, user_name_len);
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-rmcpplus-util.c:575:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (sik_key_buf, sik, sik_len);
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-rmcpplus-util.c:604:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (integrity_key_buf, k1, k1_len);
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-rmcpplus-util.c:620:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy (integrity_key_buf,
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-rmcpplus-util.c:652:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (confidentiality_key_buf, k2, k2_len);
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-rmcpplus-util.c:756:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (buf + buf_index, managed_system_random_number, IPMI_MANAGED_SYSTEM_RANDOM_NUMBER_LENGTH);
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-rmcpplus-util.c:776:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (buf + buf_index, user_name, user_name_len);
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-rmcpplus-util.c:811:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (key_exchange_authentication_code, digest, digest_len);
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-rmcpplus-util.c:1044:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (buf + buf_index, remote_console_random_number, IPMI_REMOTE_CONSOLE_RANDOM_NUMBER_LENGTH);
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-rmcpplus-util.c:1046:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (buf + buf_index, managed_system_random_number, IPMI_MANAGED_SYSTEM_RANDOM_NUMBER_LENGTH);
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-rmcpplus-util.c:1048:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (buf + buf_index, managed_system_guid, IPMI_MANAGED_SYSTEM_GUID_LENGTH);
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-rmcpplus-util.c:1060:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (buf + buf_index, user_name, user_name_len);
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-rmcpplus-util.c:1203:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (buf + buf_index, remote_console_random_number, IPMI_REMOTE_CONSOLE_RANDOM_NUMBER_LENGTH);
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-rmcpplus-util.c:1213:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (buf + buf_index, managed_system_guid, IPMI_MANAGED_SYSTEM_GUID_LENGTH);
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-rmcpplus-util.c:1359:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy (pwbuf, authentication_code_data, authentication_code_data_len);
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-rmcpplus-util.c:1361:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (hash_data + hash_data_len,
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-rmcpplus-util.c:1367:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (hash_data + hash_data_len, pkt + rmcp_header_len, pkt_len - rmcp_header_len - compare_digest_len);
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-rmcpplus-util.c:1372:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (hash_data + hash_data_len,
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-sensor-and-event-code-tables-util.c:205:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    str1 = (char *)ipmi_sensor_type_system_event_event_data2_offset_entry_added_to_auxiliary_log_log_entry_action[log_type];
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-sensor-and-event-code-tables-util.c:208:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    str2 = (char *)ipmi_sensor_type_system_event_event_data2_offset_entry_added_to_auxiliary_log_log_type[log_entry_action];
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-sensor-and-event-code-tables-util.c:243:11:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
          strcat (buf, "%s");
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-sensor-and-event-code-tables-util.c:414:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    str1 = (char *)ipmi_sensor_type_system_event_event_data2_offset_timestamp_clock_synch_timestamp_clock_type[timestamp_clock_type];
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-sensor-and-event-code-tables-util.c:417:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    str2 = (char *)ipmi_sensor_type_system_event_event_data2_offset_timestamp_clock_synch_first_second[first_second];
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-sensor-and-event-code-tables-util.c:594:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    str1 = (char *)ipmi_sensor_type_watchdog2_event_data2_timer_use_at_expiration[timer_at_expiration];
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-sensor-and-event-code-tables-util.c:597:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    str2 = (char *)ipmi_sensor_type_watchdog2_event_data2_interrupt_type[interrupt_type];
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-sensor-and-event-code-tables-util.c:673:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        str = (char *)ipmi_sensor_type_management_subsystem_health_event_data2_offset_fru_failure_logical_fru_device[fru_device];
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-sensor-and-event-code-tables-util.c:800:34:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    previous_state_offset_str = (char *)ipmi_sensor_type_fru_state[previous_state_offset];
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-sensor-and-event-code-tables-util.c:803:34:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    cause_of_state_change_str = (char *)ipmi_sensor_type_fru_state_event_data2_offset_communication_lost_cause_of_state_change[cause_of_state_change];
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-sensor-and-event-code-tables-util.c:936:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          str1 = (char *)ipmi_sensor_type_event_logging_disabled_event_data3_offset_event_type_logging_disabled_assertion_event[assertion_deassertion_event];
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-sensor-and-event-code-tables-util.c:939:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          str2 = (char *)ipmi_sensor_type_event_logging_disabled_event_data3_offset_event_type_logging_disabled_logging_disabled_all_events[logging_disabled_all_events];
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-sensor-and-event-code-tables-util.c:1102:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        str = (char *)ipmi_sensor_type_session_audit_event_data3_offset_session_deactivated_deactivation_cause[deactivation_cause];
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-sensor-and-event-code-tables-util.c:2561:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *tmp_event_messages[EVENT_MAX_MESSAGES];
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-sensor-and-event-code-tables-util.c:2563:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[EVENT_BUFLEN + 1];
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-util.c:189:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fd = open ("/dev/urandom", O_RDONLY)) < 0)
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-util.c:192:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fd = open ("/dev/random", O_RDONLY)) < 0)
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole.c:737:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[CONFFILE_MAX_ERRMSGLEN];
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_checks.c:625:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char username_buf[IPMI_MAX_USER_NAME_LENGTH+1];
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_ctx.c:202:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy (c->config.k_g, ipmi_config->k_g, ipmi_config->k_g_len);
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_ctx.c:213:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (c->config.k_g, default_config.k_g, default_config.k_g_len);
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_ctx.c:383:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char filename[MAXPATHLEN];
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_ctx.c:395:32:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((c->debug.debug_fd = open (filename,
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_ctx.c:1171:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char port_str[MAXPORTBUFLEN + 1];
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_ctx.c:1224:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy (&(c->session.addr4), ai->ai_addr, ai->ai_addrlen);
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_ctx.c:1230:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy (&(c->session.addr6), ai->ai_addr, ai->ai_addrlen);
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_debug.c:80:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char filename[MAXPATHLEN];
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_debug.c:91:31:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((console_debug_fd = open (filename,
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_debug.c:120:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char errbuf[IPMICONSOLE_DEBUG_ERROR_BUFLEN];
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_debug.c:170:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char tbuf[IPMICONSOLE_DEBUG_ERROR_BUFLEN+2];
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_debug.c:216:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char errbuf[IPMICONSOLE_DEBUG_ERROR_BUFLEN];
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_debug.c:266:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char tbuf[IPMICONSOLE_DEBUG_ERROR_BUFLEN+2];
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_debug.h:43:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char __err[IPMICONSOLE_DEBUG_ERROR_BUFLEN + 1];                             \
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_debug.h:66:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char __err[IPMICONSOLE_DEBUG_ERROR_BUFLEN + 1];                             \
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_defs.h:246:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char hostname[MAXHOSTNAMELEN+1];
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_defs.h:248:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char username[IPMI_MAX_USER_NAME_LENGTH+1];
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_defs.h:249:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char password[IPMI_2_0_MAX_PASSWORD_LENGTH+1];
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_engine.c:480:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[IPMICONSOLE_PACKET_BUFLEN];
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_engine.c:581:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (&from4, from, fromlen);
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_engine.c:596:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char tempbuf[IPMICONSOLE_PACKET_BUFLEN];
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_engine.c:636:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[IPMICONSOLE_PACKET_BUFLEN];
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_engine.c:761:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[IPMICONSOLE_PACKET_BUFLEN];
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_engine.c:821:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[IPMICONSOLE_PACKET_BUFLEN];
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_engine.c:963:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[IPMICONSOLE_PIPE_BUFLEN];
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_packet.c:307:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char hdr[IPMICONSOLE_MAX_PACKET_DUMP_HDR_LEN];
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_packet.c:510:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char hdr[IPMICONSOLE_MAX_PACKET_DUMP_HDR_LEN];
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_packet.c:751:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char username_buf[IPMI_MAX_USER_NAME_LENGTH+1];
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_processing.c:1847:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
              char buf[1] = { '\0' };
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_processing.c:2008:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char username_buf[IPMI_MAX_USER_NAME_LENGTH+1];
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_processing.c:2159:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fieldstr[64];
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_processing.c:2736:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char character_data[IPMICONSOLE_MAX_CHARACTER_DATA];
data/freeipmi-1.6.4/libipmiconsole/scbuf.c:289:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (cb->data - SCBUF_MAGIC_LEN, (void *) &cb->magic, SCBUF_MAGIC_LEN);
data/freeipmi-1.6.4/libipmiconsole/scbuf.c:290:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (cb->data + cb->size + 1, (void *) &cb->magic, SCBUF_MAGIC_LEN);
data/freeipmi-1.6.4/libipmiconsole/scbuf.c:313:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (cb->data - SCBUF_MAGIC_LEN, (void *) &cb->magic, SCBUF_MAGIC_LEN);
data/freeipmi-1.6.4/libipmiconsole/scbuf.c:314:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (cb->data + cb->size + 1, (void *) &cb->magic, SCBUF_MAGIC_LEN);
data/freeipmi-1.6.4/libipmiconsole/scbuf.c:1324:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (dstbuf, *psrscbuf, len);
data/freeipmi-1.6.4/libipmiconsole/scbuf.c:1362:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (*pdstbuf, srscbuf, len);
data/freeipmi-1.6.4/libipmiconsole/scbuf.c:1430:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy (&dst->data[i_dst], &src->data[i_src], n);
data/freeipmi-1.6.4/libipmiconsole/scbuf.c:1747:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (cb->data + cb->size + 1, (void *) &cb->magic, SCBUF_MAGIC_LEN);
data/freeipmi-1.6.4/libipmidetect/ipmidetect.c:126:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char hostnames[IPMIDETECT_CONFIG_HOSTNAMES_MAX+1][IPMIDETECT_MAXHOSTNAMELEN+1];
data/freeipmi-1.6.4/libipmidetect/ipmidetect.c:385:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char port_str[IPMIDETECT_BUFLEN + 1];
data/freeipmi-1.6.4/libipmidetect/ipmidetect.c:406:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy (&servaddr4, ai->ai_addr, ai->ai_addrlen);
data/freeipmi-1.6.4/libipmidetect/ipmidetect.c:412:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy (&servaddr6, ai->ai_addr, ai->ai_addrlen);
data/freeipmi-1.6.4/libipmidetect/ipmidetect.c:552:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[IPMIDETECT_BUFLEN];
data/freeipmi-1.6.4/libipmidetect/ipmidetect.c:553:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char hostname[IPMIDETECT_MAXHOSTNAMELEN+1];
data/freeipmi-1.6.4/libipmimonitoring/ipmi_monitoring.c:1230:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (oem_data, sel_record->oem_data, sel_record->oem_data_len);
data/freeipmi-1.6.4/libipmimonitoring/ipmi_monitoring_debug.c:56:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char errbuf[IPMI_MONITORING_DEBUG_ERROR_BUFLEN];
data/freeipmi-1.6.4/libipmimonitoring/ipmi_monitoring_debug.h:38:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char __err[IPMI_MONITORING_DEBUG_ERROR_BUFLEN + 1];                             \
data/freeipmi-1.6.4/libipmimonitoring/ipmi_monitoring_defs.h:155:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sensor_name[IPMI_MONITORING_MAX_SENSOR_NAME_LENGTH + 1];
data/freeipmi-1.6.4/libipmimonitoring/ipmi_monitoring_defs.h:177:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sensor_name[IPMI_MONITORING_MAX_SENSOR_NAME_LENGTH + 1];
data/freeipmi-1.6.4/libipmimonitoring/ipmi_monitoring_defs.h:198:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sdr_cache_directory[MAXPATHLEN+1];
data/freeipmi-1.6.4/libipmimonitoring/ipmi_monitoring_defs.h:200:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sdr_cache_filename_format[MAXPATHLEN+1];
data/freeipmi-1.6.4/libipmimonitoring/ipmi_monitoring_sdr_cache.c:96:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sdr_cache_filename[MAXPATHLEN+1];
data/freeipmi-1.6.4/libipmimonitoring/ipmi_monitoring_sdr_cache.c:132:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                  char local_hostname[MAXHOSTNAMELEN+1];
data/freeipmi-1.6.4/libipmimonitoring/ipmi_monitoring_sdr_cache.c:268:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename[MAXPATHLEN+1];
data/freeipmi-1.6.4/libipmimonitoring/ipmi_monitoring_sdr_cache.c:367:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename[MAXPATHLEN+1];
data/freeipmi-1.6.4/libipmimonitoring/ipmi_monitoring_sel.c:292:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char event_offset_string[IPMI_MONITORING_SEL_EVENT_OFFSET_STRING_MAX + 1];
data/freeipmi-1.6.4/libipmimonitoring/ipmi_monitoring_sensor_reading.c:1183:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sensor_name[IPMI_MONITORING_MAX_SENSOR_NAME_LENGTH];
data/freeipmi-1.6.4/rmcpping/rmcpping.c:94:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char hdrbuf[DEBUG_UTIL_HDR_BUFLEN + 1];
data/freeipmi-1.6.4/rmcpping/rmcpping.c:150:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char hdrbuf[DEBUG_UTIL_HDR_BUFLEN + 1];
data/freeipmi-1.6.4/bmc-device/bmc-device-argp.c:479:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      && strlen (cmd_args->set_system_firmware_version_arg) > IPMI_SYSTEM_INFO_STRING_LEN_MAX)
data/freeipmi-1.6.4/bmc-device/bmc-device-argp.c:487:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      && strlen (cmd_args->set_system_name_arg) > IPMI_SYSTEM_INFO_STRING_LEN_MAX)
data/freeipmi-1.6.4/bmc-device/bmc-device-argp.c:495:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      && strlen (cmd_args->set_primary_operating_system_name_arg) > IPMI_SYSTEM_INFO_STRING_LEN_MAX)
data/freeipmi-1.6.4/bmc-device/bmc-device-argp.c:503:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      && strlen (cmd_args->set_operating_system_name_arg) > IPMI_SYSTEM_INFO_STRING_LEN_MAX)
data/freeipmi-1.6.4/bmc-device/bmc-device-argp.c:511:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      && strlen (cmd_args->set_present_os_version_number_arg) > IPMI_SYSTEM_INFO_STRING_LEN_MAX)
data/freeipmi-1.6.4/bmc-device/bmc-device-argp.c:519:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      && strlen (cmd_args->set_bmc_url_arg) > IPMI_SYSTEM_INFO_STRING_LEN_MAX)
data/freeipmi-1.6.4/bmc-device/bmc-device-argp.c:527:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      && strlen (cmd_args->set_base_os_hypervisor_url_arg) > IPMI_SYSTEM_INFO_STRING_LEN_MAX)
data/freeipmi-1.6.4/bmc-device/bmc-device.c:851:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen (from) >= 2)
data/freeipmi-1.6.4/bmc-device/bmc-device.c:888:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen (from) >= 2)
data/freeipmi-1.6.4/bmc-device/bmc-device.c:934:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen (from) >= 2)
data/freeipmi-1.6.4/bmc-device/bmc-device.c:1555:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen (from) >= 2)
data/freeipmi-1.6.4/bmc-device/bmc-device.c:2548:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert (strlen (string) <= IPMI_SYSTEM_INFO_STRING_LEN_MAX);
data/freeipmi-1.6.4/bmc-device/bmc-device.c:2568:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  string_length = strlen (string);
data/freeipmi-1.6.4/common/miscutil/cbuf.c:841:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = ncopy = strlen (srcbuf);
data/freeipmi-1.6.4/common/miscutil/cbuf.c:1283:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        n = read (*psrcfd, dstbuf, len);
data/freeipmi-1.6.4/common/miscutil/conffile.c:622:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (errno || (args[0] + strlen(args[0])) != ptr) {
data/freeipmi-1.6.4/common/miscutil/conffile.c:630:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (errno || (args[0] + strlen(args[0])) != ptr) {
data/freeipmi-1.6.4/common/miscutil/conffile.c:636:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(data.string, args[0], CONFFILE_MAX_ARGLEN);
data/freeipmi-1.6.4/common/miscutil/conffile.c:644:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (errno || (args[i] + strlen(args[i])) != ptr) {
data/freeipmi-1.6.4/common/miscutil/conffile.c:656:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (errno || (args[i] + strlen(args[i])) != ptr) {
data/freeipmi-1.6.4/common/miscutil/conffile.c:666:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(data.stringlist[i], args[i], CONFFILE_MAX_ARGLEN);
data/freeipmi-1.6.4/common/miscutil/conffile.c:715:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            || strlen(options[i].optionname) >= CONFFILE_MAX_OPTIONNAMELEN
data/freeipmi-1.6.4/common/miscutil/conffile.c:822:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy((char *)option_ptr, data->string, option_data);
data/freeipmi-1.6.4/common/miscutil/fd.c:71:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if ((nread = read (fd, p, nleft)) < 0) {
data/freeipmi-1.6.4/common/miscutil/fd.c:120:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if ((rc = read (fd, &c, 1)) == 1) {
data/freeipmi-1.6.4/common/miscutil/fi_hostlist.c:146:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert (strlen (replace) > 0);
data/freeipmi-1.6.4/common/miscutil/fi_hostlist.c:148:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert (strlen (with) > 0);
data/freeipmi-1.6.4/common/miscutil/fi_hostlist.c:150:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len_replace = strlen (replace);
data/freeipmi-1.6.4/common/miscutil/fi_hostlist.c:151:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len_with = strlen (with);
data/freeipmi-1.6.4/common/miscutil/fi_hostlist.c:169:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  new = newp = (char *) malloc (strlen(orig) + (len_with - len_replace) * count + 1);
data/freeipmi-1.6.4/common/miscutil/fi_hostlist.c:183:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy (newp, p, len_front);
data/freeipmi-1.6.4/common/miscutil/fi_hostlist.c:185:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy (newp, with, len_with);
data/freeipmi-1.6.4/common/miscutil/fi_hostlist.c:237:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (!(new = (char *) malloc (strlen (host) + 5)))
data/freeipmi-1.6.4/common/miscutil/fi_hostlist.c:244:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      memcpy (new + len, FI_LEFT_BRACKET, strlen (FI_LEFT_BRACKET));
data/freeipmi-1.6.4/common/miscutil/fi_hostlist.c:245:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len += strlen (FI_LEFT_BRACKET);
data/freeipmi-1.6.4/common/miscutil/fi_hostlist.c:254:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      memcpy (new + len, FI_RIGHT_BRACKET, strlen (FI_RIGHT_BRACKET));
data/freeipmi-1.6.4/common/miscutil/fi_hostlist.c:255:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len += strlen (FI_RIGHT_BRACKET);
data/freeipmi-1.6.4/common/miscutil/fi_hostlist.c:258:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      memcpy (new + len, pr, host + strlen (host) - pr);
data/freeipmi-1.6.4/common/miscutil/fi_hostlist.c:259:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len += (host + strlen (host) - pr);
data/freeipmi-1.6.4/common/miscutil/fi_hostlist.c:543:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen (str) > n)
data/freeipmi-1.6.4/common/miscutil/fi_hostlist.c:546:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy (buf, str, n);
data/freeipmi-1.6.4/common/miscutil/fi_hostlist.c:547:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  rv = strlen (str);
data/freeipmi-1.6.4/common/miscutil/hostlist.c:483:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int idx = strlen(hostname) - 1;
data/freeipmi-1.6.4/common/miscutil/hostlist.c:509:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (idx == strlen(hostname) - 1) {
data/freeipmi-1.6.4/common/miscutil/hostlist.c:575:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return (int) strlen(hn->suffix);
data/freeipmi-1.6.4/common/miscutil/hostlist.c:811:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size = strlen(hr->prefix) + hr->width + 16;
data/freeipmi-1.6.4/common/miscutil/hostlist.c:834:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size = strlen(hr->prefix) + hr->width + 16;
data/freeipmi-1.6.4/common/miscutil/hostlist.c:950:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len_hn = strlen (hn->prefix);
data/freeipmi-1.6.4/common/miscutil/hostlist.c:972:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len_hr = strlen (hr->prefix);
data/freeipmi-1.6.4/common/miscutil/hostlist.c:1285:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (str == NULL || strlen(str) == 0)
data/freeipmi-1.6.4/common/miscutil/hostlist.c:1301:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        pos = strlen(tok) - 1;
data/freeipmi-1.6.4/common/miscutil/hostlist.c:1313:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            pos = strlen(tok) - 1;
data/freeipmi-1.6.4/common/miscutil/hostlist.c:1350:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                if (pos != strlen(prefix) ||
data/freeipmi-1.6.4/common/miscutil/hostlist.c:1447:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    range->width = strlen(str);
data/freeipmi-1.6.4/common/miscutil/hostlist.c:1535:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(cur_tok, tok, 1024);
data/freeipmi-1.6.4/common/miscutil/hostlist.c:2347:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen (i->hr->prefix) + strlen (suffix) + 1;
data/freeipmi-1.6.4/common/miscutil/hostlist.c:2347:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen (i->hr->prefix) + strlen (suffix) + 1;
data/freeipmi-1.6.4/common/miscutil/network.c:101:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              if (*tmp == '\0' && strlen (portptr))
data/freeipmi-1.6.4/common/miscutil/network.c:190:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (*tmp == '\0' && strlen (portptr))
data/freeipmi-1.6.4/common/miscutil/network.c:226:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen (addr) > MAXHOSTNAMELEN)
data/freeipmi-1.6.4/common/parsecommon/parse-common.c:152:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy (buf, str, WORKAROUND_FLAG_BUFLEN);
data/freeipmi-1.6.4/common/parsecommon/parse-common.c:358:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (!strlen (in))
data/freeipmi-1.6.4/common/parsecommon/parse-common.c:363:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen (in) > IPMI_MAX_K_G_LENGTH*2+2)
data/freeipmi-1.6.4/common/parsecommon/parse-common.c:368:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      for (i = j = 0; i < strlen (p); i+=2, j++)
data/freeipmi-1.6.4/common/parsecommon/parse-common.c:390:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen (in) > IPMI_MAX_K_G_LENGTH)
data/freeipmi-1.6.4/common/parsecommon/parse-common.c:394:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      memcpy (out, in, strlen (in));
data/freeipmi-1.6.4/common/parsecommon/parse-common.c:395:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      rv = strlen (in);
data/freeipmi-1.6.4/common/pingtool/ping-tool-common.c:177:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy (dest, src, len);
data/freeipmi-1.6.4/common/portability/freeipmi-argp-fmtstream.c:411:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t __len = strlen (__str);
data/freeipmi-1.6.4/common/portability/freeipmi-argp-fmtstream.h:231:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t __len = strlen (__str);
data/freeipmi-1.6.4/common/portability/freeipmi-argp-help.c:229:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              if (strlen (un->name) == var_len
data/freeipmi-1.6.4/common/portability/freeipmi-argp-help.c:859:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          unsigned hol_so_len = strlen (hol->short_options);
data/freeipmi-1.6.4/common/portability/freeipmi-argp-help.c:861:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            malloc (hol_so_len + strlen (more->short_options) + 1);
data/freeipmi-1.6.4/common/portability/freeipmi-argp-help.c:1279:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          space (stream, 6 + strlen (arg));
data/freeipmi-1.6.4/common/portability/freeipmi-argp-help.c:1326:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      char *short_no_arg_opts = alloca (strlen (hol->short_options) + 1);
data/freeipmi-1.6.4/common/portability/freeipmi-portability.c:58:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen (s);
data/freeipmi-1.6.4/common/portability/freeipmi-portability.c:197:10:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    ch = fgetc (fp);
data/freeipmi-1.6.4/common/portability/freeipmi-portability.c:300:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      nbytes += (strlen (*p)+1);              /* aliases */
data/freeipmi-1.6.4/common/portability/freeipmi-portability.c:348:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      pbuf += strlen (*p);              /* advance pbuf */
data/freeipmi-1.6.4/common/portability/freeipmi-portability.c:355:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    pbuf += strlen (ph->h_name);          /* advance pbuf */
data/freeipmi-1.6.4/common/portability/freeipmi-portability.h:102:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t __len = strlen (__old) + 1;          \
data/freeipmi-1.6.4/common/toolcommon/pstdout.c:631:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              hostname_len = strlen(pstate->hostname);
data/freeipmi-1.6.4/common/toolcommon/tool-cmdline-common.c:207:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen (arg) > IPMI_MAX_USER_NAME_LENGTH)
data/freeipmi-1.6.4/common/toolcommon/tool-cmdline-common.c:221:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      n = strlen (arg);
data/freeipmi-1.6.4/common/toolcommon/tool-cmdline-common.c:225:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen (arg) > IPMI_2_0_MAX_PASSWORD_LENGTH)
data/freeipmi-1.6.4/common/toolcommon/tool-cmdline-common.c:239:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      n = strlen (arg);
data/freeipmi-1.6.4/common/toolcommon/tool-cmdline-common.c:245:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (arg && strlen (arg) > IPMI_2_0_MAX_PASSWORD_LENGTH)
data/freeipmi-1.6.4/common/toolcommon/tool-cmdline-common.c:279:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        n = strlen (arg);
data/freeipmi-1.6.4/common/toolcommon/tool-cmdline-common.c:614:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      && strlen (common_args->password) > IPMI_1_5_MAX_PASSWORD_LENGTH)
data/freeipmi-1.6.4/common/toolcommon/tool-config-file-common.c:347:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen (data->string) > IPMI_MAX_USER_NAME_LENGTH)
data/freeipmi-1.6.4/common/toolcommon/tool-config-file-common.c:385:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen (data->string) > IPMI_2_0_MAX_PASSWORD_LENGTH)
data/freeipmi-1.6.4/common/toolcommon/tool-config-file-common.c:628:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen (data->string) > IPMI_MAX_USER_NAME_LENGTH)
data/freeipmi-1.6.4/common/toolcommon/tool-config-file-common.c:667:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen (data->string) > IPMI_2_0_MAX_PASSWORD_LENGTH)
data/freeipmi-1.6.4/common/toolcommon/tool-config-file-common.c:962:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen (data->stringlist[i]) > CONFIG_FILE_MAX_SENSOR_TYPES_STRING_LENGTH)
data/freeipmi-1.6.4/common/toolcommon/tool-config-file-common.c:970:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy (sensor_types[i],
data/freeipmi-1.6.4/common/toolcommon/tool-daemon-common.c:78:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if (read(fds[0], &buf, 1) < 0)
data/freeipmi-1.6.4/common/toolcommon/tool-daemon-common.c:98:7:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
      umask(022);
data/freeipmi-1.6.4/common/toolcommon/tool-daemon-common.c:115:3:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
  umask (0);
data/freeipmi-1.6.4/common/toolcommon/tool-sdr-cache-common.c:128:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          if (strlen (pwd.pw_dir) > (buflen - 1))
data/freeipmi-1.6.4/common/toolcommon/tool-sdr-cache-common.c:212:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen (cache_dir) > (MAXPATHLEN - 1))
data/freeipmi-1.6.4/common/toolcommon/tool-sdr-cache-common.c:363:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen (common_args->sdr_cache_file) > (MAXPATHLEN - 1))
data/freeipmi-1.6.4/common/toolcommon/tool-sensor-common.c:154:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy (sensor_types[(*sensor_types_length)],
data/freeipmi-1.6.4/common/toolcommon/tool-sensor-common.c:474:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (column_width->record_id < strlen(SENSORS_HEADER_RECORD_ID_STR))
data/freeipmi-1.6.4/common/toolcommon/tool-sensor-common.c:475:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    column_width->record_id = strlen(SENSORS_HEADER_RECORD_ID_STR);
data/freeipmi-1.6.4/common/toolcommon/tool-sensor-common.c:476:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (column_width->sensor_name < strlen(SENSORS_HEADER_NAME_STR))
data/freeipmi-1.6.4/common/toolcommon/tool-sensor-common.c:477:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    column_width->sensor_name = strlen(SENSORS_HEADER_NAME_STR);
data/freeipmi-1.6.4/common/toolcommon/tool-sensor-common.c:478:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (column_width->sensor_type < strlen(SENSORS_HEADER_TYPE_STR))
data/freeipmi-1.6.4/common/toolcommon/tool-sensor-common.c:479:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    column_width->sensor_type = strlen(SENSORS_HEADER_TYPE_STR);
data/freeipmi-1.6.4/common/toolcommon/tool-sensor-common.c:480:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (column_width->sensor_units < strlen(SENSORS_HEADER_UNITS_STR))
data/freeipmi-1.6.4/common/toolcommon/tool-sensor-common.c:481:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    column_width->sensor_units = strlen(SENSORS_HEADER_UNITS_STR);
data/freeipmi-1.6.4/common/toolcommon/tool-sensor-common.c:535:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen (record_id_buf);
data/freeipmi-1.6.4/common/toolcommon/tool-sensor-common.c:565:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len = strlen (sensor_name);
data/freeipmi-1.6.4/common/toolcommon/tool-sensor-common.c:587:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len = strlen (sensor_name);
data/freeipmi-1.6.4/common/toolcommon/tool-sensor-common.c:608:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len = strlen (get_sensor_type_output_string (sensor_type));
data/freeipmi-1.6.4/common/toolcommon/tool-sensor-common.c:638:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          len = strlen (sensor_units_buf);
data/freeipmi-1.6.4/common/toolcommon/tool-sensor-common.c:911:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  column_width->sensor_type = strlen (ipmi_sensor_types[IPMI_SENSOR_TYPE_SYSTEM_FIRMWARE_PROGRESS]);
data/freeipmi-1.6.4/common/toolcommon/tool-sensor-common.c:913:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    column_width->sensor_units = strlen (ipmi_sensor_units[IPMI_SENSOR_UNIT_DEGREES_C]);
data/freeipmi-1.6.4/common/toolcommon/tool-sensor-common.c:915:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    column_width->sensor_units = strlen (ipmi_sensor_units[IPMI_SENSOR_UNIT_RPM]);
data/freeipmi-1.6.4/common/toolcommon/tool-util-common.c:80:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen (in) == 0)
data/freeipmi-1.6.4/common/toolcommon/tool-util-common.c:85:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen (in) > IPMI_MAX_K_G_LENGTH*2+2)
data/freeipmi-1.6.4/common/toolcommon/tool-util-common.c:90:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen (in) > IPMI_MAX_K_G_LENGTH)
data/freeipmi-1.6.4/contrib/libipmimonitoring/ipmimonitoring-sel.c:542:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          if (!strlen (sensor_name))
data/freeipmi-1.6.4/contrib/libipmimonitoring/ipmimonitoring-sensors.c:467:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (!strlen (sensor_name))
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan-conf-security-keys-section.c:228:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    strlen (kv->value_input)));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan-conf-security-keys-section.c:242:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen (value) <= IPMI_MAX_K_R_LENGTH)
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:746:66:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                       atoi (kv->key->key_name + strlen ("IPv6_Static_Address_Source_")),
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:777:66:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                       atoi (kv->key->key_name + strlen ("IPv6_Static_Address_Source_")),
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:785:63:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                    atoi (kv->key->key_name + strlen ("IPv6_Static_Address_Source_")),
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:820:66:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                       atoi (kv->key->key_name + strlen ("IPv6_Static_Address_Enable_")),
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:851:66:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                       atoi (kv->key->key_name + strlen ("IPv6_Static_Address_Enable_")),
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:859:63:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                    atoi (kv->key->key_name + strlen ("IPv6_Static_Address_Enable_")),
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:879:66:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                       atoi (kv->key->key_name + strlen ("IPv6_Static_Address_")),
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:925:66:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                       atoi (kv->key->key_name + strlen ("IPv6_Static_Address_")),
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:943:63:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                    atoi (kv->key->key_name + strlen ("IPv6_Static_Address_")),
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:962:66:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                       atoi (kv->key->key_name + strlen ("IPv6_Static_Address_Prefix_Length_")),
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:993:66:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                       atoi (kv->key->key_name + strlen ("IPv6_Static_Address_Prefix_Length_")),
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:1001:63:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                    atoi (kv->key->key_name + strlen ("IPv6_Static_Address_Prefix_Length_")),
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:1020:66:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                       atoi (kv->key->key_name + strlen ("IPv6_Static_Address_Status_")),
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:1180:67:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                        atoi (kv->key->key_name + strlen ("IPv6_Dynamic_Address_Source_")),
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:1229:67:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                        atoi (kv->key->key_name + strlen ("IPv6_Dynamic_Address_")),
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:1275:67:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                        atoi (kv->key->key_name + strlen ("IPv6_Dynamic_Address_Prefix_Length_")),
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:1307:67:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                        atoi (kv->key->key_name + strlen ("IPv6_Dynamic_Address_Status_")),
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:1530:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  num = atoi (kv->key->key_name + strlen ("IPv6_Static_Router_Address_"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:1642:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  num = atoi (kv->key->key_name + strlen ("IPv6_Static_Router_Address_"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:1724:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  num = atoi (kv->key->key_name + strlen ("IPv6_Static_Router_Mac_Address_"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:1837:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  num = atoi (kv->key->key_name + strlen ("IPv6_Static_Router_Mac_Address_"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:1909:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  num = atoi (kv->key->key_name + strlen ("IPv6_Static_Router_Prefix_Length_"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:2005:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  num = atoi (kv->key->key_name + strlen ("IPv6_Static_Router_Prefix_Length_"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:2079:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  num = atoi (kv->key->key_name + strlen ("IPv6_Static_Router_Prefix_Value_"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-lan6-conf-section.c:2191:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  num = atoi (kv->key->key_name + strlen ("IPv6_Static_Router_Prefix_Value_"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-rmcpplus-conf-privilege-section.c:555:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  uint8_t id = atoi (kv->key->key_name + strlen ("Maximum_Privilege_Cipher_Suite_Id_"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-rmcpplus-conf-privilege-section.c:564:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  uint8_t id = atoi (kv->key->key_name + strlen ("Maximum_Privilege_Cipher_Suite_Id_"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-user-sections.c:71:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      (*channel_number) = atoi (ptr + strlen ("Channel_"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-user-sections.c:116:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  userid = atoi (section_name + strlen ("User"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-user-sections.c:302:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  userid = atoi (section_name + strlen ("User"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-user-sections.c:454:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  userid = atoi (section_name + strlen ("User"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-user-sections.c:573:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  userid = atoi (section_name + strlen ("User"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-user-sections.c:598:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                              strlen (kv->value_input),
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-user-sections.c:696:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  userid = atoi (section_name + strlen ("User"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-user-sections.c:706:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (!value || strlen (value) > IPMI_MAX_USER_NAME_LENGTH)
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-user-sections.c:741:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                  strlen (password),
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-user-sections.c:808:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      userid = atoi (section_name + strlen ("User"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-user-sections.c:817:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen (kv->value_input) > IPMI_1_5_MAX_PASSWORD_LENGTH)
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-user-sections.c:864:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  userid = atoi (section_name + strlen ("User"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-user-sections.c:876:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen (kv->value_input) > IPMI_1_5_MAX_PASSWORD_LENGTH)
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-user-sections.c:883:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                      strlen (kv->value_input),
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-user-sections.c:910:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                      strlen (kv->value_input),
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-user-sections.c:972:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen (value) > IPMI_2_0_MAX_PASSWORD_LENGTH)
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-user-sections.c:975:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen (value) > IPMI_1_5_MAX_PASSWORD_LENGTH)
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-user-sections.c:981:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      userid = atoi (section_name + strlen ("User"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-user-sections.c:996:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen (value) <= IPMI_1_5_MAX_PASSWORD_LENGTH)
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-user-sections.c:1016:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  userid = atoi (section_name + strlen ("User"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-user-sections.c:1080:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  userid = atoi (section_name + strlen ("User"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-user-sections.c:1096:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                  strlen (kv->value_input),
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-user-sections.c:1134:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen (value) <= IPMI_2_0_MAX_PASSWORD_LENGTH)
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-user-sections.c:1212:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  userid = atoi (section_name + strlen ("User"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-user-sections.c:1791:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  userid = atoi (section_name + strlen ("User"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-core-user-sections.c:1890:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  userid = atoi (section_name + strlen ("User"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-dcmi-dcmi-conf-section.c:199:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  data_len = strlen (kv->value_input);
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-dcmi-dcmi-conf-section.c:207:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  memcpy (data_buf, kv->value_input, strlen (kv->value_input));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-dcmi-dcmi-conf-section.c:293:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (!value || strlen (value) > IPMI_DCMI_MAX_ASSET_TAG_LENGTH)
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-dcmi-dcmi-conf-section.c:430:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  data_len = strlen (kv->value_input) + 1;
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-dcmi-dcmi-conf-section.c:438:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  memcpy (data_buf, kv->value_input, strlen (kv->value_input));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-dcmi-dcmi-conf-section.c:524:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (!value || strlen (value) > (IPMI_DCMI_MAX_MANAGEMENT_CONTROLLER_IDENTIFIER_STRING_LENGTH - 1))
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-dcmi-dcmi-conf-section.c:1028:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (str && strlen (str))
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-alert-policy-table.c:64:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  alert_policy_entry_number = atoi (section_name + strlen ("Alert_Policy_"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-alert-policy-table.c:197:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  alert_policy_entry_number = atoi (section_name + strlen ("Alert_Policy_"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-alert-policy-table.c:764:7:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      strcat (description, ")");
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-alert-string.c:66:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  string_selector = atoi (section_name + strlen ("Alert_String_"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-alert-string.c:139:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  string_selector = atoi (section_name + strlen ("Alert_String_"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-alert-string.c:293:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  string_selector = atoi (section_name + strlen ("Alert_String_"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-alert-string.c:393:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  string_selector = atoi (section_name + strlen ("Alert_String_"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-alert-string.c:404:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  alert_string_len = strlen (kv->value_input);
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-alert-string.c:477:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen (value) <= PEF_ALERT_STRING_MAX_LEN)
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-community-string.c:146:67:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                                                  strlen (kv->value_input),
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-community-string.c:181:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (!value || strlen (value) > IPMI_MAX_COMMUNITY_STRING_LENGTH)
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-event-filter-table.c:100:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  filter_number = atoi (section_name + strlen ("Event_Filter_"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-event-filter-table.c:434:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  filter_number = atoi (section_name + strlen ("Event_Filter_"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-event-filter-table.c:1209:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (str && strlen (str))
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-lan-alert-destination.c:72:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  destination_selector = atoi (section_name + strlen ("Lan_Alert_Destination_"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-lan-alert-destination.c:172:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  destination_selector = atoi (section_name + strlen ("Lan_Alert_Destination_"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-lan-alert-destination.c:447:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  destination_selector = atoi (section_name + strlen ("Lan_Alert_Destination_"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-pef-lan-alert-destination.c:563:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  destination_selector = atoi (section_name + strlen ("Lan_Alert_Destination_"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-category-sensors-utils.c:118:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen (id_string) > 0)
data/freeipmi-1.6.4/ipmi-config/ipmi-config-checkout.c:210:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  && !strlen (kv->value_output))
data/freeipmi-1.6.4/ipmi-config/ipmi-config-comment.c:78:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      int toklen = strlen (tok);
data/freeipmi-1.6.4/ipmi-config/ipmi-config-comment.c:96:7:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      strcat (out, " ");
data/freeipmi-1.6.4/ipmi-config/ipmi-config-comment.c:107:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat (out, "\n");
data/freeipmi-1.6.4/ipmi-config/ipmi-config-map.c:572:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      device_instance_selector = atoi (str + strlen ("external-"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-map.c:580:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      device_instance_selector = atoi (str + strlen ("internal-"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-utils.c:490:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          (*channel_number) = atoi (ptr + strlen ("Channel_Channel_"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-utils.c:497:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          (*channel_number) = atoi (ptr + strlen ("Channel_"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-utils.c:552:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          (*channel_number) = atoi (ptr + strlen ("Channel_Channel_"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-utils.c:559:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          (*channel_number) = atoi (ptr + strlen ("Channel_"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config-utils.c:614:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          (*channel_number) = atoi (ptr + strlen ("Channel_"));
data/freeipmi-1.6.4/ipmi-config/ipmi-config.c:319:62:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                      userid = atoi (section->section_name + strlen ("User"));
data/freeipmi-1.6.4/ipmi-dcmi/ipmi-dcmi-argp.c:158:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen (cmd_args->set_asset_tag_arg) > IPMI_DCMI_MAX_ASSET_TAG_LENGTH)
data/freeipmi-1.6.4/ipmi-dcmi/ipmi-dcmi-argp.c:171:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen (cmd_args->set_management_controller_identifier_string_arg) > (IPMI_DCMI_MAX_MANAGEMENT_CONTROLLER_IDENTIFIER_STRING_LENGTH - 1))
data/freeipmi-1.6.4/ipmi-dcmi/ipmi-dcmi.c:1211:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  data_len = strlen (state_data->prog_data->args->set_asset_tag_arg);
data/freeipmi-1.6.4/ipmi-dcmi/ipmi-dcmi.c:1217:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          strlen (state_data->prog_data->args->set_asset_tag_arg));
data/freeipmi-1.6.4/ipmi-dcmi/ipmi-dcmi.c:1398:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  data_len = strlen (state_data->prog_data->args->set_management_controller_identifier_string_arg) + 1;
data/freeipmi-1.6.4/ipmi-dcmi/ipmi-dcmi.c:1404:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          strlen (state_data->prog_data->args->set_management_controller_identifier_string_arg));
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-common.c:426:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen (value) > stringbuflen)
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-common.c:437:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  (*string_length) = strlen (value);
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-fujitsu.c:1394:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      component_length = strlen ((char *)bytes_rs + 16);
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-intel.c:784:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen (string) > (max_blocks * IPMI_OEM_INTEL_SMTP_STRING_BLOCK_LENGTH))
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-intel.c:795:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      && strlen (string) > IPMI_OEM_INTEL_SMTP_CONFIGURATION_PARAMETER_USER_PASSWORD_LENGTH_MAX)
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-intel.c:806:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  memcpy (buf, string, strlen (string));
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-intel.c:981:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          secure_memset (value, '\0', strlen (value));
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-intel.c:983:77:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          secure_memset (state_data->prog_data->args->oem_options[i], '\0', strlen (state_data->prog_data->args->oem_options[i]));
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-intelnm.c:4662:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy (buf, value, IPMI_OEM_STR_BUFLEN);
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-inventec.c:926:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          if (strlen (value) < min_required
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-inventec.c:927:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              || strlen (value) > (IPMI_OEM_INVENTEC_EXTENDED_ATTRIBUTE_ID_FIRMWARE_UPDATE_URI_LEN - 1))
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-inventec.c:938:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          value_len = strlen (value);
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-inventec.c:1799:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  asset_tag_len = strlen (state_data->prog_data->args->oem_options[0]);
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-inventec.c:2348:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen (state_data->prog_data->args->oem_options[0]) != (IPMI_SYSTEM_GUID_LENGTH * 2))
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-thirdparty.c:726:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  bytes_rq[8] = strlen (buf);
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-thirdparty.c:1215:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (i && !strlen (user_name))
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-wistron.c:3150:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen (state_data->prog_data->args->oem_options[0]) > IPMI_OEM_WISTRON_PROPRIETARY_STRING_MAX)
data/freeipmi-1.6.4/ipmi-oem/ipmi-oem-wistron.c:3161:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen (state_data->prog_data->args->oem_options[0]);
data/freeipmi-1.6.4/ipmi-pet/ipmi-pet-argp.c:228:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen (arg) >= 2)
data/freeipmi-1.6.4/ipmi-pet/ipmi-pet.c:1689:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen (token) >= 2)
data/freeipmi-1.6.4/ipmi-raw/ipmi-raw-argp.c:133:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen (arg) >= 2)
data/freeipmi-1.6.4/ipmi-raw/ipmi-raw.c:149:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (delimbytes >= strlen (line))
data/freeipmi-1.6.4/ipmi-raw/ipmi-raw.c:155:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (!(*buf = calloc ((strlen (line) - delimbytes), 1)))
data/freeipmi-1.6.4/ipmi-raw/ipmi-raw.c:177:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      l = strlen (token);
data/freeipmi-1.6.4/ipmi-raw/ipmi-raw.c:192:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              l = strlen (token);
data/freeipmi-1.6.4/ipmi-sel/ipmi-sel-argp.c:682:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy (cmd_args->sensor_types[i],
data/freeipmi-1.6.4/ipmi-sel/ipmi-sel-argp.c:695:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy (cmd_args->exclude_sensor_types[i],
data/freeipmi-1.6.4/ipmi-sel/ipmi-sel.c:1012:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen (outbuf);
data/freeipmi-1.6.4/ipmi-sel/ipmi-sel.c:1825:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          if (state_data->column_width.sensor_type >= (strlen (ipmi_sensor_types[IPMI_SENSOR_TYPE_SYSTEM_FIRMWARE_PROGRESS]) - 2))
data/freeipmi-1.6.4/ipmi-sel/ipmi-sel.c:1827:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              if (state_data->column_width.sensor_type < strlen (ipmi_sensor_types[IPMI_SENSOR_TYPE_SYSTEM_FIRMWARE_PROGRESS]))
data/freeipmi-1.6.4/ipmi-sel/ipmi-sel.c:1828:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                state_data->column_width.sensor_type = strlen (ipmi_sensor_types[IPMI_SENSOR_TYPE_SYSTEM_FIRMWARE_PROGRESS]);
data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-argp.c:245:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy (cmd_args->sensor_types[cmd_args->sensor_types_length],
data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-argp.c:389:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy (cmd_args->sensor_types[i],
data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-argp.c:402:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy (cmd_args->exclude_sensor_types[i],
data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-output-common.c:66:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len = strlen (prefix);
data/freeipmi-1.6.4/ipmi-sensors/ipmi-sensors-output-common.c:71:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        strcat (spcbuf, " ");
data/freeipmi-1.6.4/ipmiconsole/ipmiconsole.c:455:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
          if ((n = read (STDIN_FILENO, buf, IPMICONSOLE_BUFLEN)) < 0)
data/freeipmi-1.6.4/ipmiconsole/ipmiconsole.c:474:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
          if ((n = read (fd, buf, IPMICONSOLE_BUFLEN)) < 0)
data/freeipmi-1.6.4/ipmipower/ipmipower_check.c:140:79:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                                                   password ? strlen (password) : 0)) < 0)
data/freeipmi-1.6.4/ipmipower/ipmipower_check.c:174:83:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                                                       password ? strlen (password) : 0)) < 0)
data/freeipmi-1.6.4/ipmipower/ipmipower_check.c:200:86:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                                                        (password) ? strlen (password) : 0,
data/freeipmi-1.6.4/ipmipower/ipmipower_check.c:837:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      username_len = (username) ? strlen (username) : 0;
data/freeipmi-1.6.4/ipmipower/ipmipower_check.c:906:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  password_len = (password) ? strlen (password) : 0;
data/freeipmi-1.6.4/ipmipower/ipmipower_connection.c:288:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy (ic->hostname, hostname_second_parse_ptr, MAXHOSTNAMELEN);
data/freeipmi-1.6.4/ipmipower/ipmipower_error.h:83:13:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
            strncat (__err, __str, IPMIPOWER_ERROR_BUFLEN - __len);             \
data/freeipmi-1.6.4/ipmipower/ipmipower_error.h:108:17:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
                strncat (__err, __str, IPMIPOWER_ERROR_BUFLEN - __len);         \
data/freeipmi-1.6.4/ipmipower/ipmipower_packet.c:656:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        username_len = (username) ? strlen (username) : 0;
data/freeipmi-1.6.4/ipmipower/ipmipower_packet.c:975:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      password_len = (password) ? strlen (password) : 0;
data/freeipmi-1.6.4/ipmipower/ipmipower_packet.c:1191:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                  (password) ? strlen (password) : 0,
data/freeipmi-1.6.4/ipmipower/ipmipower_packet.c:1207:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                  (password) ? strlen (password) : 0,
data/freeipmi-1.6.4/ipmipower/ipmipower_powercmd.c:1798:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      username_len = (username) ? strlen (username) : 0;
data/freeipmi-1.6.4/ipmipower/ipmipower_powercmd.c:1802:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  password_len = (password) ? strlen (password) : 0;
data/freeipmi-1.6.4/ipmipower/ipmipower_prompt.c:174:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      || (argv[1] && strlen (argv[1]) <= IPMI_MAX_USER_NAME_LENGTH))
data/freeipmi-1.6.4/ipmipower/ipmipower_prompt.c:208:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    && strlen (argv[1]) <= IPMI_2_0_MAX_PASSWORD_LENGTH)
data/freeipmi-1.6.4/ipmipower/ipmipower_prompt.c:210:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                       && strlen (argv[1]) <= IPMI_1_5_MAX_PASSWORD_LENGTH))))
data/freeipmi-1.6.4/ipmipower/ipmipower_prompt.c:721:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        strcat (strbuf, ",");
data/freeipmi-1.6.4/ipmipower/ipmipower_prompt.c:1243:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen (buf) > 0)
data/freeipmi-1.6.4/ipmipower/ipmipower_prompt.c:1425:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              memset (argv[i], '\0', strlen (argv[i]));
data/freeipmi-1.6.4/ipmipower/ipmipower_prompt.c:1431:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    } while (!quit && strlen (buf) > 0);
data/freeipmi-1.6.4/ipmiseld/ipmiseld-argp.c:378:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy (cmd_args->sensor_types[i],
data/freeipmi-1.6.4/ipmiseld/ipmiseld-argp.c:391:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy (cmd_args->exclude_sensor_types[i],
data/freeipmi-1.6.4/ipmiseld/ipmiseld-cache.c:99:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert (filename && strlen (filename));
data/freeipmi-1.6.4/ipmiseld/ipmiseld-cache.c:246:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen (filename))
data/freeipmi-1.6.4/ipmiseld/ipmiseld-debug.h:64:13:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
            strncat (__err, __str, IPMISELD_DEBUG_BUFFER_LEN - __len); \
data/freeipmi-1.6.4/ipmiseld/ipmiseld-debug.h:87:13:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
            strncat (__err, __str, IPMISELD_DEBUG_BUFFER_LEN - __len); \
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-api.c:412:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy (ctx->io.outofband.hostname,
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-api.c:502:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      || (username && strlen (username) > IPMI_MAX_USER_NAME_LENGTH)
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-api.c:503:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      || (password && strlen (password) > IPMI_1_5_MAX_PASSWORD_LENGTH)
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-api.c:530:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            strlen (username));
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-api.c:535:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            strlen (password));
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-api.c:646:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      || (username && strlen (username) > IPMI_MAX_USER_NAME_LENGTH)
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-api.c:647:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      || (password && strlen (password) > IPMI_2_0_MAX_PASSWORD_LENGTH)
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-api.c:684:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            strlen (username));
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-api.c:690:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            strlen (password));
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-api.c:914:15:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
              strncpy (locate_info.driver_device, driver_device, IPMI_LOCATE_PATH_MAX);
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-api.c:932:15:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
              strncpy (locate_info.driver_device,
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-api.c:1040:15:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
              strncpy (locate_info.driver_device, driver_device, IPMI_LOCATE_PATH_MAX);
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-api.c:1058:15:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
              strncpy (locate_info.driver_device,
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-kcs-driver-api.c:648:15:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
              usleep (IPMI_KCS_IPMB_REREAD_WAIT);
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-lan-interface-api.c:288:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                   strlen (ctx->io.outofband.password) ? ctx->io.outofband.password : NULL,
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-lan-interface-api.c:289:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                   strlen (ctx->io.outofband.password),
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-lan-session-common.c:1583:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          && strlen (ctx->io.outofband.username) <= IPMI_MAX_USER_NAME_LENGTH
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-lan-session-common.c:1584:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          && strlen (ctx->io.outofband.password) <= IPMI_1_5_MAX_PASSWORD_LENGTH
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-lan-session-common.c:1649:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen (ctx->io.outofband.username))
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-lan-session-common.c:1652:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen (ctx->io.outofband.password))
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-lan-session-common.c:3329:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                                         strlen (ctx->io.outofband.password) ? ctx->io.outofband.password : NULL,
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-lan-session-common.c:3330:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                                         strlen (ctx->io.outofband.password),
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-lan-session-common.c:3400:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          && strlen (ctx->io.outofband.username) <= IPMI_MAX_USER_NAME_LENGTH
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-lan-session-common.c:3401:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          && strlen (ctx->io.outofband.password) <= IPMI_2_0_MAX_PASSWORD_LENGTH
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-lan-session-common.c:3486:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen (ctx->io.outofband.username))
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-lan-session-common.c:3489:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen (ctx->io.outofband.password))
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-lan-session-common.c:3753:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen (ctx->io.outofband.username))
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-lan-session-common.c:3760:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen (ctx->io.outofband.username))
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-lan-session-common.c:3764:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      username_len = (username) ? strlen (username) : 0;
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-lan-session-common.c:3856:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen (ctx->io.outofband.password))
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-lan-session-common.c:3860:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  password_len = (password) ? strlen (password) : 0;
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-lan-session-common.c:4062:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen (ctx->io.outofband.username))
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-lan-session-common.c:4066:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      username_len = (username) ? strlen (username) : 0;
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-lan-session-common.c:4354:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                               strlen (ctx->io.outofband.password) ? ctx->io.outofband.password : NULL,
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-lan-session-common.c:4355:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                               strlen (ctx->io.outofband.password),
data/freeipmi-1.6.4/libfreeipmi/api/ipmi-ssif-driver-api.c:653:15:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
              usleep (IPMI_SSIF_IPMB_REREAD_WAIT);
data/freeipmi-1.6.4/libfreeipmi/cmds/ipmi-lan-cmds.c:1912:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy (buf, community_string, IPMI_MAX_COMMUNITY_STRING_LENGTH);
data/freeipmi-1.6.4/libfreeipmi/cmds/ipmi-messaging-support-cmds.c:1939:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy (buf, user_name, IPMI_MAX_USER_NAME_LENGTH);
data/freeipmi-1.6.4/libfreeipmi/cmds/ipmi-messaging-support-cmds.c:2310:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy (buf, user_name, IPMI_MAX_USER_NAME_LENGTH);
data/freeipmi-1.6.4/libfreeipmi/cmds/ipmi-messaging-support-cmds.c:2396:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy (buf, password, buf_max_len);
data/freeipmi-1.6.4/libfreeipmi/debug/ipmi-debug-common.c:99:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy (buf, prefix, buflen);
data/freeipmi-1.6.4/libfreeipmi/driver/ipmi-kcs-driver.c:632:5:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
    usleep (ctx->poll_interval);
data/freeipmi-1.6.4/libfreeipmi/driver/ipmi-semaphores.c:145:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
  usleep (1);
data/freeipmi-1.6.4/libfreeipmi/fiid/fiid.c:119:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len = strlen (tmpl[i].key);
data/freeipmi-1.6.4/libfreeipmi/fiid/fiid.c:1002:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy (obj->field_data[i].key, tmpl[i].key, FIID_FIELD_MAX_KEY_LEN);
data/freeipmi-1.6.4/libfreeipmi/locate/ipmi-locate-acpi-spmi.c:859:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                   strlen (IPMI_ACPI_RSDP_SIG)) != 0)
data/freeipmi-1.6.4/libfreeipmi/locate/ipmi-locate-acpi-spmi.c:957:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                         strlen (IPMI_ACPI_RSDP_SIG)))
data/freeipmi-1.6.4/libfreeipmi/locate/ipmi-locate-acpi-spmi.c:1185:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  sysfs_path_length = strlen (sysfs_fw_acpi_tables) + strlen(signature) + \
data/freeipmi-1.6.4/libfreeipmi/locate/ipmi-locate-acpi-spmi.c:1185:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  sysfs_path_length = strlen (sysfs_fw_acpi_tables) + strlen(signature) + \
data/freeipmi-1.6.4/libfreeipmi/locate/ipmi-locate-acpi-spmi.c:1226:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if ((read (sysfs_acpi_fd, acpi_table_buf, *acpi_table_length)) !=
data/freeipmi-1.6.4/libfreeipmi/locate/ipmi-locate-acpi-spmi.c:1656:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy (linfo.driver_device, IPMI_DEFAULT_I2C_DEVICE, IPMI_LOCATE_PATH_MAX);
data/freeipmi-1.6.4/libfreeipmi/locate/ipmi-locate-defaults.c:71:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy (linfo.driver_device, IPMI_DEFAULT_I2C_DEVICE, IPMI_LOCATE_PATH_MAX);
data/freeipmi-1.6.4/libfreeipmi/locate/ipmi-locate-dmidecode.c:133:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if ((r = read (fd, buf + r2, count - r2)) < 0)
data/freeipmi-1.6.4/libfreeipmi/locate/ipmi-locate-dmidecode.c:311:15:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
              strncpy (locate_info->driver_device, IPMI_DEFAULT_I2C_DEVICE, IPMI_LOCATE_PATH_MAX);
data/freeipmi-1.6.4/libfreeipmi/locate/ipmi-locate-dmidecode.c:502:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          char *addr =  memchr (linebuf, '=', strlen (linebuf));
data/freeipmi-1.6.4/libfreeipmi/locate/ipmi-locate-pci.c:216:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy (linfo.driver_device, IPMI_DEFAULT_I2C_DEVICE, IPMI_LOCATE_PATH_MAX);
data/freeipmi-1.6.4/libfreeipmi/locate/ipmi-locate-smbios.c:465:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy (linfo.driver_device, IPMI_DEFAULT_I2C_DEVICE, IPMI_LOCATE_PATH_MAX);
data/freeipmi-1.6.4/libfreeipmi/sdr/ipmi-sdr-cache-create.c:806:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      || (strlen (filename) > MAXPATHLEN)
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-dell-poweredge.c:2273:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                               strlen (data2_number_str) ? " " : "",
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-dell-poweredge.c:2276:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                               strlen (data3_number_str) ? " " : "",
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-fujitsu-irmc-common.c:228:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      component_length = strlen ((char *)bytes_rs + 16);
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-fujitsu-irmc-common.c:301:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen (string_buf) > buflen)
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-fujitsu-irmc-common.c:307:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  memcpy (buf, string_buf, strlen (string_buf));
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-fujitsu-irmc-common.c:427:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen (selbuf))
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-fujitsu-irmc-common.c:493:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen (selbuf))
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-fujitsu-irmc-common.c:555:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen (selbuf))
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string-intel-e52600v3-common.c:1400:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (!strlen (cpu_str))
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string.c:138:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen (buf) > 0)
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string.c:2096:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((strlen (tmpbufdata2)
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string.c:2098:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      && (strlen (tmpbufdata3)
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string.c:2110:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  else if (strlen (tmpbufdata2)
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string.c:2120:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  else if (strlen (tmpbufdata3)
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string.c:2404:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((strlen (tmpbufeventdata1)
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string.c:2406:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      && (strlen (tmpbufeventdata23)
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string.c:2418:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  else if (strlen (tmpbufeventdata1)
data/freeipmi-1.6.4/libfreeipmi/sel/ipmi-sel-string.c:2428:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  else if (strlen (tmpbufeventdata23)
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-sensor-and-event-code-tables-util.c:228:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len_temp = strlen (ipmi_sensor_type_system_event_event_data2_offset_pef_action[index]);
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-sensor-and-event-code-tables-util.c:230:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len_temp += strlen (_ipmi_event_message_separator);
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-sensor-and-event-code-tables-util.c:945:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        ((str1 && str2 && strlen (str2)) ? _ipmi_event_message_separator : ""),
data/freeipmi-1.6.4/libfreeipmi/util/ipmi-util.c:196:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if ((len = read (fd, buf, buflen)) < 0)
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole.c:175:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen (data->string) > IPMI_MAX_USER_NAME_LENGTH)
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole.c:199:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen (data->string) > IPMI_2_0_MAX_PASSWORD_LENGTH)
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole.c:1015:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if ((len = read (c->blocking.blocking_notification[0], (void *)&tmpbyte, 1)) < 0)
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole.c:1175:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      || (ipmi_config->username && strlen (ipmi_config->username) > IPMI_MAX_USER_NAME_LENGTH)
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole.c:1176:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      || (ipmi_config->password && strlen (ipmi_config->password) > IPMI_2_0_MAX_PASSWORD_LENGTH)
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole.c:1607:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen (username) > IPMI_MAX_USER_NAME_LENGTH)
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole.c:1619:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen (password) > IPMI_2_0_MAX_PASSWORD_LENGTH)
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_checks.c:119:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen (c->config.password))
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_checks.c:130:82:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                                                    (password) ? strlen (password) : 0,
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_checks.c:645:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen (c->config.username))
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_checks.c:652:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen (c->config.username))
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_checks.c:656:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      username_len = (username) ? strlen (username) : 0;
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_checks.c:722:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen (c->config.password))
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_checks.c:726:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  password_len = (password) ? strlen (password) : 0;
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_debug.h:57:13:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
            strncat (__err, __str, IPMICONSOLE_DEBUG_ERROR_BUFLEN - __len);     \
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_debug.h:84:13:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
            strncat (__err, __str, IPMICONSOLE_DEBUG_ERROR_BUFLEN - __len);     \
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_engine.c:716:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if ((len = read (c->connection.asynccomm[0], (void *)&tmpbyte, 1)) < 0)
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_engine.c:772:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if ((len = read (c->connection.ipmiconsole_fd,
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_engine.c:1200:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
          if (read (console_engine_ctxs_notifier[index][0], buf, IPMICONSOLE_PIPE_BUFLEN) < 0)
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_engine.c:1221:11:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
          usleep (IPMICONSOLE_SPIN_WAIT_TIME);
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_engine.c:1487:7:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
      usleep (IPMICONSOLE_SPIN_WAIT_TIME);
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_packet.c:791:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen (c->config.username))
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_packet.c:798:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen (c->config.username))
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_packet.c:802:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      username_len = (username) ? strlen (username) : 0;
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_packet.c:810:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen (c->config.password))
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_packet.c:816:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  password_len = (password) ? strlen (password) : 0;
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_packet.c:1328:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen (c->config.password))
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_packet.c:1396:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                            (password) ? strlen (password) : 0,
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_processing.c:1957:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen (c->config.username))
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_processing.c:1960:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen (c->config.password))
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_processing.c:2032:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen (c->config.username))
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_processing.c:2039:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen (c->config.username))
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_processing.c:2043:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      username_len = (username) ? strlen (username) : 0;
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_processing.c:2046:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen (c->config.password))
data/freeipmi-1.6.4/libipmiconsole/ipmiconsole_processing.c:2051:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  password_len = (password) ? strlen (password) : 0;
data/freeipmi-1.6.4/libipmiconsole/scbuf.c:865:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = ncopy = strlen (srscbuf);
data/freeipmi-1.6.4/libipmiconsole/scbuf.c:1307:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        n = read (*psrcfd, dstbuf, len);
data/freeipmi-1.6.4/libipmidetect/ipmidetect.c:288:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen (data->stringlist[i]) > IPMIDETECT_MAXHOSTNAMELEN)
data/freeipmi-1.6.4/libipmidetect/ipmidetect.c:659:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          if (strlen (conffile_config.hostnames[i]) > 0)
data/freeipmi-1.6.4/libipmimonitoring/ipmi_monitoring.c:399:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (!dir || (strlen (dir) > MAXPATHLEN))
data/freeipmi-1.6.4/libipmimonitoring/ipmi_monitoring.c:414:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy (c->sdr_cache_directory, dir, MAXPATHLEN);
data/freeipmi-1.6.4/libipmimonitoring/ipmi_monitoring.c:451:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy (c->sdr_cache_filename_format, format, MAXPATHLEN);
data/freeipmi-1.6.4/libipmimonitoring/ipmi_monitoring_debug.h:52:13:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
            strncat (__err, __str, IPMI_MONITORING_DEBUG_ERROR_BUFLEN - __len);     \
data/freeipmi-1.6.4/libipmimonitoring/ipmi_monitoring_sdr_cache.c:147:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  if ((index + strlen (local_hostname)) >= MAXPATHLEN)
data/freeipmi-1.6.4/libipmimonitoring/ipmi_monitoring_sdr_cache.c:155:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  index += strlen (local_hostname);
data/freeipmi-1.6.4/libipmimonitoring/ipmi_monitoring_sdr_cache.c:159:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  if ((index + strlen (hostname)) >= MAXPATHLEN)
data/freeipmi-1.6.4/libipmimonitoring/ipmi_monitoring_sdr_cache.c:166:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  index += strlen (hostname);
data/freeipmi-1.6.4/libipmimonitoring/ipmi_monitoring_sdr_cache.c:212:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert (filename && strlen (filename));
data/freeipmi-1.6.4/libipmimonitoring/ipmi_monitoring_sdr_cache.c:344:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen (filename))
data/freeipmi-1.6.4/libipmimonitoring/ipmi_monitoring_sensor_reading.c:151:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy (s->sensor_name, sensor_name, IPMI_MONITORING_MAX_SENSOR_NAME_LENGTH);
data/freeipmi-1.6.4/libipmimonitoring/ipmi_monitoring_sensor_reading.c:222:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy (s->sensor_name, sensor_name, IPMI_MONITORING_MAX_SENSOR_NAME_LENGTH);

ANALYSIS SUMMARY:

Hits = 1576
Lines analyzed = 403028 in approximately 9.54 seconds (42234 lines/second)
Physical Source Lines of Code (SLOC) = 318520
Hits@level = [0] 1347 [1] 418 [2] 1009 [3]   6 [4] 143 [5]   0
Hits@level+ = [0+] 2923 [1+] 1576 [2+] 1158 [3+] 149 [4+] 143 [5+]   0
Hits/KSLOC@level+ = [0+] 9.17682 [1+] 4.94788 [2+] 3.63556 [3+] 0.467789 [4+] 0.448951 [5+]   0
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.