Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/gdal-3.2.0+dfsg/swig/perl/gdal_wrap.cpp
Examining data/gdal-3.2.0+dfsg/swig/perl/gnm_wrap.cpp
Examining data/gdal-3.2.0+dfsg/swig/perl/ogr_wrap.cpp
Examining data/gdal-3.2.0+dfsg/swig/perl/osr_wrap.cpp
Examining data/gdal-3.2.0+dfsg/swig/perl/gdalconst_wrap.c
Examining data/gdal-3.2.0+dfsg/swig/python/extensions/gdal_wrap.cpp
Examining data/gdal-3.2.0+dfsg/swig/python/extensions/gnm_wrap.cpp
Examining data/gdal-3.2.0+dfsg/swig/python/extensions/ogr_wrap.cpp
Examining data/gdal-3.2.0+dfsg/swig/python/extensions/gdal_array_wrap.cpp
Examining data/gdal-3.2.0+dfsg/swig/python/extensions/osr_wrap.cpp
Examining data/gdal-3.2.0+dfsg/swig/python/extensions/gdalconst_wrap.c
Examining data/gdal-3.2.0+dfsg/swig/java/add_javadoc.c
Examining data/gdal-3.2.0+dfsg/port/cpl_vsil_curl_priv.h
Examining data/gdal-3.2.0+dfsg/port/cpl_hash_set.h
Examining data/gdal-3.2.0+dfsg/port/cpl_minizip_zip.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_error.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_vsil_hdfs.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_vax.h
Examining data/gdal-3.2.0+dfsg/port/cpl_google_cloud.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_google_cloud.h
Examining data/gdal-3.2.0+dfsg/port/cpl_minixml.h
Examining data/gdal-3.2.0+dfsg/port/cplgetsymbol.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_error.h
Examining data/gdal-3.2.0+dfsg/port/cpl_path.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_json.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_csv.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_spawn.h
Examining data/gdal-3.2.0+dfsg/port/cpl_vax.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_vsil_cache.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_recode_stub.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_error_internal.h
Examining data/gdal-3.2.0+dfsg/port/cpl_recode_iconv.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_cpu_features.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_vsil_curl.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_userfaultfd.h
Examining data/gdal-3.2.0+dfsg/port/cpl_swift.h
Examining data/gdal-3.2.0+dfsg/port/cpl_progress.h
Examining data/gdal-3.2.0+dfsg/port/cpl_list.h
Examining data/gdal-3.2.0+dfsg/port/cpl_worker_thread_pool.h
Examining data/gdal-3.2.0+dfsg/port/cpl_vsil_stdin.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_vsi.h
Examining data/gdal-3.2.0+dfsg/port/xmlreformat.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_vsi_virtual.h
Examining data/gdal-3.2.0+dfsg/port/cpl_string.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_vsil_webhdfs.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_recode.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_getexecpath.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_vsil_stdout.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_odbc.h
Examining data/gdal-3.2.0+dfsg/port/cpl_worker_thread_pool.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_vsil_abstract_archive.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_json_streaming_parser.h
Examining data/gdal-3.2.0+dfsg/port/cpl_multiproc.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_multiproc.h
Examining data/gdal-3.2.0+dfsg/port/cpl_azure.h
Examining data/gdal-3.2.0+dfsg/port/cpl_base64.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_vsil_uploadonclose.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_vsil_subfile.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_vsi_mem.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_minizip_ioapi.h
Examining data/gdal-3.2.0+dfsg/port/cpl_aws_win32.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_json_streaming_writer.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_virtualmem.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_minizip_zip.h
Examining data/gdal-3.2.0+dfsg/port/cpl_vsil_buffered_reader.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_sha256.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_vsil_s3.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_time.h
Examining data/gdal-3.2.0+dfsg/port/cplstringlist.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_vsil_az.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_json_header.h
Examining data/gdal-3.2.0+dfsg/port/cpl_quad_tree.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_userfaultfd.cpp
Examining data/gdal-3.2.0+dfsg/port/gdal_csv.h
Examining data/gdal-3.2.0+dfsg/port/cpl_md5.h
Examining data/gdal-3.2.0+dfsg/port/cpl_vsil_gs.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_alibaba_oss.h
Examining data/gdal-3.2.0+dfsg/port/cpl_config_extras.h
Examining data/gdal-3.2.0+dfsg/port/cpl_aws.h
Examining data/gdal-3.2.0+dfsg/port/cplkeywordparser.h
Examining data/gdal-3.2.0+dfsg/port/cplkeywordparser.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_safemaths.hpp
Examining data/gdal-3.2.0+dfsg/port/cpl_minizip_ioapi.cpp
Examining data/gdal-3.2.0+dfsg/port/vsipreload.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_list.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_atomic_ops.h
Examining data/gdal-3.2.0+dfsg/port/cpl_hash_set.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_auto_close.h
Examining data/gdal-3.2.0+dfsg/port/cpl_vsil_sparsefile.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_minizip_unzip.h
Examining data/gdal-3.2.0+dfsg/port/cpl_mem_cache.h
Examining data/gdal-3.2.0+dfsg/port/cpl_vsil_curl_class.h
Examining data/gdal-3.2.0+dfsg/port/cpl_conv.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_vsil_plugin.h
Examining data/gdal-3.2.0+dfsg/port/cpl_vsil_tar.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_vsil_win32.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_alibaba_oss.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_vsil_crypt.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_findfile.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_cpu_features.h
Examining data/gdal-3.2.0+dfsg/port/cpl_http.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_odbc.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_atomic_ops.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_vsisimple.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_quad_tree.h
Examining data/gdal-3.2.0+dfsg/port/cpl_xml_validate.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_csv.h
Examining data/gdal-3.2.0+dfsg/port/cplstring.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_vsil_plugin.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_aws.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_strtod.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_azure.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_vsil.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_string.h
Examining data/gdal-3.2.0+dfsg/port/cpl_port.h
Examining data/gdal-3.2.0+dfsg/port/cpl_virtualmem.h
Examining data/gdal-3.2.0+dfsg/port/cpl_sha1.h
Examining data/gdal-3.2.0+dfsg/port/cpl_sha1.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_json_streaming_writer.h
Examining data/gdal-3.2.0+dfsg/port/cpl_md5.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_minixml.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_vsil_simple.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_vsi_error.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_vsil_gzip.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_http.h
Examining data/gdal-3.2.0+dfsg/port/cpl_spawn.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_vsi_error.h
Examining data/gdal-3.2.0+dfsg/port/cpl_json.h
Examining data/gdal-3.2.0+dfsg/port/cpl_conv.h
Examining data/gdal-3.2.0+dfsg/port/cpl_google_oauth2.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_swift.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_vsil_unix_stdio_64.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_vsil_oss.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_time.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_sha256.h
Examining data/gdal-3.2.0+dfsg/port/cpl_json_streaming_parser.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_vsil_swift.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_vsil_curl_streaming.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_progress.cpp
Examining data/gdal-3.2.0+dfsg/port/cpl_minizip_unzip.cpp
Examining data/gdal-3.2.0+dfsg/frmts/aaigrid/aaigriddataset.h
Examining data/gdal-3.2.0+dfsg/frmts/aaigrid/aaigriddataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/mrsid_lidar/gdal_MG4Lidar.cpp
Examining data/gdal-3.2.0+dfsg/frmts/mrsid_lidar/mg4lidar_headers.h
Examining data/gdal-3.2.0+dfsg/frmts/srtmhgt/srtmhgtdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/leveller/levellerdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/ceos2/ceos.h
Examining data/gdal-3.2.0+dfsg/frmts/ceos2/ceossar.c
Examining data/gdal-3.2.0+dfsg/frmts/ceos2/sar_ceosdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/ceos2/link.c
Examining data/gdal-3.2.0+dfsg/frmts/ceos2/ceosrecipe.c
Examining data/gdal-3.2.0+dfsg/frmts/ceos2/ceos.c
Examining data/gdal-3.2.0+dfsg/frmts/ignfheightasciigrid/ignfheightasciigrid.cpp
Examining data/gdal-3.2.0+dfsg/frmts/mem/memdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/mem/memdataset.h
Examining data/gdal-3.2.0+dfsg/frmts/cosar/cosar_dataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/northwood/northwood.h
Examining data/gdal-3.2.0+dfsg/frmts/northwood/grddataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/northwood/grcdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/northwood/northwood.cpp
Examining data/gdal-3.2.0+dfsg/frmts/jp2kak/jp2kak_headers.h
Examining data/gdal-3.2.0+dfsg/frmts/jp2kak/jp2kakdataset.h
Examining data/gdal-3.2.0+dfsg/frmts/jp2kak/subfile_source.h
Examining data/gdal-3.2.0+dfsg/frmts/jp2kak/jp2kakdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/jp2kak/vsil_target.h
Examining data/gdal-3.2.0+dfsg/frmts/rasterlite/rasterlitecreatecopy.cpp
Examining data/gdal-3.2.0+dfsg/frmts/rasterlite/rasterliteoverviews.cpp
Examining data/gdal-3.2.0+dfsg/frmts/rasterlite/rasterlitedataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/rasterlite/rasterlitedataset.h
Examining data/gdal-3.2.0+dfsg/frmts/e00grid/e00read.c
Examining data/gdal-3.2.0+dfsg/frmts/e00grid/e00griddataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/e00grid/e00compr.h
Examining data/gdal-3.2.0+dfsg/frmts/terragen/terragendataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/png/pngdataset.h
Examining data/gdal-3.2.0+dfsg/frmts/png/libpng/pngrtran.c
Examining data/gdal-3.2.0+dfsg/frmts/png/libpng/pngmem.c
Examining data/gdal-3.2.0+dfsg/frmts/png/libpng/pngset.c
Examining data/gdal-3.2.0+dfsg/frmts/png/libpng/pnginfo.h
Examining data/gdal-3.2.0+dfsg/frmts/png/libpng/pngrio.c
Examining data/gdal-3.2.0+dfsg/frmts/png/libpng/pngdebug.h
Examining data/gdal-3.2.0+dfsg/frmts/png/libpng/pngget.c
Examining data/gdal-3.2.0+dfsg/frmts/png/libpng/pngtrans.c
Examining data/gdal-3.2.0+dfsg/frmts/png/libpng/pngrutil.c
Examining data/gdal-3.2.0+dfsg/frmts/png/libpng/pngerror.c
Examining data/gdal-3.2.0+dfsg/frmts/png/libpng/pngwio.c
Examining data/gdal-3.2.0+dfsg/frmts/png/libpng/pngpriv.h
Examining data/gdal-3.2.0+dfsg/frmts/png/libpng/pngstruct.h
Examining data/gdal-3.2.0+dfsg/frmts/png/libpng/png.h
Examining data/gdal-3.2.0+dfsg/frmts/png/libpng/png.c
Examining data/gdal-3.2.0+dfsg/frmts/png/libpng/pngwrite.c
Examining data/gdal-3.2.0+dfsg/frmts/png/libpng/pngpread.c
Examining data/gdal-3.2.0+dfsg/frmts/png/libpng/pnglibconf.h
Examining data/gdal-3.2.0+dfsg/frmts/png/libpng/pngwutil.c
Examining data/gdal-3.2.0+dfsg/frmts/png/libpng/pngread.c
Examining data/gdal-3.2.0+dfsg/frmts/png/libpng/pngconf.h
Examining data/gdal-3.2.0+dfsg/frmts/png/libpng/pngwtran.c
Examining data/gdal-3.2.0+dfsg/frmts/png/pngdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/coasp/coasp_dataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/nitf/mgrs.h
Examining data/gdal-3.2.0+dfsg/frmts/nitf/nitfdataset.h
Examining data/gdal-3.2.0+dfsg/frmts/nitf/nitfimage.c
Examining data/gdal-3.2.0+dfsg/frmts/nitf/ecrgtocdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/nitf/rpftoclib.h
Examining data/gdal-3.2.0+dfsg/frmts/nitf/rpftocfile.cpp
Examining data/gdal-3.2.0+dfsg/frmts/nitf/nitf_gcprpc.cpp
Examining data/gdal-3.2.0+dfsg/frmts/nitf/rpftocdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/nitf/mgrs.c
Examining data/gdal-3.2.0+dfsg/frmts/nitf/nitfrasterband.cpp
Examining data/gdal-3.2.0+dfsg/frmts/nitf/nitfbilevel.cpp
Examining data/gdal-3.2.0+dfsg/frmts/nitf/nitfwritejpeg_12.cpp
Examining data/gdal-3.2.0+dfsg/frmts/nitf/nitflib.h
Examining data/gdal-3.2.0+dfsg/frmts/nitf/nitffile.c
Examining data/gdal-3.2.0+dfsg/frmts/nitf/nitfaridpcm.cpp
Examining data/gdal-3.2.0+dfsg/frmts/nitf/nitfdump.c
Examining data/gdal-3.2.0+dfsg/frmts/nitf/nitfwritejpeg.cpp
Examining data/gdal-3.2.0+dfsg/frmts/nitf/nitfdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/nitf/nitfdes.c
Examining data/gdal-3.2.0+dfsg/frmts/envisat/dumpgeo.c
Examining data/gdal-3.2.0+dfsg/frmts/envisat/envisat_dump.c
Examining data/gdal-3.2.0+dfsg/frmts/envisat/envisatdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/envisat/EnvisatFile.c
Examining data/gdal-3.2.0+dfsg/frmts/envisat/adsrange.cpp
Examining data/gdal-3.2.0+dfsg/frmts/envisat/timedelta.hpp
Examining data/gdal-3.2.0+dfsg/frmts/envisat/adsrange.hpp
Examining data/gdal-3.2.0+dfsg/frmts/envisat/records.h
Examining data/gdal-3.2.0+dfsg/frmts/envisat/unwrapgcps.cpp
Examining data/gdal-3.2.0+dfsg/frmts/envisat/EnvisatFile.h
Examining data/gdal-3.2.0+dfsg/frmts/envisat/records.c
Examining data/gdal-3.2.0+dfsg/frmts/wms/wmsdriver.cpp
Examining data/gdal-3.2.0+dfsg/frmts/wms/gdalhttp.h
Examining data/gdal-3.2.0+dfsg/frmts/wms/minidriver_tms.h
Examining data/gdal-3.2.0+dfsg/frmts/wms/minidriver_arcgis_server.h
Examining data/gdal-3.2.0+dfsg/frmts/wms/gdalwmscache.cpp
Examining data/gdal-3.2.0+dfsg/frmts/wms/gdalhttp.cpp
Examining data/gdal-3.2.0+dfsg/frmts/wms/minidriver_mrf.h
Examining data/gdal-3.2.0+dfsg/frmts/wms/minidriver_tileservice.cpp
Examining data/gdal-3.2.0+dfsg/frmts/wms/gdalwmsrasterband.cpp
Examining data/gdal-3.2.0+dfsg/frmts/wms/minidriver_tiled_wms.cpp
Examining data/gdal-3.2.0+dfsg/frmts/wms/minidriver_ogcapicoverage.h
Examining data/gdal-3.2.0+dfsg/frmts/wms/minidriver_tiled_wms.h
Examining data/gdal-3.2.0+dfsg/frmts/wms/wmsdriver.h
Examining data/gdal-3.2.0+dfsg/frmts/wms/minidriver_ogcapicoverage.cpp
Examining data/gdal-3.2.0+dfsg/frmts/wms/minidriver_iip.cpp
Examining data/gdal-3.2.0+dfsg/frmts/wms/minidriver_iip.h
Examining data/gdal-3.2.0+dfsg/frmts/wms/minidriver_virtualearth.h
Examining data/gdal-3.2.0+dfsg/frmts/wms/gdalwmsdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/wms/minidriver_ogcapimaps.cpp
Examining data/gdal-3.2.0+dfsg/frmts/wms/minidriver_ogcapimaps.h
Examining data/gdal-3.2.0+dfsg/frmts/wms/minidriver_worldwind.h
Examining data/gdal-3.2.0+dfsg/frmts/wms/wmsutils.cpp
Examining data/gdal-3.2.0+dfsg/frmts/wms/minidriver.cpp
Examining data/gdal-3.2.0+dfsg/frmts/wms/minidriver_arcgis_server.cpp
Examining data/gdal-3.2.0+dfsg/frmts/wms/minidriver_virtualearth.cpp
Examining data/gdal-3.2.0+dfsg/frmts/wms/wmsmetadataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/wms/minidriver_wms.h
Examining data/gdal-3.2.0+dfsg/frmts/wms/minidriver_tileservice.h
Examining data/gdal-3.2.0+dfsg/frmts/wms/minidriver_worldwind.cpp
Examining data/gdal-3.2.0+dfsg/frmts/wms/minidriver_tms.cpp
Examining data/gdal-3.2.0+dfsg/frmts/wms/wmsmetadataset.h
Examining data/gdal-3.2.0+dfsg/frmts/wms/minidriver_wms.cpp
Examining data/gdal-3.2.0+dfsg/frmts/wms/minidriver_mrf.cpp
Examining data/gdal-3.2.0+dfsg/frmts/null/nulldataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/adrg/srpdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/adrg/adrgdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/sigdem/sigdemdataset.h
Examining data/gdal-3.2.0+dfsg/frmts/sigdem/sigdemdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/safe/safedataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/gt_wkt_srs_priv.h
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/gt_jpeg_copy.cpp
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/cogdriver.h
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/tif_lerc.c
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/tifvsi.cpp
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/gt_wkt_srs.h
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/gt_wkt_srs.cpp
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/gt_jpeg_copy.h
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_aux.c
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_tile.c
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_color.c
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tiffiop.h
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tiff.h
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_swab.c
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_jpeg.c
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_lzw.c
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_zip.c
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_flush.c
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_packbits.c
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/gdal_libtiff_symbol_rename.h
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/uvcode.h
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_codec.c
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_dirwrite.c
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_luv.c
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/t4.h
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_error.c
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_compress.c
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_vsi.c
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_version.c
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_open.c
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_predict.h
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_dir.h
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_predict.c
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_next.c
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tiffvers.h
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_strip.c
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_extension.c
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_getimage.c
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_print.c
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_read.c
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_fax3.c
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_dirinfo.c
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_fax3sm.c
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_pixarlog.c
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_warning.c
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_write.c
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_thunder.c
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tiffconf.h
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_zstd.c
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_config.h
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tiffio.h
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_fax3.h
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_dir.c
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_close.c
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_webp.c
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_dumpmode.c
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_jpeg_12.c
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_ojpeg.c
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_dirread.c
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_lzma.c
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/gt_overview.h
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geotiff_proj4.c
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_tiffp.c
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/gdal_libgeotiff_symbol_rename.h
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_set.c
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geotiff.h
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_free.c
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geotiffio.h
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_trans.c
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geokeys.h
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geonames.h
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_config.h
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_print.c
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geovalues.h
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_extra.c
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_write.c
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_normalize.c
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_simpletags.h
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_new.c
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_normalize.h
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/xtiff.c
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_get.c
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/xtiffio.h
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_simpletags.c
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_names.c
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_keyp.h
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_tiffp.h
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/cpl_serv.h
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/gt_wkt_srs_for_gdal.h
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/tif_lerc.h
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/cogdriver.cpp
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/gt_citation.cpp
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/gt_citation.h
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/tif_float.h
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/tifvsi.h
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/gtiff.h
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/gt_overview.cpp
Examining data/gdal-3.2.0+dfsg/frmts/gtiff/tif_float.c
Examining data/gdal-3.2.0+dfsg/frmts/til/tildataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/kmlsuperoverlay/kmlsuperoverlaydataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/kmlsuperoverlay/kmlsuperoverlaydataset.h
Examining data/gdal-3.2.0+dfsg/frmts/vrt/pixelfunctions.cpp
Examining data/gdal-3.2.0+dfsg/frmts/vrt/vrtderivedrasterband.cpp
Examining data/gdal-3.2.0+dfsg/frmts/vrt/vrtpansharpened.cpp
Examining data/gdal-3.2.0+dfsg/frmts/vrt/vrtrawrasterband.cpp
Examining data/gdal-3.2.0+dfsg/frmts/vrt/vrtfilters.cpp
Examining data/gdal-3.2.0+dfsg/frmts/vrt/vrtwarped.cpp
Examining data/gdal-3.2.0+dfsg/frmts/vrt/vrtsources.cpp
Examining data/gdal-3.2.0+dfsg/frmts/vrt/vrtsourcedrasterband.cpp
Examining data/gdal-3.2.0+dfsg/frmts/vrt/vrtmultidim.cpp
Examining data/gdal-3.2.0+dfsg/frmts/vrt/vrtdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/vrt/vrtrasterband.cpp
Examining data/gdal-3.2.0+dfsg/frmts/vrt/gdal_vrt.h
Examining data/gdal-3.2.0+dfsg/frmts/vrt/vrtdriver.cpp
Examining data/gdal-3.2.0+dfsg/frmts/vrt/vrtdataset.h
Examining data/gdal-3.2.0+dfsg/frmts/wmts/wmtsdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/netcdf/netcdf_sentinel3_sral_mwr.cpp
Examining data/gdal-3.2.0+dfsg/frmts/netcdf/netcdflayersg.h
Examining data/gdal-3.2.0+dfsg/frmts/netcdf/netcdfvirtual.cpp
Examining data/gdal-3.2.0+dfsg/frmts/netcdf/netcdfsg.h
Examining data/gdal-3.2.0+dfsg/frmts/netcdf/netcdfsgwriterutil.h
Examining data/gdal-3.2.0+dfsg/frmts/netcdf/netcdfdataset.h
Examining data/gdal-3.2.0+dfsg/frmts/netcdf/netcdfvirtual.h
Examining data/gdal-3.2.0+dfsg/frmts/netcdf/netcdfuffd.h
Examining data/gdal-3.2.0+dfsg/frmts/netcdf/netcdfsg.cpp
Examining data/gdal-3.2.0+dfsg/frmts/netcdf/netcdfdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/netcdf/netcdflayer.cpp
Examining data/gdal-3.2.0+dfsg/frmts/netcdf/netcdfwriterconfig.cpp
Examining data/gdal-3.2.0+dfsg/frmts/netcdf/netcdflayersg.cpp
Examining data/gdal-3.2.0+dfsg/frmts/netcdf/gmtdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/netcdf/netcdfmultidim.cpp
Examining data/gdal-3.2.0+dfsg/frmts/netcdf/netcdfsgwriterutil.cpp
Examining data/gdal-3.2.0+dfsg/frmts/sgi/sgidataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/xpm/xpmdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/zlib/zlib.h
Examining data/gdal-3.2.0+dfsg/frmts/zlib/inffast.c
Examining data/gdal-3.2.0+dfsg/frmts/zlib/inflate.h
Examining data/gdal-3.2.0+dfsg/frmts/zlib/trees.c
Examining data/gdal-3.2.0+dfsg/frmts/zlib/zutil.c
Examining data/gdal-3.2.0+dfsg/frmts/zlib/compress.c
Examining data/gdal-3.2.0+dfsg/frmts/zlib/inftrees.h
Examining data/gdal-3.2.0+dfsg/frmts/zlib/deflate.c
Examining data/gdal-3.2.0+dfsg/frmts/zlib/gzio.c
Examining data/gdal-3.2.0+dfsg/frmts/zlib/deflate.h
Examining data/gdal-3.2.0+dfsg/frmts/zlib/trees.h
Examining data/gdal-3.2.0+dfsg/frmts/zlib/inffixed.h
Examining data/gdal-3.2.0+dfsg/frmts/zlib/adler32.c
Examining data/gdal-3.2.0+dfsg/frmts/zlib/crc32.c
Examining data/gdal-3.2.0+dfsg/frmts/zlib/uncompr.c
Examining data/gdal-3.2.0+dfsg/frmts/zlib/zconf.h
Examining data/gdal-3.2.0+dfsg/frmts/zlib/inflate.c
Examining data/gdal-3.2.0+dfsg/frmts/zlib/zutil.h
Examining data/gdal-3.2.0+dfsg/frmts/zlib/crc32.h
Examining data/gdal-3.2.0+dfsg/frmts/zlib/infback.c
Examining data/gdal-3.2.0+dfsg/frmts/zlib/inftrees.c
Examining data/gdal-3.2.0+dfsg/frmts/zlib/inffast.h
Examining data/gdal-3.2.0+dfsg/frmts/ers/ersdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/ers/ershdrnode.cpp
Examining data/gdal-3.2.0+dfsg/frmts/ers/ershdrnode.h
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/vsidataio.cpp
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jdsample.c
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jmemmgr.c
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jidctflt.c
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jcmaster.c
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jcsample.c
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jfdctint.c
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jmorecfg.h
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jcmarker.c
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jchuff.c
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jdhuff.c
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jdmainct.c
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jdcolor.c
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jconfig.h
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jdapimin.c
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jdcoefct.c
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jfdctfst.c
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jutils.c
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jdmerge.c
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jdmaster.c
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jfdctflt.c
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jdtrans.c
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jcprepct.c
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jchuff.h
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jcapimin.c
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jquant2.c
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jpegint.h
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jdhuff.h
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jdatadst.c
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jmemansi.c
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jidctred.c
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jcphuff.c
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jdmarker.c
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jversion.h
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jdphuff.c
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jerror.c
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jdct.h
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jdpostct.c
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jdatasrc.c
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jctrans.c
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jidctfst.c
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jcdctmgr.c
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jpeglib.h
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jccoefct.c
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jccolor.c
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jerror.h
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jidctint.c
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jddctmgr.c
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jquant1.c
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jcparam.c
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jdinput.c
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jinclude.h
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jmemsys.h
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jdapistd.c
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jcapistd.c
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jcomapi.c
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jcmainct.c
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jcinit.c
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/vsidataio_12.cpp
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/jpgdataset.h
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/jpgdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/jpgdataset_12.cpp
Examining data/gdal-3.2.0+dfsg/frmts/jpeg/vsidataio.h
Examining data/gdal-3.2.0+dfsg/frmts/ogcapi/gdalogcapidataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/prf/phprfdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/tga/tgadataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/jaxapalsar/jaxapalsardataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/ogrpcidsklayer.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/gdal_edb.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/pcidskdataset2.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/vsi_pcidsk_io.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/pcidskdataset2.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/pcidsk_airphoto.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/port/io_win32.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/port/io_stdio.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/port/win32_mutex.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/port/pthread_mutex.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/pcidsk_rpc.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/pcidsk_segment.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/pcidsk_vectorsegment.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/pcidsk_io.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/pcidsk_config.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/pcidsk_gcp.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/segment/cpcidskgeoref.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/segment/cpcidskvectorsegment.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/segment/cpcidsktoutinmodel.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/segment/sysblockmap.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/segment/metadatasegment.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/segment/toutinstructures.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/segment/cpcidsk_array.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/segment/cpcidskgeoref.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/segment/vecsegheader.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/segment/cpcidskrpcmodel.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/segment/cpcidskpct.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/segment/cpcidskads40model.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/segment/cpcidskgcp2segment.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/segment/cpcidskapmodel.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/segment/cpcidskbinarysegment.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/segment/cpcidsk_tex.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/segment/cpcidsktoutinmodel.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/segment/cpcidskgcp2segment.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/segment/vecsegheader.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/segment/metadatasegment_p.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/segment/cpcidskbitmap.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/segment/cpcidskephemerissegment.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/segment/cpcidskads40model.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/segment/cpcidsksegment.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/segment/vecsegdataindex.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/segment/cpcidsk_array.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/segment/sysblockmap.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/segment/cpcidskbinarysegment.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/segment/cpcidskvectorsegment.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/segment/cpcidsk_tex.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/segment/cpcidskbitmap.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/segment/cpcidskpolymodel.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/segment/cpcidskapmodel.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/segment/orbitstructures.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/segment/cpcidsksegment.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/segment/cpcidskvectorsegment_consistencycheck.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/segment/pcidsksegmentbuilder.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/segment/cpcidskpct.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/segment/cpcidskephemerissegment.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/segment/vecsegdataindex.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/segment/cpcidskrpcmodel.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/pcidsk_georef.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/pcidsk_types.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/pcidsk_buffer.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/pcidsk_exception.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/pcidsk_shape.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/pcidsk_gcpsegment.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/pcidsk_edb.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/pcidsk_toutin.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/pcidsk_binary.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/pcidsk_mutex.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/pcidsk_file.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/pcidsk_tex.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/pcidsk_ephemeris.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/channel/cbandinterleavedchannel.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/channel/cpixelinterleavedchannel.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/channel/cpcidskchannel.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/channel/ctiledchannel.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/channel/cpcidskchannel.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/channel/cbandinterleavedchannel.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/channel/ctiledchannel.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/channel/cexternalchannel.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/channel/cpixelinterleavedchannel.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/channel/cexternalchannel.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/pcidsk_array.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/pcidsk.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/pcidsk_poly.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/pcidsk_channel.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/pcidsk_ads40.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/pcidsk_interfaces.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/pcidsk_pct.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/core/libjpeg_io.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/core/sysvirtualfile.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/core/pcidskbuffer.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/core/clinksegment.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/core/clinksegment.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/core/pcidskopen.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/core/cpcidskfile.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/core/cpcidskfile.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/core/pcidsk_pubutils.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/core/edb_pcidsk.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/core/pcidsk_utils.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/core/pcidskinterfaces.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/core/pcidskexception.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/core/mutexholder.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/core/pcidsk_utils.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/core/metadataset_p.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/core/pcidskcreate.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/core/metadataset.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/core/sysvirtualfile.h
Examining data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/core/protectedfile.h
Examining data/gdal-3.2.0+dfsg/frmts/dods/libdap_headers.h
Examining data/gdal-3.2.0+dfsg/frmts/dods/dodsdataset2.cpp
Examining data/gdal-3.2.0+dfsg/frmts/jpipkak/jpipkakdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/jpipkak/jpipkak_headers.h
Examining data/gdal-3.2.0+dfsg/frmts/jpipkak/jpipkakdataset.h
Examining data/gdal-3.2.0+dfsg/frmts/ngsgeoid/ngsgeoiddataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/idrisi/idrisi.h
Examining data/gdal-3.2.0+dfsg/frmts/idrisi/IdrisiDataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/fits/fitsdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/pcrasterutil.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/pcrasterdataset.h
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/pcrasterutil.h
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/pcrasterrasterband.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/pcrasterdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/pcrastermisc.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/gversion.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/dumconv.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/pvalscal.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/csfsup.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/csfattr.h
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/pgisfid.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/gvartype.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/getattr.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/create2.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/rrowcol.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/attravai.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/gnrrows.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/_rputrow.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/setmv.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/putx0.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/gety0.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/gdattype.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/setangle.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/trackmm.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/_gsomece.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/moreattr.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/ggisfid.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/_getrow.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/gminval.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/gattrblk.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/pcrtypes.h
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/pmaxval.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/puty0.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/pminval.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/csfglob.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/csfimpl.h
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/file.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/strconst.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/gattridx.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/vs2.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/mperror.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/cellsize.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/putallmv.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/gmaxval.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/_putcell.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/delattr.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/csftypes.h
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/reseterr.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/mclose.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/strpad.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/swapio.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/legend.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/filename.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/vsdef.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/endian.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/putsomec.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/setvtmv.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/gvalscal.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/_getcell.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/ismv.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/rmalloc.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/gproj.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/getx0.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/ruseas.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/mopen.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/vsis.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/gcellrep.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/gnrcols.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/gputproj.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/angle.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/vsvers.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/rcoords.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/rcomp.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/kernlcsf.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/attrsize.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/rattrblk.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/wattrblk.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/putattr.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/rextend.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/csf.h
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/rdup2.c
Examining data/gdal-3.2.0+dfsg/frmts/pcraster/pcrasterrasterband.h
Examining data/gdal-3.2.0+dfsg/frmts/plmosaic/plmosaicdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/l1b/l1bdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/hfa/hfafield.cpp
Examining data/gdal-3.2.0+dfsg/frmts/hfa/hfaentry.cpp
Examining data/gdal-3.2.0+dfsg/frmts/hfa/hfaband.cpp
Examining data/gdal-3.2.0+dfsg/frmts/hfa/hfa_p.h
Examining data/gdal-3.2.0+dfsg/frmts/hfa/hfa.h
Examining data/gdal-3.2.0+dfsg/frmts/hfa/hfadataset.h
Examining data/gdal-3.2.0+dfsg/frmts/hfa/hfaopen.cpp
Examining data/gdal-3.2.0+dfsg/frmts/hfa/hfa_overviews.cpp
Examining data/gdal-3.2.0+dfsg/frmts/hfa/hfatest.cpp
Examining data/gdal-3.2.0+dfsg/frmts/hfa/hfacompress.cpp
Examining data/gdal-3.2.0+dfsg/frmts/hfa/hfatype.cpp
Examining data/gdal-3.2.0+dfsg/frmts/hfa/hfadataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/hfa/hfadictionary.cpp
Examining data/gdal-3.2.0+dfsg/frmts/iso8211/ddfrecord.cpp
Examining data/gdal-3.2.0+dfsg/frmts/iso8211/timetest.cpp
Examining data/gdal-3.2.0+dfsg/frmts/iso8211/8211dump.cpp
Examining data/gdal-3.2.0+dfsg/frmts/iso8211/8211createfromxml.cpp
Examining data/gdal-3.2.0+dfsg/frmts/iso8211/ddfmodule.cpp
Examining data/gdal-3.2.0+dfsg/frmts/iso8211/iso8211.h
Examining data/gdal-3.2.0+dfsg/frmts/iso8211/ddfutils.cpp
Examining data/gdal-3.2.0+dfsg/frmts/iso8211/mkcatalog.cpp
Examining data/gdal-3.2.0+dfsg/frmts/iso8211/8211view.cpp
Examining data/gdal-3.2.0+dfsg/frmts/iso8211/ddffield.cpp
Examining data/gdal-3.2.0+dfsg/frmts/iso8211/ddffielddefn.cpp
Examining data/gdal-3.2.0+dfsg/frmts/iso8211/ddfsubfielddefn.cpp
Examining data/gdal-3.2.0+dfsg/frmts/bsb/bsb2raw.c
Examining data/gdal-3.2.0+dfsg/frmts/bsb/bsbdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/bsb/bsb_read.h
Examining data/gdal-3.2.0+dfsg/frmts/bsb/bsb_read.c
Examining data/gdal-3.2.0+dfsg/frmts/msg/xritheaderparser.cpp
Examining data/gdal-3.2.0+dfsg/frmts/msg/reflectancecalculator.h
Examining data/gdal-3.2.0+dfsg/frmts/msg/reflectancecalculator.cpp
Examining data/gdal-3.2.0+dfsg/frmts/msg/msgdataset.h
Examining data/gdal-3.2.0+dfsg/frmts/msg/msgcommand.cpp
Examining data/gdal-3.2.0+dfsg/frmts/msg/xritheaderparser.h
Examining data/gdal-3.2.0+dfsg/frmts/msg/prologue.cpp
Examining data/gdal-3.2.0+dfsg/frmts/msg/msgcommand.h
Examining data/gdal-3.2.0+dfsg/frmts/msg/msgdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/msg/PublicDecompWT_all.cpp
Examining data/gdal-3.2.0+dfsg/frmts/msg/prologue.h
Examining data/gdal-3.2.0+dfsg/frmts/msg/PublicDecompWT_headers.h
Examining data/gdal-3.2.0+dfsg/frmts/sentinel2/sentinel2dataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/bmp/bmpdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/raw/fastdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/raw/fujibasdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/raw/pnmdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/raw/doq2dataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/raw/doq1dataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/raw/genbindataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/raw/cpgdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/raw/ace2dataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/raw/gtxdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/raw/dipxdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/raw/hkvdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/raw/eirdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/raw/roipacdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/raw/envidataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/raw/atlsci_spheroid.cpp
Examining data/gdal-3.2.0+dfsg/frmts/raw/btdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/raw/envidataset.h
Examining data/gdal-3.2.0+dfsg/frmts/raw/landataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/raw/gscdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/raw/byndataset.h
Examining data/gdal-3.2.0+dfsg/frmts/raw/ndfdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/raw/krodataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/raw/loslasdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/raw/byndataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/raw/ntv2dataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/raw/atlsci_spheroid.h
Examining data/gdal-3.2.0+dfsg/frmts/raw/iscedataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/raw/pauxdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/raw/mffdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/raw/ntv1dataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/raw/snodasdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/raw/idadataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/raw/ehdrdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/raw/ctable2dataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/raw/lcpdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/raw/rrasterdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/raw/ehdrdataset.h
Examining data/gdal-3.2.0+dfsg/frmts/elas/elasdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pds/pds4dataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pds/vicarkeywordhandler.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pds/pds4dataset.h
Examining data/gdal-3.2.0+dfsg/frmts/pds/isis2dataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pds/vicarkeywordhandler.h
Examining data/gdal-3.2.0+dfsg/frmts/pds/isis3dataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pds/vicardataset.h
Examining data/gdal-3.2.0+dfsg/frmts/pds/pdsdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pds/vicardataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pds/pds4vector.cpp
Examining data/gdal-3.2.0+dfsg/frmts/dimap/dimapdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/msgn/msg_reader_core.h
Examining data/gdal-3.2.0+dfsg/frmts/msgn/msg_basic_types.h
Examining data/gdal-3.2.0+dfsg/frmts/msgn/msg_basic_types.cpp
Examining data/gdal-3.2.0+dfsg/frmts/msgn/msgndataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/msgn/msg_reader_core.cpp
Examining data/gdal-3.2.0+dfsg/frmts/ilwis/ilwisdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/ilwis/ilwisdataset.h
Examining data/gdal-3.2.0+dfsg/frmts/ilwis/ilwiscoordinatesystem.cpp
Examining data/gdal-3.2.0+dfsg/frmts/mbtiles/mbtilesdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/eeda/eedaidataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/eeda/eedadataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/eeda/eeda.h
Examining data/gdal-3.2.0+dfsg/frmts/eeda/eedacommon.cpp
Examining data/gdal-3.2.0+dfsg/frmts/grass/grass.cpp
Examining data/gdal-3.2.0+dfsg/frmts/mrf/marfa.h
Examining data/gdal-3.2.0+dfsg/frmts/mrf/Packer_RLE.h
Examining data/gdal-3.2.0+dfsg/frmts/mrf/Packer_RLE.cpp
Examining data/gdal-3.2.0+dfsg/frmts/mrf/LERC_band.cpp
Examining data/gdal-3.2.0+dfsg/frmts/mrf/marfa_dataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/mrf/JPEG_band.cpp
Examining data/gdal-3.2.0+dfsg/frmts/mrf/LERCV1/Lerc1Image.h
Examining data/gdal-3.2.0+dfsg/frmts/mrf/LERCV1/Lerc1Image.cpp
Examining data/gdal-3.2.0+dfsg/frmts/mrf/JPNG_band.cpp
Examining data/gdal-3.2.0+dfsg/frmts/mrf/JPEG12_band.cpp
Examining data/gdal-3.2.0+dfsg/frmts/mrf/Raw_band.cpp
Examining data/gdal-3.2.0+dfsg/frmts/mrf/PNG_band.cpp
Examining data/gdal-3.2.0+dfsg/frmts/mrf/Packer.h
Examining data/gdal-3.2.0+dfsg/frmts/mrf/Tif_band.cpp
Examining data/gdal-3.2.0+dfsg/frmts/mrf/mrf_overview.cpp
Examining data/gdal-3.2.0+dfsg/frmts/mrf/mrf_band.cpp
Examining data/gdal-3.2.0+dfsg/frmts/mrf/BitMask2D.h
Examining data/gdal-3.2.0+dfsg/frmts/mrf/mrf_util.cpp
Examining data/gdal-3.2.0+dfsg/frmts/hf2/hf2dataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/openjpeg/openjpegdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/gxf/gxfopen.c
Examining data/gdal-3.2.0+dfsg/frmts/gxf/gxfdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/gxf/gxf_ogcwkt.c
Examining data/gdal-3.2.0+dfsg/frmts/gxf/gxfopen.h
Examining data/gdal-3.2.0+dfsg/frmts/gxf/gxf_proj4.c
Examining data/gdal-3.2.0+dfsg/frmts/blx/blxdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/blx/blx.c
Examining data/gdal-3.2.0+dfsg/frmts/blx/blx.h
Examining data/gdal-3.2.0+dfsg/frmts/rda/rdadataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/gta/gtadataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/gta/gta_headers.h
Examining data/gdal-3.2.0+dfsg/frmts/ingr/JpegHelper.cpp
Examining data/gdal-3.2.0+dfsg/frmts/ingr/IntergraphDataset.h
Examining data/gdal-3.2.0+dfsg/frmts/ingr/IngrTypes.cpp
Examining data/gdal-3.2.0+dfsg/frmts/ingr/IngrTypes.h
Examining data/gdal-3.2.0+dfsg/frmts/ingr/IntergraphDataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/ingr/JpegHelper.h
Examining data/gdal-3.2.0+dfsg/frmts/ingr/IntergraphBand.cpp
Examining data/gdal-3.2.0+dfsg/frmts/ingr/IntergraphBand.h
Examining data/gdal-3.2.0+dfsg/frmts/rik/rikdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/gdalallregister.cpp
Examining data/gdal-3.2.0+dfsg/frmts/rdb/rdbdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/rdb/rdbdataset.hpp
Examining data/gdal-3.2.0+dfsg/frmts/ceos/ceosdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/ceos/ceosopen.c
Examining data/gdal-3.2.0+dfsg/frmts/ceos/ceostest.c
Examining data/gdal-3.2.0+dfsg/frmts/ceos/ceosopen.h
Examining data/gdal-3.2.0+dfsg/frmts/pdf/pdfcreatefromcomposition.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pdf/gdal_pdf.h
Examining data/gdal-3.2.0+dfsg/frmts/pdf/ogrpdflayer.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pdf/pdfreadvectors.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pdf/pdfsdk_headers.h
Examining data/gdal-3.2.0+dfsg/frmts/pdf/pdfcreatecopy.h
Examining data/gdal-3.2.0+dfsg/frmts/pdf/pdfobject.h
Examining data/gdal-3.2.0+dfsg/frmts/pdf/pdfio.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pdf/pdfcreatefromcomposition.h
Examining data/gdal-3.2.0+dfsg/frmts/pdf/pdfdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pdf/pdfwritabledataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pdf/pdfobject.cpp
Examining data/gdal-3.2.0+dfsg/frmts/pdf/pdfio.h
Examining data/gdal-3.2.0+dfsg/frmts/pdf/pdfcreatecopy.cpp
Examining data/gdal-3.2.0+dfsg/frmts/gsg/gsbgdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/gsg/gsagdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/gsg/gs7bgdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/tiledb/tiledb_headers.h
Examining data/gdal-3.2.0+dfsg/frmts/tiledb/tiledbdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/rmf/rmfjpeg.cpp
Examining data/gdal-3.2.0+dfsg/frmts/rmf/rmflzw.cpp
Examining data/gdal-3.2.0+dfsg/frmts/rmf/rmfdataset.h
Examining data/gdal-3.2.0+dfsg/frmts/rmf/rmfdem.cpp
Examining data/gdal-3.2.0+dfsg/frmts/rmf/rmfdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/fit/fitdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/fit/gstTypes.h
Examining data/gdal-3.2.0+dfsg/frmts/fit/fit.cpp
Examining data/gdal-3.2.0+dfsg/frmts/fit/fit.h
Examining data/gdal-3.2.0+dfsg/frmts/fit/gstEndian.h
Examining data/gdal-3.2.0+dfsg/frmts/daas/daasdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/zmap/zmapdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/jpeg2000/jpeg2000_vsil_io.cpp
Examining data/gdal-3.2.0+dfsg/frmts/jpeg2000/jpeg2000dataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/jpeg2000/jpeg2000_vsil_io.h
Examining data/gdal-3.2.0+dfsg/frmts/mrsid/mrsiddataset_headers_include.h
Examining data/gdal-3.2.0+dfsg/frmts/mrsid/mrsidstream_headers_include.h
Examining data/gdal-3.2.0+dfsg/frmts/mrsid/mrsidstream.h
Examining data/gdal-3.2.0+dfsg/frmts/mrsid/mrsiddataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/mrsid/mrsidstream.cpp
Examining data/gdal-3.2.0+dfsg/frmts/arg/argdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/georaster/oci_wrapper.cpp
Examining data/gdal-3.2.0+dfsg/frmts/georaster/cpl_vsil_ocilob.cpp
Examining data/gdal-3.2.0+dfsg/frmts/georaster/georaster_dataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/georaster/georaster_priv.h
Examining data/gdal-3.2.0+dfsg/frmts/georaster/oci_wrapper.h
Examining data/gdal-3.2.0+dfsg/frmts/georaster/georaster_rasterband.cpp
Examining data/gdal-3.2.0+dfsg/frmts/georaster/georaster_wrapper.cpp
Examining data/gdal-3.2.0+dfsg/frmts/dds/crunch_headers.h
Examining data/gdal-3.2.0+dfsg/frmts/dds/ddsdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/bpg/bpgdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/saga/sagadataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/ctg/ctgdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/epsilon/epsilondataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/cals/calsdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/map/mapdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/airsar/airsardataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/aigrid/aigdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/aigrid/aigccitt.c
Examining data/gdal-3.2.0+dfsg/frmts/aigrid/aitest.c
Examining data/gdal-3.2.0+dfsg/frmts/aigrid/aigopen.c
Examining data/gdal-3.2.0+dfsg/frmts/aigrid/aigrid.h
Examining data/gdal-3.2.0+dfsg/frmts/aigrid/gridlib.c
Examining data/gdal-3.2.0+dfsg/frmts/usgsdem/usgsdemdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/usgsdem/usgsdem_create.cpp
Examining data/gdal-3.2.0+dfsg/frmts/dted/dted_ptstream.c
Examining data/gdal-3.2.0+dfsg/frmts/dted/dteddataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/dted/dted_create.c
Examining data/gdal-3.2.0+dfsg/frmts/dted/dted_test.c
Examining data/gdal-3.2.0+dfsg/frmts/dted/dted_api.c
Examining data/gdal-3.2.0+dfsg/frmts/dted/dted_api.h
Examining data/gdal-3.2.0+dfsg/frmts/jp2lura/jp2luradataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/jp2lura/jp2luracallbacks.cpp
Examining data/gdal-3.2.0+dfsg/frmts/jp2lura/jp2lurarasterband.cpp
Examining data/gdal-3.2.0+dfsg/frmts/jp2lura/jp2luracallbacks.h
Examining data/gdal-3.2.0+dfsg/frmts/jp2lura/jp2luradataset.h
Examining data/gdal-3.2.0+dfsg/frmts/jp2lura/jp2lurarasterband.h
Examining data/gdal-3.2.0+dfsg/frmts/webp/webp_headers.h
Examining data/gdal-3.2.0+dfsg/frmts/webp/webpdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/tsx/tsxdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/exr/openexr_headers.h
Examining data/gdal-3.2.0+dfsg/frmts/exr/exrdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/derived/derivedlist.h
Examining data/gdal-3.2.0+dfsg/frmts/derived/deriveddataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/derived/derivedlist.c
Examining data/gdal-3.2.0+dfsg/frmts/heif/heifdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/wcs/wcsdataset201.cpp
Examining data/gdal-3.2.0+dfsg/frmts/wcs/wcsrasterband.h
Examining data/gdal-3.2.0+dfsg/frmts/wcs/gmlcoverage.h
Examining data/gdal-3.2.0+dfsg/frmts/wcs/gmlcoverage.cpp
Examining data/gdal-3.2.0+dfsg/frmts/wcs/wcsdataset100.cpp
Examining data/gdal-3.2.0+dfsg/frmts/wcs/wcsutils.h
Examining data/gdal-3.2.0+dfsg/frmts/wcs/wcsdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/wcs/wcsdataset110.cpp
Examining data/gdal-3.2.0+dfsg/frmts/wcs/httpdriver.cpp
Examining data/gdal-3.2.0+dfsg/frmts/wcs/wcsutils.cpp
Examining data/gdal-3.2.0+dfsg/frmts/wcs/wcsdataset.h
Examining data/gdal-3.2.0+dfsg/frmts/wcs/wcsrasterband.cpp
Examining data/gdal-3.2.0+dfsg/frmts/jpegls/jpeglsdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/jpegls/jpegls_header.h
Examining data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c
Examining data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/HDFEOSVersion.h
Examining data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/HdfEosDef.h
Examining data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/gctp_wrap.c
Examining data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c
Examining data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/ease.h
Examining data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c
Examining data/gdal-3.2.0+dfsg/frmts/hdf4/hdf4imagedataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/hdf4/hdf4dataset.h
Examining data/gdal-3.2.0+dfsg/frmts/hdf4/hdf4multidim.cpp
Examining data/gdal-3.2.0+dfsg/frmts/hdf4/hdf4compat.h
Examining data/gdal-3.2.0+dfsg/frmts/hdf4/hdf4dataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/rs2/rs2dataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/rasdaman/rasdamandataset.h
Examining data/gdal-3.2.0+dfsg/frmts/rasdaman/rasdamandataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/postgisraster/postgisrastertiledataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/postgisraster/postgisrastertools.cpp
Examining data/gdal-3.2.0+dfsg/frmts/postgisraster/postgisraster.h
Examining data/gdal-3.2.0+dfsg/frmts/postgisraster/postgisrasterdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/postgisraster/postgisrasterdriver.cpp
Examining data/gdal-3.2.0+dfsg/frmts/postgisraster/postgisrasterrasterband.cpp
Examining data/gdal-3.2.0+dfsg/frmts/postgisraster/postgisrastertilerasterband.cpp
Examining data/gdal-3.2.0+dfsg/frmts/r/rdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/r/rcreatecopy.cpp
Examining data/gdal-3.2.0+dfsg/frmts/r/rdataset.h
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/weather.c
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/degrib1.h
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/tdlpack.cpp
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/engribapi.c
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaprint.cpp
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/myutil.c
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/grib1tab.cpp
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/grib2api.c
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.h
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaname.cpp
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/inventory.cpp
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/type.h
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/weather.h
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/myassert.c
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaname.h
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/grib2api.h
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/inventory.h
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/degrib1.cpp
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/scan.c
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/myerror.h
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/tendian.h
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/hazard.c
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaparse.cpp
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/degrib2.h
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/myerror.c
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/tdlpack.h
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/engribapi.h
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/myassert.h
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/tendian.cpp
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/degrib2.cpp
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/scan.h
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/hazard.h
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/myutil.h
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/meta.h
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/gbits.c
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/jpcunpack.c
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/enc_png.c
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/g2_unpack4.c
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/g2_unpack6.c
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/gridtemplates.c
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/pdstemplates.h
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/seekgb.c
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/compack.c
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/g2_unpack2.c
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/simunpack.c
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/pdstemplates.c
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/g2_addlocal.c
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/int_power.c
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/simpack.c
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/dec_jpeg2000.cpp
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/dec_png.c
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/gdal_g2clib_symbol_rename.h
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/specpack.c
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/g2_unpack3.c
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/pngpack.c
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/grib2.h
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/g2_create.c
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/mkieee.c
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/g2_gribend.c
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/reduce.c
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/getpoly.c
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/g2_unpack7.c
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/drstemplates.c
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/gridtemplates.h
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/comunpack.c
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/specunpack.c
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/g2_addgrid.c
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/rdieee.c
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/pack_gp.c
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/g2_free.c
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/g2_unpack5.c
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/g2_getfld.c
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/cmplxpack.c
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/jpcpack.c
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/pngunpack.c
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/getdim.c
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/g2_miss.c
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/g2_addfield.c
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/misspack.c
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/g2_unpack1.c
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/drstemplates.h
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/g2_info.c
Examining data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/enc_jpeg2000.c
Examining data/gdal-3.2.0+dfsg/frmts/grib/gribdataset.h
Examining data/gdal-3.2.0+dfsg/frmts/grib/gribdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/grib/gribcreatecopy.cpp
Examining data/gdal-3.2.0+dfsg/frmts/ozi/ozidataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/iris/irisdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/sdts/sdts_al.h
Examining data/gdal-3.2.0+dfsg/frmts/sdts/sdtspointreader.cpp
Examining data/gdal-3.2.0+dfsg/frmts/sdts/sdtsiref.cpp
Examining data/gdal-3.2.0+dfsg/frmts/sdts/sdtsrasterreader.cpp
Examining data/gdal-3.2.0+dfsg/frmts/sdts/sdtslib.cpp
Examining data/gdal-3.2.0+dfsg/frmts/sdts/sdtspolygonreader.cpp
Examining data/gdal-3.2.0+dfsg/frmts/sdts/sdtsxref.cpp
Examining data/gdal-3.2.0+dfsg/frmts/sdts/sdtscatd.cpp
Examining data/gdal-3.2.0+dfsg/frmts/sdts/sdtsdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/sdts/sdts2shp.cpp
Examining data/gdal-3.2.0+dfsg/frmts/sdts/sdtslinereader.cpp
Examining data/gdal-3.2.0+dfsg/frmts/sdts/sdtsattrreader.cpp
Examining data/gdal-3.2.0+dfsg/frmts/sdts/sdtsindexedreader.cpp
Examining data/gdal-3.2.0+dfsg/frmts/sdts/sdtstransfer.cpp
Examining data/gdal-3.2.0+dfsg/frmts/kea/keamaskband.h
Examining data/gdal-3.2.0+dfsg/frmts/kea/keamaskband.cpp
Examining data/gdal-3.2.0+dfsg/frmts/kea/keaband.cpp
Examining data/gdal-3.2.0+dfsg/frmts/kea/keadataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/kea/kearat.h
Examining data/gdal-3.2.0+dfsg/frmts/kea/keadataset.h
Examining data/gdal-3.2.0+dfsg/frmts/kea/keadriver.cpp
Examining data/gdal-3.2.0+dfsg/frmts/kea/keacopy.cpp
Examining data/gdal-3.2.0+dfsg/frmts/kea/keacopy.h
Examining data/gdal-3.2.0+dfsg/frmts/kea/libkea_headers.h
Examining data/gdal-3.2.0+dfsg/frmts/kea/keaband.h
Examining data/gdal-3.2.0+dfsg/frmts/kea/keaoverview.h
Examining data/gdal-3.2.0+dfsg/frmts/kea/kearat.cpp
Examining data/gdal-3.2.0+dfsg/frmts/kea/keaoverview.cpp
Examining data/gdal-3.2.0+dfsg/frmts/ecw/jp2userbox.cpp
Examining data/gdal-3.2.0+dfsg/frmts/ecw/ecwsdk_headers.h
Examining data/gdal-3.2.0+dfsg/frmts/ecw/ecwasyncreader.cpp
Examining data/gdal-3.2.0+dfsg/frmts/ecw/ecwcreatecopy.cpp
Examining data/gdal-3.2.0+dfsg/frmts/ecw/gdal_ecw.h
Examining data/gdal-3.2.0+dfsg/frmts/ecw/ecwdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/xyz/xyzdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/esric/esric_dataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/gff/gff_dataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/hdf5/hdf5dataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/hdf5/iso19115_srs.cpp
Examining data/gdal-3.2.0+dfsg/frmts/hdf5/hdf5_api.h
Examining data/gdal-3.2.0+dfsg/frmts/hdf5/hdf5dataset.h
Examining data/gdal-3.2.0+dfsg/frmts/hdf5/gh5_convenience.cpp
Examining data/gdal-3.2.0+dfsg/frmts/hdf5/iso19115_srs.h
Examining data/gdal-3.2.0+dfsg/frmts/hdf5/gh5_convenience.h
Examining data/gdal-3.2.0+dfsg/frmts/hdf5/hdf5multidim.cpp
Examining data/gdal-3.2.0+dfsg/frmts/hdf5/hdf5imagedataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/hdf5/hdf5vfl.h
Examining data/gdal-3.2.0+dfsg/frmts/hdf5/bagdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/gif/gifabstractdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/gif/gifdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/gif/giflib/egif_lib.c
Examining data/gdal-3.2.0+dfsg/frmts/gif/giflib/gif_lib.h
Examining data/gdal-3.2.0+dfsg/frmts/gif/giflib/gif_hash.c
Examining data/gdal-3.2.0+dfsg/frmts/gif/giflib/gif_err.c
Examining data/gdal-3.2.0+dfsg/frmts/gif/giflib/gif_lib_private.h
Examining data/gdal-3.2.0+dfsg/frmts/gif/giflib/gif_hash.h
Examining data/gdal-3.2.0+dfsg/frmts/gif/giflib/dgif_lib.c
Examining data/gdal-3.2.0+dfsg/frmts/gif/giflib/gifalloc.c
Examining data/gdal-3.2.0+dfsg/frmts/gif/gifabstractdataset.h
Examining data/gdal-3.2.0+dfsg/frmts/gif/biggifdataset.cpp
Examining data/gdal-3.2.0+dfsg/frmts/jdem/jdemdataset.cpp
Examining data/gdal-3.2.0+dfsg/gnm/gnmlayer.cpp
Examining data/gdal-3.2.0+dfsg/gnm/gnmgenericnetwork.cpp
Examining data/gdal-3.2.0+dfsg/gnm/gnm_priv.h
Examining data/gdal-3.2.0+dfsg/gnm/gnm_frmts/gnmregisterall.cpp
Examining data/gdal-3.2.0+dfsg/gnm/gnm_frmts/file/gnmfiledriver.cpp
Examining data/gdal-3.2.0+dfsg/gnm/gnm_frmts/file/gnmfile.h
Examining data/gdal-3.2.0+dfsg/gnm/gnm_frmts/file/gnmfilenetwork.cpp
Examining data/gdal-3.2.0+dfsg/gnm/gnm_frmts/db/gnmdbnetwork.cpp
Examining data/gdal-3.2.0+dfsg/gnm/gnm_frmts/db/gnmdbdriver.cpp
Examining data/gdal-3.2.0+dfsg/gnm/gnm_frmts/db/gnmdb.h
Examining data/gdal-3.2.0+dfsg/gnm/gnm_frmts/gnm_frmts.h
Examining data/gdal-3.2.0+dfsg/gnm/gnmnetwork.cpp
Examining data/gdal-3.2.0+dfsg/gnm/gnmgraph.cpp
Examining data/gdal-3.2.0+dfsg/gnm/gnmresultlayer.cpp
Examining data/gdal-3.2.0+dfsg/gnm/gnmrule.cpp
Examining data/gdal-3.2.0+dfsg/gnm/gnm_api.h
Examining data/gdal-3.2.0+dfsg/gnm/gnm.h
Examining data/gdal-3.2.0+dfsg/gnm/gnmgraph.h
Examining data/gdal-3.2.0+dfsg/apps/multireadtest.cpp
Examining data/gdal-3.2.0+dfsg/apps/dumpoverviews.cpp
Examining data/gdal-3.2.0+dfsg/apps/ogrinfo.cpp
Examining data/gdal-3.2.0+dfsg/apps/gdalbuildvrt_lib.cpp
Examining data/gdal-3.2.0+dfsg/apps/gdalinfo_lib.cpp
Examining data/gdal-3.2.0+dfsg/apps/ogr2ogr_lib.cpp
Examining data/gdal-3.2.0+dfsg/apps/gdallocationinfo.cpp
Examining data/gdal-3.2.0+dfsg/apps/gdalmdimtranslate_lib.cpp
Examining data/gdal-3.2.0+dfsg/apps/commonutils.cpp
Examining data/gdal-3.2.0+dfsg/apps/gdal_grid_bin.cpp
Examining data/gdal-3.2.0+dfsg/apps/gdalwarp_bin.cpp
Examining data/gdal-3.2.0+dfsg/apps/testreprojmulti.cpp
Examining data/gdal-3.2.0+dfsg/apps/gdalflattenmask.c
Examining data/gdal-3.2.0+dfsg/apps/ogr2ogr_bin.cpp
Examining data/gdal-3.2.0+dfsg/apps/gdal_create.cpp
Examining data/gdal-3.2.0+dfsg/apps/ogrdissolve.cpp
Examining data/gdal-3.2.0+dfsg/apps/ogrlineref.cpp
Examining data/gdal-3.2.0+dfsg/apps/gdaladdo.cpp
Examining data/gdal-3.2.0+dfsg/apps/gdal_viewshed.cpp
Examining data/gdal-3.2.0+dfsg/apps/gdal_grid_lib.cpp
Examining data/gdal-3.2.0+dfsg/apps/gnmanalyse.cpp
Examining data/gdal-3.2.0+dfsg/apps/gdaldem_lib.cpp
Examining data/gdal-3.2.0+dfsg/apps/gdal2ogr.c
Examining data/gdal-3.2.0+dfsg/apps/gdalmdimtranslate_bin.cpp
Examining data/gdal-3.2.0+dfsg/apps/gdal_translate_lib.cpp
Examining data/gdal-3.2.0+dfsg/apps/gdal_translate_bin.cpp
Examining data/gdal-3.2.0+dfsg/apps/gdal_rasterize_bin.cpp
Examining data/gdal-3.2.0+dfsg/apps/ogrtindex.cpp
Examining data/gdal-3.2.0+dfsg/apps/gdalmdiminfo_bin.cpp
Examining data/gdal-3.2.0+dfsg/apps/gdalmdiminfo_lib.cpp
Examining data/gdal-3.2.0+dfsg/apps/gdaltransform.cpp
Examining data/gdal-3.2.0+dfsg/apps/gnmmanage.cpp
Examining data/gdal-3.2.0+dfsg/apps/commonutils.h
Examining data/gdal-3.2.0+dfsg/apps/gdalwarp_lib.cpp
Examining data/gdal-3.2.0+dfsg/apps/testepsg.cpp
Examining data/gdal-3.2.0+dfsg/apps/gdal_utils_priv.h
Examining data/gdal-3.2.0+dfsg/apps/gdalasyncread.cpp
Examining data/gdal-3.2.0+dfsg/apps/gdal_utils.h
Examining data/gdal-3.2.0+dfsg/apps/gdaltorture.cpp
Examining data/gdal-3.2.0+dfsg/apps/gdal_rasterize_lib.cpp
Examining data/gdal-3.2.0+dfsg/apps/nearblack_bin.cpp
Examining data/gdal-3.2.0+dfsg/apps/gdalbuildvrt_bin.cpp
Examining data/gdal-3.2.0+dfsg/apps/gdaldem_bin.cpp
Examining data/gdal-3.2.0+dfsg/apps/gdalinfo_bin.cpp
Examining data/gdal-3.2.0+dfsg/apps/nearblack_lib.cpp
Examining data/gdal-3.2.0+dfsg/apps/gdalwarpsimple.c
Examining data/gdal-3.2.0+dfsg/apps/gdal_contour.cpp
Examining data/gdal-3.2.0+dfsg/apps/gdalsrsinfo.cpp
Examining data/gdal-3.2.0+dfsg/apps/gdalmanage.cpp
Examining data/gdal-3.2.0+dfsg/apps/gdaltindex.cpp
Examining data/gdal-3.2.0+dfsg/apps/test_ogrsf.cpp
Examining data/gdal-3.2.0+dfsg/apps/gdalenhance.cpp
Examining data/gdal-3.2.0+dfsg/gcore/overview.cpp
Examining data/gdal-3.2.0+dfsg/gcore/gdalopeninfo.cpp
Examining data/gdal-3.2.0+dfsg/gcore/gdalgeorefpamdataset.h
Examining data/gdal-3.2.0+dfsg/gcore/gdalabstractbandblockcache.cpp
Examining data/gdal-3.2.0+dfsg/gcore/gdalproxydataset.cpp
Examining data/gdal-3.2.0+dfsg/gcore/gdal_thread_pool.cpp
Examining data/gdal-3.2.0+dfsg/gcore/gdaldefaultasync.cpp
Examining data/gdal-3.2.0+dfsg/gcore/gdaljp2abstractdataset.h
Examining data/gdal-3.2.0+dfsg/gcore/gdalarraybandblockcache.cpp
Examining data/gdal-3.2.0+dfsg/gcore/gdaljp2box.cpp
Examining data/gdal-3.2.0+dfsg/gcore/gdalpythondriverloader.cpp
Examining data/gdal-3.2.0+dfsg/gcore/gdal_proxy.h
Examining data/gdal-3.2.0+dfsg/gcore/gdalnodatavaluesmaskband.cpp
Examining data/gdal-3.2.0+dfsg/gcore/gdalmultidomainmetadata.cpp
Examining data/gdal-3.2.0+dfsg/gcore/gdaldataset.cpp
Examining data/gdal-3.2.0+dfsg/gcore/gdaljp2abstractdataset.cpp
Examining data/gdal-3.2.0+dfsg/gcore/gdal_mdreader.h
Examining data/gdal-3.2.0+dfsg/gcore/rasterio_ssse3.cpp
Examining data/gdal-3.2.0+dfsg/gcore/gdalnodatamaskband.cpp
Examining data/gdal-3.2.0+dfsg/gcore/gdaloverviewdataset.cpp
Examining data/gdal-3.2.0+dfsg/gcore/gdalpamrasterband.cpp
Examining data/gdal-3.2.0+dfsg/gcore/tilematrixset.cpp
Examining data/gdal-3.2.0+dfsg/gcore/gdal_priv_templates.hpp
Examining data/gdal-3.2.0+dfsg/gcore/rawdataset.h
Examining data/gdal-3.2.0+dfsg/gcore/gdalrescaledalphaband.cpp
Examining data/gdal-3.2.0+dfsg/gcore/gdal_pam.h
Examining data/gdal-3.2.0+dfsg/gcore/gdaldriver.cpp
Examining data/gdal-3.2.0+dfsg/gcore/gdal.h
Examining data/gdal-3.2.0+dfsg/gcore/gdal_rat.cpp
Examining data/gdal-3.2.0+dfsg/gcore/mdreader/reader_geo_eye.h
Examining data/gdal-3.2.0+dfsg/gcore/mdreader/reader_kompsat.cpp
Examining data/gdal-3.2.0+dfsg/gcore/mdreader/reader_rapid_eye.h
Examining data/gdal-3.2.0+dfsg/gcore/mdreader/reader_spot.h
Examining data/gdal-3.2.0+dfsg/gcore/mdreader/reader_spot.cpp
Examining data/gdal-3.2.0+dfsg/gcore/mdreader/reader_geo_eye.cpp
Examining data/gdal-3.2.0+dfsg/gcore/mdreader/reader_rapid_eye.cpp
Examining data/gdal-3.2.0+dfsg/gcore/mdreader/reader_kompsat.h
Examining data/gdal-3.2.0+dfsg/gcore/mdreader/reader_rdk1.h
Examining data/gdal-3.2.0+dfsg/gcore/mdreader/reader_orb_view.cpp
Examining data/gdal-3.2.0+dfsg/gcore/mdreader/reader_rdk1.cpp
Examining data/gdal-3.2.0+dfsg/gcore/mdreader/reader_alos.cpp
Examining data/gdal-3.2.0+dfsg/gcore/mdreader/reader_pleiades.h
Examining data/gdal-3.2.0+dfsg/gcore/mdreader/reader_eros.h
Examining data/gdal-3.2.0+dfsg/gcore/mdreader/reader_landsat.cpp
Examining data/gdal-3.2.0+dfsg/gcore/mdreader/reader_pleiades.cpp
Examining data/gdal-3.2.0+dfsg/gcore/mdreader/reader_alos.h
Examining data/gdal-3.2.0+dfsg/gcore/mdreader/reader_landsat.h
Examining data/gdal-3.2.0+dfsg/gcore/mdreader/reader_digital_globe.cpp
Examining data/gdal-3.2.0+dfsg/gcore/mdreader/reader_eros.cpp
Examining data/gdal-3.2.0+dfsg/gcore/mdreader/reader_orb_view.h
Examining data/gdal-3.2.0+dfsg/gcore/mdreader/reader_digital_globe.h
Examining data/gdal-3.2.0+dfsg/gcore/gdalgeorefpamdataset.cpp
Examining data/gdal-3.2.0+dfsg/gcore/gdalpython.h
Examining data/gdal-3.2.0+dfsg/gcore/gdalrasterblock.cpp
Examining data/gdal-3.2.0+dfsg/gcore/gdalhashsetbandblockcache.cpp
Examining data/gdal-3.2.0+dfsg/gcore/gdalmultidim.cpp
Examining data/gdal-3.2.0+dfsg/gcore/gdalexif.h
Examining data/gdal-3.2.0+dfsg/gcore/gdalallvalidmaskband.cpp
Examining data/gdal-3.2.0+dfsg/gcore/gdaldllmain.cpp
Examining data/gdal-3.2.0+dfsg/gcore/gdaldrivermanager.cpp
Examining data/gdal-3.2.0+dfsg/gcore/gdalpamproxydb.cpp
Examining data/gdal-3.2.0+dfsg/gcore/gdalexif.cpp
Examining data/gdal-3.2.0+dfsg/gcore/gdal_rat.h
Examining data/gdal-3.2.0+dfsg/gcore/tilematrixset.hpp
Examining data/gdal-3.2.0+dfsg/gcore/gdaljp2metadatagenerator.cpp
Examining data/gdal-3.2.0+dfsg/gcore/nasakeywordhandler.cpp
Examining data/gdal-3.2.0+dfsg/gcore/gdalpamdataset.cpp
Examining data/gdal-3.2.0+dfsg/gcore/gdaljp2metadatagenerator.h
Examining data/gdal-3.2.0+dfsg/gcore/gdalpython.cpp
Examining data/gdal-3.2.0+dfsg/gcore/gdalproxypool.cpp
Examining data/gdal-3.2.0+dfsg/gcore/gdal_mdreader.cpp
Examining data/gdal-3.2.0+dfsg/gcore/gdal_misc.cpp
Examining data/gdal-3.2.0+dfsg/gcore/gdaljp2metadata.cpp
Examining data/gdal-3.2.0+dfsg/gcore/gdal_avx2_emulation.hpp
Examining data/gdal-3.2.0+dfsg/gcore/gdaldefaultoverviews.cpp
Examining data/gdal-3.2.0+dfsg/gcore/gdal_frmts.h
Examining data/gdal-3.2.0+dfsg/gcore/gdaljp2structure.cpp
Examining data/gdal-3.2.0+dfsg/gcore/gdalsse_priv.h
Examining data/gdal-3.2.0+dfsg/gcore/gdal_priv.h
Examining data/gdal-3.2.0+dfsg/gcore/gdalmajorobject.cpp
Examining data/gdal-3.2.0+dfsg/gcore/nasakeywordhandler.h
Examining data/gdal-3.2.0+dfsg/gcore/gdalvirtualmem.cpp
Examining data/gdal-3.2.0+dfsg/gcore/rawdataset.cpp
Examining data/gdal-3.2.0+dfsg/gcore/gdalrasterband.cpp
Examining data/gdal-3.2.0+dfsg/gcore/gdal_thread_pool.h
Examining data/gdal-3.2.0+dfsg/gcore/gdalcolortable.cpp
Examining data/gdal-3.2.0+dfsg/gcore/gdaljp2metadata.h
Examining data/gdal-3.2.0+dfsg/gcore/rasterio.cpp
Examining data/gdal-3.2.0+dfsg/fuzzers/gml_geom_import_fuzzer.cpp
Examining data/gdal-3.2.0+dfsg/fuzzers/wkb_import_fuzzer.cpp
Examining data/gdal-3.2.0+dfsg/fuzzers/gdal_translate_fuzzer.cpp
Examining data/gdal-3.2.0+dfsg/fuzzers/osr_set_from_user_input_fuzzer.cpp
Examining data/gdal-3.2.0+dfsg/fuzzers/gdal_vector_translate_fuzzer.cpp
Examining data/gdal-3.2.0+dfsg/fuzzers/spatialite_geom_import_fuzzer.cpp
Examining data/gdal-3.2.0+dfsg/fuzzers/tests/test_wkb_import_fuzzer.cpp
Examining data/gdal-3.2.0+dfsg/fuzzers/tests/test_osr_set_from_user_input_fuzzer.cpp
Examining data/gdal-3.2.0+dfsg/fuzzers/tests/test_ogr_fuzzer.cpp
Examining data/gdal-3.2.0+dfsg/fuzzers/tests/test_wkt_import_fuzzer.cpp
Examining data/gdal-3.2.0+dfsg/fuzzers/tests/test_gdal_fuzzer.cpp
Examining data/gdal-3.2.0+dfsg/fuzzers/gdal_fuzzer.cpp
Examining data/gdal-3.2.0+dfsg/fuzzers/wkt_import_fuzzer.cpp
Examining data/gdal-3.2.0+dfsg/fuzzers/fuzzingengine.cpp
Examining data/gdal-3.2.0+dfsg/fuzzers/ogr_fuzzer.cpp
Examining data/gdal-3.2.0+dfsg/fuzzers/get_jpeg2000_structure_fuzzer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogr_api.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ingres/ogringresresultlayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ingres/ogringresdriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ingres/ogringreslayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ingres/ogringrestablelayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ingres/ogringresdatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ingres/ogringresstatement.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ingres/ogr_ingres.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/filegdb/FGdbUtils.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/filegdb/ogr_fgdb.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/filegdb/FGdbUtils.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/filegdb/filegdbsdk_headers.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/filegdb/FGdbDatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/filegdb/FGdbLayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/filegdb/FGdbDriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/filegdb/FGdbResultLayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/couchdb/ogr_couchdb.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/couchdb/ogrcouchdbdriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/couchdb/ogrcouchdbrowslayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/couchdb/ogrcouchdblayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/couchdb/ogrcouchdbdatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/couchdb/ogrcouchdbtablelayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mem/ogrmemlayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mem/ogrmemdatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mem/ogr_mem.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mem/ogrmemdriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/aeronavfaa/ograeronavfaalayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/aeronavfaa/ogr_aeronavfaa.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/aeronavfaa/ograeronavfaadatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/aeronavfaa/ograeronavfaadriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/cloudant/ogrcloudantdriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/cloudant/ogrcloudanttablelayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/cloudant/ogrcloudantdatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/cloudant/ogr_cloudant.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gmt/ogr_gmt.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gmt/ogrgmtlayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gmt/ogrgmtdatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gmt/ogrgmtdriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gml/gmlfeature.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gml/gmlhandler.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gml/gmlutils.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gml/parsexsd.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gml/gfstemplate.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gml/gmlregistry.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gml/resolvexlinks.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gml/ogrgmldatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gml/ogrgmllayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gml/gmlreader.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gml/gmlregistry.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gml/gmlutils.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gml/xercesc_headers.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gml/parsexsd.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gml/ogr_gml.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gml/gmlreader.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gml/gmlpropertydefn.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gml/hugefileresolver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gml/gmlreadstate.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gml/ogrgmldriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gml/gmlfeatureclass.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gml/gmlreaderp.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ods/ogrodsdriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ods/ods_formula_parser.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ods/testparser.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ods/ods_formula_parser.hpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ods/ogr_ods.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ods/ods_formula_node.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ods/ods_formula.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ods/ogrodsdatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ods/ods_formula.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/selafin/ogrselafindatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/selafin/ogr_selafin.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/selafin/io_selafin.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/selafin/ogrselafinlayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/selafin/io_selafin.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/selafin/ogrselafindriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gmlas/ogrgmlasdatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gmlas/ogrgmlaswriter.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gmlas/ogrgmlasxsdcache.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gmlas/ogrgmlasconf.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gmlas/ogr_gmlas.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gmlas/ogrgmlasreader.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gmlas/xercesc_headers.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gmlas/ogrgmlasxpatchmatcher.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gmlas/ogrgmlasxlinkresolver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gmlas/ogrgmlasschemaanalyzer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gmlas/ogrgmlasutils.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gmlas/ogrgmlasfeatureclass.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gmlas/ogr_gmlas_consts.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gmlas/ogrgmlaslayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gmlas/ogrgmlasdriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mongodbv3/mongocxxv3_headers.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mongodbv3/ogrmongodbv3driver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/openair/ogropenairdriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/openair/ogropenairlayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/openair/ogropenairdatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/openair/ogropenairlabellayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/openair/ogr_openair.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/generic/ogrdatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/generic/ogreditablelayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/generic/ogrwarpedlayer.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/generic/ogrsfdriverregistrar.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/generic/ogr_gensql.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/generic/ogr_gensql.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/generic/ogr_attrind.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/generic/ogremulatedtransaction.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/generic/ogrregisterall.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/generic/ogrlayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/generic/ogrlayerpool.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/generic/ogrsfdriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/generic/ogrwarpedlayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/generic/ogrmutexeddatasource.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/generic/ogrmutexedlayer.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/generic/ogrmutexeddatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/generic/ogrlayerdecorator.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/generic/ogrlayerpool.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/generic/ogrmutexedlayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/generic/ogrlayerdecorator.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/generic/ogrunionlayer.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/generic/ogremulatedtransaction.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/generic/ogrunionlayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/generic/ogreditablelayer.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/generic/ogr_miattrind.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/elastic/ogrelasticlayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/elastic/ogr_elastic.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/elastic/ogrelasticdriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/elastic/ogrelasticdatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/csw/ogrcswdataset.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ogrsf_frmts.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/pgeo/ogrpgeotablelayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/pgeo/ogrpgeodatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/pgeo/ogrpgeolayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/pgeo/ogr_pgeo.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/pgeo/ogrpgeodriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/pgeo/ogrpgeoselectlayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mdb/ogr_mdb.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mdb/ogrmdbdatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mdb/ogrmdbdriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mdb/ogrmdblayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mdb/ogrmdbjackcess.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ili/imdreader.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ili/ili1readerp.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ili/ili1reader.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ili/ili2reader.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ili/ili2handler.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ili/imdreader.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ili/ogrili2driver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ili/ogrili1datasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ili/ogr_ili2.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ili/ogrili2datasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ili/ogrili1layer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ili/ogr_ili1.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ili/ili1reader.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ili/xercesc_headers.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ili/ogrili2layer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ili/ogrili1driver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ili/ili2reader.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ili/ili2readerp.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dxf/ogrdxfblockswriterlayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dxf/ogr_autocad_services.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dxf/ogrdxfwriterlayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dxf/ogrdxf_leader.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dxf/ogrdxflayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dxf/ogrdxfdatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dxf/intronurbs.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dxf/ogrdxf_ocstransformer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dxf/ogrdxfdriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dxf/ogr_dxf.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dxf/ogrdxf_blockmap.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dxf/ogrdxfreader.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dxf/ogr_autocad_services.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dxf/ogrdxf_feature.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dxf/ogrdxf_hatch.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dxf/ogrdxf_polyline_smooth.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dxf/ogrdxf_dimension.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dxf/ogrdxfwriterds.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dxf/ogrdxfblockslayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dxf/ogrdxf_polyline_smooth.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mapml/ogrmapmldataset.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gtm/gtm.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gtm/ogr_gtm.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gtm/ogrgtmlayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gtm/ogrgtmdatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gtm/ogrgtmdriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gtm/gtmtracklayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gtm/gtmwaypointlayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gtm/gtm.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/db2/ogrdb2geometryvalidator.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/db2/ogrdb2driver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/db2/ogrdb2layer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/db2/ogrdb2tablelayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/db2/ogrdb2datasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/db2/ogrdb2cli.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/db2/ogrdb2selectlayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/db2/gdaldb2rasterband.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/db2/ogr_db2.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/db2/ogrdb2datasourcemd.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dgn/ogrdgndatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dgn/dgnlib.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dgn/dgnhelp.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dgn/dist/cpl_config.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dgn/dgnwritetest.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dgn/ogrdgndriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dgn/dgnstroke.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dgn/dgndump.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dgn/ogr_dgn.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dgn/dgnopen.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dgn/dgnread.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dgn/ogrdgnlayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dgn/dgnwrite.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dgn/dgnlibp.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/vrt/ogrvrtdatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/vrt/ogrvrtlayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/vrt/ogrvrtdriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/vrt/ogr_vrt.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/pgdump/ogrpgdumpdriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/pgdump/ogr_pgdump.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/pgdump/ogrpgdumpdatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/pgdump/ogrpgdumplayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/sxf/ogrsxfdatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/sxf/org_sxf_defs.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/sxf/ogr_sxf.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/sxf/ogrsxflayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/sxf/ogrsxfdriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/segukooa/ogr_segukooa.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/segukooa/ogrsegukooadriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/segukooa/ogrsegukooalayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/segukooa/ogrsegukooadatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/odbc/ogr_odbc.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/odbc/ogrodbcdriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/odbc/ogrodbclayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/odbc/ogrodbcselectlayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/odbc/ogrodbcdatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/odbc/ogrodbctablelayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dods/libdap_headers.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dods/ogrdodsfielddefn.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dods/ogrdodslayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dods/ogrdodsdriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dods/ogrdodsgrid.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dods/ogrdodsdatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dods/ogr_dods.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dods/ogrdodssequencelayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dwg/ogrdgnv8driver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dwg/ogrdwg_blockmap.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dwg/ogrdgnv8datasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dwg/ogrdwgdriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dwg/ogr_dwg.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dwg/ogrdwg_hatch.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dwg/ogrdwglayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dwg/ogrdwg_dimension.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dwg/createdgnv8testfile_headers.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dwg/ogrdwgdatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dwg/ogrteigha.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dwg/createdgnv8testfile.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dwg/dgnv8_headers.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dwg/dwg_headers.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dwg/ogr_dgnv8.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dwg/ogrdgnv8layer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dwg/ogrteigha.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dwg/ogrdwgblockslayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/nas/ogrnasdriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/nas/ogr_nas.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/nas/ogrnasrelationlayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/nas/ogrnaslayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/nas/ogrnasdatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/nas/nashandler.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/nas/nasreaderp.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/nas/nasreader.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/idrisi/generate_test_files.c
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/idrisi/ogridrisidatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/idrisi/ogr_idrisi.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/idrisi/ogridrisilayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/idrisi/ogridrisidriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/ogrgeojsonreader.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/ogresrijsonreader.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/ogrtopojsondriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/libjson/json_util.c
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/libjson/json_tokener.c
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/libjson/json_inttypes.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/libjson/json_config.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/libjson/linkhash.c
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/libjson/json_object.c
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/libjson/json_object_private.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/libjson/json_object.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/libjson/linkhash.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/libjson/json_util.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/libjson/printbuf.c
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/libjson/json.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/libjson/json_tokener.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/libjson/arraylist.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/libjson/symbol_renames.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/libjson/json_object_iterator.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/libjson/config.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/libjson/json_c_version.c
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/libjson/arraylist.c
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/libjson/debug.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/libjson/debug.c
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/libjson/json_object_iterator.c
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/libjson/bits.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/libjson/printbuf.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/libjson/json_c_version.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/ogrgeojsonutils.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/ogrgeojsondriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/ogrtopojsonreader.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/ogrgeojsondatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/ogrgeojsonseqdriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/ogresrijsondriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/ogrgeojsonreader.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/ogrgeojsonwriter.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/ogrgeojsonwritelayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/ogrgeojsonwriter.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/ogrgeojsonutils.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/ogrgeojsonlayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/ogr_geojson.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/bna/ogrbnaparser.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/bna/ogrbnalayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/bna/ogr_bna.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/bna/ogrbnaparser.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/bna/ogrbnadatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/bna/ogrbnadriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mongodb/ogrmongodbdriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mongodb/mongocxx_headers.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/shape/shpopen.c
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/shape/dbfopen.c
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/shape/shp_vsi.c
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/shape/sbnsearch_wrapper.c
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/shape/ogrshapedatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/shape/ogrshapelayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/shape/sbnsearch.c
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/shape/shptree.c
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/shape/shptree_wrapper.c
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/shape/shp_vsi.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/shape/ogrshapedriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/shape/ogrshape.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/shape/gdal_shapelib_symbol_rename.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/shape/shape2ogr.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/shape/dbfopen_wrapper.c
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/shape/shapefil.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/shape/shpopen_wrapper.c
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gpkg/gdalgeopackagerasterband.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gpkg/ogrgeopackageselectlayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gpkg/ogrgeopackagelayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gpkg/ogr_geopackage.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gpkg/ogrgeopackagedatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gpkg/gpkgmbtilescommon.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gpkg/ogrgeopackagedriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gpkg/ogrgeopackageutility.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gpkg/ogrgeopackagetablelayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gpkg/ogrgeopackageutility.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/tiger/tigerfilebase.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/tiger/tigercompletechain.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/tiger/tigerpip.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/tiger/ogr_tiger.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/tiger/tigerspatialmetadata.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/tiger/tigeroverunder.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/tiger/tigerkeyfeatures.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/tiger/tigerlandmarks.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/tiger/tigerfeatureids.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/tiger/tigeraltname.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/tiger/tigerentitynames.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/tiger/ogrtigerdriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/tiger/tigerzipcodes.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/tiger/tigerpolygoneconomic.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/tiger/ogrtigerlayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/tiger/tigerpolygoncorrections.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/tiger/ogrtigerdatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/tiger/tigerpoint.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/tiger/tigertlidrange.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/tiger/tigerarealandmarks.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/tiger/tigerpolygon.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/tiger/tigeridhistory.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/tiger/tigerzipplus4.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/tiger/tigerpolychainlink.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/tiger/tigerzerocellid.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/xplane/ogrxplanedatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/xplane/ogr_xplane_nav_reader.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/xplane/ogrxplanelayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/xplane/ogr_xplane.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/xplane/ogr_xplane_apt_reader.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/xplane/ogr_xplane_awy_reader.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/xplane/ogr_xplane_reader.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/xplane/ogrxplanedriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/xplane/ogr_xplane_awy_reader.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/xplane/ogr_xplane_reader.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/xplane/ogr_xplane_fix_reader.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/xplane/ogr_xplane_nav_reader.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/xplane/ogr_xplane_apt_reader.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/xplane/ogr_xplane_fix_reader.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/csv/ogrcsvlayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/csv/ogr_csv.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/csv/ogrcsvdatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/csv/ogrcsvdriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/flatgeobuf/geometryreader.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/flatgeobuf/cplerrors.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/flatgeobuf/feature_generated.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/flatgeobuf/packedrtree.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/flatgeobuf/ogr_flatgeobuf.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/flatgeobuf/geometrywriter.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/flatgeobuf/flatbuffers/util.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/flatgeobuf/flatbuffers/base.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/flatgeobuf/flatbuffers/hash.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/flatgeobuf/flatbuffers/minireflect.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/flatgeobuf/flatbuffers/registry.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/flatgeobuf/flatbuffers/code_generators.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/flatgeobuf/flatbuffers/flatc.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/flatgeobuf/flatbuffers/reflection.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/flatgeobuf/flatbuffers/flatbuffers.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/flatgeobuf/flatbuffers/reflection_generated.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/flatgeobuf/flatbuffers/grpc.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/flatgeobuf/flatbuffers/idl.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/flatgeobuf/flatbuffers/flexbuffers.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/flatgeobuf/flatbuffers/stl_emulation.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/flatgeobuf/ogrflatgeobufdataset.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/flatgeobuf/packedrtree.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/flatgeobuf/header_generated.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/flatgeobuf/ogrflatgeobuflayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/flatgeobuf/geometryreader.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/flatgeobuf/geometrywriter.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/s57/ogrs57datasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/s57/s57tables.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/s57/ogrs57driver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/s57/ogr_s57.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/s57/s57.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/s57/s57writer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/s57/s57filecollector.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/s57/ogrs57layer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/s57/s57dump.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/s57/ddfrecordindex.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/s57/s57featuredefns.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/s57/s57classregistrar.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/s57/s57reader.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/pds/ogr_pds.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/pds/ogrpdsdriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/pds/ogrpdslayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/pds/ogrpdsdatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gpsbabel/ogrgpsbabeldriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gpsbabel/ogrgpsbabelwritedatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gpsbabel/ogr_gpsbabel.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gpsbabel/ogrgpsbabeldatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/oci/ogrocidatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/oci/fastload.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/oci/ogrociwritablelayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/oci/ogrocisession.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/oci/ogrocistatement.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/oci/ogrociloaderlayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/oci/ogrocistringbuf.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/oci/ogrocitablelayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/oci/ogrocistroke.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/oci/oci_utils.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/oci/ogrociselectlayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/oci/ogr_oci.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/oci/ocitest.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/oci/ogrocidriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/oci/ogrocilayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mvt/ogrmvtdataset.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mvt/mvt_tile.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mvt/mvt_tile.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mvt/mvtutils.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mvt/mvtutils.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mvt/mvt_tile_test.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/carto/ogrcartodriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/carto/ogrcartotablelayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/carto/ogr_carto.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/carto/ogrcartoresultlayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/carto/ogrcartodatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/carto/ogrcartolayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mssqlspatial/ogrmssqlspatialdriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mssqlspatial/ogr_mssqlspatial.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mssqlspatial/ogrmssqlspatiallayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mssqlspatial/ogrmssqlspatialtablelayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mssqlspatial/ogrmssqlspatialselectlayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mssqlspatial/ogrmssqlspatialdatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mssqlspatial/ogrmssqlgeometryparser.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mssqlspatial/ogrmssqlgeometrywriter.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mssqlspatial/ogrmssqlgeometryvalidator.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/lvbag/ogrlvbagdriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/lvbag/ogr_lvbag.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/lvbag/ogrlvbagdatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/lvbag/ogrlvbaglayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/amigocloud/ogr_amigocloud.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/amigocloud/ogramigocloudtablelayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/amigocloud/ogramigocloudresultlayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/amigocloud/ogramigoclouddriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/amigocloud/ogramigoclouddatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/amigocloud/ogramigocloudlayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mysql/ogrmysqllayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mysql/ogrmysqltablelayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mysql/ogrmysqldriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mysql/ogrmysqldatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mysql/ogr_mysql.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mysql/ogrmysqlresultlayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/grass/ogrgrassdatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/grass/ogrgrassdriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/grass/ogrgrasslayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/grass/ogrgrass.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/arcobjects/aolayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/arcobjects/aoutils.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/arcobjects/ogr_ao.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/arcobjects/aoutils.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/arcobjects/aodriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/arcobjects/aodatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/edigeo/ogredigeolayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/edigeo/ogredigeodriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/edigeo/ogr_edigeo.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/edigeo/ogredigeodatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/arcgen/ogr_arcgen.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/arcgen/ograrcgendatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/arcgen/ograrcgendriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/arcgen/ograrcgenlayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/sua/ogrsualayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/sua/ogr_sua.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/sua/ogrsuadatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/sua/ogrsuadriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/vfk/vfkreaderp.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/vfk/vfkreader.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/vfk/vfkfeaturesqlite.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/vfk/vfkdatablocksqlite.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/vfk/vfkpropertydefn.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/vfk/vfkproperty.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/vfk/vfkfeature.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/vfk/ogrvfkdatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/vfk/ogr_vfk.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/vfk/vfkreadersqlite.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/vfk/vfkdatablock.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/vfk/ogrvfklayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/vfk/vfkreader.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/vfk/ogrvfkdriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/osm/ogrosmdriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/osm/osm2osm.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/osm/gpb.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/osm/ogr_osm.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/osm/ogrosmdatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/osm/osm_parser.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/osm/ogrosmlayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/osm/osm_parser.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ogdi/ogrogdidatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ogdi/ogrogdilayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ogdi/ogrogdidriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ogdi/ogrogdi.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/cad/ogrcaddriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/cad/vsilfileio.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/cad/gdalcaddataset.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/cad/ogrcadlayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/cad/ogr_cad.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/cad/vsilfileio.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/cad/libopencad/cadheader.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/cad/libopencad/opencad.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/cad/libopencad/cadtables.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/cad/libopencad/cadobjects.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/cad/libopencad/cadclasses.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/cad/libopencad/opencad.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/cad/libopencad/cadlayer.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/cad/libopencad/cadfileio.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/cad/libopencad/caddictionary.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/cad/libopencad/dwg/io.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/cad/libopencad/dwg/r2000.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/cad/libopencad/dwg/io.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/cad/libopencad/dwg/r2000.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/cad/libopencad/caddictionary.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/cad/libopencad/cadfilestreamio.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/cad/libopencad/cadcolors.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/cad/libopencad/cadclasses.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/cad/libopencad/cadfile.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/cad/libopencad/cadobjects.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/cad/libopencad/cadgeometry.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/cad/libopencad/cadtables.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/cad/libopencad/cadfilestreamio.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/cad/libopencad/cadgeometry.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/cad/libopencad/cadlayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/cad/libopencad/cadfile.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/cad/libopencad/cadfileio.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/cad/libopencad/cadcolors.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/cad/libopencad/opencad_api.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/cad/libopencad/cadheader.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/pg/ogrpglayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/pg/ogrpgutility.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/pg/ogrpgdatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/pg/ogr_pg.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/pg/ogrpgdriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/pg/ogrpgutility.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/pg/ogrpgresultlayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/pg/ogrpgtablelayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/sqlite/ogrsqlitetablelayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/sqlite/ogrsqlitevirtualogr.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/sqlite/ogrsqlitedriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/sqlite/ogrsqliteexecutesql.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/sqlite/ogrsqlite3ext.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/sqlite/ogr_sqlite.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/sqlite/ogrsqlitesqlfunctions.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/sqlite/ogrsqlitesinglefeaturelayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/sqlite/ogrsqliteutility.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/sqlite/ogrsqliteapiroutines.c
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/sqlite/ogrsqlitelayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/sqlite/ogrsqliteselectlayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/sqlite/ogrsqliteregexp.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/sqlite/test_load_virtual_ogr.c
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/sqlite/ogrsqlitedatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/sqlite/rasterlite2.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/sqlite/ogrsqliteviewlayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/sqlite/ogrsqliteregexp.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/sqlite/rasterlite2_header.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/sqlite/ogrsqlitevfs.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/sqlite/ogrsqliteutility.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/sqlite/ogrsqlitevirtualogr.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/sqlite/ogrsqlitesqlfunctions.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/sqlite/ogrsqliteexecutesql.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gpx/ogr_gpx.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gpx/ogrgpxdriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gpx/ogrgpxdatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gpx/ogrgpxlayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/plscenes/ogrplscenesdriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/plscenes/ogr_plscenes.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/plscenes/ogrplscenesdatav1dataset.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/plscenes/ogrplscenesdatav1layer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/fme/ogrfmecacheindex.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/fme/ogrfmelayerdb.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/fme/ogrfmedatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/fme/fme2ogr_utils.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/fme/ogrfmedriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/fme/ogrfmelayercached.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/fme/fme2ogr.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/fme/ogrfmelayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/openfilegdb/ogr_openfilegdb.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/openfilegdb/filegdbindex.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/openfilegdb/ogropenfilegdbdriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/openfilegdb/ogropenfilegdbdatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/openfilegdb/filegdbtable_priv.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/openfilegdb/ogropenfilegdblayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/openfilegdb/filegdbtable.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/openfilegdb/filegdbtable.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/htf/ogr_htf.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/htf/ogrhtflayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/htf/ogrhtfdatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/htf/ogrhtfdriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geomedia/ogrgeomediadriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geomedia/ogrgeomedialayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geomedia/ogrgeomediaselectlayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geomedia/ogrgeomediadatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geomedia/ogrgeomediatablelayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geomedia/ogr_geomedia.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/xls/ogrxlsdriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/xls/ogrxlsdatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/xls/ogr_xls.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/xls/ogrxlslayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ntf/ogrntffeatureclasslayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ntf/ntf_codelist.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ntf/ntfdump.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ntf/ntfstroke.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ntf/ntf.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ntf/ogrntfdatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ntf/ntf_estlayers.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ntf/ogrntflayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ntf/ntfrecord.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ntf/ntf_generic.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ntf/ntffilereader.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ntf/ogrntfdriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ntf/ntf_raster.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/idb/idb_headers.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/idb/ogridbdriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/idb/ogridbselectlayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/idb/ogr_idb.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/idb/ogridbdatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/idb/ogridbtablelayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/idb/ogridblayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/sosi/fyba_melding.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/sosi/ogrsosidatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/sosi/ogr_sosi.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/sosi/ogrsosidatatypes.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/sosi/ogrsosilayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/sosi/ogrsosidatatypes.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/sosi/ogrsosidriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ngw/ogrngwdriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ngw/ogr_ngw.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ngw/ogrngwlayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ngw/gdalngwdataset.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ngw/ngw_api.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/walk/ogrwalkdriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/walk/ogrwalkdatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/walk/ogrwalktablelayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/walk/ogrwalklayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/walk/ogis_geometry_wkb_struct.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/walk/ogrwalkselectlayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/walk/ogrwalk.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/walk/ogrwalktool.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/vdv/ogrvdvdatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/vdv/ogr_vdv.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/xlsx/ogrxlsxdriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/xlsx/ogr_xlsx.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/xlsx/ogrxlsxdatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/kml/ogrkmllayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/kml/kmlutility.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/kml/ogrkmldriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/kml/ogrkmldatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/kml/kmlnode.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/kml/ogr_kml.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/kml/kml.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/kml/kml.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/kml/kmlvector.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/kml/kmlnode.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/kml/ogr2kmlgeometry.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/kml/kmlvector.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/libkml/ogrlibkmldriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/libkml/ogrlibkmlfeaturestyle.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/libkml/libkml_headers.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/libkml/ogrlibkmlstyle.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/libkml/ogrlibkmlfeaturestyle.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/libkml/ogrlibkmldatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/libkml/ogr_libkml.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/libkml/ogrlibkmlgeometry.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/libkml/ogrlibkmlfeature.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/libkml/ogrlibkmlgeometry.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/libkml/ogrlibkmllayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/libkml/ogrlibkmlstyle.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/libkml/ogrlibkmlfield.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/libkml/ogrlibkmlfeature.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/libkml/ogrlibkmlfield.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/rec/ogrrecdatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/rec/ogr_rec.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/rec/ll_recio.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/rec/ogrreclayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/rec/ogrrecdriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mitab/mitab_rawbinblock.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mitab/mitab_indfile.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mitab/mitab_mapheaderblock.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mitab/mitab_tabview.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mitab/mitab_utils.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mitab/mitab_mapfile.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mitab/mitab_feature.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mitab/mitab_maptoolblock.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mitab/mitab_tooldef.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mitab/mitab_ogr_datasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mitab/mitab_ogr_driver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mitab/mitab_feature_mif.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mitab/mitab_geometry.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mitab/mitab_tabfile.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mitab/mitab_miffile.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mitab/mitab_mapcoordblock.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mitab/mitab_ogr_driver.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mitab/mitab.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mitab/mitab_geometry.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mitab/mitab_tabseamless.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mitab/mitab_utils.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mitab/mitab_priv.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mitab/mitab_bounds.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mitab/mitab_coordsys.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mitab/mitab_idfile.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mitab/mitab_imapinfofile.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mitab/mitab_mapobjectblock.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mitab/mitab_spatialref.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mitab/mitab_middatafile.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mitab/mitab_mapindexblock.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mitab/mitab_datfile.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/segy/ogrsegydatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/segy/ogr_segy.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/segy/ogrsegylayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/segy/ogrsegydriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ogr_attrind.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/jml/ogrjmlwriterlayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/jml/ogrjmldataset.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/jml/ogrjmllayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/jml/ogr_jml.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/avc/avc_mbyte.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/avc/ogravce00datasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/avc/avc_rawbin.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/avc/ogravcbindriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/avc/avc_bin.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/avc/avc_misc.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/avc/ogr_avc.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/avc/avc_mbyte.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/avc/avc_binwr.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/avc/avc_e00parse.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/avc/ogravcbindatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/avc/avc_e00gen.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/avc/avc.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/avc/avc_e00write.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/avc/avc_e00read.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/avc/ogravce00layer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/avc/ogravcdatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/avc/ogravce00driver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/avc/ogravcbinlayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/avc/ogravclayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/georss/ogrgeorsslayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/georss/ogrgeorssdriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/georss/ogrgeorssdatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/georss/ogr_georss.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/svg/ogrsvgdatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/svg/ogr_svg.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/svg/ogrsvglayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/svg/ogrsvgdriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/wasp/ogrwasp.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/wasp/ogrwasplayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/wasp/ogrwaspdriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/wasp/ogrwaspdatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/sdts/ogr_sdts.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/sdts/ogrsdtslayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/sdts/ogrsdtsdriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/sdts/ogrsdtsdatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geoconcept/geoconcept.c
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geoconcept/geoconcept_syscoord.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geoconcept/geoconcept_syscoord.c
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geoconcept/ogrgeoconceptdatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geoconcept/ogrgeoconceptlayer.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geoconcept/ogrgeoconceptdriver.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geoconcept/ogrgeoconceptdriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geoconcept/ogrgeoconceptdatasource.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geoconcept/geoconcept.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geoconcept/ogrgeoconceptlayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/wfs/ogrwfsdatasource.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/wfs/ogroapifdriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/wfs/ogrwfslayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/wfs/ogrwfsjoinlayer.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/wfs/ogrwfsdriver.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/wfs/ogr_wfs.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/wfs/ogrwfsfilter.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrpgeogeometry.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogr_srs_esri_names.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrgeomediageometry.h
Examining data/gdal-3.2.0+dfsg/ogr/ogr_proj_p.h
Examining data/gdal-3.2.0+dfsg/ogr/ogr_geocoding.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrcurve.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ograpispy.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogr_spatialref.h
Examining data/gdal-3.2.0+dfsg/ogr/ogr_swq.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrcurvepolygon.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrgeomfielddefn.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogr_geometry.h
Examining data/gdal-3.2.0+dfsg/ogr/ogr_srs_erm.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrspatialreference.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrcompoundcurve.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogr_capi_test.c
Examining data/gdal-3.2.0+dfsg/ogr/ogr_libs.h
Examining data/gdal-3.2.0+dfsg/ogr/ogr_geo_utils.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrmultipoint.cpp
Examining data/gdal-3.2.0+dfsg/ogr/swq_parser.hpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrcurvecollection.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogr_xerces.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrtriangle.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogr_srs_api.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrfeaturequery.cpp
Examining data/gdal-3.2.0+dfsg/ogr/generate_encoding_table.c
Examining data/gdal-3.2.0+dfsg/ogr/ogr_proj_p.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrtriangulatedsurface.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogr2gmlgeometry.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrpgeogeometry.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrct.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrmulticurve.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogr_sfcgal.h
Examining data/gdal-3.2.0+dfsg/ogr/ogr_xerces_headers.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrfeaturedefn.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrmultilinestring.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrmultisurface.cpp
Examining data/gdal-3.2.0+dfsg/ogr/swq.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogr_fromepsg.cpp
Examining data/gdal-3.2.0+dfsg/ogr/swq_select.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrgeometryfactory.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrsurface.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogr_geo_utils.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrgeometry.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrpolyhedralsurface.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogr_srs_usgs.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogr_expat.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrlinestring.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrfeature.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogr_srs_esri.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrgeometrycollection.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrgeomediageometry.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogr_core.h
Examining data/gdal-3.2.0+dfsg/ogr/ogr_feature.h
Examining data/gdal-3.2.0+dfsg/ogr/ogr_expat.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogr_srs_panorama.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ograpispy.h
Examining data/gdal-3.2.0+dfsg/ogr/ogr_srs_ozi.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogr_srs_pci.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ograssemblepolygon.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogr_featurestyle.h
Examining data/gdal-3.2.0+dfsg/ogr/swq_op_general.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogr_geocoding.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogr_srs_dict.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogr_srsnode.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrmultipolygon.cpp
Examining data/gdal-3.2.0+dfsg/ogr/swq_expr_node.cpp
Examining data/gdal-3.2.0+dfsg/ogr/test_geo_utils.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrfeaturestyle.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrlinearring.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrcircularstring.cpp
Examining data/gdal-3.2.0+dfsg/ogr/swq_op_registrar.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogr_geos.h
Examining data/gdal-3.2.0+dfsg/ogr/ogr_api.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrfielddefn.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogr_xerces.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogr_p.h
Examining data/gdal-3.2.0+dfsg/ogr/ogrutils.cpp
Examining data/gdal-3.2.0+dfsg/ogr/swq_parser.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogr_srs_xml.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrpoint.cpp
Examining data/gdal-3.2.0+dfsg/ogr/ogrpolygon.cpp
Examining data/gdal-3.2.0+dfsg/ogr/gml2ogrgeometry.cpp
Examining data/gdal-3.2.0+dfsg/alg/gdalmatching.cpp
Examining data/gdal-3.2.0+dfsg/alg/gdalgeoloc.cpp
Examining data/gdal-3.2.0+dfsg/alg/viewshed.cpp
Examining data/gdal-3.2.0+dfsg/alg/gdaltransformer.cpp
Examining data/gdal-3.2.0+dfsg/alg/gdalcutline.cpp
Examining data/gdal-3.2.0+dfsg/alg/gdalmediancut.cpp
Examining data/gdal-3.2.0+dfsg/alg/gdal_alg.h
Examining data/gdal-3.2.0+dfsg/alg/gdalpansharpen.cpp
Examining data/gdal-3.2.0+dfsg/alg/armadillo_headers.h
Examining data/gdal-3.2.0+dfsg/alg/llrasterize.cpp
Examining data/gdal-3.2.0+dfsg/alg/gdal_simplesurf.h
Examining data/gdal-3.2.0+dfsg/alg/thinplatespline.h
Examining data/gdal-3.2.0+dfsg/alg/gdallinearsystem.h
Examining data/gdal-3.2.0+dfsg/alg/delaunay.c
Examining data/gdal-3.2.0+dfsg/alg/gdal_crs.cpp
Examining data/gdal-3.2.0+dfsg/alg/gdalgrid.h
Examining data/gdal-3.2.0+dfsg/alg/gdal_alg_priv.h
Examining data/gdal-3.2.0+dfsg/alg/contour.cpp
Examining data/gdal-3.2.0+dfsg/alg/gdalgridavx.cpp
Examining data/gdal-3.2.0+dfsg/alg/gdalchecksum.cpp
Examining data/gdal-3.2.0+dfsg/alg/gdalwarpkernel_opencl.h
Examining data/gdal-3.2.0+dfsg/alg/gdallinearsystem.cpp
Examining data/gdal-3.2.0+dfsg/alg/gdalwarpkernel_opencl.cpp
Examining data/gdal-3.2.0+dfsg/alg/gvgcpfit.h
Examining data/gdal-3.2.0+dfsg/alg/thinplatespline.cpp
Examining data/gdal-3.2.0+dfsg/alg/internal_libqhull/global.c
Examining data/gdal-3.2.0+dfsg/alg/internal_libqhull/io.h
Examining data/gdal-3.2.0+dfsg/alg/internal_libqhull/mem.h
Examining data/gdal-3.2.0+dfsg/alg/internal_libqhull/qset.c
Examining data/gdal-3.2.0+dfsg/alg/internal_libqhull/geom.h
Examining data/gdal-3.2.0+dfsg/alg/internal_libqhull/qhull_a.h
Examining data/gdal-3.2.0+dfsg/alg/internal_libqhull/stat.h
Examining data/gdal-3.2.0+dfsg/alg/internal_libqhull/libqhull.c
Examining data/gdal-3.2.0+dfsg/alg/internal_libqhull/random.c
Examining data/gdal-3.2.0+dfsg/alg/internal_libqhull/merge.c
Examining data/gdal-3.2.0+dfsg/alg/internal_libqhull/geom2.c
Examining data/gdal-3.2.0+dfsg/alg/internal_libqhull/geom.c
Examining data/gdal-3.2.0+dfsg/alg/internal_libqhull/userprintf_rbox.c
Examining data/gdal-3.2.0+dfsg/alg/internal_libqhull/mem.c
Examining data/gdal-3.2.0+dfsg/alg/internal_libqhull/io.c
Examining data/gdal-3.2.0+dfsg/alg/internal_libqhull/user.h
Examining data/gdal-3.2.0+dfsg/alg/internal_libqhull/user.c
Examining data/gdal-3.2.0+dfsg/alg/internal_libqhull/poly.h
Examining data/gdal-3.2.0+dfsg/alg/internal_libqhull/libqhull.h
Examining data/gdal-3.2.0+dfsg/alg/internal_libqhull/rboxlib.c
Examining data/gdal-3.2.0+dfsg/alg/internal_libqhull/poly2.c
Examining data/gdal-3.2.0+dfsg/alg/internal_libqhull/stat.c
Examining data/gdal-3.2.0+dfsg/alg/internal_libqhull/poly.c
Examining data/gdal-3.2.0+dfsg/alg/internal_libqhull/random.h
Examining data/gdal-3.2.0+dfsg/alg/internal_libqhull/userprintf.c
Examining data/gdal-3.2.0+dfsg/alg/internal_libqhull/qset.h
Examining data/gdal-3.2.0+dfsg/alg/internal_libqhull/merge.h
Examining data/gdal-3.2.0+dfsg/alg/internal_libqhull/usermem.c
Examining data/gdal-3.2.0+dfsg/alg/marching_squares/square.h
Examining data/gdal-3.2.0+dfsg/alg/marching_squares/segment_merger.h
Examining data/gdal-3.2.0+dfsg/alg/marching_squares/polygon_ring_appender.h
Examining data/gdal-3.2.0+dfsg/alg/marching_squares/utility.h
Examining data/gdal-3.2.0+dfsg/alg/marching_squares/level_generator.h
Examining data/gdal-3.2.0+dfsg/alg/marching_squares/contour_generator.h
Examining data/gdal-3.2.0+dfsg/alg/marching_squares/point.h
Examining data/gdal-3.2.0+dfsg/alg/gdalgrid.cpp
Examining data/gdal-3.2.0+dfsg/alg/gdalgrid_priv.h
Examining data/gdal-3.2.0+dfsg/alg/gdal_octave.cpp
Examining data/gdal-3.2.0+dfsg/alg/gdalsimplewarp.cpp
Examining data/gdal-3.2.0+dfsg/alg/gdal_tps.cpp
Examining data/gdal-3.2.0+dfsg/alg/gdalgridsse.cpp
Examining data/gdal-3.2.0+dfsg/alg/gdal_rpc.cpp
Examining data/gdal-3.2.0+dfsg/alg/internal_qhull_headers.h
Examining data/gdal-3.2.0+dfsg/alg/gdalsievefilter.cpp
Examining data/gdal-3.2.0+dfsg/alg/gdalapplyverticalshiftgrid.cpp
Examining data/gdal-3.2.0+dfsg/alg/polygonize.cpp
Examining data/gdal-3.2.0+dfsg/alg/gdalwarper.cpp
Examining data/gdal-3.2.0+dfsg/alg/gdaldither.cpp
Examining data/gdal-3.2.0+dfsg/alg/gdalwarpoperation.cpp
Examining data/gdal-3.2.0+dfsg/alg/gdalwarper.h
Examining data/gdal-3.2.0+dfsg/alg/gdaltransformgeolocs.cpp
Examining data/gdal-3.2.0+dfsg/alg/gdal_simplesurf.cpp
Examining data/gdal-3.2.0+dfsg/alg/rasterfill.cpp
Examining data/gdal-3.2.0+dfsg/alg/gdalrasterize.cpp
Examining data/gdal-3.2.0+dfsg/alg/gdalpansharpen.h
Examining data/gdal-3.2.0+dfsg/alg/gdalrasterpolygonenumerator.cpp
Examining data/gdal-3.2.0+dfsg/alg/gdalproximity.cpp
Examining data/gdal-3.2.0+dfsg/alg/gdalwarpkernel.cpp
Examining data/gdal-3.2.0+dfsg/third_party/LercLib/Lerc_c_api.h
Examining data/gdal-3.2.0+dfsg/third_party/LercLib/BitMask.cpp
Examining data/gdal-3.2.0+dfsg/third_party/LercLib/Lerc.h
Examining data/gdal-3.2.0+dfsg/third_party/LercLib/Defines.h
Examining data/gdal-3.2.0+dfsg/third_party/LercLib/Huffman.cpp
Examining data/gdal-3.2.0+dfsg/third_party/LercLib/Lerc.cpp
Examining data/gdal-3.2.0+dfsg/third_party/LercLib/Lerc2.cpp
Examining data/gdal-3.2.0+dfsg/third_party/LercLib/RLE.h
Examining data/gdal-3.2.0+dfsg/third_party/LercLib/Lerc_c_api_impl.cpp
Examining data/gdal-3.2.0+dfsg/third_party/LercLib/Lerc_types.h
Examining data/gdal-3.2.0+dfsg/third_party/LercLib/RLE.cpp
Examining data/gdal-3.2.0+dfsg/third_party/LercLib/BitMask.h
Examining data/gdal-3.2.0+dfsg/third_party/LercLib/BitStuffer2.cpp
Examining data/gdal-3.2.0+dfsg/third_party/LercLib/Huffman.h
Examining data/gdal-3.2.0+dfsg/third_party/LercLib/BitStuffer2.h
Examining data/gdal-3.2.0+dfsg/third_party/LercLib/Lerc2.h

FINAL RESULTS:

data/gdal-3.2.0+dfsg/frmts/sentinel2/sentinel2dataset.cpp:871:35:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
    int nBytes = static_cast<int>(readlink(pszFilename, szPointerFilename,
data/gdal-3.2.0+dfsg/frmts/sentinel2/sentinel2dataset.cpp:2277:35:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
    int nBytes = static_cast<int>(readlink(pszFilename, szPointerFilename,
data/gdal-3.2.0+dfsg/frmts/sentinel2/sentinel2dataset.cpp:2365:35:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
    int nBytes = static_cast<int>(readlink(pszFilename, szPointerFilename,
data/gdal-3.2.0+dfsg/frmts/vrt/vrtdataset.cpp:860:17:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
                readlink( currentVrtFilename,
data/gdal-3.2.0+dfsg/gcore/gdalopeninfo.cpp:323:17:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
                readlink( pszFilename, szPointerFilename, nBufSize ) );
data/gdal-3.2.0+dfsg/gcore/gdalpython.cpp:309:29:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
                            readlink( osPythonBinary, szPointerFilename,
data/gdal-3.2.0+dfsg/port/cpl_getexecpath.cpp:102:26:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
    ssize_t nResultLen = readlink( osExeLink, pszPathBuf, nMaxLength );
data/gdal-3.2.0+dfsg/alg/gdalpansharpen.cpp:1210:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        snprintf(szBuffer1, sizeof(szBuffer1), "PIXELOFFSET=" CPL_FRMT_GIB,
data/gdal-3.2.0+dfsg/alg/gdalpansharpen.cpp:1212:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        snprintf(szBuffer2, sizeof(szBuffer2), "LINEOFFSET=" CPL_FRMT_GIB,
data/gdal-3.2.0+dfsg/alg/internal_libqhull/global.c:2029:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(buf, "  %s", option);
data/gdal-3.2.0+dfsg/alg/internal_libqhull/random.c:52:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(command, s);
data/gdal-3.2.0+dfsg/alg/internal_libqhull/random.c:84:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(command, s);
data/gdal-3.2.0+dfsg/alg/internal_libqhull/rboxlib.c:353:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(t+1, t+3); /* remove " t " */
data/gdal-3.2.0+dfsg/alg/internal_libqhull/userprintf.c:58:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(fp, fmt, args);
data/gdal-3.2.0+dfsg/alg/internal_libqhull/userprintf_rbox.c:50:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(fp, fmt, args);
data/gdal-3.2.0+dfsg/apps/gdal2ogr.c:188:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(pszDstFilenameCSVT, pszDstFilename);
data/gdal-3.2.0+dfsg/apps/gdal_translate_bin.cpp:336:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy( pszSubDest, osTemp.c_str() );
data/gdal-3.2.0+dfsg/apps/gdalinfo_lib.cpp:170:9:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        vfprintf(stdout, pszFormat, args );
data/gdal-3.2.0+dfsg/frmts/adrg/adrgdataset.cpp:332:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(str, pszStr);
data/gdal-3.2.0+dfsg/frmts/adrg/adrgdataset.cpp:344:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf( str, size+1, formatStr, val);
data/gdal-3.2.0+dfsg/frmts/blx/blx.h:126:19:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define BLXdebug0 printf
data/gdal-3.2.0+dfsg/frmts/blx/blx.h:127:19:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define BLXdebug1 printf
data/gdal-3.2.0+dfsg/frmts/blx/blx.h:128:19:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define BLXdebug2 printf
data/gdal-3.2.0+dfsg/frmts/blx/blx.h:129:19:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define BLXerror0 printf
data/gdal-3.2.0+dfsg/frmts/blx/blx.h:130:20:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define BLXnotice1 printf
data/gdal-3.2.0+dfsg/frmts/blx/blx.h:131:20:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define BLXnotice2 printf
data/gdal-3.2.0+dfsg/frmts/ceos2/ceos.c:267:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf( temp_buf, field_size+1, szPrintfFormat, *(int *) value);
data/gdal-3.2.0+dfsg/frmts/ceos2/ceos.c:274:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf( temp_buf, field_size+1, szPrintfFormat, *(double *)value);
data/gdal-3.2.0+dfsg/frmts/ceos2/ceos.c:281:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf( temp_buf, field_size+1, szPrintfFormat, *(double *)value);
data/gdal-3.2.0+dfsg/frmts/ceos2/sar_ceosdataset.cpp:1719:17:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                snprintf( szMadeBasename, sizeof(szMadeBasename),
data/gdal-3.2.0+dfsg/frmts/dted/dted_api.c:115:13:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
            fprintf( stderr,
data/gdal-3.2.0+dfsg/frmts/dted/dted_api.c:161:16:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
               fprintf( stderr,
data/gdal-3.2.0+dfsg/frmts/dted/dted_api.c:179:13:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
            fprintf( stderr,
data/gdal-3.2.0+dfsg/frmts/dted/dted_api.c:216:9:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        fprintf( stderr,
data/gdal-3.2.0+dfsg/frmts/dted/dted_api.c:264:9:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        fprintf( stderr,
data/gdal-3.2.0+dfsg/frmts/dted/dted_api.c:496:9:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        fprintf( stderr,
data/gdal-3.2.0+dfsg/frmts/dted/dted_api.c:521:9:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        fprintf( stderr,
data/gdal-3.2.0+dfsg/frmts/dted/dted_api.c:550:17:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                fprintf( stderr,
data/gdal-3.2.0+dfsg/frmts/dted/dted_api.c:609:9:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        fprintf( stderr,
data/gdal-3.2.0+dfsg/frmts/dted/dted_api.c:624:9:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        fprintf( stderr,
data/gdal-3.2.0+dfsg/frmts/dted/dted_api.c:657:21:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                    fprintf( stderr,
data/gdal-3.2.0+dfsg/frmts/dted/dted_api.c:693:17:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                fprintf( stderr,
data/gdal-3.2.0+dfsg/frmts/dted/dted_api.c:707:13:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
            fprintf( stderr,
data/gdal-3.2.0+dfsg/frmts/dted/dted_api.c:739:9:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        fprintf( stderr,
data/gdal-3.2.0+dfsg/frmts/dted/dted_api.c:791:9:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        fprintf( stderr,
data/gdal-3.2.0+dfsg/frmts/dted/dted_create.c:82:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf( (char*)achField + nOffset, nTargetLenSize - nOffset,
data/gdal-3.2.0+dfsg/frmts/envisat/EnvisatFile.c:1074:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf( string_value, sizeof(string_value), format, value );
data/gdal-3.2.0+dfsg/frmts/envisat/EnvisatFile.c:1190:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        snprintf( string_value, sizeof(string_value), format, value );
data/gdal-3.2.0+dfsg/frmts/envisat/envisatdataset.cpp:705:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy( szTrimmedName, pszFilename );
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:569:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy (buffer, MonthName[month - 1]);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:572:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy (buffer, DayName[(4 + totDay) % 7]);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:576:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy (buffer, MonthName[month - 1]);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:580:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy (buffer, DayName[(4 + totDay) % 7]);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:613:10:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
         strcat (buffer, temp);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:617:10:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
         strcat (buffer, temp);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:625:10:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
         strcat (buffer, temp);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:629:10:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
         strcat (buffer, temp);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:637:10:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
         strcat (buffer, temp);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:641:10:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
         strcat (buffer, temp);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:645:10:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
         strcat (buffer, temp);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:653:10:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
         strcat (buffer, temp);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:676:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy (buffer, temp);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:1412:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy (buffer, MonthName[mon - 1]);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:1440:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy (buffer, MonthName[mon - 1]);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/degrib1.cpp:779:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy (inv->element, varName);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/degrib1.cpp:2025:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy (meta->element, varName);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/hazard.c:808:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (haz->english[i], buffer);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/hazard.c:923:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (haz->english[0], data);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaname.cpp:3425:19:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                  strcpy (*name, NDFD_Override[i].NDFDname);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaname.cpp:3427:19:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                  strcpy (*comment, table[subcat].comment);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaname.cpp:3456:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy (*name, table[subcat].name);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaname.cpp:3458:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy (*comment, table[subcat].comment);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaname.cpp:3494:16:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
               strcpy (*name, local[i].name);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaname.cpp:3496:16:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
               strcpy (*comment, local[i].comment);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaname.cpp:3578:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy (*unit, overrideUnit);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaparse.cpp:46:8:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#undef printf
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaparse.cpp:47:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define printf debug_printf
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaparse.cpp:492:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy (Wx->data[Wx->dataLen - 1], buffer);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaparse.cpp:527:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (Wx->data[Wx->dataLen - 1], buffer);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaparse.cpp:617:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy (Hazard->data[Hazard->dataLen - 1], buffer);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaparse.cpp:652:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (Hazard->data[Hazard->dataLen - 1], buffer);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaprint.cpp:776:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf (buffer, "%d %s", sect4->Interval[i].lenTime,
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaprint.cpp:781:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf (buffer, "%d %s", sect4->Interval[i].timeIncr,
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaprint.cpp:817:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf (buffer, "%d %s", sect4->Interval[i].lenTime,
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaprint.cpp:822:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf (buffer, "%d %s", sect4->Interval[i].timeIncr,
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaprint.cpp:873:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf (buffer, "%d %s", sect4->Interval[i].lenTime,
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaprint.cpp:878:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf (buffer, "%d %s", sect4->Interval[i].timeIncr,
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaprint.cpp:925:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf (buffer, "%d %s", sect4->Interval[i].lenTime,
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaprint.cpp:930:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf (buffer, "%d %s", sect4->Interval[i].timeIncr,
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaprint.cpp:1121:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (buffer, "'%10s'", pds1->cluster.Member);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/myerror.c:127:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy (buffer + ipos, p1);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/myerror.c:169:22:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                     sprintf (bufpart, format, va_arg (ap, sInt4));
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/myerror.c:183:22:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                     sprintf (bufpart, format, va_arg (ap, int));
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/myerror.c:192:16:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
               sprintf (bufpart, format, va_arg (ap, double));
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/myerror.c:200:16:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
               sprintf (bufpart, format, va_arg (ap, double));
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/myerror.c:208:16:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
               sprintf (bufpart, format, va_arg (ap, double));
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/myerror.c:242:22:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                     strcpy (buffer + ipos, *Sval);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/myerror.c:444:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat (preBuffer, errBuffer);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/myerror.c:536:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat (buff, warnBuff);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/myerror.c:550:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat (warnBuff, buff);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/myutil.c:194:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy (argv[argc], head);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/myutil.c:516:10:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
         sprintf (argv[argc], "%s/%s", dirName, dp->d_name);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/myutil.c:622:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy (*tail, ptr);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/tdlpack.cpp:443:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy (*element, pds->Descriptor);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/weather.c:2265:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(target + target_length, string_to_append);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/weather.c:2310:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (ugly->english[i], buffer);
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:15847:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(szOpeningFlag, bAppend ? "r+" : "w+");
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:19683:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat( pszModFmt, fmt );
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_citation.cpp:267:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy (name, pStr);
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_wkt_srs.cpp:2571:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat(outPeStr, pszPEString);
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_config.h:9:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#ifdef sprintf
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_config.h:10:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#undef sprintf
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_config.h:12:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#define sprintf CPLsprintf
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_names.c:271:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(gtif->szTmpBufferForGTIFValueNameEx,
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_new.c:39:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(stderr, msg, list);
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_normalize.c:159:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(szEPSGName, "%s / UTM zone %d%c",
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_normalize.c:2740:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( szFormat, "%%3dd%%2d\'%%%d.%df\"%s",
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_normalize.c:2742:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf( szBuffer, szFormat, nDegrees, nMinutes, dfSeconds );
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_print.c:68:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(message,FMT_GEOTIFF "\n");
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_print.c:70:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(message, FMT_VERSION,gtif->gt_version);
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_print.c:72:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(message, FMT_REV,gtif->gt_rev_major,
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_print.c:76:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(message,"   %s\n",FMT_TAGS); print(message,aux);
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_print.c:78:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(message,"      %s\n",FMT_TAGEND); print(message,aux);
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_print.c:80:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(message,"   %s\n",FMT_KEYS); print(message,aux);
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_print.c:86:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(message,"      %s\n",FMT_KEYEND); print(message,aux);
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_print.c:88:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(message,"   %s\n",FMT_GEOEND); print(message,aux);
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_print.c:124:4:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
			sprintf(message,FMT_DOUBLE,*data++);
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_print.c:149:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(message," (%s,%d): ",GTIFTypeName(key->gk_type),count);
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_print.c:206:17:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                sprintf(message,FMT_DOUBLE ,*dptr);
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_print.c:229:21:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                    sprintf(message,FMT_SHORT,*sptr);
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_print.c:277:10:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    if (!sscanf(message,FMT_VERSION,(short unsigned*)&gtif->gt_version)) return 0;
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_print.c:279:9:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    if (sscanf(message,FMT_REV,(short unsigned*)&gtif->gt_rev_major,
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geotiff_proj4.c:1364:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat( szProjection, szUnits );
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_compress.c:209:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(cd->info->name, name);
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_extension.c:105:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(psLink->name, name);
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_getimage.c:110:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(emsg, "Missing needed %s tag", photoTag);
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_getimage.c:121:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(emsg,
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_getimage.c:145:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(emsg, "Sorry, can not handle RGB image with %s=%d",
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_getimage.c:155:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
					sprintf(emsg,
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_getimage.c:161:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
					sprintf(emsg,
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_getimage.c:170:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(emsg, "Sorry, LogL data must have %s=%d",
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_getimage.c:178:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(emsg, "Sorry, LogLuv data must have %s=%d or %d",
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_getimage.c:183:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(emsg, "Sorry, can not handle LogLuv images with %s=%d",
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_getimage.c:188:33:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                                sprintf(emsg,
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_getimage.c:197:33:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                                sprintf(emsg,
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_getimage.c:206:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(emsg, "Sorry, can not handle image with %s=%d",
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_getimage.c:354:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(emsg, "Missing needed %s tag", photoTag);
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_getimage.c:386:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(emsg,
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_getimage.c:423:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(emsg, "Sorry, can not handle RGB image with %s=%d",
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_getimage.c:433:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
					sprintf(emsg, "Sorry, can not handle separated image with %s=%d",
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_getimage.c:438:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
					sprintf(emsg, "Sorry, can not handle separated image with %s=%d",
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_getimage.c:446:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(emsg, "Sorry, LogL data must have %s=%d",
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_getimage.c:456:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(emsg, "Sorry, LogLuv data must have %s=%d or %d",
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_getimage.c:461:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(emsg, "Sorry, can not handle LogLuv images with %s=%d",
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_getimage.c:472:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(emsg, "Sorry, can not handle image with %s=%d",
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_ojpeg.c:626:4:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			fprintf(fd," " TIFF_UINT64_FORMAT,(TIFF_UINT64_T)sp->qtable_offset[m]);
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_ojpeg.c:633:4:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			fprintf(fd," " TIFF_UINT64_FORMAT,(TIFF_UINT64_T)sp->dctable_offset[m]);
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_ojpeg.c:640:4:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			fprintf(fd," " TIFF_UINT64_FORMAT,(TIFF_UINT64_T)sp->actable_offset[m]);
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_open.c:125:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(tif->tif_name, name);
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_vsi.c:206:2:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	vfprintf(stderr, fmt, ap);
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_vsi.c:216:2:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	vfprintf(stderr, fmt, ap);
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tiffiop.h:59:8:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#undef snprintf
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tiffiop.h:60:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define snprintf _TIFF_snprintf_f
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tiffiop.h:61:12:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
extern int snprintf(char* str, size_t size, const char* format, ...);
data/gdal-3.2.0+dfsg/frmts/gxf/gxf_ogcwkt.c:649:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy( szWKT, szGCS );
data/gdal-3.2.0+dfsg/frmts/gxf/gxfopen.c:139:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(pszTmp, papszReturn[nReturnLineCount-1]);
data/gdal-3.2.0+dfsg/frmts/gxf/gxfopen.c:143:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(pszTmp + (strlen(papszReturn[nReturnLineCount-1]) - 1), pszTrimmedLine);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:91:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
EHopen(const char *filename, intn access)
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:137:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (access != DFACC_READ)
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:169:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	    switch (access)
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:375:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		    strcat(errbuf, filename);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:414:39:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		HEreport("Access Code: %d (%s).\n", access, filename);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:496:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	 uint8 * access)
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:625:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(filename, fname);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:665:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    uint8           access;	/* Access code */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:676:67:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    status = EHchkfid(fid, "EHgetversion", &dum, &sdInterfaceID, &access);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:1129:6:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	    strcat(liststr, dstr);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:1177:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        const char *access)
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:1234:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		    id = Vattach(fid, *(refs + i), access);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:1264:39:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		    id = VSattach(fid, *(refs + i), access);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:1339:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(tempdimlist, dimlist);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:2036:6:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	    strcat(utlstr, colon2 + 1);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:2042:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(utlstr, utlstr2);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:2098:6:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	    strcat(utlstr, colon2 + 1);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:2104:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(utlstr, utlstr2);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:2192:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(utlstr, colon + 1);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:2267:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(utlstr, metastr);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:2277:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(utlstr, metastr);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:2286:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(utlstr, metastr);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:2295:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(utlstr, metastr);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:2417:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(retstr, parameter);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:3310:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(attrnames, name);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:3314:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(attrnames, name);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:3431:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy(objectlist, name);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:3435:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		    strcat(objectlist, name);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:1075:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(projparmbuf, utlbuf);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:2033:7:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
		    sscanf(&utlstr[1], fmt,
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:2664:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(dimlist, dimstr);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:2808:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(errmsg, errmsg1);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:2809:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(errmsg, errmsg2);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:2865:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(dimbuf, dimlist);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:2869:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(dimbuf, dimlist);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:2875:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(dimbuf, dimlist);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:2882:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(dimlist0, dimbuf);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:2958:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy(utlbuf, dimcheck);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:2963:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		    strcat(utlbuf, dimcheck);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:3081:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		    strcat(GDXSDname, fieldname);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:3128:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		    strcat(GDXSDdims, dimlist0);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:3191:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		    strcat(utlbuf, gridname);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:3354:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		    strcat(utlbuf2, parmbuf);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:3364:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		    strcat(utlbuf2, parmbuf);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:3367:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(utlbuf, utlbuf2);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:3393:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		    strcat(utlbuf2, parmbuf);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:3396:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(utlbuf, utlbuf2);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:4486:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(dimnames, utlstr);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:4661:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(fieldlist, utlstr);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:4836:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(utlstr, &valName[0][0]);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:5004:6:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	    strcat(name, fieldname);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:5075:6:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	    strcat(name, fieldname);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:5484:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(utlbuf, nambuf);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:5491:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(utlbuf, nambuf);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:5535:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(dimbuf2, gridname);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:8804:21:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                    strcpy(GDXRegion[i]->DimNamePtr[j],GDXRegion[oldregionID]->DimNamePtr[j]);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:409:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(utlbuf, utlbuf2);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:1646:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(dimlist, dimstr);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:2232:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(dimbuf, dimlist);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:2274:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy(utlbuf, dimcheck);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:2279:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		    strcat(utlbuf, dimcheck);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:2448:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(utlbuf, fieldname);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:2561:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(SWXSDname, fieldname);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:2607:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(SWXSDdims, dimlist);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:2642:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(utlbuf, swathname);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:2736:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		    strcat(utlbuf2, compparmbuf);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:2746:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		    strcat(utlbuf2, compparmbuf);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:2751:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(utlbuf, utlbuf2);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:3419:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(dimnames, utlstr);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:3569:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(dimmaps, utlstr);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:3576:8:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			    strcat(dimmaps, utlstr);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:3735:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(idxmaps, utlstr);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:3753:8:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			    strcat(idxmaps, utlstr);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:3930:8:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			    strcat(utlstr, utlstr2);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:3947:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(fieldlist, utlstr);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:4273:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(utlstr, &valName[0][0]);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:6029:16:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        (void) strcpy(geodim,dimlist);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:7080:23:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                      strcpy(geodim, tgeodim);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:7103:23:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                      strcpy(geodim,dimlist);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:7104:23:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                      strcpy(dimlist,dgeodim);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:8294:19:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                  strcpy(geodim, tgeodim);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:8319:23:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                      strcpy(geodim,dimlist);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:8320:23:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                      strcpy(dimlist,dgeodim);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:9514:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
       strcpy(tfieldname, dfieldlist);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:9520:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
       strcpy(tfieldname, fieldname);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:9739:6:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	    strcat(name, fieldname);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:9806:6:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	    strcat(name, fieldname);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:10303:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(utlbuf, nambuf);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:10314:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(utlbuf, nambuf);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:10373:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(dimbuf2, swathname);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf4dataset.cpp:180:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat( pszString, pszField );
data/gdal-3.2.0+dfsg/frmts/hdf5/hdf5dataset.cpp:927:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(szValue, osVal.c_str());
data/gdal-3.2.0+dfsg/frmts/hfa/hfadataset.cpp:1367:21:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                    strcpy(&pachColData[nNewMaxChars*i], papszStrList[i]);
data/gdal-3.2.0+dfsg/frmts/hfa/hfadataset.cpp:2380:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        snprintf(szBuf, 31, CPL_FRMT_GUIB, panHistValues[nBin]);
data/gdal-3.2.0+dfsg/frmts/hfa/hfadataset.cpp:2392:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(pszBinValues + nBinValuesLen, szBuf);
data/gdal-3.2.0+dfsg/frmts/hfa/hfadataset.cpp:3233:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(&pachColData[nMaxNumChars * i],
data/gdal-3.2.0+dfsg/frmts/hfa/hfadataset.cpp:6066:21:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                    strcat(pszBinValues + nBinValuesLen,
data/gdal-3.2.0+dfsg/frmts/hfa/hfaopen.cpp:1785:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(psInfo->pszDictionary, aszDefaultDD[iChunk]);
data/gdal-3.2.0+dfsg/frmts/idrisi/IdrisiDataset.cpp:484:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy( pszNewLine, pszKey );
data/gdal-3.2.0+dfsg/frmts/idrisi/IdrisiDataset.cpp:485:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat( pszNewLine, pszSeparator );
data/gdal-3.2.0+dfsg/frmts/idrisi/IdrisiDataset.cpp:486:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat( pszNewLine, pszValue );
data/gdal-3.2.0+dfsg/frmts/idrisi/IdrisiDataset.cpp:919:13:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
            sscanf( poDS->papszRDC[++nLine], rdcCODE_N, &nCode );//assign legend cats to nCode
data/gdal-3.2.0+dfsg/frmts/idrisi/IdrisiDataset.cpp:929:25:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
                        sscanf( poDS->papszRDC[++nLine], rdcCODE_N, &nCode );
data/gdal-3.2.0+dfsg/frmts/idrisi/IdrisiDataset.cpp:2462:9:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
        sscanf( pszRefSystemLower, rstUTM, &nZone, &cNorth );
data/gdal-3.2.0+dfsg/frmts/idrisi/IdrisiDataset.cpp:2479:9:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
        sscanf( pszRefSystemLower, rstSPC, &nNAD, szState, &nZone );
data/gdal-3.2.0+dfsg/frmts/idrisi/IdrisiDataset.cpp:3299:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pOutput, pInput);
data/gdal-3.2.0+dfsg/frmts/iso8211/ddffielddefn.cpp:127:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy( pszNewFormatControls, _formatControls );
data/gdal-3.2.0+dfsg/frmts/iso8211/ddffielddefn.cpp:132:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat( pszNewFormatControls, poNewSFDefn->GetFormat() );
data/gdal-3.2.0+dfsg/frmts/iso8211/ddffielddefn.cpp:150:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat( _arrayDescr, poNewSFDefn->GetName() );
data/gdal-3.2.0+dfsg/frmts/iso8211/ddffielddefn.cpp:654:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat( pszDest + iDst, pszExpandedContents );
data/gdal-3.2.0+dfsg/frmts/iso8211/ddffielddefn.cpp:715:17:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                strcat( pszDest + iDst, pszExpandedContents );
data/gdal-3.2.0+dfsg/frmts/iso8211/ddfmodule.cpp:468:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy( achDirEntry, papoFieldDefns[iField]->GetName() );
data/gdal-3.2.0+dfsg/frmts/iso8211/ddfmodule.cpp:470:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        snprintf( achDirEntry + _sizeFieldTag, sizeof(achDirEntry) - _sizeFieldTag,
data/gdal-3.2.0+dfsg/frmts/iso8211/ddfmodule.cpp:473:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        snprintf( achDirEntry + _sizeFieldTag + _sizeFieldLength,
data/gdal-3.2.0+dfsg/frmts/iso8211/ddfrecord.cpp:1566:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        snprintf( pachData + nEntrySize * iField,
data/gdal-3.2.0+dfsg/frmts/jp2kak/jp2kakdataset.h:198:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat(m_pszError, string);
data/gdal-3.2.0+dfsg/frmts/jp2kak/vsil_target.h:47:46:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    void open(const char *fname, const char *access )
data/gdal-3.2.0+dfsg/frmts/jp2kak/vsil_target.h:50:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
            file = VSIFOpenL( fname, access );
data/gdal-3.2.0+dfsg/frmts/jp2lura/jp2luradataset.cpp:883:17:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                snprintf(pcMsg, sizeof(pcMsg), \
data/gdal-3.2.0+dfsg/frmts/jp2lura/jp2luradataset.cpp:1385:17:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                snprintf(pcMsg, sizeof(pcMsg), \
data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jerror.c:200:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(buffer, msgtext, err->msg_parm.s);
data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jerror.c:202:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(buffer, msgtext,
data/gdal-3.2.0+dfsg/frmts/jpeg2000/jpeg2000dataset.cpp:1077:21:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                    strcat( pszOptionBuf, papszOptions[i] );
data/gdal-3.2.0+dfsg/frmts/jpipkak/jpipkakdataset.cpp:84:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat( m_pszError, string );
data/gdal-3.2.0+dfsg/frmts/kea/keaband.cpp:261:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        snprintf( szBuf, 31, CPL_FRMT_GUIB, (GUIntBig)pTable->GetValueAsDouble(nBin, nCol) );
data/gdal-3.2.0+dfsg/frmts/kea/keaband.cpp:274:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat( pszBinValues+nBinValuesLen, szBuf );
data/gdal-3.2.0+dfsg/frmts/kmlsuperoverlay/kmlsuperoverlaydataset.cpp:2296:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(sDesc.szExtJ, szExt);
data/gdal-3.2.0+dfsg/frmts/kmlsuperoverlay/kmlsuperoverlaydataset.cpp:2299:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(sDesc.szExtI, szExt);
data/gdal-3.2.0+dfsg/frmts/kmlsuperoverlay/kmlsuperoverlaydataset.cpp:2312:21:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                    strcpy(aosDescs[level-1].szExtJ, szExt);
data/gdal-3.2.0+dfsg/frmts/kmlsuperoverlay/kmlsuperoverlaydataset.cpp:2320:21:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                    strcpy(aosDescs[level-1].szExtI, szExt);
data/gdal-3.2.0+dfsg/frmts/l1b/l1bdataset.cpp:1406:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(szDatasetName, pszFilename);
data/gdal-3.2.0+dfsg/frmts/leveller/levellerdataset.cpp:518:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(ds.m_szElevUnits, psz);
data/gdal-3.2.0+dfsg/frmts/leveller/levellerdataset.cpp:1339:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(m_pszProjection, szWKT);
data/gdal-3.2.0+dfsg/frmts/msg/msgdataset.cpp:155:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    bool fPrologueExists = (access(sPrologueFileName.c_str(), 0) == 0);
data/gdal-3.2.0+dfsg/frmts/msg/msgdataset.cpp:162:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      fPrologueExists = (access(sPrologueFileName.c_str(), 0) == 0);
data/gdal-3.2.0+dfsg/frmts/msg/msgdataset.cpp:168:28:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        fPrologueExists = (access(sPrologueFileName.c_str(), 0) == 0);
data/gdal-3.2.0+dfsg/frmts/msg/msgdataset.cpp:349:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    bool fPrologueExists = (access(sPrologueFileName.c_str(), 0) == 0);
data/gdal-3.2.0+dfsg/frmts/msg/msgdataset.cpp:356:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      fPrologueExists = (access(sPrologueFileName.c_str(), 0) == 0);
data/gdal-3.2.0+dfsg/frmts/msg/msgdataset.cpp:362:28:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        fPrologueExists = (access(sPrologueFileName.c_str(), 0) == 0);
data/gdal-3.2.0+dfsg/frmts/msg/msgdataset.cpp:383:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    while ((access(input_file.c_str(), 0) != 0) && (iStrip <= poDSIn->command.iNrStrips(iChannel))) // compensate for missing strips
data/gdal-3.2.0+dfsg/frmts/msg/msgdataset.cpp:522:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access(strip_input_file.c_str(), 0) == 0) // does it exist?
data/gdal-3.2.0+dfsg/frmts/netcdf/netcdfdataset.cpp:1488:25:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                        snprintf(szMetaTemp, sizeof(szMetaTemp), CPL_FRMT_GIB, nData);
data/gdal-3.2.0+dfsg/frmts/netcdf/netcdfdataset.cpp:1497:25:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                        snprintf(szMetaTemp, sizeof(szMetaTemp), CPL_FRMT_GUIB, unData);
data/gdal-3.2.0+dfsg/frmts/netcdf/netcdfdataset.cpp:9413:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pszNewHist, strtime);
data/gdal-3.2.0+dfsg/frmts/netcdf/netcdfdataset.cpp:9414:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(pszNewHist, pszAddHist);
data/gdal-3.2.0+dfsg/frmts/netcdf/netcdfdataset.cpp:9421:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(pszNewHist, pszOldHist);
data/gdal-3.2.0+dfsg/frmts/netcdf/netcdfdataset.cpp:9659:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(*ppszDest, pszSrc);
data/gdal-3.2.0+dfsg/frmts/netcdf/netcdfdataset.cpp:10317:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
            snprintf(szTemp, sizeof(szTemp), CPL_FRMT_GIB ",", pnTemp[m]);
data/gdal-3.2.0+dfsg/frmts/netcdf/netcdfdataset.cpp:10320:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        snprintf(szTemp, sizeof(szTemp), CPL_FRMT_GIB, pnTemp[m]);
data/gdal-3.2.0+dfsg/frmts/netcdf/netcdfdataset.cpp:10334:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
            snprintf(szTemp, sizeof(szTemp), CPL_FRMT_GUIB ",", pnTemp[m]);
data/gdal-3.2.0+dfsg/frmts/netcdf/netcdfdataset.cpp:10337:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        snprintf(szTemp, sizeof(szTemp), CPL_FRMT_GUIB, pnTemp[m]);
data/gdal-3.2.0+dfsg/frmts/nitf/mgrs.c:720:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (Ellipsoid_Code, MGRS_Ellipsoid_Code);
data/gdal-3.2.0+dfsg/frmts/nitf/nitfdataset.cpp:2953:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(szUniqueTag, szTag);
data/gdal-3.2.0+dfsg/frmts/nitf/nitfdataset.cpp:3011:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(szUniqueTag, szTREName);
data/gdal-3.2.0+dfsg/frmts/nitf/nitfdes.c:488:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(szTREName, szTRETempName);
data/gdal-3.2.0+dfsg/frmts/nitf/nitffile.c:2598:29:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                            snprintf(szTmp, nTmpLen, pszMDSubPrefix, iIter + 1);
data/gdal-3.2.0+dfsg/frmts/nitf/nitfrasterband.cpp:682:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy( psBandInfo->szIREPBAND, pszREP );
data/gdal-3.2.0+dfsg/frmts/nitf/nitfrasterband.cpp:692:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy( szPadded, pszREP );
data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/core/cpcidskfile.h:53:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
            std::string access, const PCIDSKInterfaces *interfaces );
data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/core/edb_pcidsk.cpp:74:82:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
EDBFile *PCIDSK::DefaultOpenEDB( const std::string& filename, const std::string& access )
data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/core/edb_pcidsk.cpp:79:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    PCIDSKFile *file = PCIDSK::Open( filename, access, nullptr );
data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/core/pcidsk_utils.cpp:600:9:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
    if( vsprintf( pszBuffer, fmt, args) > 29998 )
data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/core/pcidsk_utils.cpp:624:11:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    nPR = vsnprintf( szModestBuffer, sizeof(szModestBuffer), fmt, 
data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/core/pcidsk_utils.cpp:637:21:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        while( (nPR=vsnprintf( pszWorkBuffer, nWorkBufferSize, fmt, wrk_args))
data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/core/pcidskbuffer.cpp:256:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf( wrk, sizeof(wrk), fmt, value );
data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/core/pcidskexception.cpp:140:9:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
    if( vsprintf( pszBuffer, fmt, args) > 29998 )
data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/core/pcidskexception.cpp:164:11:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    nPR = vsnprintf( szModestBuffer, sizeof(szModestBuffer), fmt, 
data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/core/pcidskexception.cpp:177:21:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        while( (nPR=vsnprintf( pszWorkBuffer, nWorkBufferSize, fmt, wrk_args))
data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/core/pcidskopen.cpp:57:61:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
PCIDSKFile *PCIDSK::Open( std::string filename, std::string access,
data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/core/pcidskopen.cpp:72:55:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    void *io_handle = interfaces->io->Open( filename, access );
data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/core/pcidskopen.cpp:96:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if( strstr(access.c_str(),"+") != nullptr )
data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/pcidsk.h:56:64:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
PCIDSKFile PCIDSK_DLL *Open( std::string filename, std::string access,  
data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/pcidsk_config.h:109:20:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#define CPLsprintf sprintf
data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/pcidsk_config.h:110:21:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define CPLsnprintf snprintf
data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/pcidsk_edb.h:63:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                       const std::string& access);    
data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/pcidsk_interfaces.h:50:87:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        EDBFile           *(*OpenEDB)(const std::string& filename, const std::string& access);
data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/pcidsk_io.h:47:65:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        virtual void   *Open( std::string filename, std::string access ) const = 0;
data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/port/io_stdio.cpp:39:61:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    virtual void   *Open( std::string filename, std::string access ) const override;
data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/port/io_stdio.cpp:81:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
StdioIOInterface::Open( std::string filename, std::string access ) const
data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/port/io_stdio.cpp:84:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    std::string adjusted_access = access;
data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/port/io_win32.cpp:41:61:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    virtual void   *Open( std::string filename, std::string access ) const override;
data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/port/io_win32.cpp:74:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Win32IOInterface::Open( std::string filename, std::string access ) const
data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/port/io_win32.cpp:80:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if( strchr(access.c_str(),'+') != NULL || strchr(access.c_str(),'w') != 0 )
data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/port/io_win32.cpp:80:54:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if( strchr(access.c_str(),'+') != NULL || strchr(access.c_str(),'w') != 0 )
data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/port/io_win32.cpp:85:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if( strstr(access.c_str(), "w") != NULL )
data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/port/io_win32.cpp:100:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                              filename.c_str(), access.c_str(), LastError() );
data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/segment/metadatasegment_p.cpp:68:9:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        fprintf( stderr, /*ok*/
data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/segment/metadatasegment_p.cpp:74:9:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        fprintf( stderr, /*ok*/
data/gdal-3.2.0+dfsg/frmts/pcidsk/vsi_pcidsk_io.cpp:46:61:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    virtual void   *Open( std::string filename, std::string access ) const override;
data/gdal-3.2.0+dfsg/frmts/pcidsk/vsi_pcidsk_io.cpp:78:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
VSI_IOInterface::Open( std::string filename, std::string access ) const
data/gdal-3.2.0+dfsg/frmts/pcidsk/vsi_pcidsk_io.cpp:81:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    VSILFILE *fp = VSIFOpenL( filename.c_str(), access.c_str() );
data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/create2.c:128:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	(void)strcpy(newMap->fileName, fileName);
data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/create2.c:149:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	(void)strcpy(newMap->main.signature, CSF_SIG);
data/gdal-3.2.0+dfsg/frmts/pcraster/libcsf/mopen.c:63:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
 (void)strcpy(m->fileName,fileName);
data/gdal-3.2.0+dfsg/frmts/pdf/pdfobject.cpp:271:17:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                snprintf(szReal, sizeof(szReal), CPL_FRMT_GIB, (GIntBig)dfReal);
data/gdal-3.2.0+dfsg/frmts/png/libpng/pngdebug.h:84:8:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
       fprintf(PNG_DEBUG_FILE,"%s" m PNG_STRING_NEWLINE,(num_tabs==1 ? "   " : \
data/gdal-3.2.0+dfsg/frmts/png/libpng/pngdebug.h:92:8:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
       fprintf(PNG_DEBUG_FILE,"%s" m PNG_STRING_NEWLINE,(num_tabs==1 ? "   " : \
data/gdal-3.2.0+dfsg/frmts/png/libpng/pngdebug.h:100:8:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
       fprintf(PNG_DEBUG_FILE,"%s" m PNG_STRING_NEWLINE,(num_tabs==1 ? "   " : \
data/gdal-3.2.0+dfsg/frmts/png/libpng/pngdebug.h:113:8:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
       fprintf(PNG_DEBUG_FILE,format); \
data/gdal-3.2.0+dfsg/frmts/png/libpng/pngdebug.h:124:8:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
       fprintf(PNG_DEBUG_FILE,format,p1); \
data/gdal-3.2.0+dfsg/frmts/png/libpng/pngdebug.h:135:8:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
       fprintf(PNG_DEBUG_FILE,format,p1,p2); \
data/gdal-3.2.0+dfsg/frmts/png/libpng/pngerror.c:734:10:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         fprintf(stderr, PNG_STRING_NEWLINE);
data/gdal-3.2.0+dfsg/frmts/png/libpng/pngerror.c:741:10:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         fprintf(stderr, PNG_STRING_NEWLINE);
data/gdal-3.2.0+dfsg/frmts/png/libpng/pngerror.c:749:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(stderr, PNG_STRING_NEWLINE);
data/gdal-3.2.0+dfsg/frmts/png/libpng/pngerror.c:805:10:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         fprintf(stderr, PNG_STRING_NEWLINE);
data/gdal-3.2.0+dfsg/frmts/png/libpng/pngerror.c:812:10:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         fprintf(stderr, PNG_STRING_NEWLINE);
data/gdal-3.2.0+dfsg/frmts/png/libpng/pngerror.c:820:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(stderr, PNG_STRING_NEWLINE);
data/gdal-3.2.0+dfsg/frmts/rasdaman/rasdamandataset.cpp:399:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        access[xPos] = x;// base[xPos] + offsetX; TODO: check if required
data/gdal-3.2.0+dfsg/frmts/rasdaman/rasdamandataset.cpp:400:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        access[yPos] = y;// base[yPos] + offsetY;
data/gdal-3.2.0+dfsg/frmts/rasdaman/rasdamandataset.cpp:401:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        const char *data = (*gmdd)[access] + typeOffset;
data/gdal-3.2.0+dfsg/frmts/raw/lcpdataset.cpp:470:22:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                     strcat(pszList, szTemp);
data/gdal-3.2.0+dfsg/frmts/raw/mffdataset.cpp:1139:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy( pszBaseFilename, pszFilenameIn );
data/gdal-3.2.0+dfsg/frmts/raw/mffdataset.cpp:1363:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy( pszBaseFilename, pszFilename );
data/gdal-3.2.0+dfsg/frmts/raw/pauxdataset.cpp:946:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy( pszAuxFilename, pszFilename );
data/gdal-3.2.0+dfsg/frmts/sdts/sdts2shp.cpp:251:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( szDBFFilename, "%s.dbf", pszShapefile );
data/gdal-3.2.0+dfsg/frmts/sdts/sdts2shp.cpp:298:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf( szID, "%s:%d",
data/gdal-3.2.0+dfsg/frmts/sdts/sdts2shp.cpp:303:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf( szID, "%s:%d",
data/gdal-3.2.0+dfsg/frmts/sdts/sdts2shp.cpp:308:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf( szID, "%s:%d",
data/gdal-3.2.0+dfsg/frmts/sdts/sdts2shp.cpp:313:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf( szID, "%s:%d",
data/gdal-3.2.0+dfsg/frmts/sdts/sdts2shp.cpp:375:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( szDBFFilename, "%s.dbf", pszShapefile );
data/gdal-3.2.0+dfsg/frmts/sdts/sdts2shp.cpp:420:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf( szID, "%s:%d",
data/gdal-3.2.0+dfsg/frmts/sdts/sdts2shp.cpp:468:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( szDBFFilename, "%s.dbf", pszShapefile );
data/gdal-3.2.0+dfsg/frmts/sdts/sdts2shp.cpp:562:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( szDBFFilename, "%s.dbf", pszShapefile );
data/gdal-3.2.0+dfsg/frmts/zlib/gzio.c:131:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(s->path, path); /* do this early for debugging */
data/gdal-3.2.0+dfsg/frmts/zlib/gzio.c:613:11:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
    (void)vsprintf(buf, format, va);
data/gdal-3.2.0+dfsg/frmts/zlib/gzio.c:618:11:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
    len = vsprintf(buf, format, va);
data/gdal-3.2.0+dfsg/frmts/zlib/gzio.c:623:11:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    (void)vsnprintf(buf, sizeof(buf), format, va);
data/gdal-3.2.0+dfsg/frmts/zlib/gzio.c:627:11:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    len = vsnprintf(buf, sizeof(buf), format, va);
data/gdal-3.2.0+dfsg/frmts/zlib/gzio.c:650:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(buf, format, a1, a2, a3, a4, a5, a6, a7, a8,
data/gdal-3.2.0+dfsg/frmts/zlib/gzio.c:655:11:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    len = sprintf(buf, format, a1, a2, a3, a4, a5, a6, a7, a8,
data/gdal-3.2.0+dfsg/frmts/zlib/gzio.c:660:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(buf, sizeof(buf), format, a1, a2, a3, a4, a5, a6, a7, a8,
data/gdal-3.2.0+dfsg/frmts/zlib/gzio.c:664:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    len = snprintf(buf, sizeof(buf), format, a1, a2, a3, a4, a5, a6, a7, a8,
data/gdal-3.2.0+dfsg/frmts/zlib/gzio.c:1008:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(s->msg, s->path);
data/gdal-3.2.0+dfsg/frmts/zlib/gzio.c:1010:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(s->msg, m);
data/gdal-3.2.0+dfsg/frmts/zlib/zutil.h:179:18:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#    if !defined(vsnprintf) && !defined(NO_vsnprintf) && (_MSC_VER < 1500)
data/gdal-3.2.0+dfsg/frmts/zlib/zutil.h:180:15:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#      define vsnprintf _vsnprintf
data/gdal-3.2.0+dfsg/frmts/zlib/zutil.h:226:39:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define Trace(x) {if (z_verbose>=0) fprintf x ;}
data/gdal-3.2.0+dfsg/frmts/zlib/zutil.h:227:39:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define Tracev(x) {if (z_verbose>0) fprintf x ;}
data/gdal-3.2.0+dfsg/frmts/zlib/zutil.h:228:40:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define Tracevv(x) {if (z_verbose>1) fprintf x ;}
data/gdal-3.2.0+dfsg/frmts/zlib/zutil.h:229:48:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define Tracec(c,x) {if (z_verbose>0 && (c)) fprintf x ;}
data/gdal-3.2.0+dfsg/frmts/zlib/zutil.h:230:49:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define Tracecv(c,x) {if (z_verbose>1 && (c)) fprintf x ;}
data/gdal-3.2.0+dfsg/gcore/gdaldrivermanager.cpp:727:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy( szPluginDir, CPLGetDirname( szExecPath ) );
data/gdal-3.2.0+dfsg/gcore/gdalexif.cpp:269:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(pszDataEnd,szTemp);
data/gdal-3.2.0+dfsg/gcore/gdalexif.cpp:281:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(pszDataEnd,szTemp);
data/gdal-3.2.0+dfsg/gcore/gdalexif.cpp:299:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(pszDataEnd,szTemp);
data/gdal-3.2.0+dfsg/gcore/gdalexif.cpp:312:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(pszDataEnd,szTemp);
data/gdal-3.2.0+dfsg/gcore/gdalexif.cpp:325:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(pszDataEnd,szTemp);
data/gdal-3.2.0+dfsg/gcore/gdalexif.cpp:338:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(pszDataEnd,szTemp);
data/gdal-3.2.0+dfsg/gcore/gdalexif.cpp:359:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(pszDataEnd,szTemp);
data/gdal-3.2.0+dfsg/gcore/gdalexif.cpp:378:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(pszDataEnd,szTemp);
data/gdal-3.2.0+dfsg/gcore/gdalexif.cpp:391:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(pszDataEnd,szTemp);
data/gdal-3.2.0+dfsg/gcore/gdalexif.cpp:404:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(pszDataEnd,szTemp);
data/gdal-3.2.0+dfsg/gcore/gdalopeninfo.cpp:198:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy( szAltPath, pszFilenameIn );
data/gdal-3.2.0+dfsg/gcore/gdalpamdataset.cpp:771:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy( psPam->pszPamFilename, pszPhysicalFile );
data/gdal-3.2.0+dfsg/gcore/gdalpamrasterband.cpp:1156:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        snprintf( pszHistCounts + iHistOffset,
data/gdal-3.2.0+dfsg/gcore/rasterio.cpp:900:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf( szBuffer1, sizeof(szBuffer1),
data/gdal-3.2.0+dfsg/gcore/rasterio.cpp:903:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf( szBuffer2, sizeof(szBuffer2),
data/gdal-3.2.0+dfsg/gcore/rasterio.cpp:1401:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        snprintf( szBuffer1, sizeof(szBuffer1),
data/gdal-3.2.0+dfsg/gcore/rasterio.cpp:1406:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        snprintf( szBuffer2, sizeof(szBuffer2),
data/gdal-3.2.0+dfsg/ogr/ogr2gmlgeometry.cpp:115:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat( *ppszText + *pnLength, pszTextToAppend );
data/gdal-3.2.0+dfsg/ogr/ogr2gmlgeometry.cpp:150:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat( *ppszText + *pnLength, szCoordinate );
data/gdal-3.2.0+dfsg/ogr/ogr2gmlgeometry.cpp:551:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat( *ppszText + *pnLength, szCoordinate );
data/gdal-3.2.0+dfsg/ogr/ogr_srsnode.cpp:511:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat( *ppszResult, pszValue );  // Should we do quoting?
data/gdal-3.2.0+dfsg/ogr/ogr_srsnode.cpp:515:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat( *ppszResult, pszValue );
data/gdal-3.2.0+dfsg/ogr/ogr_srsnode.cpp:525:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat( *ppszResult, papszChildrenWkt[i] );
data/gdal-3.2.0+dfsg/ogr/ogr_srsnode.cpp:586:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat( *ppszResult, pszValue );  // Should we do quoting?
data/gdal-3.2.0+dfsg/ogr/ogr_srsnode.cpp:591:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat( *ppszResult, pszValue );
data/gdal-3.2.0+dfsg/ogr/ogr_srsnode.cpp:608:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat( *ppszResult, papszChildrenWkt[i] );
data/gdal-3.2.0+dfsg/ogr/ogrgeometry.cpp:6102:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pszTextBufCurrent, pszHex );
data/gdal-3.2.0+dfsg/ogr/ogrgeometry.cpp:6121:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pszTextBufCurrent, pszHex );
data/gdal-3.2.0+dfsg/ogr/ogrgeometry.cpp:6131:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(pszTextBufCurrent, pszHex );
data/gdal-3.2.0+dfsg/ogr/ogrgeometry.cpp:6139:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pszTextBufCurrent, pszHex );
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/avc/avc_binwr.cpp:1984:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(psFile->pszFilename, pszPath);
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/avc/avc_e00write.cpp:482:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(szOldName, psTableDef->szTableName);
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/avc/avc_misc.cpp:281:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(pszFname, pszTmpPath);
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/avc/avc_misc.cpp:297:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(pszFname, pszTmpPath);
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/avc/avc_misc.cpp:306:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pszTmpPath, pszFname);
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/avc/avc_misc.cpp:380:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(pszTmpPath+iLastPartStart, papszDir[iEntry]);
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/avc/avc_misc.cpp:404:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pszFname, pszTmpPath);
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/avc/ogravce00layer.cpp:68:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf( szTableName, "%s.PAT", poDS->GetCoverageName() );
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/avc/ogravce00layer.cpp:70:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf( szTableName, "%s.PAT%s", poDS->GetCoverageName(),
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/avc/ogravce00layer.cpp:73:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf( szTableName, "%s.AAT", poDS->GetCoverageName() );
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/avc/ogravce00layer.cpp:78:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf( szTableName, "%s.PAT", poDS->GetCoverageName() );
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/avc/ogravclayer.cpp:506:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy( szFieldName, psFInfo->szName );
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/cad/libopencad/opencad.cpp:203:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf( stdout, format, argptr );
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/csv/ogrcsvlayer.cpp:214:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(pszWorkLine + nWorkLineLength, pszLine);
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/db2/ogrdb2cli.cpp:1190:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy( m_pszStatement + m_nStatementLen, pszText );
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/db2/ogrdb2cli.cpp:1303:16:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    bSuccess = vsnprintf( szFormattedText, sizeof(szFormattedText)-1,
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/db2/ogrdb2cli.cpp:1306:5:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
    vsprintf( szFormattedText, pszFormat, args );
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/db2/ogrdb2datasource.cpp:261:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(stime, ctime(&time2));   /* get current time as a string */
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/db2/ogrdb2datasource.cpp:1251:21:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                    strcpy(DB2SpatialType, oStatement.GetColData(5));
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/db2/ogrdb2datasource.cpp:1252:21:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                    strcpy(OGCSpatialType, DB2SpatialType+3);
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/db2/ogrdb2datasource.cpp:1294:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(DB2SpatialType, oStatement.GetColData(6));
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/db2/ogrdb2datasource.cpp:1295:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(OGCSpatialType, DB2SpatialType+3);
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dgn/dgnstroke.cpp:310:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        printf(  // ok
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dgn/dgnwrite.cpp:1405:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy( psText->string, pszText );
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dgn/ogrdgnlayer.cpp:294:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat( szFullStyle, pszPen );
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/flatgeobuf/flatbuffers/util.h:105:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  snprintf(const_cast<char *>(s.data()), (s.size() + 1), fmt, string_width, t);
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/fme/fme2ogr_utils.cpp:52:5:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
    vsprintf( pszErrorBuf, pszFormat, hVaArgs );
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/fme/ogrfmedatasource.cpp:143:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf( szFilename, "%s%c%s_%s",
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/fme/ogrfmedatasource.cpp:146:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf( szFilename, "%s%c%s_%s_%d",
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/fme/ogrfmedatasource.cpp:1366:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( szDefinition, "%s::", pszDataset );
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/fme/ogrfmedatasource.cpp:1379:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf( szDefinition + strlen(szDefinition), "%s=%s;",
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/fme/ogrfmelayerdb.cpp:195:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy( pszWorking, poMacros->data() );
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/fme/ogrfmelayerdb.cpp:204:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf( pszWorking + strlen(pszWorking), "%s,%s",
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/libjson/debug.c:39:31:  [4] (format) syslog:
  If syslog's format strings can be influenced by an attacker, they can be
  exploited (CWE-134). Use a constant format string for syslog.
extern void mc_set_syslog(int syslog)
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/libjson/debug.c:41:13:  [4] (format) syslog:
  If syslog's format strings can be influenced by an attacker, they can be
  exploited (CWE-134). Use a constant format string for syslog.
  _syslog = syslog;
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/libjson/debug.c:53:4:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	  vprintf(msg, ap);
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/libjson/debug.c:69:3:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		vprintf(msg, ap);
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/libjson/debug.c:83:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		vfprintf(stderr, msg, ap);
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/libjson/debug.c:96:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		vfprintf(stderr, msg, ap);
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/libjson/debug.h:28:31:  [4] (format) syslog:
  If syslog's format strings can be influenced by an attacker, they can be
  exploited (CWE-134). Use a constant format string for syslog.
extern void mc_set_syslog(int syslog);
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/libjson/json_object.c:31:8:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#undef snprintf
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/libjson/json_object.c:32:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define snprintf CPLsnprintf
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/libjson/json_object.c:38:40:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
# error You do not have strdup on your system.
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/libjson/json_tokener.c:55:45:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
# error You do not have strncasecmp on your system.
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/libjson/json_util.c:58:8:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#undef snprintf
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/libjson/json_util.c:59:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define snprintf CPLsnprintf
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/libjson/json_util.c:165:8:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	(void)sscanf(" -01234567890123456789012345", "%" SCNd64, &num64);
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/libjson/json_util.c:169:8:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	(void)sscanf(" 01234567890123456789012345", "%" SCNd64, &num64);
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/libjson/json_util.c:199:6:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	if (sscanf(buf, "%" SCNd64, &num64) != 1)
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/libjson/json_util.c:228:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(buf_cmp_start, sizeof(buf_cmp), "%" PRId64, num64);
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/geojson/libjson/linkhash.c:26:2:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	vprintf(msg, ap);
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gml/gmlfeatureclass.cpp:873:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
            snprintf(szValue, sizeof(szValue), CPL_FRMT_GIB, m_nFeatureCount);
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gml/ogrgmldatasource.cpp:71:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(pszTmp + nBeforeNeedle + strlen(";%20"),
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gml/ogrgmldatasource.cpp:2938:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(pszXML, szStartTag);
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gml/ogrgmllayer.cpp:238:27:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
            if( j < 20 && sscanf(pszGML_FID + i + 1, CPL_FRMT_GIB, &nFID) == 1)
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gml/ogrgmllayer.cpp:258:17:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
                sscanf(pszGML_FID + nLenPrefix, CPL_FRMT_GIB, &nFID) == 1 )
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gmlas/ogrgmlaswriter.cpp:403:13:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
        if( sscanf( pszKey, szNAMESPACE_URI_FMT, &i ) == 1 && i > 0 )
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gmlas/ogrgmlaswriter.cpp:407:18:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
        else if( sscanf( pszKey, szNAMESPACE_LOCATION_FMT, &i ) == 1 &&
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gmlas/ogrgmlaswriter.cpp:412:18:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
        else if( sscanf( pszKey, szNAMESPACE_PREFIX_FMT, &i ) == 1 &&
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gtm/ogrgtmdatasource.cpp:278:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (pszLayerName, pszBaseFileName);
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gtm/ogrgtmdatasource.cpp:294:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (pszLayerName, pszBaseFileName);
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/gtm/ogrgtmdatasource.cpp:408:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy((char*)pCurrentPos, pszBaseFileName);
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ili/ogrili2layer.cpp:277:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        snprintf( szTempBuffer, sizeof(szTempBuffer), CPL_FRMT_GIB,
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ingres/ogringresdatasource.cpp:189:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(pszDBTarget, "@%s,%s,%s;%s[%s,%s]::%s ",
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ingres/ogringresdatasource.cpp:204:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(pszDBTarget, pszDBName);
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ingres/ogringresdatasource.cpp:564:10:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
         sprintf( szCommand,
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ingres/ogringresdatasource.cpp:600:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( szCommand,
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ingres/ogringresdatasource.cpp:674:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf( szCommand,
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ingres/ogringresdatasource.cpp:681:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf( szCommand,
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ingres/ogringresdatasource.cpp:808:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( szCommand,
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ingres/ogringreslayer.cpp:611:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf( szCommand,
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ingres/ogringrestablelayer.cpp:371:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf( pszFieldList, "%s", osFIDColumn.c_str() );
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ingres/ogringrestablelayer.cpp:380:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf( pszFieldList+strlen(pszFieldList),
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ingres/ogringrestablelayer.cpp:386:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf( pszFieldList+strlen(pszFieldList),
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ingres/ogringrestablelayer.cpp:398:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat( pszFieldList, pszName );
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ingres/ogringrestablelayer.cpp:1142:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( pszCommand,
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/kml/ogr2kmlgeometry.cpp:192:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat( *ppszText + *pnLength, pszTextToAppend );
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/kml/ogr2kmlgeometry.cpp:227:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat( *ppszText + *pnLength, szCoordinate );
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mdb/ogrmdbjackcess.cpp:155:25:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
        FILE *javaCmd = popen("\"${JAVA_HOME}${JAVA_HOME:+/bin/}java\" -XshowSettings 2>&1 | grep 'sun.boot.library.path'", "r");
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mdb/ogrmdbjackcess.cpp:173:21:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                    snprintf(jvmLib, sizeof(jvmLib), "%s/server/libjvm." SO_EXT, pszPtr);
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mitab/mitab_datfile.cpp:1755:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(m_szBuffer, ReadCharField(nWidth));
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mitab/mitab_datfile.cpp:1825:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(m_szBuffer, ReadCharField(nWidth));
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mitab/mitab_datfile.cpp:1906:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(m_szBuffer, ReadCharField(nWidth));
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mitab/mitab_datfile.cpp:2173:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(szBuf, pszValue);
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mitab/mitab_datfile.cpp:2282:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(szBuf, pszValue);
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mitab/mitab_datfile.cpp:2407:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(szBuf, pszValue);
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mitab/mitab_feature.cpp:6245:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pszTextString, GetTextString());
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mitab/mitab_feature.cpp:6327:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pszTextString, pszTmpTextString);
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mitab/mitab_utils.cpp:192:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(pszTmpPath+iLastPartStart, papszDir[iEntry]);
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mitab/mitab_utils.cpp:211:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pszFname, pszTmpPath);
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mssqlspatial/ogrmssqlspatialtablelayer.cpp:1718:17:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                snprintf((char*)papstBindBuffer[iCol]->VarChar.pData, 8000, CPL_FRMT_GIB, nFID);
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/mysql/ogrmysqltablelayer.cpp:588:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat( pszFieldList, pszName );
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/nas/nashandler.cpp:255:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy( m_pszGeometry+m_nGeomLen+1, m_osElementName );
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/nas/nashandler.cpp:260:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat( m_pszGeometry+m_nGeomLen, osAttributes );
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/nas/nashandler.cpp:687:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy( m_pszGeometry+m_nGeomLen+2, m_osElementName );
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/nas/ogrnasrelationlayer.cpp:189:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy( pszMerged, pszFromID );
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/nas/ogrnasrelationlayer.cpp:190:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy( pszMerged + strlen(pszFromID) + 1, pszType );
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/nas/ogrnasrelationlayer.cpp:191:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy( pszMerged + strlen(pszFromID) + strlen(pszType) + 2, pszToID );
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/oci/ogrocidatasource.cpp:240:21:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                    strcpy( szFullTableName, papszRow[0] );
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/oci/ogrocistringbuf.cpp:83:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat( pszString+nLen, pszNewText );
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/oci/ogrocitablelayer.cpp:1022:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat( pszCommand, pszGeomName );
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/oci/ogrocitablelayer.cpp:1030:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat( pszCommand, pszFIDName );
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/oci/ogrocitablelayer.cpp:1104:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat( pszCommand, szSDO_GEOMETRY );
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/oci/ogrocitablelayer.cpp:1132:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        snprintf( pszCommand+nOffset, nCommandBufSize - nOffset, CPL_FRMT_GIB, nFID );
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/oci/ogrocitablelayer.cpp:1169:17:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                strcat( pszCommand+nOffset, pszStrValue );
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/odbc/ogrodbctablelayer.cpp:416:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf( szCommand,
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ods/ods_formula_parser.cpp:742:21:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define YYFPRINTF fprintf
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/openfilegdb/filegdbindex.cpp:1757:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(psField->String, pszOut);
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/osm/ogrosmdatasource.cpp:4363:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        snprintf( szVal, sizeof(szVal), CPL_FRMT_GUIB,
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/osm/ogrosmlayer.cpp:603:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
            snprintf(szID, sizeof(szID), CPL_FRMT_GIB, nID );
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/osm/ogrosmlayer.cpp:614:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
            snprintf(szID, sizeof(szID), CPL_FRMT_GIB, nID );
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/pg/ogrpgresultlayer.cpp:173:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(pszQueryStatement, pszRawStatement);
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/pgdump/ogrpgdumplayer.cpp:575:17:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                snprintf( pszNeedToFree+nOff, nLen-nOff, CPL_FRMT_GIB, panItems[j] );
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/pgdump/ogrpgdumplayer.cpp:602:21:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                    snprintf( pszNeedToFree+nOff, nLen-nOff, (padfItems[j] > 0) ? "Infinity" : "-Infinity" );
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/pgdump/ogrpgdumplayer.cpp:1039:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
            snprintf( pszNeedToFree+nOff, nLen-nOff, CPL_FRMT_GIB, panItems[j] );
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/pgdump/ogrpgdumplayer.cpp:1069:17:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                snprintf( pszNeedToFree+nOff, nLen-nOff, (padfItems[j] > 0) ? "Infinity" : "-Infinity" );
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/rec/ll_recio.cpp:100:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy( pszFieldname, RECGetField( pszLine, 2, 10 ) );
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/s57/s57reader.cpp:1936:9:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        fprintf( stderr, /*ok*/
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/shape/dbfopen.c:57:14:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#     define snprintf _snprintf
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/shape/dbfopen.c:57:23:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#     define snprintf _snprintf
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/shape/dbfopen.c:60:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#  ifndef snprintf
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/shape/dbfopen.c:61:14:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#     define snprintf _snprintf
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/shape/dbfopen.c:61:23:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#     define snprintf _snprintf
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/shape/dbfopen.c:65:20:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#define CPLsprintf sprintf
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/shape/dbfopen.c:66:21:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define CPLsnprintf snprintf
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/shape/dbfopen.c:512:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy( psDBF->pszCodePage, REINTERPRET_CAST(char *, pabyBuf) );
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/shape/dbfopen.c:770:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy( psDBF->pszCodePage, pszCodePage );
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/shape/sbnsearch.c:53:14:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#     define snprintf _snprintf
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/shape/sbnsearch.c:53:23:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#     define snprintf _snprintf
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/shape/sbnsearch.c:56:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#  ifndef snprintf
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/shape/sbnsearch.c:57:14:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#     define snprintf _snprintf
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/shape/sbnsearch.c:57:23:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#     define snprintf _snprintf
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/shape/shapefil.h:153:61:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    SAFile     (*FOpen) ( const char *filename, const char *access);
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/shape/shpopen.c:71:14:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#     define snprintf _snprintf
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/shape/shpopen.c:71:23:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#     define snprintf _snprintf
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/shape/shpopen.c:74:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#  ifndef snprintf
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/shape/shpopen.c:75:14:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#     define snprintf _snprintf
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/shape/shpopen.c:75:23:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#     define snprintf _snprintf
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/sosi/fyba_melding.cpp:45:16:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      case 2:  sprintf(szErrMsg,"%s","Observer følgende! \n\n");break;
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/sosi/fyba_melding.cpp:46:16:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      case 3:  sprintf(szErrMsg,"%s","Det er oppstått en feil! \n\n");break;
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/sosi/fyba_melding.cpp:47:16:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      case 4:  sprintf(szErrMsg,"%s","Alvorlig feil avslutt programmet! \n\n");break;
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/sqlite/ogrsqlite3ext.h:368:12:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  char * (*snprintf)(int,char*,const char*,...);
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/sqlite/ogrsqlite3ext.h:584:53:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define sqlite3_snprintf               sqlite3_api->snprintf
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/sqlite/ogrsqlitetablelayer.cpp:1681:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat( pszFieldListForSelect, SQLEscapeName(poGeomFieldDefn->GetNameRef()) );
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/sqlite/ogrsqlitetablelayer.cpp:1685:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat( pszNewFieldList, SQLEscapeName(poGeomFieldDefn->GetNameRef()) );
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/sqlite/test_load_virtual_ogr.c:64:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define snprintf _snprintf
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/sqlite/test_load_virtual_ogr.c:64:18:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define snprintf _snprintf
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/tiger/tigerfilebase.cpp:297:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        snprintf( szValue, sizeof(szValue), szFormat, poFeature->GetFieldAsInteger( iField ) );
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/tiger/tigerfilebase.cpp:302:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        snprintf( szValue, sizeof(szValue), szFormat, poFeature->GetFieldAsInteger( iField ) );
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/tiger/tigerfilebase.cpp:316:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        snprintf( szValue, sizeof(szValue), szFormat, poFeature->GetFieldAsString( iField ) );
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/vrt/ogrvrtlayer.cpp:1695:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        snprintf(pszFIDQuery, strlen(pszFID) + 64, "%s = " CPL_FRMT_GIB, pszFID,
data/gdal-3.2.0+dfsg/ogr/ogrutils.cpp:230:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pszBuffer, s.data());
data/gdal-3.2.0+dfsg/ogr/swq_parser.cpp:837:21:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define YYFPRINTF fprintf
data/gdal-3.2.0+dfsg/port/cpl_conv.cpp:1027:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(szBuffer, sizeof(szBuffer), CPL_FRMT_GIB, nVal);
data/gdal-3.2.0+dfsg/port/cpl_conv.cpp:3095:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy( pszFilename + strlen(pszFilename) - osFileOnly.size(),
data/gdal-3.2.0+dfsg/port/cpl_csv.cpp:625:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat( pszWorkLine + nWorkLineLength, pszLine );
data/gdal-3.2.0+dfsg/port/cpl_csv.cpp:707:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat( pszWorkLine + nWorkLineLength, pszLine );
data/gdal-3.2.0+dfsg/port/cpl_csv.cpp:1345:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy( pTLSData->szPath, GDAL_PREFIX "/Resources/epsg_csv/" );
data/gdal-3.2.0+dfsg/port/cpl_csv.cpp:1347:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy( pTLSData->szPath, GDAL_PREFIX "/share/epsg_csv/" );
data/gdal-3.2.0+dfsg/port/cpl_error.cpp:653:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat( pszMessage, VSICTime( static_cast<unsigned long>(tv.tv_sec) ) );
data/gdal-3.2.0+dfsg/port/cpl_error.cpp:675:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat( pszMessage, szVmSize );
data/gdal-3.2.0+dfsg/port/cpl_error.cpp:681:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat( pszMessage, pszCategory );
data/gdal-3.2.0+dfsg/port/cpl_error.cpp:1007:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(pszPath, cpl_log);
data/gdal-3.2.0+dfsg/port/cpl_minixml.cpp:406:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy( psContext->pszToken, pszUnescaped );
data/gdal-3.2.0+dfsg/port/cpl_minixml.cpp:434:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy( psContext->pszToken, pszUnescaped );
data/gdal-3.2.0+dfsg/port/cpl_minixml.cpp:459:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy( psContext->pszToken, pszUnescaped );
data/gdal-3.2.0+dfsg/port/cpl_minixml.cpp:813:21:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                    strcat(sContext.papsStack[sContext.nStackSize - 1]
data/gdal-3.2.0+dfsg/port/cpl_minixml.cpp:1076:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat( *ppszText + *pnLength, pszEscaped );
data/gdal-3.2.0+dfsg/port/cpl_minixml.cpp:1102:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat( *ppszText + *pnLength, pszEscaped );
data/gdal-3.2.0+dfsg/port/cpl_minixml.cpp:1137:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy( *ppszText + *pnLength, psNode->pszValue );
data/gdal-3.2.0+dfsg/port/cpl_minizip_unzip.cpp:1009:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(szFileName, pszRecoded);
data/gdal-3.2.0+dfsg/port/cpl_odbc.cpp:451:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf( pszDSN,
data/gdal-3.2.0+dfsg/port/cpl_odbc.cpp:467:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        snprintf( pszDSN,
data/gdal-3.2.0+dfsg/port/cpl_odbc.cpp:1351:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy( m_pszStatement + m_nStatementLen, pszText );
data/gdal-3.2.0+dfsg/port/cpl_odbc.cpp:1468:9:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        vsnprintf( szFormattedText, sizeof(szFormattedText)-1,
data/gdal-3.2.0+dfsg/port/cpl_odbc.cpp:1472:5:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
    vsprintf( szFormattedText, pszFormat, args );
data/gdal-3.2.0+dfsg/port/cpl_port.h:1031:5:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
int vsnprintf(char *str, size_t size, const char* fmt, va_list args)
data/gdal-3.2.0+dfsg/port/cpl_port.h:1033:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
int snprintf(char *str, size_t size, const char* fmt, ...)
data/gdal-3.2.0+dfsg/port/cpl_port.h:1036:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
int sprintf(char *str, const char* fmt, ...)
data/gdal-3.2.0+dfsg/port/cpl_port.h:1040:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
int sprintf(char *str, const char* fmt, ...)
data/gdal-3.2.0+dfsg/port/cpl_spawn.cpp:783:13:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
            execvp(papszArgvDup[0], papszArgvDup);
data/gdal-3.2.0+dfsg/port/cpl_string.cpp:1122:17:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    local_ret = snprintf(str + offset_out, size - offset_out, localfmt, \
data/gdal-3.2.0+dfsg/port/cpl_string.cpp:1144:16:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        return vsnprintf(str, size, fmt, args);
data/gdal-3.2.0+dfsg/port/cpl_string.cpp:1255:29:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                local_ret = snprintf(str + offset_out, size - offset_out,
data/gdal-3.2.0+dfsg/port/cpl_string.cpp:1296:22:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        offset_out = vsnprintf(str, size, fmt_ori, wrk_args);
data/gdal-3.2.0+dfsg/port/cpl_string.cpp:1298:22:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
        offset_out = vsprintf(str, fmt_ori, wrk_args);
data/gdal-3.2.0+dfsg/port/cpl_string.cpp:1423:15:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        ret = vfprintf(stdout, fmt, wrk_args);
data/gdal-3.2.0+dfsg/port/cpl_string.cpp:1979:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy( pszNewLine, pszKey );
data/gdal-3.2.0+dfsg/port/cpl_string.cpp:1980:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat( pszNewLine, pszSeparator );
data/gdal-3.2.0+dfsg/port/cpl_string.cpp:1981:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat( pszNewLine, pszValue );
data/gdal-3.2.0+dfsg/port/cpl_string.h:222:21:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define CPLsnprintf snprintf
data/gdal-3.2.0+dfsg/port/cpl_userfaultfd.cpp:137:19:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  if (variable && sscanf(variable, "%" PRId64, &retval))
data/gdal-3.2.0+dfsg/port/cpl_virtualmem.cpp:238:5:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    vsnprintf(buffer, sizeof(buffer), fmt, ap);
data/gdal-3.2.0+dfsg/port/cpl_vsi_error.cpp:93:13:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
            fprintf(stderr, /*ok*/
data/gdal-3.2.0+dfsg/port/cpl_vsil_curl.cpp:1371:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(rangeStr, sizeof(rangeStr),
data/gdal-3.2.0+dfsg/port/cpl_vsil_curl.cpp:1930:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        snprintf(rangeStr, sizeof(rangeStr),
data/gdal-3.2.0+dfsg/port/cpl_vsil_curl.cpp:1991:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
            snprintf(rangeStr, sizeof(rangeStr),
data/gdal-3.2.0+dfsg/port/cpl_vsil_curl.cpp:2010:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
            snprintf(rangeStr, sizeof(rangeStr),
data/gdal-3.2.0+dfsg/port/cpl_vsisimple.cpp:357:25:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    const int nReturn = vfprintf( fp, pszFormat, args );
data/gdal-3.2.0+dfsg/port/vsipreload.cpp:1506:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(mydir->ent64.d_name, mydir->ent.d_name);
data/gdal-3.2.0+dfsg/swig/java/add_javadoc.c:144:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(javadoc, szLine);
data/gdal-3.2.0+dfsg/swig/java/add_javadoc.c:147:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat(javadoc, szLine);
data/gdal-3.2.0+dfsg/swig/java/add_javadoc.c:187:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(szDstName, "%s/%s", argv[2], argv[i]);
data/gdal-3.2.0+dfsg/swig/java/add_javadoc.c:200:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(szPackage, szLine);
data/gdal-3.2.0+dfsg/swig/java/add_javadoc.c:204:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(szClass, stripline(szLine));
data/gdal-3.2.0+dfsg/swig/java/add_javadoc.c:221:21:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                    strcpy(szClass, szLine);
data/gdal-3.2.0+dfsg/swig/java/add_javadoc.c:228:17:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                strcat(szLine, c + 13);
data/gdal-3.2.0+dfsg/swig/java/add_javadoc.c:234:21:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                    strcpy(szMethodName, szLine);
data/gdal-3.2.0+dfsg/swig/java/add_javadoc.c:238:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                        strcpy(szMethodName + strlen(szMethodName) - 1, szLine);
data/gdal-3.2.0+dfsg/swig/java/add_javadoc.c:240:21:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                    strcpy(szLine, szMethodName);
data/gdal-3.2.0+dfsg/swig/java/add_javadoc.c:246:21:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                    sprintf(szMethodName, "%s:%s", szClass, removeargnames(stripline(szLine)));
data/gdal-3.2.0+dfsg/swig/java/add_javadoc.c:248:21:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                    strcpy(szMethodName, szClass);
data/gdal-3.2.0+dfsg/swig/java/add_javadoc.c:276:29:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                            strcpy(szLine, szOriLine);
data/gdal-3.2.0+dfsg/swig/perl/gdal_wrap.cpp:690:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(r,name);
data/gdal-3.2.0+dfsg/swig/perl/gdal_wrap.cpp:1277:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(r,SWIG_Perl_TypeProxyName(type));
data/gdal-3.2.0+dfsg/swig/perl/gdal_wrap.cpp:1505:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
#ifdef access
data/gdal-3.2.0+dfsg/swig/perl/gdal_wrap.cpp:1506:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  #undef access
data/gdal-3.2.0+dfsg/swig/perl/gdal_wrap.cpp:2463:10:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
# ifndef snprintf
data/gdal-3.2.0+dfsg/swig/perl/gdal_wrap.cpp:2464:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#  define snprintf _snprintf
data/gdal-3.2.0+dfsg/swig/perl/gdal_wrap.cpp:2464:20:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#  define snprintf _snprintf
data/gdal-3.2.0+dfsg/swig/perl/gdal_wrap.cpp:3884:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
            snprintf(s, LENGTH_OF_GUIntBig_AS_STRING-1, CPL_FRMT_GUIB, *first);
data/gdal-3.2.0+dfsg/swig/perl/gdal_wrap.cpp:27145:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
          snprintf(s, LENGTH_OF_GUIntBig_AS_STRING-1, CPL_FRMT_GUIB, arg5[i]);
data/gdal-3.2.0+dfsg/swig/perl/gdalconst_wrap.c:666:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(r,name);
data/gdal-3.2.0+dfsg/swig/perl/gdalconst_wrap.c:1253:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(r,SWIG_Perl_TypeProxyName(type));
data/gdal-3.2.0+dfsg/swig/perl/gdalconst_wrap.c:1481:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
#ifdef access
data/gdal-3.2.0+dfsg/swig/perl/gdalconst_wrap.c:1482:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  #undef access
data/gdal-3.2.0+dfsg/swig/perl/gnm_wrap.cpp:690:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(r,name);
data/gdal-3.2.0+dfsg/swig/perl/gnm_wrap.cpp:1277:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(r,SWIG_Perl_TypeProxyName(type));
data/gdal-3.2.0+dfsg/swig/perl/gnm_wrap.cpp:1505:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
#ifdef access
data/gdal-3.2.0+dfsg/swig/perl/gnm_wrap.cpp:1506:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  #undef access
data/gdal-3.2.0+dfsg/swig/perl/ogr_wrap.cpp:690:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(r,name);
data/gdal-3.2.0+dfsg/swig/perl/ogr_wrap.cpp:1277:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(r,SWIG_Perl_TypeProxyName(type));
data/gdal-3.2.0+dfsg/swig/perl/ogr_wrap.cpp:1505:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
#ifdef access
data/gdal-3.2.0+dfsg/swig/perl/ogr_wrap.cpp:1506:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  #undef access
data/gdal-3.2.0+dfsg/swig/perl/ogr_wrap.cpp:2383:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
            snprintf(s, LENGTH_OF_GIntBig_AS_STRING-1, CPL_FRMT_GIB, *first);
data/gdal-3.2.0+dfsg/swig/perl/osr_wrap.cpp:690:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(r,name);
data/gdal-3.2.0+dfsg/swig/perl/osr_wrap.cpp:1277:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(r,SWIG_Perl_TypeProxyName(type));
data/gdal-3.2.0+dfsg/swig/perl/osr_wrap.cpp:1505:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
#ifdef access
data/gdal-3.2.0+dfsg/swig/perl/osr_wrap.cpp:1506:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  #undef access
data/gdal-3.2.0+dfsg/swig/python/extensions/gdal_array_wrap.cpp:701:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(r,name);
data/gdal-3.2.0+dfsg/swig/python/extensions/gdal_array_wrap.cpp:841:25:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#  define PyOS_snprintf _snprintf
data/gdal-3.2.0+dfsg/swig/python/extensions/gdal_array_wrap.cpp:843:25:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#  define PyOS_snprintf snprintf
data/gdal-3.2.0+dfsg/swig/python/extensions/gdal_array_wrap.cpp:860:9:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  res = vsnprintf(buf, sizeof(buf), fmt, ap);
data/gdal-3.2.0+dfsg/swig/python/extensions/gdal_wrap.cpp:702:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(r,name);
data/gdal-3.2.0+dfsg/swig/python/extensions/gdal_wrap.cpp:842:25:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#  define PyOS_snprintf _snprintf
data/gdal-3.2.0+dfsg/swig/python/extensions/gdal_wrap.cpp:844:25:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#  define PyOS_snprintf snprintf
data/gdal-3.2.0+dfsg/swig/python/extensions/gdal_wrap.cpp:861:9:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  res = vsnprintf(buf, sizeof(buf), fmt, ap);
data/gdal-3.2.0+dfsg/swig/python/extensions/gdal_wrap.cpp:9984:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(szTmp, CPL_FRMT_GIB, result);
data/gdal-3.2.0+dfsg/swig/python/extensions/gdal_wrap.cpp:10019:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(szTmp, CPL_FRMT_GIB, result);
data/gdal-3.2.0+dfsg/swig/python/extensions/gdal_wrap.cpp:11816:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(szTmp, CPL_FRMT_GIB, result);
data/gdal-3.2.0+dfsg/swig/python/extensions/gdal_wrap.cpp:11851:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(szTmp, CPL_FRMT_GIB, result);
data/gdal-3.2.0+dfsg/swig/python/extensions/gdal_wrap.cpp:12752:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(szTmp, CPL_FRMT_GIB, result);
data/gdal-3.2.0+dfsg/swig/python/extensions/gdal_wrap.cpp:22866:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(szTmp, CPL_FRMT_GIB, result);
data/gdal-3.2.0+dfsg/swig/python/extensions/gdal_wrap.cpp:23268:7:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
      sprintf(szTmp, CPL_FRMT_GUIB, (*arg2)[i]);
data/gdal-3.2.0+dfsg/swig/python/extensions/gdal_wrap.cpp:23349:7:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
      sprintf(szTmp, CPL_FRMT_GUIB, (*arg3)[i]);
data/gdal-3.2.0+dfsg/swig/python/extensions/gdal_wrap.cpp:26105:7:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
      sprintf(szTmp, CPL_FRMT_GUIB, (*arg2)[i]);
data/gdal-3.2.0+dfsg/swig/python/extensions/gdal_wrap.cpp:30855:9:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
        sprintf(szTmp, CPL_FRMT_GUIB, integerarray[i]);
data/gdal-3.2.0+dfsg/swig/python/extensions/gdal_wrap.cpp:37998:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(szTmp, CPL_FRMT_GIB, result);
data/gdal-3.2.0+dfsg/swig/python/extensions/gdal_wrap.cpp:38037:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(szTmp, CPL_FRMT_GIB, result);
data/gdal-3.2.0+dfsg/swig/python/extensions/gdalconst_wrap.c:678:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(r,name);
data/gdal-3.2.0+dfsg/swig/python/extensions/gdalconst_wrap.c:818:25:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#  define PyOS_snprintf _snprintf
data/gdal-3.2.0+dfsg/swig/python/extensions/gdalconst_wrap.c:820:25:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#  define PyOS_snprintf snprintf
data/gdal-3.2.0+dfsg/swig/python/extensions/gdalconst_wrap.c:837:9:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  res = vsnprintf(buf, sizeof(buf), fmt, ap);
data/gdal-3.2.0+dfsg/swig/python/extensions/gnm_wrap.cpp:702:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(r,name);
data/gdal-3.2.0+dfsg/swig/python/extensions/gnm_wrap.cpp:842:25:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#  define PyOS_snprintf _snprintf
data/gdal-3.2.0+dfsg/swig/python/extensions/gnm_wrap.cpp:844:25:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#  define PyOS_snprintf snprintf
data/gdal-3.2.0+dfsg/swig/python/extensions/gnm_wrap.cpp:861:9:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  res = vsnprintf(buf, sizeof(buf), fmt, ap);
data/gdal-3.2.0+dfsg/swig/python/extensions/ogr_wrap.cpp:702:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(r,name);
data/gdal-3.2.0+dfsg/swig/python/extensions/ogr_wrap.cpp:842:25:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#  define PyOS_snprintf _snprintf
data/gdal-3.2.0+dfsg/swig/python/extensions/ogr_wrap.cpp:844:25:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#  define PyOS_snprintf snprintf
data/gdal-3.2.0+dfsg/swig/python/extensions/ogr_wrap.cpp:861:9:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  res = vsnprintf(buf, sizeof(buf), fmt, ap);
data/gdal-3.2.0+dfsg/swig/python/extensions/ogr_wrap.cpp:9882:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(szTmp, CPL_FRMT_GIB, result);
data/gdal-3.2.0+dfsg/swig/python/extensions/ogr_wrap.cpp:10821:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(szTmp, CPL_FRMT_GIB, result);
data/gdal-3.2.0+dfsg/swig/python/extensions/ogr_wrap.cpp:13901:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(szTmp, CPL_FRMT_GIB, result);
data/gdal-3.2.0+dfsg/swig/python/extensions/ogr_wrap.cpp:13961:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(szTmp, CPL_FRMT_GIB, result);
data/gdal-3.2.0+dfsg/swig/python/extensions/ogr_wrap.cpp:14740:7:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
      sprintf(szTmp, CPL_FRMT_GIB, (*arg4)[i]);
data/gdal-3.2.0+dfsg/swig/python/extensions/ogr_wrap.cpp:15899:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(szTmp, CPL_FRMT_GIB, result);
data/gdal-3.2.0+dfsg/swig/python/extensions/osr_wrap.cpp:702:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(r,name);
data/gdal-3.2.0+dfsg/swig/python/extensions/osr_wrap.cpp:842:25:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#  define PyOS_snprintf _snprintf
data/gdal-3.2.0+dfsg/swig/python/extensions/osr_wrap.cpp:844:25:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#  define PyOS_snprintf snprintf
data/gdal-3.2.0+dfsg/swig/python/extensions/osr_wrap.cpp:861:9:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  res = vsnprintf(buf, sizeof(buf), fmt, ap);
data/gdal-3.2.0+dfsg/alg/internal_libqhull/user.h:249:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#define qh_RANDOMint random()
data/gdal-3.2.0+dfsg/alg/internal_libqhull/user.h:250:30:  [3] (random) srandom:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#define qh_RANDOMseed_(seed) srandom(seed);
data/gdal-3.2.0+dfsg/alg/internal_libqhull/user.h:259:30:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#define qh_RANDOMseed_(seed) srand((unsigned)seed);
data/gdal-3.2.0+dfsg/alg/internal_libqhull/user.h:264:30:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#define qh_RANDOMseed_(seed) srand((unsigned)seed);
data/gdal-3.2.0+dfsg/alg/internal_libqhull/user.h:268:22:  [3] (random) lrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#define qh_RANDOMint lrand48()
data/gdal-3.2.0+dfsg/alg/internal_libqhull/user.h:278:17:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#error: unknown random option
data/gdal-3.2.0+dfsg/frmts/dods/dodsdataset2.cpp:335:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        && getenv("DODS_CONF") == nullptr )
data/gdal-3.2.0+dfsg/frmts/grass/grass.cpp:861:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if ( !getenv( "GISBASE" ) ) {
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_dirread.c:5741:24:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		const char* pszMax = getenv("LIBTIFF_STRILE_ARRAY_MAX_RESIZE_COUNT");
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_jpeg.c:384:38:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        sz_max_allowed_scan_number = getenv("LIBTIFF_JPEG_MAX_ALLOWED_SCAN_NUMBER");
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_jpeg.c:1227:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
                getenv("LIBTIFF_ALLOW_LARGE_LIBJPEG_MEM_ALLOC") == NULL )
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_jpeg.c:2463:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
            if (getenv("JPEGMEM") == NULL)
data/gdal-3.2.0+dfsg/frmts/iso8211/ddffield.cpp:77:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if( getenv("DDF_MAXDUMP") != nullptr )
data/gdal-3.2.0+dfsg/frmts/iso8211/ddffield.cpp:78:27:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        nMaxRepeat = atoi(getenv("DDF_MAXDUMP"));
data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jmemmgr.c:35:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
extern char * getenv JPP((const char * name));
data/gdal-3.2.0+dfsg/frmts/jpeg/libjpeg/jmemmgr.c:1110:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if ((memenv = getenv("JPEGMEM")) != NULL) {
data/gdal-3.2.0+dfsg/frmts/openjpeg/openjpegdataset.cpp:896:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if( getenv("OPJ_NUM_THREADS") == nullptr )
data/gdal-3.2.0+dfsg/frmts/openjpeg/openjpegdataset.cpp:1711:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if( getenv("OPJ_NUM_THREADS") == nullptr )
data/gdal-3.2.0+dfsg/frmts/openjpeg/openjpegdataset.cpp:3331:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if( getenv("OPJ_NUM_THREADS") == nullptr )
data/gdal-3.2.0+dfsg/frmts/pcidsk/sdk/core/pcidsk_utils.cpp:572:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if( getenv( "PCIDSK_DEBUG" ) != nullptr )
data/gdal-3.2.0+dfsg/frmts/postgisraster/postgisrasterdataset.cpp:2909:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        getenv("PGAPPNAME") == nullptr) {
data/gdal-3.2.0+dfsg/frmts/wcs/wcsutils.cpp:437:5:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    srand((unsigned int)time(nullptr)); // not to have the same names in the cache
data/gdal-3.2.0+dfsg/gcore/gdaljp2metadatagenerator.cpp:428:5:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    srand(static_cast<unsigned int>(time(nullptr)) + nCounter);
data/gdal-3.2.0+dfsg/gcore/gdalpython.cpp:269:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        char* pszPath = getenv("PATH");
data/gdal-3.2.0+dfsg/gcore/gdalpython.cpp:456:25:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
            libHandle = LoadLibrary(pszPythonSO);
data/gdal-3.2.0+dfsg/gcore/gdalpython.cpp:485:21:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
        libHandle = LoadLibrary(PYTHONSO_DEFAULT);
data/gdal-3.2.0+dfsg/gcore/gdalpython.cpp:499:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        char* pszPath = getenv("PATH");
data/gdal-3.2.0+dfsg/gcore/gdalpython.cpp:579:25:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
            libHandle = LoadLibrary(osDLLName);
data/gdal-3.2.0+dfsg/gcore/gdalpython.cpp:609:25:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
            libHandle = LoadLibrary(apszPythonSO[i]);
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/dods/ogrdodsdatasource.cpp:123:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        && getenv("DODS_CONF") == nullptr )
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/fme/ogrfmedatasource.cpp:101:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    pszTmpDir = getenv("OGRFME_TMPDIR");
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/fme/ogrfmedatasource.cpp:103:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        pszTmpDir = getenv("TMPDIR");
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/fme/ogrfmedatasource.cpp:105:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        pszTmpDir = getenv("TEMPDIR");
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/fme/ogrfmedatasource.cpp:107:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        pszTmpDir = getenv("TMP");
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/fme/ogrfmedatasource.cpp:109:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        pszTmpDir = getenv("TEMP");
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/grass/ogrgrassdatasource.cpp:151:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if ( !getenv( "GISBASE" ) ) {
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/grass/ogrgrasslayer.cpp:201:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if ( getenv("GISBASE") )  // We have some projection info in GISBASE
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ntf/ogrntfdatasource.cpp:74:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if( getenv("OGR_NTF_OPTIONS") != nullptr )
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/ntf/ogrntfdatasource.cpp:77:39:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
            CSLTokenizeStringComplex( getenv("OGR_NTF_OPTIONS"), ",",
data/gdal-3.2.0+dfsg/ogr/ogrsf_frmts/pg/ogrpgdatasource.cpp:405:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        getenv("PGAPPNAME") == nullptr )
data/gdal-3.2.0+dfsg/ogr/ogrspatialreference.cpp:10157:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        getenv("PROJ_USE_PROJ4_INIT_RULES") == nullptr )
data/gdal-3.2.0+dfsg/port/cpl_conv.cpp:1719:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        pszResult = getenv(pszKey);
data/gdal-3.2.0+dfsg/port/cpl_multiproc.cpp:850:7:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
      EnterCriticalSection(pcs);
data/gdal-3.2.0+dfsg/port/cpl_multiproc.cpp:884:9:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
        EnterCriticalSection(pcs);
data/gdal-3.2.0+dfsg/port/cpl_odbc.cpp:95:34:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        const char* pszEnvHome = getenv("HOME");
data/gdal-3.2.0+dfsg/port/cpl_odbc.cpp:103:32:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
            pszEnvOdbcSysIni = getenv("ODBCSYSINI");
data/gdal-3.2.0+dfsg/port/cpl_recode_stub.cpp:1234:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if( ((s = getenv("LC_CTYPE")) && *s) ||
data/gdal-3.2.0+dfsg/port/cpl_recode_stub.cpp:1235:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
            ((s = getenv("LC_ALL"))   && *s) ||
data/gdal-3.2.0+dfsg/port/cpl_recode_stub.cpp:1236:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
            ((s = getenv("LANG"))     && *s) )
data/gdal-3.2.0+dfsg/port/cpl_vsisimple.cpp:412:29:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    char* pszShowMemStats = getenv("CPL_SHOW_MEM_STATS");
data/gdal-3.2.0+dfsg/port/cpl_vsisimple.cpp:463:37:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        char* pszMaxPeakAllocSize = getenv("CPL_MAX_PEAK_ALLOC_SIZE");
data/gdal-3.2.0+dfsg/port/cpl_vsisimple.cpp:465:38:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        char* pszMaxCumulAllocSize = getenv("CPL_MAX_CUMUL_ALLOC_SIZE");
data/gdal-3.2.0+dfsg/port/cpl_vsisimple.cpp:571:37:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        char* pszMaxPeakAllocSize = getenv("CPL_MAX_PEAK_ALLOC_SIZE");
data/gdal-3.2.0+dfsg/port/cpl_vsisimple.cpp:573:38:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        char* pszMaxCumulAllocSize = getenv("CPL_MAX_CUMUL_ALLOC_SIZE");
data/gdal-3.2.0+dfsg/port/cpl_vsisimple.cpp:698:37:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        char* pszMaxPeakAllocSize = getenv("CPL_MAX_PEAK_ALLOC_SIZE");
data/gdal-3.2.0+dfsg/port/vsipreload.cpp:172:24:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    DEBUG_VSIPRELOAD = getenv("DEBUG_VSIPRELOAD") != nullptr;
data/gdal-3.2.0+dfsg/alg/contour.cpp:580:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        idField = atoi( opt );
data/gdal-3.2.0+dfsg/alg/contour.cpp:586:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        elevField = atoi( opt );
data/gdal-3.2.0+dfsg/alg/contour.cpp:592:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        elevFieldMin = atoi( opt );
data/gdal-3.2.0+dfsg/alg/contour.cpp:598:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        elevFieldMax = atoi( opt );
data/gdal-3.2.0+dfsg/alg/gdal_crs.cpp:219:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( psInfo->sTI.abySignature, GDAL_GTI2_SIGNATURE, strlen(GDAL_GTI2_SIGNATURE) );
data/gdal-3.2.0+dfsg/alg/gdal_crs.cpp:538:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    nReqOrder = atoi(CPLGetXMLValue(psTree,"Order","3"));
data/gdal-3.2.0+dfsg/alg/gdal_crs.cpp:539:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    bReversed = atoi(CPLGetXMLValue(psTree,"Reversed","0"));
data/gdal-3.2.0+dfsg/alg/gdal_crs.cpp:540:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    bRefine = atoi(CPLGetXMLValue(psTree,"Refine","0"));
data/gdal-3.2.0+dfsg/alg/gdal_crs.cpp:541:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    nMinimumGcps = atoi(CPLGetXMLValue(psTree,"MinimumGcps","6"));
data/gdal-3.2.0+dfsg/alg/gdal_rpc.cpp:486:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&sRPC, &(psInfo->sRPC), sizeof(GDALRPCInfo));
data/gdal-3.2.0+dfsg/alg/gdal_rpc.cpp:792:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( &(psTransform->sRPC), psRPCInfo, sizeof(GDALRPCInfo) );
data/gdal-3.2.0+dfsg/alg/gdal_rpc.cpp:805:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( psTransform->sTI.abySignature,
data/gdal-3.2.0+dfsg/alg/gdal_rpc.cpp:820:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(psTransform->padfCoeffs,
data/gdal-3.2.0+dfsg/alg/gdal_rpc.cpp:823:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(psTransform->padfCoeffs+20,
data/gdal-3.2.0+dfsg/alg/gdal_rpc.cpp:826:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(psTransform->padfCoeffs+40,
data/gdal-3.2.0+dfsg/alg/gdal_rpc.cpp:829:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(psTransform->padfCoeffs+60,
data/gdal-3.2.0+dfsg/alg/gdal_rpc.cpp:910:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    psTransform->nMaxIterations = atoi( CSLFetchNameValueDef(
data/gdal-3.2.0+dfsg/alg/gdal_rpc.cpp:1481:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( padfOut + i * nWidth,
data/gdal-3.2.0+dfsg/alg/gdal_rpc.cpp:1770:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(adfElevData,
data/gdal-3.2.0+dfsg/alg/gdal_rpc.cpp:1773:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(adfElevData + 2,
data/gdal-3.2.0+dfsg/alg/gdal_rpc.cpp:1915:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            atoi(CPLGetConfigOption("GDAL_RPC_DEM_BUFFER_MAX_RADIUS", "2"));
data/gdal-3.2.0+dfsg/alg/gdal_rpc.cpp:2393:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    const int bReversed = atoi(CPLGetXMLValue(psTree, "Reversed", "0"));
data/gdal-3.2.0+dfsg/alg/gdal_tps.cpp:173:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( psInfo->sTI.abySignature,
data/gdal-3.2.0+dfsg/alg/gdal_tps.cpp:270:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            nThreads = atoi(pszWarpThreads);
data/gdal-3.2.0+dfsg/alg/gdal_tps.cpp:449:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    const int bReversed = atoi(CPLGetXMLValue(psTree, "Reversed", "0"));
data/gdal-3.2.0+dfsg/alg/gdalapplyverticalshiftgrid.cpp:564:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        atoi(CSLFetchNameValueDef(papszOptions, "BLOCKSIZE", "256")) );
data/gdal-3.2.0+dfsg/alg/gdalcutline.cpp:340:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szDataPointer[100] = {};
data/gdal-3.2.0+dfsg/alg/gdalgeoloc.cpp:174:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy( psTransform->padfGeoLocX + j * nXSize,
data/gdal-3.2.0+dfsg/alg/gdalgeoloc.cpp:708:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( psTransform->sTI.abySignature,
data/gdal-3.2.0+dfsg/alg/gdalgeoloc.cpp:784:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        std::max(1, atoi(CSLFetchNameValue( papszGeolocationInfo, "X_BAND" )));
data/gdal-3.2.0+dfsg/alg/gdalgeoloc.cpp:788:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        std::max(1, atoi(CSLFetchNameValue( papszGeolocationInfo, "Y_BAND" )));
data/gdal-3.2.0+dfsg/alg/gdalgeoloc.cpp:1183:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    const int bReversed = atoi(CPLGetXMLValue(psTree, "Reversed", "0"));
data/gdal-3.2.0+dfsg/alg/gdalgrid.cpp:1760:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(poOptionsNew, poOptions,
data/gdal-3.2.0+dfsg/alg/gdalgrid.cpp:1868:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(poOptionsNew, poOptions,
data/gdal-3.2.0+dfsg/alg/gdalgrid.cpp:1879:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(poOptionsNew,
data/gdal-3.2.0+dfsg/alg/gdalgrid.cpp:1889:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(poOptionsNew, poOptions,
data/gdal-3.2.0+dfsg/alg/gdalgrid.cpp:1901:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(poOptionsNew, poOptions, sizeof(GDALGridDataMetricsOptions));
data/gdal-3.2.0+dfsg/alg/gdalgrid.cpp:1909:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(poOptionsNew, poOptions, sizeof(GDALGridDataMetricsOptions));
data/gdal-3.2.0+dfsg/alg/gdalgrid.cpp:1917:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(poOptionsNew, poOptions, sizeof(GDALGridDataMetricsOptions));
data/gdal-3.2.0+dfsg/alg/gdalgrid.cpp:1925:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(poOptionsNew, poOptions, sizeof(GDALGridDataMetricsOptions));
data/gdal-3.2.0+dfsg/alg/gdalgrid.cpp:1933:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(poOptionsNew, poOptions, sizeof(GDALGridDataMetricsOptions));
data/gdal-3.2.0+dfsg/alg/gdalgrid.cpp:1941:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(poOptionsNew, poOptions, sizeof(GDALGridDataMetricsOptions));
data/gdal-3.2.0+dfsg/alg/gdalgrid.cpp:1949:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(poOptionsNew, poOptions, sizeof(GDALGridLinearOptions));
data/gdal-3.2.0+dfsg/alg/gdalgrid.cpp:1976:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(padfXNew, padfX, nPoints * sizeof(double));
data/gdal-3.2.0+dfsg/alg/gdalgrid.cpp:1977:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(padfYNew, padfY, nPoints * sizeof(double));
data/gdal-3.2.0+dfsg/alg/gdalgrid.cpp:1978:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(padfZNew, padfZ, nPoints * sizeof(double));
data/gdal-3.2.0+dfsg/alg/gdalgrid.cpp:2049:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        nThreads = atoi(pszThreads);
data/gdal-3.2.0+dfsg/alg/gdalgrid.cpp:2322:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&pasJobs[i], &sJob, sizeof(GDALGridJob));
data/gdal-3.2.0+dfsg/alg/gdalgrid.cpp:2671:55:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            poMetricsOptions->nMinPoints = pszValue ? atoi(pszValue) : 0;
data/gdal-3.2.0+dfsg/alg/gdalmatching.cpp:201:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    nOctaveStart =atoi(CSLFetchNameValueDef(papszOptions, "OCTAVE_START", "2"));
data/gdal-3.2.0+dfsg/alg/gdalmatching.cpp:202:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    nOctaveEnd = atoi(CSLFetchNameValueDef(papszOptions, "OCTAVE_END", "2"));
data/gdal-3.2.0+dfsg/alg/gdalpansharpen.cpp:125:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(psNewOptions->padfWeights,
data/gdal-3.2.0+dfsg/alg/gdalpansharpen.cpp:137:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(psNewOptions->pahInputSpectralBands,
data/gdal-3.2.0+dfsg/alg/gdalpansharpen.cpp:146:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(psNewOptions->panOutPansharpenedBands,
data/gdal-3.2.0+dfsg/alg/gdalpansharpen.cpp:383:54:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                nThreads = std::max(0, std::min(128, atoi(pszNumThreads)));
data/gdal-3.2.0+dfsg/alg/gdalpansharpen.cpp:1207:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char szBuffer0[64] = {};
data/gdal-3.2.0+dfsg/alg/gdalpansharpen.cpp:1208:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char szBuffer1[64] = {};
data/gdal-3.2.0+dfsg/alg/gdalpansharpen.cpp:1209:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char szBuffer2[64] = {};
data/gdal-3.2.0+dfsg/alg/gdalpansharpen.cpp:1222:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char szBuffer[32] = {};
data/gdal-3.2.0+dfsg/alg/gdalpansharpen.cpp:1408:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                nBandBitDepth = atoi(pszNBITS);
data/gdal-3.2.0+dfsg/alg/gdalproximity.cpp:242:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            panTargetValues[i] = atoi(papszValuesTokens[i]);
data/gdal-3.2.0+dfsg/alg/gdalrasterize.cpp:877:57:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        if( pszYChunkSize == nullptr || ((nYChunkSize = atoi(pszYChunkSize))) == 0)
data/gdal-3.2.0+dfsg/alg/gdalrasterize.cpp:1232:44:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    if( !(pszYChunkSize && ((nYChunkSize = atoi(pszYChunkSize))) != 0) )
data/gdal-3.2.0+dfsg/alg/gdalsievefilter.cpp:537:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( panThisLineWriteVal, panThisLineVal, 4 * nXSize );
data/gdal-3.2.0+dfsg/alg/gdalsimplewarp.cpp:90:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        const int nFromValue = atoi(papszTokens[0]);
data/gdal-3.2.0+dfsg/alg/gdalsimplewarp.cpp:91:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        const int nToValue = atoi(papszTokens[1]);
data/gdal-3.2.0+dfsg/alg/gdalsimplewarp.cpp:154:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            panFromValue[iBand] = atoi(papszTokens[iBand]);
data/gdal-3.2.0+dfsg/alg/gdalsimplewarp.cpp:155:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            panToValue[iBand] = atoi(papszTokens[iBand+nMapBandCount]);
data/gdal-3.2.0+dfsg/alg/gdalsimplewarp.cpp:375:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                    atoi(papszTokens[std::min(iBand, nTokenCount- 1)]);
data/gdal-3.2.0+dfsg/alg/gdaltransformer.cpp:542:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(padfXRevert, padfX, nSamplePoints * sizeof(double));
data/gdal-3.2.0+dfsg/alg/gdaltransformer.cpp:543:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(padfYRevert, padfY, nSamplePoints * sizeof(double));
data/gdal-3.2.0+dfsg/alg/gdaltransformer.cpp:544:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(padfZRevert, padfZ, nSamplePoints * sizeof(double));
data/gdal-3.2.0+dfsg/alg/gdaltransformer.cpp:978:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(psClonedInfo, psInfo, sizeof(GDALGenImgProjTransformInfo));
data/gdal-3.2.0+dfsg/alg/gdaltransformer.cpp:1170:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( psInfo->sTI.abySignature,
data/gdal-3.2.0+dfsg/alg/gdaltransformer.cpp:1485:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    const int nOrder = pszValue ? atoi(pszValue) : 0;
data/gdal-3.2.0+dfsg/alg/gdaltransformer.cpp:1492:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    const int nMinimumGcps =  pszValue ? atoi(pszValue) : -1;
data/gdal-3.2.0+dfsg/alg/gdaltransformer.cpp:1567:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( psInfo->adfSrcInvGeoTransform, psInfo->adfSrcGeoTransform,
data/gdal-3.2.0+dfsg/alg/gdaltransformer.cpp:1776:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( psInfo->adfDstInvGeoTransform, psInfo->adfDstGeoTransform,
data/gdal-3.2.0+dfsg/alg/gdaltransformer.cpp:2160:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( psInfo->adfSrcInvGeoTransform, psInfo->adfSrcGeoTransform,
data/gdal-3.2.0+dfsg/alg/gdaltransformer.cpp:2207:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( psInfo->adfDstInvGeoTransform, psInfo->adfDstGeoTransform,
data/gdal-3.2.0+dfsg/alg/gdaltransformer.cpp:2244:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( psInfo->adfDstGeoTransform, padfGeoTransform, sizeof(double) * 6 );
data/gdal-3.2.0+dfsg/alg/gdaltransformer.cpp:2438:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szWork[200] = {};
data/gdal-3.2.0+dfsg/alg/gdaltransformer.cpp:2875:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( psInfo->sTI.abySignature,
data/gdal-3.2.0+dfsg/alg/gdaltransformer.cpp:3128:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(psClonedInfo, psInfo, sizeof(ApproxTransformInfo));
data/gdal-3.2.0+dfsg/alg/gdaltransformer.cpp:3259:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(psATInfo->sTI.abySignature,
data/gdal-3.2.0+dfsg/alg/gdaltransformer.cpp:4269:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( padfGeoTransform, psGenImgProjInfo->adfDstGeoTransform,
data/gdal-3.2.0+dfsg/alg/gdalwarper.cpp:1267:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
       memcpy( (psDstOptions->target), (psSrcOptions->target),          \
data/gdal-3.2.0+dfsg/alg/gdalwarper.cpp:1287:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( psDstOptions, psSrcOptions, sizeof(GDALWarpOptions) );
data/gdal-3.2.0+dfsg/alg/gdalwarper.cpp:1952:40:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            psWO->panSrcBands[iBand] = atoi(pszValue);
data/gdal-3.2.0+dfsg/alg/gdalwarper.cpp:1959:40:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            psWO->panDstBands[iBand] = atoi(pszValue);
data/gdal-3.2.0+dfsg/alg/gdalwarper.cpp:2002:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        atoi( CPLGetXMLValue( psTree, "SrcAlphaBand", "0" ) );
data/gdal-3.2.0+dfsg/alg/gdalwarper.cpp:2004:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        atoi( CPLGetXMLValue( psTree, "DstAlphaBand", "0" ) );
data/gdal-3.2.0+dfsg/alg/gdalwarpkernel.cpp:305:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        nThreads = atoi(pszWarpThreads);
data/gdal-3.2.0+dfsg/alg/gdalwarpkernel.cpp:465:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    const int nWarpChunkSize = atoi(
data/gdal-3.2.0+dfsg/alg/gdalwarpkernel.cpp:1168:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        atoi(CSLFetchNameValueDef(papszWarpOptions,
data/gdal-3.2.0+dfsg/alg/gdalwarpkernel.cpp:2759:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&i, ptr, 4);
data/gdal-3.2.0+dfsg/alg/gdalwarpkernel.cpp:2779:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&i, ptr, 8);
data/gdal-3.2.0+dfsg/alg/gdalwarpkernel.cpp:4539:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( padfX, padfX + nDstXSize, sizeof(double) * nDstXSize );
data/gdal-3.2.0+dfsg/alg/gdalwarpkernel.cpp:4664:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&(pabyDst[iDstY*nDstXSize]),
data/gdal-3.2.0+dfsg/alg/gdalwarpkernel.cpp:4668:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&(reinterpret_cast<GInt16 *>(pabyDst)[iDstY*nDstXSize]),
data/gdal-3.2.0+dfsg/alg/gdalwarpkernel.cpp:4672:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&(reinterpret_cast<GUInt16 *>(pabyDst)[iDstY*nDstXSize]),
data/gdal-3.2.0+dfsg/alg/gdalwarpkernel.cpp:4676:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&(reinterpret_cast<float *>(pabyDst)[iDstY*nDstXSize]),
data/gdal-3.2.0+dfsg/alg/gdalwarpkernel.cpp:4851:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( padfX, padfX + nDstXSize, sizeof(double) * nDstXSize );
data/gdal-3.2.0+dfsg/alg/gdalwarpkernel.cpp:5076:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( padfX, padfX + nDstXSize, sizeof(double) * nDstXSize );
data/gdal-3.2.0+dfsg/alg/gdalwarpkernel.cpp:5325:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( padfX, padfX + nDstXSize, sizeof(double) * nDstXSize );
data/gdal-3.2.0+dfsg/alg/gdalwarpkernel.cpp:5542:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( padfX, padfX + nDstXSize, sizeof(double) * nDstXSize );
data/gdal-3.2.0+dfsg/alg/gdalwarpkernel_opencl.cpp:1590:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char dummyImageData[16];
data/gdal-3.2.0+dfsg/alg/gdalwarpkernel_opencl.cpp:1880:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(realDst, srcImgData, width*height*sizeof(unsigned char));
data/gdal-3.2.0+dfsg/alg/gdalwarpkernel_opencl.cpp:1886:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(realDst, srcImgData, width*height*sizeof(char));
data/gdal-3.2.0+dfsg/alg/gdalwarpkernel_opencl.cpp:1892:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(realDst, srcImgData, width*height*sizeof(unsigned short));
data/gdal-3.2.0+dfsg/alg/gdalwarpkernel_opencl.cpp:1898:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(realDst, srcImgData, width*height*sizeof(short));
data/gdal-3.2.0+dfsg/alg/gdalwarpkernel_opencl.cpp:1904:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(realDst, srcImgData, width*height*sizeof(float));
data/gdal-3.2.0+dfsg/alg/gdalwarpkernel_opencl.cpp:2244:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&(warper->nBandSrcValid[bandNum*stride]), bandSrcValid, sizeof(int) * stride);
data/gdal-3.2.0+dfsg/alg/gdalwarpoperation.cpp:399:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        if( atoi(CSLFetchNameValue( psOptions->papszWarpOptions,
data/gdal-3.2.0+dfsg/alg/gdalwarpoperation.cpp:480:47:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        pszAlphaMax = CPLSPrintf("%u", (1U << atoi(pszNBits)) - 1U);
data/gdal-3.2.0+dfsg/alg/gdalwarpoperation.cpp:2440:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                atoi(CSLFetchNameValue( psOptions->papszWarpOptions,
data/gdal-3.2.0+dfsg/alg/gdalwarpoperation.cpp:2571:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            atoi(CSLFetchNameValue( psOptions->papszWarpOptions,
data/gdal-3.2.0+dfsg/alg/gdalwarpoperation.cpp:2838:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        const int nSrcExtra = atoi(
data/gdal-3.2.0+dfsg/alg/internal_libqhull/geom2.c:39:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((char *)newpoints, (char *)points, (size_t)size);
data/gdal-3.2.0+dfsg/alg/internal_libqhull/global.c:1313:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char filename[qh_FILENAMElen];
data/gdal-3.2.0+dfsg/alg/internal_libqhull/global.c:1333:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
              char filename[qh_FILENAMElen];
data/gdal-3.2.0+dfsg/alg/internal_libqhull/global.c:1892:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(qh qhull, "qhull");
data/gdal-3.2.0+dfsg/alg/internal_libqhull/global.c:2026:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[200];
data/gdal-3.2.0+dfsg/alg/internal_libqhull/global.c:2031:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(buf+strlen(buf), " %d", *i);
data/gdal-3.2.0+dfsg/alg/internal_libqhull/global.c:2033:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(buf+strlen(buf), " %2.2g", *r);
data/gdal-3.2.0+dfsg/alg/internal_libqhull/io.c:3594:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *t, firstline[qh_MAXfirst+1];
data/gdal-3.2.0+dfsg/alg/internal_libqhull/libqhull.h:560:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  qhull_command[256];/* command line that invoked this program */
data/gdal-3.2.0+dfsg/alg/internal_libqhull/libqhull.h:562:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  rbox_command[256]; /* command line that produced the input points */
data/gdal-3.2.0+dfsg/alg/internal_libqhull/libqhull.h:563:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  qhull_options[512];/* descriptive list of options */
data/gdal-3.2.0+dfsg/alg/internal_libqhull/libqhull.h:617:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char qhull[sizeof("qhull")]; /* "qhull" for checking ownership while debugging */
data/gdal-3.2.0+dfsg/alg/internal_libqhull/libqhull.h:619:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char jmpXtra[40];       /* extra bytes in case jmp_buf is defined wrong by compiler */
data/gdal-3.2.0+dfsg/alg/internal_libqhull/libqhull.h:621:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char jmpXtra2[40];      /* extra bytes in case jmp_buf is defined wrong by compiler*/
data/gdal-3.2.0+dfsg/alg/internal_libqhull/qset.c:185:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy((char *)&((*setp)->e[size].p), (char *)&(setA->e[0].p), (size_t)(sizeA+1) * SETelemsize);
data/gdal-3.2.0+dfsg/alg/internal_libqhull/qset.c:318:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((char *)&(newset->e[0].p), (char *)&(set->e[0].p), (size_t)(size+1) * SETelemsize);
data/gdal-3.2.0+dfsg/alg/internal_libqhull/qset.c:556:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(newElem, elem, (size_t)elemsize);
data/gdal-3.2.0+dfsg/alg/internal_libqhull/qset.c:874:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy((char *)newp, (char *)oldp, (size_t)(size+1) * SETelemsize);
data/gdal-3.2.0+dfsg/alg/internal_libqhull/qset.c:1009:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy((char *)newp, (char *)oldp, (size_t)nth * SETelemsize);
data/gdal-3.2.0+dfsg/alg/internal_libqhull/qset.c:1037:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy((char *)newp, (char *)oldp, (size_t)tailsize * SETelemsize);
data/gdal-3.2.0+dfsg/alg/internal_libqhull/rboxlib.c:104:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char command[200], seedbuf[200];
data/gdal-3.2.0+dfsg/alg/internal_libqhull/rboxlib.c:349:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(seedbuf, " t%d", seed);  /* appends an extra t, not worth removing */
data/gdal-3.2.0+dfsg/alg/internal_libqhull/stat.h:503:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned   char id[ZEND+10]; /* id's in print order */
data/gdal-3.2.0+dfsg/alg/internal_libqhull/stat.h:504:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char *doc[ZEND];       /* array of documentation strings */
data/gdal-3.2.0+dfsg/alg/internal_libqhull/stat.h:506:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char       type[ZEND];      /* type, see ztypes above */
data/gdal-3.2.0+dfsg/alg/internal_libqhull/stat.h:507:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char       printed[ZEND];   /* true, if statistic has been printed */
data/gdal-3.2.0+dfsg/alg/internal_qhull_headers.h:77:5:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
f = open('headers.txt')
data/gdal-3.2.0+dfsg/alg/polygonize.cpp:835:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&aInt, &A, 4);
data/gdal-3.2.0+dfsg/alg/polygonize.cpp:843:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&bInt, &B, 4);
data/gdal-3.2.0+dfsg/alg/rasterfill.cpp:275:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy( pafThisPass + iThisOffset * nXSize,
data/gdal-3.2.0+dfsg/alg/thinplatespline.cpp:303:29:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define GET_HIGH_WORD(hx,x) memcpy(&hx, reinterpret_cast<char*>(&x)+4,4)
data/gdal-3.2.0+dfsg/alg/thinplatespline.cpp:304:29:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define SET_HIGH_WORD(x,hx) memcpy(reinterpret_cast<char*>(&x)+4, &hx,4)
data/gdal-3.2.0+dfsg/alg/viewshed.cpp:681:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(padfLastLineVal, padfFirstLineVal, nXSize * sizeof(double));
data/gdal-3.2.0+dfsg/apps/dumpoverviews.cpp:81:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        else if( atoi(argv[iArg]) > 0 || EQUAL(argv[iArg],"0") )
data/gdal-3.2.0+dfsg/apps/dumpoverviews.cpp:83:51:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            anReqOverviews[nReqOverviewCount++] = atoi(argv[iArg]);
data/gdal-3.2.0+dfsg/apps/dumpoverviews.cpp:222:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( adfOvGeoTransform, adfGeoTransform,
data/gdal-3.2.0+dfsg/apps/gdal2ogr.c:108:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            iBand = atoi(argv[++i]);
data/gdal-3.2.0+dfsg/apps/gdal2ogr.c:128:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            xStep = yStep = atoi(argv[++i]);
data/gdal-3.2.0+dfsg/apps/gdal2ogr.c:179:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fOut = fopen(pszDstFilename, "wt");
data/gdal-3.2.0+dfsg/apps/gdal2ogr.c:190:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fOutCSVT = fopen(pszDstFilenameCSVT, "wt");
data/gdal-3.2.0+dfsg/apps/gdal2ogr.c:202:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(pszDstFilenameVRT + strlen(pszDstFilename) - 3, "vrt");
data/gdal-3.2.0+dfsg/apps/gdal2ogr.c:203:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fOutVRT = fopen(pszDstFilenameVRT, "wt");
data/gdal-3.2.0+dfsg/apps/gdal_contour.cpp:121:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    if (atoi(GDALVersionInfo("VERSION_NUM")) < 1400)
data/gdal-3.2.0+dfsg/apps/gdal_contour.cpp:206:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            nBandIn = atoi(argv[++i]);
data/gdal-3.2.0+dfsg/apps/gdal_create.cpp:140:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            nBandCount = atoi(argv[i]);
data/gdal-3.2.0+dfsg/apps/gdal_create.cpp:145:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            nPixels = atoi(argv[i]);
data/gdal-3.2.0+dfsg/apps/gdal_create.cpp:147:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            nLines = atoi(argv[i]);
data/gdal-3.2.0+dfsg/apps/gdal_grid_lib.cpp:1141:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            psOptions->nXSize = atoi(papszArgv[i+1]);
data/gdal-3.2.0+dfsg/apps/gdal_grid_lib.cpp:1142:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            psOptions->nYSize = atoi(papszArgv[i+2]);
data/gdal-3.2.0+dfsg/apps/gdal_rasterize_lib.cpp:885:53:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                    psOptions->anBandList.push_back(atoi(*papszIter));
data/gdal-3.2.0+dfsg/apps/gdal_rasterize_lib.cpp:895:53:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                    psOptions->anBandList.push_back(atoi(papszArgv[i+1]));
data/gdal-3.2.0+dfsg/apps/gdal_rasterize_lib.cpp:1070:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            psOptions->nXSize = atoi(papszArgv[++i]);
data/gdal-3.2.0+dfsg/apps/gdal_rasterize_lib.cpp:1071:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            psOptions->nYSize = atoi(papszArgv[++i]);
data/gdal-3.2.0+dfsg/apps/gdal_translate_lib.cpp:453:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(psOptions, psOptionsIn, sizeof(GDALTranslateOptions));
data/gdal-3.2.0+dfsg/apps/gdal_translate_lib.cpp:459:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(psOptions->panBandList, psOptionsIn->panBandList,
data/gdal-3.2.0+dfsg/apps/gdal_translate_lib.cpp:468:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(psOptions->pasScaleParams, psOptionsIn->pasScaleParams,
data/gdal-3.2.0+dfsg/apps/gdal_translate_lib.cpp:475:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(psOptions->padfExponent, psOptionsIn->padfExponent,
data/gdal-3.2.0+dfsg/apps/gdal_translate_lib.cpp:488:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(psOptions->panColorInterp, psOptionsIn->panColorInterp,
data/gdal-3.2.0+dfsg/apps/gdal_translate_lib.cpp:1454:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(adfSrcWinOri, psOptions->adfSrcWin, sizeof(psOptions->adfSrcWin));
data/gdal-3.2.0+dfsg/apps/gdal_translate_lib.cpp:1758:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                    GInt32 nMin = atoi(pszMin);
data/gdal-3.2.0+dfsg/apps/gdal_translate_lib.cpp:2384:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            const int nBand = atoi(pszBand);
data/gdal-3.2.0+dfsg/apps/gdal_translate_lib.cpp:2423:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                const int nBand = atoi(pszBand);
data/gdal-3.2.0+dfsg/apps/gdal_translate_lib.cpp:2539:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                nIndex = atoi(papszArgv[i] + 7);
data/gdal-3.2.0+dfsg/apps/gdal_translate_lib.cpp:2605:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                nIndex = atoi(papszArgv[i] + 10);
data/gdal-3.2.0+dfsg/apps/gdal_translate_lib.cpp:2657:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                psOptions->nOXSizePixel = atoi(papszArgv[i]);
data/gdal-3.2.0+dfsg/apps/gdal_translate_lib.cpp:2663:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                psOptions->nOYSizePixel = atoi(papszArgv[i]);
data/gdal-3.2.0+dfsg/apps/gdal_translate_lib.cpp:2785:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            int nIndex = atoi(papszArgv[i] + strlen("-colorinterp_"));
data/gdal-3.2.0+dfsg/apps/gdal_translate_lib.cpp:2817:40:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            psOptions->nLimitOutSize = atoi(papszArgv[i+1]);
data/gdal-3.2.0+dfsg/apps/gdal_viewshed.cpp:186:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            nBandIn = atoi(argv[++i]);
data/gdal-3.2.0+dfsg/apps/gdaladdo.cpp:117:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    if (atoi(GDALVersionInfo("VERSION_NUM")) < 1700)
data/gdal-3.2.0+dfsg/apps/gdaladdo.cpp:185:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            const int nBand = atoi(pszBand);
data/gdal-3.2.0+dfsg/apps/gdaladdo.cpp:207:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            nMinSize = atoi(papszArgv[++iArg]);
data/gdal-3.2.0+dfsg/apps/gdaladdo.cpp:217:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        else if( atoi(papszArgv[iArg]) > 0 &&
data/gdal-3.2.0+dfsg/apps/gdaladdo.cpp:220:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            anLevels[nLevelCount++] = atoi(papszArgv[iArg]);
data/gdal-3.2.0+dfsg/apps/gdalasyncread.cpp:160:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            if( atoi(argv[i+1]) < 1 )
data/gdal-3.2.0+dfsg/apps/gdalasyncread.cpp:171:41:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            panBandList[nBandCount-1] = atoi(argv[++i]);
data/gdal-3.2.0+dfsg/apps/gdalasyncread.cpp:199:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            anSrcWin[0] = atoi(argv[++i]);
data/gdal-3.2.0+dfsg/apps/gdalasyncread.cpp:200:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            anSrcWin[1] = atoi(argv[++i]);
data/gdal-3.2.0+dfsg/apps/gdalasyncread.cpp:201:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            anSrcWin[2] = atoi(argv[++i]);
data/gdal-3.2.0+dfsg/apps/gdalasyncread.cpp:202:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            anSrcWin[3] = atoi(argv[++i]);
data/gdal-3.2.0+dfsg/apps/gdalasyncread.cpp:293:66:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                          ? CPLAtof(pszOXSize)/100*anSrcWin[2] : atoi(pszOXSize)));
data/gdal-3.2.0+dfsg/apps/gdalasyncread.cpp:295:66:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                          ? CPLAtof(pszOYSize)/100*anSrcWin[3] : atoi(pszOYSize)));
data/gdal-3.2.0+dfsg/apps/gdalbuildvrt_lib.cpp:328:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pahSrcDS, pahSrcDSIn, nInputFiles * sizeof(GDALDatasetH));
data/gdal-3.2.0+dfsg/apps/gdalbuildvrt_lib.cpp:341:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(panBandList, panBandListIn, nBands * sizeof(int));
data/gdal-3.2.0+dfsg/apps/gdalbuildvrt_lib.cpp:448:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char subdatasetNameKey[80];
data/gdal-3.2.0+dfsg/apps/gdalbuildvrt_lib.cpp:466:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char        subdatasetNameKey[80];
data/gdal-3.2.0+dfsg/apps/gdalbuildvrt_lib.cpp:1606:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(psOptions, psOptionsIn, sizeof(GDALBuildVRTOptions));
data/gdal-3.2.0+dfsg/apps/gdalbuildvrt_lib.cpp:1615:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(psOptions->panBandList, psOptionsIn->panBandList, sizeof(int) * psOptionsIn->nBandCount);
data/gdal-3.2.0+dfsg/apps/gdalbuildvrt_lib.cpp:1866:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            psOptions->nSubdataset = atoi(papszArgv[++iArg]);
data/gdal-3.2.0+dfsg/apps/gdalbuildvrt_lib.cpp:1913:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            int nBand = atoi(pszBand);
data/gdal-3.2.0+dfsg/apps/gdaldem_lib.cpp:1885:57:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            pasColorAssociation[nColorAssociation].nR = atoi(papszFields[1]);
data/gdal-3.2.0+dfsg/apps/gdaldem_lib.cpp:1886:57:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            pasColorAssociation[nColorAssociation].nG = atoi(papszFields[2]);
data/gdal-3.2.0+dfsg/apps/gdaldem_lib.cpp:1887:57:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            pasColorAssociation[nColorAssociation].nB = atoi(papszFields[3]);
data/gdal-3.2.0+dfsg/apps/gdaldem_lib.cpp:1892:57:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            pasColorAssociation[nColorAssociation].nR = atoi(papszFields[5]);
data/gdal-3.2.0+dfsg/apps/gdaldem_lib.cpp:1893:57:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            pasColorAssociation[nColorAssociation].nG = atoi(papszFields[6]);
data/gdal-3.2.0+dfsg/apps/gdaldem_lib.cpp:1894:57:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            pasColorAssociation[nColorAssociation].nB = atoi(papszFields[7]);
data/gdal-3.2.0+dfsg/apps/gdaldem_lib.cpp:1910:61:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                pasColorAssociation[nColorAssociation].nR = atoi(papszFields[1]);
data/gdal-3.2.0+dfsg/apps/gdaldem_lib.cpp:1911:61:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                pasColorAssociation[nColorAssociation].nG = atoi(papszFields[2]);
data/gdal-3.2.0+dfsg/apps/gdaldem_lib.cpp:1912:61:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                pasColorAssociation[nColorAssociation].nB = atoi(papszFields[3]);
data/gdal-3.2.0+dfsg/apps/gdaldem_lib.cpp:1958:61:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                pasColorAssociation[nColorAssociation].nR = atoi(papszFields[1]);
data/gdal-3.2.0+dfsg/apps/gdaldem_lib.cpp:1959:61:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                pasColorAssociation[nColorAssociation].nG = atoi(papszFields[2]);
data/gdal-3.2.0+dfsg/apps/gdaldem_lib.cpp:1960:61:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                pasColorAssociation[nColorAssociation].nB = atoi(papszFields[3]);
data/gdal-3.2.0+dfsg/apps/gdaldem_lib.cpp:1962:57:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                        (CSLCount(papszFields) >= 5 ) ? atoi(papszFields[4]) : 255;
data/gdal-3.2.0+dfsg/apps/gdaldem_lib.cpp:1984:53:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                    (CSLCount(papszFields) >= 3 ) ? atoi(papszFields[2]) : 255;
data/gdal-3.2.0+dfsg/apps/gdaldem_lib.cpp:4080:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            psOptions->nBand = atoi(papszArgv[++i]);
data/gdal-3.2.0+dfsg/apps/gdalenhance.cpp:320:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                || atoi(papszTokens[0]) != iBand+1 )
data/gdal-3.2.0+dfsg/apps/gdalenhance.cpp:346:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                papanLUTs[iBand][iLUT] = atoi(papszTokens[iLUT+3]);
data/gdal-3.2.0+dfsg/apps/gdalenhance.cpp:360:24:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            fpConfig = fopen( pszConfigFile, "w" );
data/gdal-3.2.0+dfsg/apps/gdalinfo_bin.cpp:195:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char szKeyName[1024];
data/gdal-3.2.0+dfsg/apps/gdalinfo_lib.cpp:1893:51:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                psOptionsForBinary->nSubdataset = atoi(papszArgv[i]);
data/gdal-3.2.0+dfsg/apps/gdallocationinfo.cpp:124:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            anBandList.push_back( atoi(argv[++i]) );
data/gdal-3.2.0+dfsg/apps/gdallocationinfo.cpp:128:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            nOverview = atoi(argv[++i]) - 1;
data/gdal-3.2.0+dfsg/apps/gdalmanage.cpp:184:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    if (atoi(GDALVersionInfo("VERSION_NUM")) < 1500)
data/gdal-3.2.0+dfsg/apps/gdalmdiminfo_lib.cpp:124:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&tmp, bytes, sizeof(T));
data/gdal-3.2.0+dfsg/apps/gdalmdiminfo_lib.cpp:234:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&pszStr, values, sizeof(const char*));
data/gdal-3.2.0+dfsg/apps/gdalmdiminfo_lib.cpp:1044:44:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            psOptions->nLimitValuesByDim = atoi(papszArgv[i]);
data/gdal-3.2.0+dfsg/apps/gdalmdimtranslate_lib.cpp:593:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            int nScaleFactor = atoi(osScaleFactor.c_str());
data/gdal-3.2.0+dfsg/apps/gdalmdimtranslate_lib.cpp:675:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            band = atoi(token.substr(strlen("band=")).c_str());
data/gdal-3.2.0+dfsg/apps/gdalmdimtranslate_lib.cpp:698:44:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                anTransposedAxis.push_back(atoi(aosAxis[i]));
data/gdal-3.2.0+dfsg/apps/gdalsrsinfo.cpp:219:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                    nEPSGCode = atoi(pszAuthorityCode);
data/gdal-3.2.0+dfsg/apps/gdaltindex.cpp:100:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    if( atoi(GDALVersionInfo("VERSION_NUM")) < 1400 )
data/gdal-3.2.0+dfsg/apps/gdaltransform.cpp:118:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    if (atoi(GDALVersionInfo("VERSION_NUM")) < 1500)
data/gdal-3.2.0+dfsg/apps/gdaltransform.cpp:191:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            nOrder = atoi(argv[++i]);
data/gdal-3.2.0+dfsg/apps/gdaltransform.cpp:361:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char szLine[1024];
data/gdal-3.2.0+dfsg/apps/gdalwarp_lib.cpp:530:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(psOptions, psOptionsIn, sizeof(GDALWarpAppOptions));
data/gdal-3.2.0+dfsg/apps/gdalwarp_lib.cpp:2731:63:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                FILE* f = EQUAL(pszFile, "stderr") ? stderr : fopen(pszFile, "wb");
data/gdal-3.2.0+dfsg/apps/gdalwarp_lib.cpp:4185:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            if (i < argc-1 && atoi(papszArgv[i+1]) >= 0 && isdigit(papszArgv[i+1][0]))
data/gdal-3.2.0+dfsg/apps/gdalwarp_lib.cpp:4296:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            psOptions->nForcePixels = atoi(papszArgv[++i]);
data/gdal-3.2.0+dfsg/apps/gdalwarp_lib.cpp:4297:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            psOptions->nForceLines = atoi(papszArgv[++i]);
data/gdal-3.2.0+dfsg/apps/gdalwarp_lib.cpp:4419:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                psOptions->nOvLevel = -2-atoi(pszOvLevel + 5);
data/gdal-3.2.0+dfsg/apps/gdalwarp_lib.cpp:4423:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                psOptions->nOvLevel = atoi(pszOvLevel);
data/gdal-3.2.0+dfsg/apps/gdalwarpsimple.c:157:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            nOrder = atoi(argv[++i]);
data/gdal-3.2.0+dfsg/apps/gdalwarpsimple.c:171:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            nForcePixels = atoi(argv[++i]);
data/gdal-3.2.0+dfsg/apps/gdalwarpsimple.c:172:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            nForceLines = atoi(argv[++i]);
data/gdal-3.2.0+dfsg/apps/gnmanalyse.cpp:439:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            nFromFID = atoi(papszArgv[++iArg]);
data/gdal-3.2.0+dfsg/apps/gnmanalyse.cpp:440:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            nToFID = atoi(papszArgv[++iArg]);
data/gdal-3.2.0+dfsg/apps/gnmanalyse.cpp:447:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            nFromFID = atoi(papszArgv[++iArg]);
data/gdal-3.2.0+dfsg/apps/gnmanalyse.cpp:448:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            nToFID = atoi(papszArgv[++iArg]);
data/gdal-3.2.0+dfsg/apps/gnmanalyse.cpp:449:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            nK = atoi(papszArgv[++iArg]);
data/gdal-3.2.0+dfsg/apps/gnmmanage.cpp:290:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            nSrcFID = atoi(papszArgv[++iArg]);
data/gdal-3.2.0+dfsg/apps/gnmmanage.cpp:292:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            nTgtFID = atoi(papszArgv[++iArg]);
data/gdal-3.2.0+dfsg/apps/gnmmanage.cpp:294:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            nConFID = atoi(papszArgv[++iArg]);
data/gdal-3.2.0+dfsg/apps/gnmmanage.cpp:313:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            eDir = atoi(papszArgv[++iArg]);
data/gdal-3.2.0+dfsg/apps/gnmmanage.cpp:321:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            nSrcFID = atoi(papszArgv[++iArg]);
data/gdal-3.2.0+dfsg/apps/gnmmanage.cpp:323:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            nTgtFID = atoi(papszArgv[++iArg]);
data/gdal-3.2.0+dfsg/apps/gnmmanage.cpp:325:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            nConFID = atoi(papszArgv[++iArg]);
data/gdal-3.2.0+dfsg/apps/gnmmanage.cpp:358:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            anFIDsToBlock.push_back(atoi(papszArgv[++iArg]));
data/gdal-3.2.0+dfsg/apps/gnmmanage.cpp:365:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            anFIDsToUnblock.push_back(atoi(papszArgv[++iArg]));
data/gdal-3.2.0+dfsg/apps/multireadtest.cpp:141:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            nIterations = atoi(argv[++iArg]);
data/gdal-3.2.0+dfsg/apps/multireadtest.cpp:145:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            nOpenIterations = atoi(argv[++iArg]);
data/gdal-3.2.0+dfsg/apps/multireadtest.cpp:149:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            nThreadCount = atoi(argv[++iArg]);
data/gdal-3.2.0+dfsg/apps/multireadtest.cpp:153:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            nWidth = atoi(argv[++iArg]);
data/gdal-3.2.0+dfsg/apps/multireadtest.cpp:157:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            nHeight = atoi(argv[++iArg]);
data/gdal-3.2.0+dfsg/apps/nearblack_lib.cpp:836:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                    oColor.push_back( atoi( papszTokens[iToken] ) );
data/gdal-3.2.0+dfsg/apps/nearblack_lib.cpp:869:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            psOptions->nMaxNonBlack = atoi(papszArgv[++i]);
data/gdal-3.2.0+dfsg/apps/nearblack_lib.cpp:873:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            psOptions->nNearDist = atoi(papszArgv[++i]);
data/gdal-3.2.0+dfsg/apps/ogr2ogr_lib.cpp:1263:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(psOptions, psOptionsIn, sizeof(GDALVectorTranslateOptions));
data/gdal-3.2.0+dfsg/apps/ogr2ogr_lib.cpp:3935:49:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            anMap[iField] = bIdentity? iField : atoi(m_papszFieldMap[iField]);
data/gdal-3.2.0+dfsg/apps/ogr2ogr_lib.cpp:4156:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                    char szTry[32];
data/gdal-3.2.0+dfsg/apps/ogr2ogr_lib.cpp:5288:53:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                    psOptions->nGroupTransactions = atoi(papszArgv[i]);
data/gdal-3.2.0+dfsg/apps/ogr2ogr_lib.cpp:5638:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                int nTemp = atoi(papszArgv[i+1]);
data/gdal-3.2.0+dfsg/apps/ogr2ogr_lib.cpp:5688:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            psOptions->nTransformOrder = atoi( papszArgv[++i] );
data/gdal-3.2.0+dfsg/apps/ogrdissolve.cpp:138:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            nFIDToFetch = atoi(papszArgv[++iArg]);
data/gdal-3.2.0+dfsg/apps/ogrdissolve.cpp:184:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            nGroupTransactions = atoi(papszArgv[++iArg]);
data/gdal-3.2.0+dfsg/apps/ogrinfo.cpp:183:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char pszDisplayedname[256];
data/gdal-3.2.0+dfsg/apps/ogrinfo.cpp:664:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            nRepeatCount = atoi(papszArgv[++iArg]);
data/gdal-3.2.0+dfsg/apps/ogrtindex.cpp:360:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                && atoi(papszArgv[iArg+1]) == iLayer )
data/gdal-3.2.0+dfsg/apps/ogrtindex.cpp:449:40:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                    const int iLayer = atoi(filename + j + 1);
data/gdal-3.2.0+dfsg/apps/ogrtindex.cpp:534:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                    && atoi(papszArgv[iArg+1]) == iLayer )
data/gdal-3.2.0+dfsg/apps/ogrtindex.cpp:550:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char szLocation[5000] = {};
data/gdal-3.2.0+dfsg/apps/ogrtindex.cpp:733:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char szLocation[5000] = {};
data/gdal-3.2.0+dfsg/apps/test_ogrsf.cpp:81:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE* f = fopen(pszLogFilename, "at");
data/gdal-3.2.0+dfsg/apps/test_ogrsf.cpp:158:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            nThreads = atoi(papszArgv[++iArg]);
data/gdal-3.2.0+dfsg/apps/test_ogrsf.cpp:162:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            nLoops = atoi(papszArgv[++iArg]);
data/gdal-3.2.0+dfsg/apps/test_ogrsf.cpp:2359:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char szFormat[32];
data/gdal-3.2.0+dfsg/apps/testreprojmulti.cpp:64:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(padfResultX, padfRefX, 1024 * sizeof(double));
data/gdal-3.2.0+dfsg/apps/testreprojmulti.cpp:65:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(padfResultY, padfRefY, 1024 * sizeof(double));
data/gdal-3.2.0+dfsg/apps/testreprojmulti.cpp:84:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            nThreads = atoi(argv[++i]);
data/gdal-3.2.0+dfsg/apps/testreprojmulti.cpp:86:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            nCountIter = atoi(argv[++i]);
data/gdal-3.2.0+dfsg/apps/testreprojmulti.cpp:109:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(padfRefResultX, padfRefX, 1024 * sizeof(double));
data/gdal-3.2.0+dfsg/apps/testreprojmulti.cpp:110:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(padfRefResultY, padfRefY, 1024 * sizeof(double));
data/gdal-3.2.0+dfsg/frmts/aaigrid/aaigriddataset.cpp:168:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char szToken[500] = { '\0' };
data/gdal-3.2.0+dfsg/frmts/aaigrid/aaigriddataset.cpp:203:41:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                    static_cast<GInt32>(atoi(szToken));
data/gdal-3.2.0+dfsg/frmts/aaigrid/aaigriddataset.cpp:446:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    nRasterXSize = atoi(papszTokens[i + 1]);
data/gdal-3.2.0+dfsg/frmts/aaigrid/aaigriddataset.cpp:453:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    nRasterYSize = atoi(papszTokens[i + 1]);
data/gdal-3.2.0+dfsg/frmts/aaigrid/aaigriddataset.cpp:612:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    nRasterXSize = atoi(papszTokens[i + 1]);
data/gdal-3.2.0+dfsg/frmts/aaigrid/aaigriddataset.cpp:619:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    nRasterYSize = atoi(papszTokens[i + 1]);
data/gdal-3.2.0+dfsg/frmts/aaigrid/aaigriddataset.cpp:787:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    const int nRows = atoi(osRows);
data/gdal-3.2.0+dfsg/frmts/aaigrid/aaigriddataset.cpp:788:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    const int nCols = atoi(osCols);
data/gdal-3.2.0+dfsg/frmts/aaigrid/aaigriddataset.cpp:1139:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(padfTransform, adfGeoTransform, sizeof(double) * 6);
data/gdal-3.2.0+dfsg/frmts/aaigrid/aaigriddataset.cpp:1187:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szHeader[2000] = {};
data/gdal-3.2.0+dfsg/frmts/aaigrid/aaigriddataset.cpp:1235:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szFormatFloat[32] = { '\0' };
data/gdal-3.2.0+dfsg/frmts/aaigrid/aaigriddataset.cpp:1236:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(szFormatFloat, " %.20g");
data/gdal-3.2.0+dfsg/frmts/aaigrid/aaigriddataset.cpp:1251:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        nPrecision = atoi(pszSignificantDigits);
data/gdal-3.2.0+dfsg/frmts/aaigrid/aaigriddataset.cpp:1259:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        nPrecision = atoi(pszDecimalPrecision);
data/gdal-3.2.0+dfsg/frmts/aaigrid/aaigriddataset.cpp:1364:25:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
                        strcat(szHeader, ".0");
data/gdal-3.2.0+dfsg/frmts/aaigrid/aaigriddataset.h:91:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char achReadBuf[256];
data/gdal-3.2.0+dfsg/frmts/adrg/adrgdataset.cpp:342:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char formatStr[32];
data/gdal-3.2.0+dfsg/frmts/adrg/adrgdataset.cpp:366:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str[11+1];
data/gdal-3.2.0+dfsg/frmts/adrg/adrgdataset.cpp:380:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str[10+1];
data/gdal-3.2.0+dfsg/frmts/adrg/adrgdataset.cpp:409:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szLeader[24+1];
data/gdal-3.2.0+dfsg/frmts/adrg/adrgdataset.cpp:463:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szLeader[24+1];
data/gdal-3.2.0+dfsg/frmts/adrg/adrgdataset.cpp:694:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szName[80];
data/gdal-3.2.0+dfsg/frmts/adrg/adrgdataset.cpp:754:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( padfGeoTransform, adfGeoTransform, sizeof(double)*6 );
data/gdal-3.2.0+dfsg/frmts/adrg/adrgdataset.cpp:766:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( adfGeoTransform, padfGeoTransform, sizeof(double)*6 );
data/gdal-3.2.0+dfsg/frmts/adrg/adrgdataset.cpp:777:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ddd[3+1] = { 0 };
data/gdal-3.2.0+dfsg/frmts/adrg/adrgdataset.cpp:778:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char mm[2+1] = { 0 };
data/gdal-3.2.0+dfsg/frmts/adrg/adrgdataset.cpp:779:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ssdotss[5+1] = { 0 };
data/gdal-3.2.0+dfsg/frmts/adrg/adrgdataset.cpp:796:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ddd[2+1] = { 0 };
data/gdal-3.2.0+dfsg/frmts/adrg/adrgdataset.cpp:797:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char mm[2+1] = { 0 };
data/gdal-3.2.0+dfsg/frmts/adrg/adrgdataset.cpp:798:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ssdotss[5+1] = { 0 };
data/gdal-3.2.0+dfsg/frmts/adrg/adrgdataset.cpp:1104:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char offset[5+1]={0};
data/gdal-3.2.0+dfsg/frmts/adrg/adrgdataset.cpp:1109:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            TILEINDEX[i] = atoi(offset);
data/gdal-3.2.0+dfsg/frmts/adrg/adrgdataset.cpp:1125:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char recordName[3];
data/gdal-3.2.0+dfsg/frmts/adrg/adrgdataset.cpp:1255:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char szValue[32];
data/gdal-3.2.0+dfsg/frmts/adrg/adrgdataset.cpp:1892:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[12+1];
data/gdal-3.2.0+dfsg/frmts/adrg/adrgdataset.cpp:2069:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[12+1] = {};
data/gdal-3.2.0+dfsg/frmts/adrg/adrgdataset.cpp:2080:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat(tmp, "02");
data/gdal-3.2.0+dfsg/frmts/adrg/adrgdataset.cpp:2335:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char tmp[12+1] = {};
data/gdal-3.2.0+dfsg/frmts/adrg/adrgdataset.cpp:2352:13:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
            strcat(tmp, "02.IMG");
data/gdal-3.2.0+dfsg/frmts/adrg/srpdataset.cpp:568:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char offset[30] = {0};
data/gdal-3.2.0+dfsg/frmts/adrg/srpdataset.cpp:594:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            TILEINDEX[i] = atoi(offset);
data/gdal-3.2.0+dfsg/frmts/adrg/srpdataset.cpp:629:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char recordName[3] = {};
data/gdal-3.2.0+dfsg/frmts/adrg/srpdataset.cpp:679:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szValue[32] = {};
data/gdal-3.2.0+dfsg/frmts/adrg/srpdataset.cpp:753:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                        char dat[9];
data/gdal-3.2.0+dfsg/frmts/adrg/srpdataset.cpp:773:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                        char dat[9];
data/gdal-3.2.0+dfsg/frmts/adrg/srpdataset.cpp:910:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szName[80];
data/gdal-3.2.0+dfsg/frmts/adrg/srpdataset.cpp:1258:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                    char szValue[5];
data/gdal-3.2.0+dfsg/frmts/adrg/srpdataset.cpp:1274:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                        char dat[9];
data/gdal-3.2.0+dfsg/frmts/aigrid/aigccitt.c:1137:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char aig_TIFFBitRevTable[256] = {
data/gdal-3.2.0+dfsg/frmts/aigrid/aigccitt.c:1173:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char aig_TIFFNoBitRevTable[256] = {
data/gdal-3.2.0+dfsg/frmts/aigrid/aigccitt.c:1877:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char runs_buf[4000];
data/gdal-3.2.0+dfsg/frmts/aigrid/aigdataset.cpp:824:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            nIndex = atoi(papszTokens[0]);
data/gdal-3.2.0+dfsg/frmts/aigrid/aigdataset.cpp:825:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            sEntry.c1 = (short) atoi(papszTokens[1]);
data/gdal-3.2.0+dfsg/frmts/aigrid/aigdataset.cpp:826:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            sEntry.c2 = (short) atoi(papszTokens[2]);
data/gdal-3.2.0+dfsg/frmts/aigrid/aigdataset.cpp:827:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            sEntry.c3 = (short) atoi(papszTokens[3]);
data/gdal-3.2.0+dfsg/frmts/aigrid/aigopen.c:197:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szBasename[32];
data/gdal-3.2.0+dfsg/frmts/aigrid/aitest.c:50:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char abyBlockSize[2];
data/gdal-3.2.0+dfsg/frmts/aigrid/aitest.c:134:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            iTestTileX = atoi(argv[2]);
data/gdal-3.2.0+dfsg/frmts/aigrid/aitest.c:135:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            iTestTileY = atoi(argv[3]);
data/gdal-3.2.0+dfsg/frmts/aigrid/aitest.c:196:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    while( argc > 2 && (atoi(argv[2]) > 0 || argv[2][0] == '0') )
data/gdal-3.2.0+dfsg/frmts/aigrid/aitest.c:198:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        int	nBlock = atoi(argv[2]);
data/gdal-3.2.0+dfsg/frmts/aigrid/gridlib.c:147:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(panData + i, pabyCur, 4);
data/gdal-3.2.0+dfsg/frmts/aigrid/gridlib.c:387:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy( &nValue, pabyCur, 4 );
data/gdal-3.2.0+dfsg/frmts/aigrid/gridlib.c:693:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( &nMin, pabyCur, 4 );
data/gdal-3.2.0+dfsg/frmts/aigrid/gridlib.c:846:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( &(psInfo->nCellType), abyData+16, 4 );
data/gdal-3.2.0+dfsg/frmts/aigrid/gridlib.c:847:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( &(psInfo->bCompressed), abyData+20, 4 );
data/gdal-3.2.0+dfsg/frmts/aigrid/gridlib.c:848:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( &(psInfo->nBlocksPerRow), abyData+288, 4 );
data/gdal-3.2.0+dfsg/frmts/aigrid/gridlib.c:849:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( &(psInfo->nBlocksPerColumn), abyData+292, 4 );
data/gdal-3.2.0+dfsg/frmts/aigrid/gridlib.c:850:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( &(psInfo->nBlockXSize), abyData+296, 4 );
data/gdal-3.2.0+dfsg/frmts/aigrid/gridlib.c:851:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( &(psInfo->nBlockYSize), abyData+304, 4 );
data/gdal-3.2.0+dfsg/frmts/aigrid/gridlib.c:852:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( &(psInfo->dfCellSizeX), abyData+256, 8 );
data/gdal-3.2.0+dfsg/frmts/aigrid/gridlib.c:853:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( &(psInfo->dfCellSizeY), abyData+264, 8 );
data/gdal-3.2.0+dfsg/frmts/airsar/airsardataset.cpp:379:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szLine[51];
data/gdal-3.2.0+dfsg/frmts/airsar/airsardataset.cpp:415:28:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            if( ((unsigned char *) szLine)[i] > 127
data/gdal-3.2.0+dfsg/frmts/airsar/airsardataset.cpp:416:31:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                || ((unsigned char *) szLine)[i] < 10 )
data/gdal-3.2.0+dfsg/frmts/airsar/airsardataset.cpp:488:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char szPrefixedKeyName[55];
data/gdal-3.2.0+dfsg/frmts/airsar/airsardataset.cpp:550:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        atoi(CSLFetchNameValue(papszMD,"MH_NUMBER_OF_SAMPLES_PER_RECORD"));
data/gdal-3.2.0+dfsg/frmts/airsar/airsardataset.cpp:552:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        atoi(CSLFetchNameValue(papszMD,"MH_NUMBER_OF_LINES_IN_IMAGE"));
data/gdal-3.2.0+dfsg/frmts/airsar/airsardataset.cpp:554:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    poDS->nRecordLength = atoi(
data/gdal-3.2.0+dfsg/frmts/airsar/airsardataset.cpp:557:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    poDS->nDataStart = atoi(
data/gdal-3.2.0+dfsg/frmts/airsar/airsardataset.cpp:575:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        nPHOffset = atoi(CSLFetchNameValue(
data/gdal-3.2.0+dfsg/frmts/arg/argdataset.cpp:103:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( padfTransform, adfGeoTransform, sizeof(double) * 6 );
data/gdal-3.2.0+dfsg/frmts/arg/argdataset.cpp:624:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        nSrs = atoi(oSRS.GetAuthorityCode("PROJCS"));
data/gdal-3.2.0+dfsg/frmts/arg/argdataset.cpp:627:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        nSrs = atoi(oSRS.GetAuthorityCode("GEOGCS"));
data/gdal-3.2.0+dfsg/frmts/blx/blx.c:494:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&result, *data, sizeof(double));
data/gdal-3.2.0+dfsg/frmts/blx/blx.c:508:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(*bufptr, &data, sizeof(double));
data/gdal-3.2.0+dfsg/frmts/blx/blx.c:672:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p, tmpdata, cout-tmpdata);
data/gdal-3.2.0+dfsg/frmts/blx/blx.c:1075:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if(!ctx->open) {
data/gdal-3.2.0+dfsg/frmts/blx/blx.c:1119:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char header[102];
data/gdal-3.2.0+dfsg/frmts/blx/blx.c:1245:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char header[102],*hptr;
data/gdal-3.2.0+dfsg/frmts/blx/blx.h:82:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int open;
data/gdal-3.2.0+dfsg/frmts/blx/blx.h:118:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#define BLXfopen fopen
data/gdal-3.2.0+dfsg/frmts/blx/blxdataset.cpp:310:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        zscale = atoi(CSLFetchNameValue(papszOptions,"ZSCALE"));
data/gdal-3.2.0+dfsg/frmts/blx/blxdataset.cpp:326:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        fillundefval = atoi(CSLFetchNameValue(papszOptions,"FILLUNDEFVAL"));
data/gdal-3.2.0+dfsg/frmts/bmp/bmpdataset.cpp:407:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( pImage, pabyScan, nBlockXSize );
data/gdal-3.2.0+dfsg/frmts/bmp/bmpdataset.cpp:932:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( pImage, pabyUncomprBuf +
data/gdal-3.2.0+dfsg/frmts/bmp/bmpdataset.cpp:988:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( padfTransform, adfGeoTransform, sizeof(adfGeoTransform[0])*6 );
data/gdal-3.2.0+dfsg/frmts/bmp/bmpdataset.cpp:1018:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( adfGeoTransform, padfTransform, sizeof(double) * 6 );
data/gdal-3.2.0+dfsg/frmts/bsb/bsb_read.c:178:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	achTestBlock[1000];
data/gdal-3.2.0+dfsg/frmts/bsb/bsb_read.c:179:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        szLine[1000];
data/gdal-3.2.0+dfsg/frmts/bsb/bsb_read.c:292:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            psInfo->nXSize = atoi(papszTokens[nRAIndex+1]);
data/gdal-3.2.0+dfsg/frmts/bsb/bsb_read.c:293:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            psInfo->nYSize = atoi(papszTokens[nRAIndex+2]);
data/gdal-3.2.0+dfsg/frmts/bsb/bsb_read.c:308:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            psInfo->nXSize = atoi(papszTokens[nRAIndex+3]);
data/gdal-3.2.0+dfsg/frmts/bsb/bsb_read.c:309:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            psInfo->nYSize = atoi(papszTokens[nRAIndex+4]);
data/gdal-3.2.0+dfsg/frmts/bsb/bsb_read.c:316:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            int	iPCT = atoi(papszTokens[0]);
data/gdal-3.2.0+dfsg/frmts/bsb/bsb_read.c:342:56:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            psInfo->pabyPCT[iPCT*3+0] = (unsigned char)atoi(papszTokens[1]);
data/gdal-3.2.0+dfsg/frmts/bsb/bsb_read.c:343:56:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            psInfo->pabyPCT[iPCT*3+1] = (unsigned char)atoi(papszTokens[2]);
data/gdal-3.2.0+dfsg/frmts/bsb/bsb_read.c:344:56:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            psInfo->pabyPCT[iPCT*3+2] = (unsigned char)atoi(papszTokens[3]);
data/gdal-3.2.0+dfsg/frmts/bsb/bsbdataset.cpp:236:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( padfTransform, adfGeoTransform, sizeof(double) * 6 );
data/gdal-3.2.0+dfsg/frmts/bsb/bsbdataset.cpp:622:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char szName[50];
data/gdal-3.2.0+dfsg/frmts/bsb/bsbdataset.cpp:684:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char szName[50];
data/gdal-3.2.0+dfsg/frmts/bsb/bsbdataset.cpp:971:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char       abyPCT[771];
data/gdal-3.2.0+dfsg/frmts/cals/calsdataset.cpp:514:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szBuffer[2048+1] = {};
data/gdal-3.2.0+dfsg/frmts/cals/calsdataset.cpp:534:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(szBuffer, osField, osField.size());
data/gdal-3.2.0+dfsg/frmts/cals/calsdataset.cpp:537:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(szBuffer + 128, osField, osField.size());
data/gdal-3.2.0+dfsg/frmts/cals/calsdataset.cpp:540:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(szBuffer + 128*2, osField, osField.size());
data/gdal-3.2.0+dfsg/frmts/cals/calsdataset.cpp:543:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(szBuffer + 128*3, osField, osField.size());
data/gdal-3.2.0+dfsg/frmts/cals/calsdataset.cpp:546:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(szBuffer + 128*4, osField, osField.size());
data/gdal-3.2.0+dfsg/frmts/cals/calsdataset.cpp:549:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(szBuffer + 128*5, osField, osField.size());
data/gdal-3.2.0+dfsg/frmts/cals/calsdataset.cpp:552:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(szBuffer + 128*6, osField, osField.size());
data/gdal-3.2.0+dfsg/frmts/cals/calsdataset.cpp:560:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        nAngle1 = atoi(pszPixelPath);
data/gdal-3.2.0+dfsg/frmts/cals/calsdataset.cpp:561:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        nAngle2 = atoi(pszLineProgression);
data/gdal-3.2.0+dfsg/frmts/cals/calsdataset.cpp:564:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(szBuffer + 128*7, osField, osField.size());
data/gdal-3.2.0+dfsg/frmts/cals/calsdataset.cpp:569:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(szBuffer + 128*8, osField, osField.size());
data/gdal-3.2.0+dfsg/frmts/cals/calsdataset.cpp:576:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        atoi(pszResUnit) == 2 )
data/gdal-3.2.0+dfsg/frmts/cals/calsdataset.cpp:578:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        nDensity = atoi(pszXRes);
data/gdal-3.2.0+dfsg/frmts/cals/calsdataset.cpp:583:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(szBuffer + 128*9, osField, osField.size());
data/gdal-3.2.0+dfsg/frmts/cals/calsdataset.cpp:586:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(szBuffer + 128*10, osField, osField.size());
data/gdal-3.2.0+dfsg/frmts/ceos/ceosopen.c:47:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	szWorking[33] = { 0 };
data/gdal-3.2.0+dfsg/frmts/ceos/ceosopen.c:58:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    return( atoi(szWorking) );
data/gdal-3.2.0+dfsg/frmts/ceos/ceosopen.c:143:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( psRecord->pachData, abyHeader, 12 );
data/gdal-3.2.0+dfsg/frmts/ceos2/ceos.c:59:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(record->Buffer+TYPE_OFF, &( record->TypeCode.Int32Code ), sizeof( record->TypeCode.Int32Code ) );
data/gdal-3.2.0+dfsg/frmts/ceos2/ceos.c:87:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(record->Buffer,header,CEOS_HEADER_LENGTH);
data/gdal-3.2.0+dfsg/frmts/ceos2/ceos.c:90:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(record->Buffer+CEOS_HEADER_LENGTH,buffer,record->Length-CEOS_HEADER_LENGTH);
data/gdal-3.2.0+dfsg/frmts/ceos2/ceos.c:93:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&(record->TypeCode.Int32Code),header+TYPE_OFF,sizeof(record->TypeCode.Int32Code));
data/gdal-3.2.0+dfsg/frmts/ceos2/ceos.c:129:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(record->Buffer,struct_ptr,record->Length);
data/gdal-3.2.0+dfsg/frmts/ceos2/ceos.c:140:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(record->Buffer,struct_ptr,Length);
data/gdal-3.2.0+dfsg/frmts/ceos2/ceos.c:152:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    field_size = atoi(format+1);
data/gdal-3.2.0+dfsg/frmts/ceos2/ceos.c:170:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(mod_buf,record->Buffer+(start_byte-1), field_size);
data/gdal-3.2.0+dfsg/frmts/ceos2/ceos.c:183:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy( value, mod_buf, field_size );
data/gdal-3.2.0+dfsg/frmts/ceos2/ceos.c:190:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	*( (int *)value) = atoi(mod_buf);
data/gdal-3.2.0+dfsg/frmts/ceos2/ceos.c:214:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	( (char *)value)[field_size] = '\0';
data/gdal-3.2.0+dfsg/frmts/ceos2/ceos.c:215:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy( value, mod_buf, field_size );
data/gdal-3.2.0+dfsg/frmts/ceos2/ceos.c:230:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szPrintfFormat[ 20 ];
data/gdal-3.2.0+dfsg/frmts/ceos2/ceos.c:259:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(value,temp_buf,field_size);
data/gdal-3.2.0+dfsg/frmts/ceos2/ceos.c:296:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(record->Buffer + start_byte -1, temp_buf, field_size);
data/gdal-3.2.0+dfsg/frmts/ceos2/ceos.c:304:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char total_len[12];   /* 12 because 2^32 -> 4294967296 + I + null */
data/gdal-3.2.0+dfsg/frmts/ceos2/ceos.c:341:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&crec,list->object,sizeof(CeosRecord_t));
data/gdal-3.2.0+dfsg/frmts/ceos2/ceos.c:370:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&(record->TypeCode.Int32Code),record->Buffer+TYPE_OFF,sizeof(record->TypeCode.Int32Code));
data/gdal-3.2.0+dfsg/frmts/ceos2/ceos.c:410:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy( ( unsigned char * ) dst + i, ( unsigned char * ) src + i, l_remainder );
data/gdal-3.2.0+dfsg/frmts/ceos2/ceos.h:315:31:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define NativeToCeos(a,b,c,d) memcpy(a,b,c)
data/gdal-3.2.0+dfsg/frmts/ceos2/ceos.h:316:31:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define CeosToNative(a,b,c,d) memcpy(a,b,c)
data/gdal-3.2.0+dfsg/frmts/ceos2/ceosrecipe.c:312:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char temp_str[1024];
data/gdal-3.2.0+dfsg/frmts/ceos2/ceosrecipe.c:526:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szSARDataFormat[29];
data/gdal-3.2.0+dfsg/frmts/ceos2/ceosrecipe.c:593:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szSARDataFormat[29], szProduct[32];
data/gdal-3.2.0+dfsg/frmts/ceos2/ceosrecipe.c:695:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char format[32];
data/gdal-3.2.0+dfsg/frmts/ceos2/ceosrecipe.c:704:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	*value = atoi( buffer );
data/gdal-3.2.0+dfsg/frmts/ceos2/ceosrecipe.c:730:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char format[12];
data/gdal-3.2.0+dfsg/frmts/ceos2/sar_ceosdataset.cpp:294:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( pImage, pabyRecord, nBytesPerSample * nBlockXSize );
data/gdal-3.2.0+dfsg/frmts/ceos2/sar_ceosdataset.cpp:851:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( pszSafeCopy, record->Buffer, record->Length );
data/gdal-3.2.0+dfsg/frmts/ceos2/sar_ceosdataset.cpp:878:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szVolId[128];
data/gdal-3.2.0+dfsg/frmts/ceos2/sar_ceosdataset.cpp:880:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szField[128];
data/gdal-3.2.0+dfsg/frmts/ceos2/sar_ceosdataset.cpp:1494:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szField[100];
data/gdal-3.2.0+dfsg/frmts/ceos2/sar_ceosdataset.cpp:1516:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char         szId[32];
data/gdal-3.2.0+dfsg/frmts/ceos2/sar_ceosdataset.cpp:1599:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char szId[32];
data/gdal-3.2.0+dfsg/frmts/ceos2/sar_ceosdataset.cpp:1699:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        nBand = atoi( pszBasename + 4 );
data/gdal-3.2.0+dfsg/frmts/ceos2/sar_ceosdataset.cpp:1717:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char    szMadeBasename[32];
data/gdal-3.2.0+dfsg/frmts/ceos2/sar_ceosdataset.cpp:1739:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char szThisExtension[32];
data/gdal-3.2.0+dfsg/frmts/ceos2/sar_ceosdataset.cpp:2051:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char      temp_buffer[CEOS_HEADER_LENGTH];
data/gdal-3.2.0+dfsg/frmts/coasp/coasp_dataset.cpp:194:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            int nPixels = atoi(papszMDTokens[2]);
data/gdal-3.2.0+dfsg/frmts/coasp/coasp_dataset.cpp:195:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            int nLines = atoi(papszMDTokens[3]);
data/gdal-3.2.0+dfsg/frmts/coasp/coasp_dataset.cpp:452:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    poDS->nRasterYSize = atoi(nValue);
data/gdal-3.2.0+dfsg/frmts/coasp/coasp_dataset.cpp:466:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    poDS->nRasterXSize = atoi(nValue);
data/gdal-3.2.0+dfsg/frmts/ctg/ctgdataset.cpp:200:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pImage,
data/gdal-3.2.0+dfsg/frmts/ctg/ctgdataset.cpp:284:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(szField, pszBuffer + nOffset, nLength);
data/gdal-3.2.0+dfsg/frmts/ctg/ctgdataset.cpp:300:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szLine[81];
data/gdal-3.2.0+dfsg/frmts/ctg/ctgdataset.cpp:301:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szField[11];
data/gdal-3.2.0+dfsg/frmts/ctg/ctgdataset.cpp:308:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        int nZone = atoi(ExtractField(szField, szLine, 0, 3));
data/gdal-3.2.0+dfsg/frmts/ctg/ctgdataset.cpp:316:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        int nX = atoi(ExtractField(szField, szLine, 3, 8)) - nCellSize / 2;
data/gdal-3.2.0+dfsg/frmts/ctg/ctgdataset.cpp:317:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        int nY = atoi(ExtractField(szField, szLine, 11, 8)) + nCellSize / 2;
data/gdal-3.2.0+dfsg/frmts/ctg/ctgdataset.cpp:339:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            int nVal = atoi(ExtractField(szField, szLine, 20 + 10*i, 10));
data/gdal-3.2.0+dfsg/frmts/ctg/ctgdataset.cpp:395:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szField[11];
data/gdal-3.2.0+dfsg/frmts/ctg/ctgdataset.cpp:396:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    int nRows = atoi(ExtractField(szField, pszData, 0, 10));
data/gdal-3.2.0+dfsg/frmts/ctg/ctgdataset.cpp:397:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    int nCols = atoi(ExtractField(szField, pszData, 20, 10));
data/gdal-3.2.0+dfsg/frmts/ctg/ctgdataset.cpp:398:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    int nMinColIndex = atoi(ExtractField(szField, pszData+80, 0, 5));
data/gdal-3.2.0+dfsg/frmts/ctg/ctgdataset.cpp:399:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    int nMinRowIndex = atoi(ExtractField(szField, pszData+80, 5, 5));
data/gdal-3.2.0+dfsg/frmts/ctg/ctgdataset.cpp:400:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    int nMaxColIndex = atoi(ExtractField(szField, pszData+80, 10, 5));
data/gdal-3.2.0+dfsg/frmts/ctg/ctgdataset.cpp:401:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    int nMaxRowIndex = atoi(ExtractField(szField, pszData+80, 15, 5));
data/gdal-3.2.0+dfsg/frmts/ctg/ctgdataset.cpp:454:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szHeader[HEADER_LINE_COUNT * 80+1];
data/gdal-3.2.0+dfsg/frmts/ctg/ctgdataset.cpp:470:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szField[11];
data/gdal-3.2.0+dfsg/frmts/ctg/ctgdataset.cpp:471:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    int nRows = atoi(ExtractField(szField, szHeader, 0, 10));
data/gdal-3.2.0+dfsg/frmts/ctg/ctgdataset.cpp:472:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    int nCols = atoi(ExtractField(szField, szHeader, 20, 10));
data/gdal-3.2.0+dfsg/frmts/ctg/ctgdataset.cpp:485:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    poDS->nCellSize = atoi(ExtractField(szField, szHeader, 35, 5));
data/gdal-3.2.0+dfsg/frmts/ctg/ctgdataset.cpp:491:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    poDS->nNWEasting = atoi(ExtractField(szField, szHeader + 3*80, 40, 10));
data/gdal-3.2.0+dfsg/frmts/ctg/ctgdataset.cpp:492:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    poDS->nNWNorthing = atoi(ExtractField(szField, szHeader + 3*80, 50, 10));
data/gdal-3.2.0+dfsg/frmts/ctg/ctgdataset.cpp:493:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    poDS->nUTMZone = atoi(ExtractField(szField, szHeader, 50, 5));
data/gdal-3.2.0+dfsg/frmts/daas/daasdataset.cpp:471:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                nHTTPStatus = atoi(psResult->pszErrBuf +
data/gdal-3.2.0+dfsg/frmts/daas/daasdataset.cpp:1249:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        atoi(CSLFetchNameValueDef(poOpenInfo->papszOpenOptions,
data/gdal-3.2.0+dfsg/frmts/daas/daasdataset.cpp:1252:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    m_nServerByteLimit = atoi(CPLGetConfigOption("GDAL_DAAS_SERVER_BYTE_LIMIT",
data/gdal-3.2.0+dfsg/frmts/daas/daasdataset.cpp:2480:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char szBuffer0[128] = {};
data/gdal-3.2.0+dfsg/frmts/daas/daasdataset.cpp:2481:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char szBuffer[64] = {};
data/gdal-3.2.0+dfsg/frmts/dds/ddsdataset.cpp:219:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pImage, pabyUncompressed + (nBand - 1) * nUncompressedBandOffset,
data/gdal-3.2.0+dfsg/frmts/dds/ddsdataset.cpp:315:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char szFourCC[5] = {};
data/gdal-3.2.0+dfsg/frmts/dds/ddsdataset.cpp:316:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&szFourCC[0], &ddsDesc.ddpfPixelFormat.dwFourCC, 4);
data/gdal-3.2.0+dfsg/frmts/dimap/dimapdataset.cpp:241:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( padfGeoTransform, adfGeoTransform, sizeof(double)*6 );
data/gdal-3.2.0+dfsg/frmts/dimap/dimapdataset.cpp:886:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char szID[32] = {};
data/gdal-3.2.0+dfsg/frmts/dimap/dimapdataset.cpp:980:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                            nBandIndex = atoi(psTag->psChild->pszValue);
data/gdal-3.2.0+dfsg/frmts/dimap/dimapdataset.cpp:1063:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        atoi(CPLGetXMLValue( psImageAttributes, "NBANDS", "-1" ));
data/gdal-3.2.0+dfsg/frmts/dimap/dimapdataset.cpp:1065:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        atoi(CPLGetXMLValue( psImageAttributes, "NCOLS", "-1" ));
data/gdal-3.2.0+dfsg/frmts/dimap/dimapdataset.cpp:1067:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        atoi(CPLGetXMLValue( psImageAttributes, "NROWS", "-1" ));
data/gdal-3.2.0+dfsg/frmts/dimap/dimapdataset.cpp:1068:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    int nTileWidth = atoi( CPLGetXMLValue( psImageAttributes,
data/gdal-3.2.0+dfsg/frmts/dimap/dimapdataset.cpp:1070:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    int nTileHeight = atoi( CPLGetXMLValue( psImageAttributes,
data/gdal-3.2.0+dfsg/frmts/dimap/dimapdataset.cpp:1072:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    int nOverlapRow = atoi( CPLGetXMLValue( psImageAttributes,
data/gdal-3.2.0+dfsg/frmts/dimap/dimapdataset.cpp:1074:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    int nOverlapCol = atoi( CPLGetXMLValue( psImageAttributes,
data/gdal-3.2.0+dfsg/frmts/dimap/dimapdataset.cpp:1076:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    const int nBits = atoi(
data/gdal-3.2.0+dfsg/frmts/dimap/dimapdataset.cpp:1119:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                    int nRow = atoi(pszR);
data/gdal-3.2.0+dfsg/frmts/dimap/dimapdataset.cpp:1120:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                    int nCol = atoi(pszC);
data/gdal-3.2.0+dfsg/frmts/dimap/dimapdataset.cpp:1464:41:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                        atoi(&psTag->psChild->pszValue[1]) + 1;
data/gdal-3.2.0+dfsg/frmts/dods/dodsdataset2.cpp:337:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        static char szDODS_CONF[1000];
data/gdal-3.2.0+dfsg/frmts/dods/dodsdataset2.cpp:1082:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( padfTransform, adfGeoTransform, sizeof(double) * 6 );
data/gdal-3.2.0+dfsg/frmts/dods/dodsdataset2.cpp:1381:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            sEntry.c1 = atoi(poColor->get_attr( "red" ).c_str());
data/gdal-3.2.0+dfsg/frmts/dods/dodsdataset2.cpp:1382:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            sEntry.c2 = atoi(poColor->get_attr( "green" ).c_str());
data/gdal-3.2.0+dfsg/frmts/dods/dodsdataset2.cpp:1383:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            sEntry.c3 = atoi(poColor->get_attr( "blue" ).c_str());
data/gdal-3.2.0+dfsg/frmts/dods/dodsdataset2.cpp:1387:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                sEntry.c4 = atoi(poColor->get_attr( "alpha" ).c_str());
data/gdal-3.2.0+dfsg/frmts/dods/dodsdataset2.cpp:1533:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy( pabyDataCopy, pImage, nBytesPerPixel * nXSize * nYSize );
data/gdal-3.2.0+dfsg/frmts/dods/dodsdataset2.cpp:1560:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy( pabyDataCopy, pImage, nBytesPerPixel * nXSize * nYSize );
data/gdal-3.2.0+dfsg/frmts/dods/dodsdataset2.cpp:1587:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy( pabyDataCopy, pImage, nBytesPerPixel * nXSize * nYSize );
data/gdal-3.2.0+dfsg/frmts/dted/dted_api.c:55:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *DTEDGetField( char szResult[81], const char *pachRecord, int nStart, int nSize )
data/gdal-3.2.0+dfsg/frmts/dted/dted_api.c:55:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *DTEDGetField( char szResult[81], const char *pachRecord, int nStart, int nSize )
data/gdal-3.2.0+dfsg/frmts/dted/dted_api.c:59:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( szResult, pachRecord + nStart - 1, nSize );
data/gdal-3.2.0+dfsg/frmts/dted/dted_api.c:137:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        achRecord[DTED_UHL_SIZE];
data/gdal-3.2.0+dfsg/frmts/dted/dted_api.c:144:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szResult[81];
data/gdal-3.2.0+dfsg/frmts/dted/dted_api.c:200:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( psDInfo->pachUHLRecord, achRecord, DTED_UHL_SIZE );
data/gdal-3.2.0+dfsg/frmts/dted/dted_api.c:239:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            atoi(DTEDGetField(szResult,achRecord,21,4)) / 36000.0;
data/gdal-3.2.0+dfsg/frmts/dted/dted_api.c:242:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            atoi(DTEDGetField(szResult,achRecord,25,4)) / 36000.0;
data/gdal-3.2.0+dfsg/frmts/dted/dted_api.c:244:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        psDInfo->nXSize = atoi(DTEDGetField(szResult,achRecord,48,4));
data/gdal-3.2.0+dfsg/frmts/dted/dted_api.c:245:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        psDInfo->nYSize = atoi(DTEDGetField(szResult,achRecord,52,4));
data/gdal-3.2.0+dfsg/frmts/dted/dted_api.c:250:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            atoi(DTEDGetField(szResult,achRecord,41,4)) / 36000.0;
data/gdal-3.2.0+dfsg/frmts/dted/dted_api.c:253:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            atoi(DTEDGetField(szResult,achRecord,45,4)) / 36000.0;
data/gdal-3.2.0+dfsg/frmts/dted/dted_api.c:255:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        psDInfo->nXSize = atoi(DTEDGetField(szResult,psDInfo->pachDSIRecord,563,4));
data/gdal-3.2.0+dfsg/frmts/dted/dted_api.c:256:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        psDInfo->nYSize = atoi(DTEDGetField(szResult,psDInfo->pachDSIRecord,567,4));
data/gdal-3.2.0+dfsg/frmts/dted/dted_api.c:276:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        deg = atoi(stripLeadingZeros(DTEDGetField(szResult,achRecord,5,3)));
data/gdal-3.2.0+dfsg/frmts/dted/dted_api.c:277:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        min = atoi(stripLeadingZeros(DTEDGetField(szResult,achRecord,8,2)));
data/gdal-3.2.0+dfsg/frmts/dted/dted_api.c:278:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        sec = atoi(stripLeadingZeros(DTEDGetField(szResult,achRecord,10,2)));
data/gdal-3.2.0+dfsg/frmts/dted/dted_api.c:283:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        deg = atoi(stripLeadingZeros(DTEDGetField(szResult,achRecord,9,3)));
data/gdal-3.2.0+dfsg/frmts/dted/dted_api.c:284:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        min = atoi(stripLeadingZeros(DTEDGetField(szResult,achRecord,12,2)));
data/gdal-3.2.0+dfsg/frmts/dted/dted_api.c:285:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        sec = atoi(stripLeadingZeros(DTEDGetField(szResult,achRecord,14,2)));
data/gdal-3.2.0+dfsg/frmts/dted/dted_api.c:309:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        deg = atoi(stripLeadingZeros(DTEDGetField(szResult,achRecord,13,3)));
data/gdal-3.2.0+dfsg/frmts/dted/dted_api.c:310:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        min = atoi(stripLeadingZeros(DTEDGetField(szResult,achRecord,16,2)));
data/gdal-3.2.0+dfsg/frmts/dted/dted_api.c:311:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        sec = atoi(stripLeadingZeros(DTEDGetField(szResult,achRecord,18,2)));
data/gdal-3.2.0+dfsg/frmts/dted/dted_api.c:316:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        deg = atoi(stripLeadingZeros(DTEDGetField(szResult,achRecord,25,3)));
data/gdal-3.2.0+dfsg/frmts/dted/dted_api.c:317:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        min = atoi(stripLeadingZeros(DTEDGetField(szResult,achRecord,28,2)));
data/gdal-3.2.0+dfsg/frmts/dted/dted_api.c:318:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        sec = atoi(stripLeadingZeros(DTEDGetField(szResult,achRecord,30,2)));
data/gdal-3.2.0+dfsg/frmts/dted/dted_api.c:1040:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( pszFieldSrc, pszNewValue, nLenToCopy);
data/gdal-3.2.0+dfsg/frmts/dted/dted_api.h:75:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#define VSIFOpenL fopen
data/gdal-3.2.0+dfsg/frmts/dted/dted_create.c:120:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char achRecord[3601*2 + 12];
data/gdal-3.2.0+dfsg/frmts/dted/dted_ptstream.c:55:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *apszMetadata[DTEDMD_MAX+1];
data/gdal-3.2.0+dfsg/frmts/dted/dted_ptstream.c:122:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            szFile[128];
data/gdal-3.2.0+dfsg/frmts/dted/dted_test.c:72:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            nFillDist = atoi(argv[++iArg]);
data/gdal-3.2.0+dfsg/frmts/dted/dted_test.c:75:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            nOutLevel = atoi(argv[++iArg]);
data/gdal-3.2.0+dfsg/frmts/dted/dteddataset.cpp:816:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szPartialCell[3];
data/gdal-3.2.0+dfsg/frmts/e00grid/e00compr.h:114:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    szInBuf[E00_READ_BUF_SIZE]; /* compressed input buffer  */
data/gdal-3.2.0+dfsg/frmts/e00grid/e00compr.h:115:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    szOutBuf[E00_READ_BUF_SIZE];/* uncompressed output buffer   */
data/gdal-3.2.0+dfsg/frmts/e00grid/e00compr.h:142:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    szOutBuf[E00_WRITE_BUF_SIZE]; /* compressed output buffer */
data/gdal-3.2.0+dfsg/frmts/e00grid/e00griddataset.cpp:174:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szVal[E00_FLOAT_SIZE+1];
data/gdal-3.2.0+dfsg/frmts/e00grid/e00griddataset.cpp:247:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                panImage[i] = atoi(pszLine + (i%VALS_PER_LINE) * E00_FLOAT_SIZE);
data/gdal-3.2.0+dfsg/frmts/e00grid/e00griddataset.cpp:281:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            panImage[i] = atoi(szVal);
data/gdal-3.2.0+dfsg/frmts/e00grid/e00griddataset.cpp:586:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    const int nRasterXSize = atoi(pszLine);
data/gdal-3.2.0+dfsg/frmts/e00grid/e00griddataset.cpp:587:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    const int nRasterYSize = atoi(pszLine + E00_INT_SIZE);
data/gdal-3.2.0+dfsg/frmts/e00grid/e00griddataset.cpp:702:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(padfTransform, adfGeoTransform, 6 * sizeof(double));
data/gdal-3.2.0+dfsg/frmts/ecw/ecwasyncreader.cpp:128:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( poReader->panBandMap, panBandMap, sizeof(int) * nBandCount );
data/gdal-3.2.0+dfsg/frmts/ecw/ecwcreatecopy.cpp:47:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szProcessName[2048];
data/gdal-3.2.0+dfsg/frmts/ecw/ecwcreatecopy.cpp:65:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(szProcessName, "Unknown");
data/gdal-3.2.0+dfsg/frmts/ecw/ecwcreatecopy.cpp:226:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( ppInputArray[iBand],
data/gdal-3.2.0+dfsg/frmts/ecw/ecwcreatecopy.cpp:297:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szSRSName[100];
data/gdal-3.2.0+dfsg/frmts/ecw/ecwcreatecopy.cpp:308:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            nEPSGCode = atoi(oSRS.GetAuthorityCode( "PROJCS" ));
data/gdal-3.2.0+dfsg/frmts/ecw/ecwcreatecopy.cpp:317:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            nEPSGCode = atoi(oSRS.GetAuthorityCode( "GEOGCS" ));
data/gdal-3.2.0+dfsg/frmts/ecw/ecwcreatecopy.cpp:324:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy( szSRSName,
data/gdal-3.2.0+dfsg/frmts/ecw/ecwcreatecopy.cpp:330:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szDoc[4000];
data/gdal-3.2.0+dfsg/frmts/ecw/ecwcreatecopy.cpp:486:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( &(poECWBox->m_nTBox), poBox->GetType(), 4 );
data/gdal-3.2.0+dfsg/frmts/ecw/ecwcreatecopy.cpp:634:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            bECWV3 = (3 == atoi(pszOption));
data/gdal-3.2.0+dfsg/frmts/ecw/ecwcreatecopy.cpp:747:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        if( pszNBITS && atoi(pszNBITS) > 0 )
data/gdal-3.2.0+dfsg/frmts/ecw/ecwcreatecopy.cpp:748:53:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            psClient->pBands[iBand].nBits = (UINT8) atoi(pszNBITS);
data/gdal-3.2.0+dfsg/frmts/ecw/ecwcreatecopy.cpp:793:48:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                      (UINT32) atoi(pszOption) );
data/gdal-3.2.0+dfsg/frmts/ecw/ecwcreatecopy.cpp:798:48:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                      (UINT32) atoi(pszOption) );
data/gdal-3.2.0+dfsg/frmts/ecw/ecwcreatecopy.cpp:803:48:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                      (UINT32) atoi(pszOption) );
data/gdal-3.2.0+dfsg/frmts/ecw/ecwcreatecopy.cpp:808:47:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                     (UINT32) atoi(pszOption) );
data/gdal-3.2.0+dfsg/frmts/ecw/ecwcreatecopy.cpp:813:48:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                      (UINT32) atoi(pszOption) );
data/gdal-3.2.0+dfsg/frmts/ecw/ecwcreatecopy.cpp:818:48:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                      (UINT32) atoi(pszOption) );
data/gdal-3.2.0+dfsg/frmts/ecw/ecwcreatecopy.cpp:864:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                (UINT32) atoi(pszOption) );
data/gdal-3.2.0+dfsg/frmts/ecw/ecwcreatecopy.cpp:899:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szProjection[128];
data/gdal-3.2.0+dfsg/frmts/ecw/ecwcreatecopy.cpp:900:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szDatum[128];
data/gdal-3.2.0+dfsg/frmts/ecw/ecwcreatecopy.cpp:901:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szUnits[128];
data/gdal-3.2.0+dfsg/frmts/ecw/ecwcreatecopy.cpp:903:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy( szProjection, "RAW" );
data/gdal-3.2.0+dfsg/frmts/ecw/ecwcreatecopy.cpp:904:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy( szDatum, "RAW" );
data/gdal-3.2.0+dfsg/frmts/ecw/ecwcreatecopy.cpp:918:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            strcpy( szProjection, "GEODETIC" );
data/gdal-3.2.0+dfsg/frmts/ecw/ecwcreatecopy.cpp:1222:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            bECWV3 = (3 == atoi(pszOption));
data/gdal-3.2.0+dfsg/frmts/ecw/ecwcreatecopy.cpp:1402:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        bECWV3 = (3 == atoi(pszOption));
data/gdal-3.2.0+dfsg/frmts/ecw/ecwcreatecopy.cpp:1794:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( padfGeoTransform, adfGeoTransform, sizeof(double) * 6 );
data/gdal-3.2.0+dfsg/frmts/ecw/ecwcreatecopy.cpp:1805:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( adfGeoTransform, padfGeoTransform, sizeof(double) * 6 );
data/gdal-3.2.0+dfsg/frmts/ecw/ecwcreatecopy.cpp:2123:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( poGDS->pabyBILBuffer + (nBand-1) * nWordSize * nRasterXSize,
data/gdal-3.2.0+dfsg/frmts/ecw/ecwdataset.cpp:1174:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(adfGeoTransform, padfGeoTransform, 6 * sizeof(double));
data/gdal-3.2.0+dfsg/frmts/ecw/ecwdataset.cpp:1455:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szProjCode[32], szDatumCode[32], szUnits[32];
data/gdal-3.2.0+dfsg/frmts/ecw/ecwdataset.cpp:1585:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(m_panAdviseReadBandList, panBandList, sizeof(int) * nBandCount);
data/gdal-3.2.0+dfsg/frmts/ecw/ecwdataset.cpp:1671:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( panWinBandList, panBandList, sizeof(int)* nBandCount);
data/gdal-3.2.0+dfsg/frmts/ecw/ecwdataset.cpp:1950:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char szBuffer[64];
data/gdal-3.2.0+dfsg/frmts/ecw/ecwdataset.cpp:3179:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy( pszProjection, "RAW" );
data/gdal-3.2.0+dfsg/frmts/ecw/ecwdataset.cpp:3180:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy( pszDatum, "RAW" );
data/gdal-3.2.0+dfsg/frmts/ecw/ecwdataset.cpp:3181:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy( pszUnits, "METERS" );
data/gdal-3.2.0+dfsg/frmts/ecw/ecwdataset.cpp:3210:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        && pszAuthorityCode != nullptr && atoi(pszAuthorityCode) > 0 )
data/gdal-3.2.0+dfsg/frmts/ecw/ecwdataset.cpp:3211:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        nEPSGCode = (UINT32) atoi(pszAuthorityCode);
data/gdal-3.2.0+dfsg/frmts/ecw/ecwdataset.cpp:3217:53:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            CNCSJP2FileView::GetProjectionAndDatum( atoi(pszAuthorityCode),
data/gdal-3.2.0+dfsg/frmts/ecw/ecwdataset.cpp:3221:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                  atoi(pszAuthorityCode),
data/gdal-3.2.0+dfsg/frmts/ecw/ecwdataset.cpp:3416:55:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        NCSecwSetConfig(NCSCFG_CACHE_MAXMEM, (UINT32) atoi(pszEcwCacheSize) );
data/gdal-3.2.0+dfsg/frmts/ecw/ecwdataset.cpp:3438:61:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        NCSecwSetConfig( NCSCFG_ECWP_CACHE_SIZE_MB, (INT32) atoi( pszOpt ) );
data/gdal-3.2.0+dfsg/frmts/ecw/ecwdataset.cpp:3454:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                         (NCSTimeStampMs) atoi(pszOpt) );
data/gdal-3.2.0+dfsg/frmts/ecw/ecwdataset.cpp:3461:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                         (NCSTimeStampMs) atoi(pszOpt) );
data/gdal-3.2.0+dfsg/frmts/ecw/ecwdataset.cpp:3475:57:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        NCSecwSetConfig( NCSCFG_CACHE_MAXOPEN, (UINT32) atoi(pszOpt) );
data/gdal-3.2.0+dfsg/frmts/ecw/jp2userbox.cpp:76:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( pabyData, pabyDataIn, nDataLength );
data/gdal-3.2.0+dfsg/frmts/eeda/eedacommon.cpp:358:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char abyBuffer[512];
data/gdal-3.2.0+dfsg/frmts/eeda/eedacommon.cpp:505:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                nHTTPStatus = atoi(psResult->pszErrBuf + strlen("HTTP error code : "));
data/gdal-3.2.0+dfsg/frmts/eeda/eedaidataset.cpp:1245:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( adfGeoTransform, m_adfGeoTransform, 6 * sizeof(double) );
data/gdal-3.2.0+dfsg/frmts/eeda/eedaidataset.cpp:1287:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    m_nBlockSize = atoi(CSLFetchNameValueDef(poOpenInfo->papszOpenOptions,
data/gdal-3.2.0+dfsg/frmts/eeda/eedaidataset.cpp:1412:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(m_adfGeoTransform, aoBandDesc[i].adfGeoTransform.data(),
data/gdal-3.2.0+dfsg/frmts/eeda/eedaidataset.cpp:1577:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                    atoi(osBandName.c_str() + 1) > 0 )
data/gdal-3.2.0+dfsg/frmts/elas/elasdataset.cpp:52:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        YLabel[4]; /* Should be "NOR" for UTM */
data/gdal-3.2.0+dfsg/frmts/elas/elasdataset.cpp:54:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        XLabel[4]; /* Should be "EAS" for UTM */
data/gdal-3.2.0+dfsg/frmts/elas/elasdataset.cpp:63:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        unused1[8];
data/gdal-3.2.0+dfsg/frmts/elas/elasdataset.cpp:66:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        Comment1[64];
data/gdal-3.2.0+dfsg/frmts/elas/elasdataset.cpp:67:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        Comment2[64];
data/gdal-3.2.0+dfsg/frmts/elas/elasdataset.cpp:68:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        Comment3[64];
data/gdal-3.2.0+dfsg/frmts/elas/elasdataset.cpp:69:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        Comment4[64];
data/gdal-3.2.0+dfsg/frmts/elas/elasdataset.cpp:70:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        Comment5[64];
data/gdal-3.2.0+dfsg/frmts/elas/elasdataset.cpp:71:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        Comment6[64];
data/gdal-3.2.0+dfsg/frmts/elas/elasdataset.cpp:73:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        unused2[32];
data/gdal-3.2.0+dfsg/frmts/elas/elasdataset.cpp:628:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( padfTransform, adfGeoTransform, sizeof(double)*6 );
data/gdal-3.2.0+dfsg/frmts/elas/elasdataset.cpp:657:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( adfGeoTransform, padfTransform, sizeof(double)*6 );
data/gdal-3.2.0+dfsg/frmts/elas/elasdataset.cpp:673:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( sHeader.YLabel, "NOR ", 4 );
data/gdal-3.2.0+dfsg/frmts/elas/elasdataset.cpp:674:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( sHeader.XLabel, "EAS ", 4 );
data/gdal-3.2.0+dfsg/frmts/envisat/EnvisatFile.c:147:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char header[68];
data/gdal-3.2.0+dfsg/frmts/envisat/EnvisatFile.c:226:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	mph_data[1248];
data/gdal-3.2.0+dfsg/frmts/envisat/EnvisatFile.c:255:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char	error_buf[2048];
data/gdal-3.2.0+dfsg/frmts/envisat/EnvisatFile.c:418:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        ds_info->ds_offset = atoi(
data/gdal-3.2.0+dfsg/frmts/envisat/EnvisatFile.c:421:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        ds_info->ds_size = atoi(
data/gdal-3.2.0+dfsg/frmts/envisat/EnvisatFile.c:424:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        ds_info->num_dsr = atoi(
data/gdal-3.2.0+dfsg/frmts/envisat/EnvisatFile.c:427:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        ds_info->dsr_size = atoi(
data/gdal-3.2.0+dfsg/frmts/envisat/EnvisatFile.c:484:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char	error_buf[2048];
data/gdal-3.2.0+dfsg/frmts/envisat/EnvisatFile.c:510:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char	error_buf[2048];
data/gdal-3.2.0+dfsg/frmts/envisat/EnvisatFile.c:945:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char	error_buf[2048];
data/gdal-3.2.0+dfsg/frmts/envisat/EnvisatFile.c:960:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( entries[key_index]->value, value, nEntryValueLen );
data/gdal-3.2.0+dfsg/frmts/envisat/EnvisatFile.c:964:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( entries[key_index]->value, value, nValueLen );
data/gdal-3.2.0+dfsg/frmts/envisat/EnvisatFile.c:1024:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        return atoi(entries[key_index]->value);
data/gdal-3.2.0+dfsg/frmts/envisat/EnvisatFile.c:1056:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char format[32], string_value[128];
data/gdal-3.2.0+dfsg/frmts/envisat/EnvisatFile.c:1063:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char	error_buf[2048];
data/gdal-3.2.0+dfsg/frmts/envisat/EnvisatFile.c:1169:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char format[32], string_value[128];
data/gdal-3.2.0+dfsg/frmts/envisat/EnvisatFile.c:1176:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char	error_buf[2048];
data/gdal-3.2.0+dfsg/frmts/envisat/EnvisatFile.c:1240:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	padded_ds_name[100];
data/gdal-3.2.0+dfsg/frmts/envisat/EnvisatFile.c:1756:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char	line[1024];
data/gdal-3.2.0+dfsg/frmts/envisat/adsrange.cpp:106:37:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    TimeDelta t_mds = mjd_m_first + atol ; /*time of the first MDSR + tolerance */
data/gdal-3.2.0+dfsg/frmts/envisat/adsrange.cpp:129:26:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    t_mds = mjd_m_last - atol ;  /* time of the last MDSR - tolerance */
data/gdal-3.2.0+dfsg/frmts/envisat/dumpgeo.c:98:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( &unValue, abyRecord + 13, 4 );
data/gdal-3.2.0+dfsg/frmts/envisat/dumpgeo.c:103:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( &unValue, abyRecord + 17, 4 );
data/gdal-3.2.0+dfsg/frmts/envisat/dumpgeo.c:107:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( &fValue, abyRecord + 21, 4 );
data/gdal-3.2.0+dfsg/frmts/envisat/dumpgeo.c:116:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy( &unValue, abyRecord + 25 + sample*4, 4 );
data/gdal-3.2.0+dfsg/frmts/envisat/dumpgeo.c:119:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy( &fValue, abyRecord + 25 + 44 + sample * 4, 4 );
data/gdal-3.2.0+dfsg/frmts/envisat/dumpgeo.c:123:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy( &fValue, abyRecord + 25 + 88 + sample * 4, 4 );
data/gdal-3.2.0+dfsg/frmts/envisat/dumpgeo.c:127:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy( &unValue, abyRecord + 25 + 132 + sample*4, 4 );
data/gdal-3.2.0+dfsg/frmts/envisat/dumpgeo.c:130:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy( &unValue, abyRecord + 25 + 176 + sample*4, 4 );
data/gdal-3.2.0+dfsg/frmts/envisat/dumpgeo.c:148:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy( &unValue, abyRecord + 279 + sample*4, 4 );
data/gdal-3.2.0+dfsg/frmts/envisat/dumpgeo.c:151:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy( &fValue, abyRecord + 279 + 44 + sample * 4, 4 );
data/gdal-3.2.0+dfsg/frmts/envisat/dumpgeo.c:155:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy( &fValue, abyRecord + 279 + 88 + sample * 4, 4 );
data/gdal-3.2.0+dfsg/frmts/envisat/dumpgeo.c:159:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy( &unValue, abyRecord + 279 + 132 + sample*4, 4 );
data/gdal-3.2.0+dfsg/frmts/envisat/dumpgeo.c:162:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy( &unValue, abyRecord + 279 + 176 + sample*4, 4 );
data/gdal-3.2.0+dfsg/frmts/envisat/envisatdataset.cpp:321:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( &unValue, abyRecord + 13, 4 );
data/gdal-3.2.0+dfsg/frmts/envisat/envisatdataset.cpp:338:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char szId[128];
data/gdal-3.2.0+dfsg/frmts/envisat/envisatdataset.cpp:342:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy( &unValue, abyRecord + 25 + iGCP*4, 4 );
data/gdal-3.2.0+dfsg/frmts/envisat/envisatdataset.cpp:345:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy( &unValue, abyRecord + 25 + 176 + iGCP*4, 4 );
data/gdal-3.2.0+dfsg/frmts/envisat/envisatdataset.cpp:348:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy( &unValue, abyRecord + 25 + 132 + iGCP*4, 4 );
data/gdal-3.2.0+dfsg/frmts/envisat/envisatdataset.cpp:363:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( &unValue, abyRecord + 17, 4 );
data/gdal-3.2.0+dfsg/frmts/envisat/envisatdataset.cpp:372:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char szId[128];
data/gdal-3.2.0+dfsg/frmts/envisat/envisatdataset.cpp:376:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( &unValue, abyRecord + 279 + iGCP*4, 4 );
data/gdal-3.2.0+dfsg/frmts/envisat/envisatdataset.cpp:379:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( &unValue, abyRecord + 279 + 176 + iGCP*4, 4 );
data/gdal-3.2.0+dfsg/frmts/envisat/envisatdataset.cpp:382:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( &unValue, abyRecord + 279 + 132 + iGCP*4, 4 );
data/gdal-3.2.0+dfsg/frmts/envisat/envisatdataset.cpp:547:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char szId[128];
data/gdal-3.2.0+dfsg/frmts/envisat/envisatdataset.cpp:596:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szDSName[128];
data/gdal-3.2.0+dfsg/frmts/envisat/envisatdataset.cpp:606:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            nRecord = atoi(szDSName+1);
data/gdal-3.2.0+dfsg/frmts/envisat/envisatdataset.cpp:686:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char szKey[max_len];
data/gdal-3.2.0+dfsg/frmts/envisat/envisatdataset.cpp:688:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy( szKey, "DS_");
data/gdal-3.2.0+dfsg/frmts/envisat/envisatdataset.cpp:702:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat( szKey, "_NAME" );
data/gdal-3.2.0+dfsg/frmts/envisat/envisatdataset.cpp:704:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char szTrimmedName[max_len];
data/gdal-3.2.0+dfsg/frmts/envisat/envisatdataset.cpp:744:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char szPrefix[128];
data/gdal-3.2.0+dfsg/frmts/envisat/envisatdataset.cpp:775:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                    char szValue[1024];
data/gdal-3.2.0+dfsg/frmts/envisat/envisatdataset.cpp:779:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                        char szKey[256];
data/gdal-3.2.0+dfsg/frmts/envisat/envisatdataset.cpp:829:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char szHeaderKey[128];
data/gdal-3.2.0+dfsg/frmts/envisat/envisatdataset.cpp:998:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szBandName[128];
data/gdal-3.2.0+dfsg/frmts/envisat/records.c:1269:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy((void*)szBuf, pData, pField->nCount);
data/gdal-3.2.0+dfsg/frmts/epsilon/epsilondataset.cpp:289:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(pImage,
data/gdal-3.2.0+dfsg/frmts/epsilon/epsilondataset.cpp:295:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char ** pTempData[3];
data/gdal-3.2.0+dfsg/frmts/epsilon/epsilondataset.cpp:322:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pImage,
data/gdal-3.2.0+dfsg/frmts/epsilon/epsilondataset.cpp:343:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(pabySrcBlock,
data/gdal-3.2.0+dfsg/frmts/epsilon/epsilondataset.cpp:710:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        atoi(CSLFetchNameValueDef(papszOptions, "BLOCKXSIZE", "256"));
data/gdal-3.2.0+dfsg/frmts/epsilon/epsilondataset.cpp:712:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        atoi(CSLFetchNameValueDef(papszOptions, "BLOCKYSIZE", "256"));
data/gdal-3.2.0+dfsg/frmts/ers/ersdataset.cpp:367:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szERSProj[32], szERSDatum[32], szERSUnits[32];
data/gdal-3.2.0+dfsg/frmts/ers/ersdataset.cpp:449:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szERSProj[32], szERSDatum[32], szERSUnits[32];
data/gdal-3.2.0+dfsg/frmts/ers/ersdataset.cpp:541:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( padfTransform, adfGeoTransform, sizeof(double) * 6 );
data/gdal-3.2.0+dfsg/frmts/ers/ersdataset.cpp:566:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( adfGeoTransform, padfTransform, sizeof(double) * 6 );
data/gdal-3.2.0+dfsg/frmts/ers/ersdataset.cpp:921:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    int nBands = atoi(poHeader->Find( "RasterInfo.NrOfBands" ));
data/gdal-3.2.0+dfsg/frmts/ers/ersdataset.cpp:922:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    poDS->nRasterXSize = atoi(poHeader->Find( "RasterInfo.NrOfCellsPerLine" ));
data/gdal-3.2.0+dfsg/frmts/ers/ersdataset.cpp:923:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    poDS->nRasterYSize = atoi(poHeader->Find( "RasterInfo.NrOfLines" ));
data/gdal-3.2.0+dfsg/frmts/ers/ersdataset.cpp:938:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        nHeaderOffset = atoi(poHeader->Find( "HeaderOffset" ));
data/gdal-3.2.0+dfsg/frmts/esric/esric_dataset.cpp:67:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&val, data, 4);
data/gdal-3.2.0+dfsg/frmts/esric/esric_dataset.cpp:123:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(gt, GeoTransform, sizeof(GeoTransform));
data/gdal-3.2.0+dfsg/frmts/esric/esric_dataset.cpp:178:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(GeoTransform, gt, sizeof(gt));
data/gdal-3.2.0+dfsg/frmts/esric/esric_dataset.cpp:223:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(GeoTransform, gt, sizeof(gt));
data/gdal-3.2.0+dfsg/frmts/exr/exrdataset.cpp:417:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(adfGT, m_adfGT, 6 * sizeof(double));
data/gdal-3.2.0+dfsg/frmts/exr/exrdataset.cpp:460:31:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    virtual bool        read (char c[/*n*/], int n) override;
data/gdal-3.2.0+dfsg/frmts/exr/exrdataset.cpp:461:38:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    virtual void        write (const char c[/*n*/], int n) override;
data/gdal-3.2.0+dfsg/frmts/exr/exrdataset.cpp:471:29:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
bool GDALEXRIOStream::read (char c[/*n*/], int n)
data/gdal-3.2.0+dfsg/frmts/exr/exrdataset.cpp:488:36:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void GDALEXRIOStream::write (const char c[/*n*/], int n)
data/gdal-3.2.0+dfsg/frmts/exr/exrdataset.cpp:549:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        iPart = atoi(pszPartPos);
data/gdal-3.2.0+dfsg/frmts/exr/exrdataset.cpp:1071:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        const int nBlockXSize = atoi(
data/gdal-3.2.0+dfsg/frmts/exr/exrdataset.cpp:1073:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        const int nBlockYSize = atoi(
data/gdal-3.2.0+dfsg/frmts/exr/exrdataset.cpp:1497:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(m_adfGT, adfGT, 6 * sizeof(double));
data/gdal-3.2.0+dfsg/frmts/exr/exrdataset.cpp:1616:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(adfGT, m_adfGT, 6 * sizeof(double));
data/gdal-3.2.0+dfsg/frmts/exr/exrdataset.cpp:1964:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    const int nBlockXSize = atoi(
data/gdal-3.2.0+dfsg/frmts/exr/exrdataset.cpp:1966:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    const int nBlockYSize = atoi(
data/gdal-3.2.0+dfsg/frmts/fit/fitdataset.cpp:1097:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy((char *) &head->magic, "IT", 2);
data/gdal-3.2.0+dfsg/frmts/fit/fitdataset.cpp:1098:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy((char *) &head->version, "02", 2);
data/gdal-3.2.0+dfsg/frmts/fits/fitsdataset.cpp:264:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char typechar[80];
data/gdal-3.2.0+dfsg/frmts/fits/fitsdataset.cpp:1290:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char key[100];
data/gdal-3.2.0+dfsg/frmts/fits/fitsdataset.cpp:1291:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char value[100];
data/gdal-3.2.0+dfsg/frmts/fits/fitsdataset.cpp:1414:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        iSelectedHDU = atoi(aosTokens[2]);
data/gdal-3.2.0+dfsg/frmts/fits/fitsdataset.cpp:1467:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char szExtname[81] = { 0 };
data/gdal-3.2.0+dfsg/frmts/fits/fitsdataset.cpp:2128:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( padfTransform, m_adfGeoTransform, sizeof(double) * 6 );
data/gdal-3.2.0+dfsg/frmts/fits/fitsdataset.cpp:2143:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( m_adfGeoTransform, padfTransform, sizeof(double)*6 );
data/gdal-3.2.0+dfsg/frmts/fits/fitsdataset.cpp:2283:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char target[81], ctype[81];
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_dataset.cpp:502:45:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            poGeoRaster->nCompressQuality = atoi( pszFetched );
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_dataset.cpp:645:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy( &nTBox, oBox.GetType(), 4 );
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_dataset.cpp:660:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy( &nTBox, oBox.GetType(), 4 );
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_dataset.cpp:923:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        poGRW->nColumnBlockSize = atoi( pszFetched );
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_dataset.cpp:930:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        poGRW->nRowBlockSize = atoi( pszFetched );
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_dataset.cpp:937:50:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        poGRW->sCellDepth = CPLSPrintf( "%dBIT", atoi( pszFetched ) );
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_dataset.cpp:958:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        poGRW->nCompressQuality = atoi( pszFetched );
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_dataset.cpp:995:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        poGRW->nBandBlockSize = atoi( pszFetched );
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_dataset.cpp:1185:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szStringId[OWTEXT];
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_dataset.cpp:1219:46:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        poGRD->poGeoRaster->SetGeoReference( atoi( pszFetched ) );
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_dataset.cpp:1229:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        poGRD->poGeoRaster->nExtentSRID = atoi( pszFetched );
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_dataset.cpp:1279:46:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        poGRD->poGeoRaster->nPyramidLevels = atoi(pszFetched);
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_dataset.cpp:1507:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            nBlockXSize = atoi( pszFetched );
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_dataset.cpp:1512:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            nBlockYSize = atoi( pszFetched );
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_dataset.cpp:1816:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( padfTransform, adfGeoTransform, sizeof(double) * 6 );
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_dataset.cpp:2013:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( adfGeoTransform, padfTransform, sizeof( double ) * 6 );
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_dataset.cpp:2067:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            poGeoRaster->SetGeoReference( atoi( pszAuthCode ) );
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_dataset.cpp:2187:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy( pszStart, "Azimuth", strlen(SRS_PP_AZIMUTH) );
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_dataset.cpp:2192:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy( pszStart, "Central_Meridian",
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_dataset.cpp:2198:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy( pszStart, "False_Easting", strlen(SRS_PP_FALSE_EASTING) );
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_dataset.cpp:2203:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy( pszStart, "False_Northing",
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_dataset.cpp:2209:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy( pszStart, "Latitude_Of_Center",
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_dataset.cpp:2215:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy( pszStart, "Latitude_Of_Origin",
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_dataset.cpp:2221:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy( pszStart, "Longitude_Of_Center",
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_dataset.cpp:2227:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy( pszStart, "Pseudo_Standard_Parallel_1",
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_dataset.cpp:2233:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy( pszStart, "Scale_Factor", strlen(SRS_PP_SCALE_FACTOR) );
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_dataset.cpp:2238:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy( pszStart, "Standard_Parallel_1",
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_dataset.cpp:2244:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy( pszStart, "Standard_Parallel_2",
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_dataset.cpp:2250:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy( pszStart, "Standard_Parallel_2",
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_dataset.cpp:2260:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy( pszStart, SRS_UL_METER, strlen(SRS_UL_METER) );
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_dataset.cpp:2461:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char szTable[OWNAME];
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_dataset.cpp:2462:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char szOwner[OWNAME];
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_dataset.cpp:2506:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char szColumn[OWNAME];
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_dataset.cpp:2507:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char szOwner[OWNAME];
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_dataset.cpp:2577:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szDataTable[OWNAME];
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_dataset.cpp:2578:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szRasterId[OWNAME];
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_dataset.cpp:2579:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szRows[OWNAME];
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_dataset.cpp:2580:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szColumns[OWNAME];
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_dataset.cpp:2581:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szBands[OWNAME];
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_dataset.cpp:2582:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szCellDepth[OWNAME];
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_dataset.cpp:2583:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szSRID[OWNAME];
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_dataset.cpp:2783:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szMethod[OWNAME];
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_dataset.cpp:2787:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy( szMethod, "NN" );
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_dataset.cpp:2791:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy( szMethod, "AVERAGE4" );
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_rasterband.cpp:419:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szMin[MAX_DOUBLE_STR_REP + 1];
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_rasterband.cpp:420:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szMax[MAX_DOUBLE_STR_REP + 1];
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_rasterband.cpp:421:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szMean[MAX_DOUBLE_STR_REP + 1];
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_rasterband.cpp:422:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szMedian[MAX_DOUBLE_STR_REP + 1];
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_rasterband.cpp:423:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szMode[MAX_DOUBLE_STR_REP + 1];
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_rasterband.cpp:424:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szStdDev[MAX_DOUBLE_STR_REP + 1];
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_rasterband.cpp:425:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szSampling[MAX_DOUBLE_STR_REP + 1];
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_rasterband.cpp:815:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  szField[OWNAME];
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_wrapper.cpp:372:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szOwner[OWCODE];
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_wrapper.cpp:373:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szTable[OWCODE];
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_wrapper.cpp:374:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szColumn[OWTEXT];
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_wrapper.cpp:375:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szDataTable[OWCODE];
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_wrapper.cpp:376:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szWhere[OWTEXT];
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_wrapper.cpp:568:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szRDT[OWNAME];
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_wrapper.cpp:569:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szRID[OWCODE];
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_wrapper.cpp:592:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            strcpy( szRID, "NULL" );
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_wrapper.cpp:600:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szDescription[OWTEXT];
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_wrapper.cpp:854:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szBindRDT[OWNAME];
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_wrapper.cpp:989:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szCreateBlank[OWTEXT];
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_wrapper.cpp:1218:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    int nCount      = atoi( CPLGetXMLValue( phMetadata,
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_wrapper.cpp:1230:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            nRasterRows = atoi( CPLGetXMLValue( phDimSize, "size", "0" ) );
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_wrapper.cpp:1235:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            nRasterColumns = atoi( CPLGetXMLValue( phDimSize, "size", "0" ) );
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_wrapper.cpp:1240:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            nRasterBands = atoi( CPLGetXMLValue( phDimSize, "size", "0" ) );
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_wrapper.cpp:1261:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    anULTCoordinate[0] = atoi(CPLGetXMLValue(
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_wrapper.cpp:1264:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    anULTCoordinate[1] = atoi(CPLGetXMLValue(
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_wrapper.cpp:1267:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    anULTCoordinate[2] = atoi(CPLGetXMLValue(
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_wrapper.cpp:1281:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    nRowBlockSize       = atoi( CPLGetXMLValue( phMetadata,
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_wrapper.cpp:1285:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    nColumnBlockSize    = atoi( CPLGetXMLValue( phMetadata,
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_wrapper.cpp:1289:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    nBandBlockSize      = atoi( CPLGetXMLValue( phMetadata,
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_wrapper.cpp:1293:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    nTotalColumnBlocks  = atoi( CPLGetXMLValue( phMetadata,
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_wrapper.cpp:1296:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    nTotalRowBlocks     = atoi( CPLGetXMLValue( phMetadata,
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_wrapper.cpp:1299:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    nTotalBandBlocks    = atoi( CPLGetXMLValue( phMetadata,
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_wrapper.cpp:1328:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        nCompressQuality = atoi( CPLGetXMLValue( phMetadata,
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_wrapper.cpp:1341:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    iDefaultRedBand     = atoi( CPLGetXMLValue( phMetadata,
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_wrapper.cpp:1344:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    iDefaultGreenBand   = atoi( CPLGetXMLValue( phMetadata,
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_wrapper.cpp:1347:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    iDefaultBlueBand    = atoi( CPLGetXMLValue( phMetadata,
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_wrapper.cpp:1354:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szPyramidType[OWCODE];
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_wrapper.cpp:1362:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        nPyramidMaxLevel = atoi( CPLGetXMLValue( phMetadata,
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_wrapper.cpp:1602:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            const int iColor    = (short) atoi( CPLGetXMLValue( psColors, "value","0"));
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_wrapper.cpp:1603:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            oEntry.c1 = (short) atoi( CPLGetXMLValue( psColors, "red",  "0"));
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_wrapper.cpp:1604:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            oEntry.c2 = (short) atoi( CPLGetXMLValue( psColors, "green","0"));
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_wrapper.cpp:1605:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            oEntry.c3 = (short) atoi( CPLGetXMLValue( psColors, "blue", "0"));
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_wrapper.cpp:1606:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            oEntry.c4 = (short) atoi( CPLGetXMLValue( psColors, "alpha","0"));
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_wrapper.cpp:2013:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( pData, &pabyBlockBuf[nStart], nGDALBlockBytes );
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_wrapper.cpp:2034:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy( &pabyData[ii], &pabyBlockBuf[jj], nSize );
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_wrapper.cpp:2149:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( &pabyBlockBuf[nStart], pabyInBuf, nGDALBlockBytes );
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_wrapper.cpp:2168:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy( &pabyBlockBuf[jj], &pabyInBuf[ii], nSize );
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_wrapper.cpp:2306:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        int nNumber = atoi( CPLGetXMLValue( phSubLayer, "layerNumber", "-1") );
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_wrapper.cpp:2365:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    int nNumCoeff = atoi( CPLGetXMLValue( phPolynomial, "nCoefficients", "0" ));
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_wrapper.cpp:2686:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    int nNumCoeff = atoi( CPLGetXMLValue( phPolynomial, "nCoefficients", "0" ) );
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_wrapper.cpp:3151:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szRDT[OWCODE];
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_wrapper.cpp:3152:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szNoData[OWTEXT];
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_wrapper.cpp:3860:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char pszDataTable[OWNAME];
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_wrapper.cpp:3975:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( pabyData, pabyBuffer, nPixCount );
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_wrapper.cpp:4280:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( pabyBuf, pabyBlockBuf, nBufferSize );
data/gdal-3.2.0+dfsg/frmts/georaster/georaster_wrapper.cpp:4321:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( pabyBuf, pabyBlockBuf, nBlockBytes );
data/gdal-3.2.0+dfsg/frmts/georaster/oci_wrapper.cpp:80:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szUser[OWTEXT];
data/gdal-3.2.0+dfsg/frmts/georaster/oci_wrapper.cpp:81:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szSchema[OWTEXT];
data/gdal-3.2.0+dfsg/frmts/georaster/oci_wrapper.cpp:277:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szVersionTxt[OWTEXT];
data/gdal-3.2.0+dfsg/frmts/georaster/oci_wrapper.cpp:1892:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  szUpcase[OWTEXT];
data/gdal-3.2.0+dfsg/frmts/georaster/oci_wrapper.cpp:1922:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szBuffer[OWTEXT];
data/gdal-3.2.0+dfsg/frmts/georaster/oci_wrapper.cpp:1945:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    return atoi(OWParseValue( pszText, " .", "Release", 1 ));
data/gdal-3.2.0+dfsg/frmts/georaster/oci_wrapper.cpp:1961:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    return atoi(OWParseValue( pszText, " ()", "EPSG", 2 ));
data/gdal-3.2.0+dfsg/frmts/gif/gifabstractdataset.cpp:102:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char abyBuffer[2048+1];
data/gdal-3.2.0+dfsg/frmts/gif/gifabstractdataset.cpp:136:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(pszXMP, abyBuffer + iFoundOffset, nSize);
data/gdal-3.2.0+dfsg/frmts/gif/gifabstractdataset.cpp:173:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(abyBuffer, abyBuffer + 1024, 1024);
data/gdal-3.2.0+dfsg/frmts/gif/gifabstractdataset.cpp:197:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char *apszMDList[2];
data/gdal-3.2.0+dfsg/frmts/gif/gifabstractdataset.cpp:255:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( padfTransform, adfGeoTransform, sizeof(double)*6 );
data/gdal-3.2.0+dfsg/frmts/gif/gifabstractdataset.cpp:552:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char szBackground[10];
data/gdal-3.2.0+dfsg/frmts/gif/gifdataset.cpp:153:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( pImage, psImage->RasterBits + nBlockYOff * nBlockXSize,
data/gdal-3.2.0+dfsg/frmts/gif/gifdataset.cpp:538:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char extensionData[4] = {
data/gdal-3.2.0+dfsg/frmts/gif/giflib/dgif_lib.c:74:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((FileHandle = open(FileName, O_RDONLY
data/gdal-3.2.0+dfsg/frmts/gif/giflib/dgif_lib.c:95:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char Buf[GIF_STAMP_LEN + 1];
data/gdal-3.2.0+dfsg/frmts/gif/giflib/dgif_lib.c:176:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char Buf[GIF_STAMP_LEN + 1];
data/gdal-3.2.0+dfsg/frmts/gif/giflib/dgif_lib.c:415:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&sp->ImageDesc, &GifFile->Image, sizeof(GifImageDesc));
data/gdal-3.2.0+dfsg/frmts/gif/giflib/dgif_lib.c:643:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char c[2];
data/gdal-3.2.0+dfsg/frmts/gif/giflib/egif_lib.c:58:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char GifVersionPrefix[GIF_STAMP_LEN + 1] = GIF87_STAMP;
data/gdal-3.2.0+dfsg/frmts/gif/giflib/egif_lib.c:87:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        FileHandle = open(FileName, O_WRONLY | O_CREAT | O_EXCL
data/gdal-3.2.0+dfsg/frmts/gif/giflib/egif_lib.c:93:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        FileHandle = open(FileName, O_WRONLY | O_CREAT | O_TRUNC
data/gdal-3.2.0+dfsg/frmts/gif/giflib/egif_lib.c:759:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char c[2];
data/gdal-3.2.0+dfsg/frmts/gif/giflib/egif_lib.c:1002:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char SavedStamp[GIF_STAMP_LEN + 1];
data/gdal-3.2.0+dfsg/frmts/gif/giflib/egif_lib.c:1017:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(SavedStamp, GifVersionPrefix, GIF_STAMP_LEN);
data/gdal-3.2.0+dfsg/frmts/gif/giflib/egif_lib.c:1019:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(GifVersionPrefix, GIF89_STAMP, GIF_STAMP_LEN);
data/gdal-3.2.0+dfsg/frmts/gif/giflib/egif_lib.c:1021:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(GifVersionPrefix, GIF87_STAMP, GIF_STAMP_LEN);
data/gdal-3.2.0+dfsg/frmts/gif/giflib/egif_lib.c:1029:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(GifVersionPrefix, SavedStamp, GIF_STAMP_LEN);
data/gdal-3.2.0+dfsg/frmts/gif/giflib/egif_lib.c:1032:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(GifVersionPrefix, SavedStamp, GIF_STAMP_LEN);
data/gdal-3.2.0+dfsg/frmts/gif/giflib/gifalloc.c:76:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy((char *)Object->Colors,
data/gdal-3.2.0+dfsg/frmts/gif/giflib/gifalloc.c:291:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ep->Bytes, ExtData, Len);
data/gdal-3.2.0+dfsg/frmts/gif/giflib/gifalloc.c:376:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy((char *)sp, CopyFrom, sizeof(SavedImage));
data/gdal-3.2.0+dfsg/frmts/gif/giflib/gifalloc.c:403:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(sp->RasterBits, CopyFrom->RasterBits,
data/gdal-3.2.0+dfsg/frmts/gif/giflib/gifalloc.c:416:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(sp->ExtensionBlocks, CopyFrom->ExtensionBlocks,
data/gdal-3.2.0+dfsg/frmts/grass/grass.cpp:271:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy((void *) &sOpenWindow, (void *) &(poDSIn->sCellInfo), sizeof(struct Cell_head));
data/gdal-3.2.0+dfsg/frmts/grass/grass.cpp:330:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char key[200], value[200];
data/gdal-3.2.0+dfsg/frmts/grass/grass.cpp:420:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy((void *) &sOpenWindow, (void *) sNewWindow, sizeof(struct Cell_head));
data/gdal-3.2.0+dfsg/frmts/grass/grass.cpp:769:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( padfGeoTransform, adfGeoTransform, sizeof(double) * 6 );
data/gdal-3.2.0+dfsg/frmts/grass/grass.cpp:787:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *ptr[5];
data/gdal-3.2.0+dfsg/frmts/grass/grass.cpp:866:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[2000];
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:216:28:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                           char answer[100])
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:221:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            strcpy (answer, "New Years Day");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:224:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            strcpy (answer, "Martin Luther King Jr Day");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:230:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            strcpy (answer, "Presidents Day");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:236:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            strcpy (answer, "Memorial Day");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:242:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            strcpy (answer, "Independence Day");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:248:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            strcpy (answer, "Labor Day");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:254:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            strcpy (answer, "Columbus Day");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:260:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            strcpy (answer, "Veterans Day");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:263:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            strcpy (answer, "Thanksgiving Day");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:269:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            strcpy (answer, "Christmas Day");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:491:32:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static void Clock_FormatParse (char buffer[SIZEOF_BUFFER], sInt4 sec, float floatSec,
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:510:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char temp[100];      /* Helps parse the %D, %T, %r, and %R options. */
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:941:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char locBuff[100];
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:1028:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char locBuff[100];
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:1171:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy (ptr, "UTC");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:1175:10:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
         strcpy (ptr, "EDT");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:1177:10:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
         strcpy (ptr, "EST");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:1182:10:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
         strcpy (ptr, "CDT");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:1184:10:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
         strcpy (ptr, "CST");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:1189:10:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
         strcpy (ptr, "MDT");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:1191:10:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
         strcpy (ptr, "MST");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:1196:10:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
         strcpy (ptr, "PDT");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:1198:10:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
         strcpy (ptr, "PST");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:1203:10:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
         strcpy (ptr, "YDT");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:1205:10:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
         strcpy (ptr, "YST");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:1532:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   hour = atoi (ptr);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:1537:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      min = atoi (ptr);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:1541:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      min = atoi (ptr);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:1586:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   *mon = atoi (ptr);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:1591:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      *day = atoi (ptr);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:1596:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      *day = atoi (ptr);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:1599:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      *year = atoi (ptr);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:1641:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   *year = atoi (ptr);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:1647:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      *mon = atoi (ptr);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:1656:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   *mon = atoi (ptr);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:1661:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      *day = atoi (ptr);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:1669:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   *day = atoi (ptr);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:1680:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   hour = atoi (ptr);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:1686:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      min = atoi (ptr);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:1690:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      min = atoi (ptr);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:1709:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
               offset = atoi (ptr) * 3600;
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:1712:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
               offset += atoi (ptr) * 60;
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:1718:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
         offset = atoi (ptr) * 3600;
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:1721:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
         offset += atoi (ptr) * 60;
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:1839:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   year = atoi (buffer);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:1844:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      mon = atoi (buffer + 4);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:1850:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      day = atoi (buffer + 6);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:1856:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      hour = atoi (buffer + 8);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:1862:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      min = atoi (buffer + 10);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:1868:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      sec = atoi (buffer + 12);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:1876:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void Clock_PrintDateNumber (double l_clock, char buffer[15])
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:1921:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static int Clock_GetWord (char **Start, char **End, char word[30],
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:1921:41:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static int Clock_GetWord (char **Start, char **End, char word[30],
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:1921:53:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static int Clock_GetWord (char **Start, char **End, char word[30],
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:2021:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char word[30];
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:2095:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
         Stack[lenStack - 1].val = atoi (word);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:2149:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
               day = atoi (word);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:2156:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
               year = atoi (word);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.c:2159:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
               year = atoi (word);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/clock.h:35:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void Clock_PrintDateNumber (double clock, char buffer[15]);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/degrib1.cpp:426:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(&pow16, ptr, 8);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/degrib1.cpp:661:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy (pdsMeta->cluster.Member, pds, 10);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/degrib1.cpp:1909:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char unitName[15];   /* Holds the string name of the current unit. */
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/degrib1.cpp:1924:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy (c_ipack, sect0, SECT0LEN_WORD * 2);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/degrib1.cpp:2048:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (meta->unitName, unitName, unitLen);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/degrib1.cpp:2100:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy (&li_temp, c_ipack + curLoc, 4);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/degrib2.cpp:119:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int ReadSECT0 (VSILFILE *fp, char **buff, uInt4 *buffLen, sInt4 limit,
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/degrib2.cpp:124:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char buffer[4];
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/degrib2.cpp:216:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy (&(sect0[0]), (*buff) + curLen, 4);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/degrib2.cpp:224:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy (&(sect0[1]), *buff + curLen + 4, 4);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/degrib2.cpp:403:38:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static int FindSectLen2to7 (unsigned char *c_ipack, sInt4 gribLen, sInt4 ns[8],
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/degrib2.cpp:566:34:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static int FindSectLen (unsigned char *c_ipack, sInt4 gribLen, sInt4 ns[8],
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/degrib2.cpp:611:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (&sectLen, c_ipack + curTot, 4);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/degrib2.cpp:904:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char unitName[15];   /* Holds the string name of the current unit. */
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/degrib2.cpp:999:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (c_ipack, sect0, SECT0LEN_WORD * 4);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/degrib2.cpp:1139:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (&gribLen, &(c_ipack[12]), sizeof (sInt4));
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/degrib2.cpp:1206:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((l_fp = fopen ("dump.is0", "wt")) != nullptr) {
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/degrib2.cpp:1244:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (meta->unitName, unitName, unitLen);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/degrib2.cpp:1416:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char unitName[15];   /* Holds the string name of the current unit. */
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/degrib2.cpp:1463:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (c_ipack, sect0, SECT0LEN_WORD * 4);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/degrib2.cpp:1560:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (&gribLen, &(c_ipack[12]), sizeof (sInt4));
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/degrib2.cpp:1627:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((fp = fopen ("dump.is0", "wt")) != NULL) {
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/degrib2.cpp:1681:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (&(meta->gds), &newGds, sizeof (gdsType));
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/degrib2.h:63:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int ReadSECT0 (VSILFILE *fp, char **buff, uInt4 *buffLen, sInt4 limit,
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/engribapi.c:293:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(en->sec2, sec2, lenSec2);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/engribapi.c:1256:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(&(en->drsTmpl[7]), &missPri, sizeof(float));
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/engribapi.c:1257:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(&(en->drsTmpl[8]), &missSec, sizeof(float));
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/engribapi.c:1280:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(&(en->drsTmpl[7]), &missPri, sizeof(float));
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/engribapi.c:1281:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(&(en->drsTmpl[8]), &missSec, sizeof(float));
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/grib2api.c:1144:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(&f_temp, &(is5[11]), sizeof (float));
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/grib2api.c:1148:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(&(f_temp), &(is5[23]), sizeof (float));
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/grib2api.c:1151:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(&(f_temp), &(is5[27]), sizeof (float));
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/hazard.c:783:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buffer[400];    /* Temporary storage as we build up the phrase. */
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/hazard.c:788:10:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
         strcat (buffer, "<None>");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/hazard.c:793:16:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
               strcat (buffer, " Watch");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/hazard.c:796:16:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
               strcat (buffer, " Statement");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/hazard.c:799:16:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
               strcat (buffer, " Advisory");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/hazard.c:802:16:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
               strcat (buffer, " Warning");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/hazard.c:972:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buffer[100];
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/hazard.c:977:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy (buffer, "FW.W:2^RecHiPos");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/inventory.cpp:52:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buffer[4];
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/inventory.cpp:123:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char refTime[25];    /* Used to store the formatted reference time. */
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/inventory.cpp:124:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char validTime[25];  /* Used to store the formatted valid time. */
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/meta.h:145:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char *english[NUM_UGLY_WORD]; /* The English translation of ugly string. */
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/meta.h:179:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char *english[NUM_HAZARD_WORD]; /* The english translation of ugly string. */
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/meta.h:392:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char Member[11];          /* Octet 77-86 */
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/meta.h:458:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char Descriptor[33];      /* Plain language Descriptor. */
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/meta.h:574:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char refTime[20];         /* When forecast was issued. */
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/meta.h:575:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char validTime[20];       /* When forecast is valid. */
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaname.cpp:2766:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy (*unit, "[%]");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaname.cpp:3099:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy (*name, "ProbUnknown");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaname.cpp:3248:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy (*name, "unknown");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaname.cpp:3252:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy (*unit, "[-]");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaname.cpp:3294:10:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
         strcpy (*name, "AVGOZCON");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaname.cpp:3297:10:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
         strcpy (*comment, "Average Ozone Concentration");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaname.cpp:3300:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy (*unit, "[PPB]");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaname.cpp:3313:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                  strcpy (*name, "dusts");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaname.cpp:3315:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                  strcpy (*comment, "Surface level dust");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaname.cpp:3317:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                  strcpy (*unit, "[log10(10^-6g/m^3)]");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaname.cpp:3322:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                  strcpy (*name, "dustc");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaname.cpp:3324:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                  strcpy (*comment, "Average vertical column dust");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaname.cpp:3326:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                  strcpy (*unit, "[log10(10^-6g/m^3)]");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaname.cpp:3336:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                  strcpy (*name, "smokes");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaname.cpp:3338:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                  strcpy (*comment, "Surface level smoke from fires");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaname.cpp:3340:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                  strcpy (*unit, "[log10(10^-6g/m^3)]");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaname.cpp:3345:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                  strcpy (*name, "smokec");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaname.cpp:3347:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                  strcpy (*comment, "Average vertical column smoke from fires");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaname.cpp:3349:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                  strcpy (*unit, "[log10(10^-6g/m^3)]");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaname.cpp:3424:28:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                  *name = (char *) malloc (strlen (NDFD_Override[i].NDFDname) + 1);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaname.cpp:3426:31:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                  *comment = (char *) malloc (strlen (table[subcat].comment) + 1);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaname.cpp:3455:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            *name = (char *) malloc (strlen (table[subcat].name) + 1);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaname.cpp:3457:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            *comment = (char *) malloc (strlen (table[subcat].comment) + 1);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaname.cpp:3493:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
               *name = (char *) malloc (strlen (local[i].name) + 1);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaname.cpp:3495:28:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
               *comment = (char *) malloc (strlen (local[i].comment) + 1);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaname.cpp:3506:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy (*name, "unknown");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaname.cpp:3510:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy (*unit, "[-]");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaname.cpp:3800:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            strcpy (name, "[F]");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaname.cpp:3806:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            strcpy (name, "[C]");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaname.cpp:3814:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            strcpy (name, "[inch]");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaname.cpp:3827:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            strcpy (name, "[feet]");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaname.cpp:3835:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            strcpy (name, "[inch]");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaname.cpp:3843:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            strcpy (name, "[statute mile]");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaname.cpp:3855:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            strcpy (name, "[knots]");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaname.cpp:3863:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            strcpy (name, "[UVI]");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaname.cpp:3882:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy (name, "[GRIB2 unit]");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaname.cpp:4166:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char valBuff[512];
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaname.cpp:4167:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char sndBuff[512];
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaparse.cpp:1136:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(&fTemp, &nTemp, 4);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaparse.cpp:3239:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char format[20];
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaprint.cpp:254:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buffer[25];     /* Stores format of pds2->refTime. */
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaprint.cpp:311:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buffer[25];     /* Assists with labeling. */
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaprint.cpp:319:16:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
               sprintf (buffer, "Elem %3d  Is Used", (int) i);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaprint.cpp:321:16:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
               sprintf (buffer, "Elem %3d NOT Used", (int) i);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaprint.cpp:330:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf (buffer, "Element %d", (int) i);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaprint.cpp:616:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buffer[50];     /* Temp storage for various uses including time
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaprint.cpp:835:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
         sprintf (buffer, "%d, %d", sect4->lowerLimit.value,
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaprint.cpp:840:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
         sprintf (buffer, "%d, %d", sect4->upperLimit.value,
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaprint.cpp:891:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
         sprintf (buffer, "%d, %d", sect4->lowerLimit.value,
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaprint.cpp:896:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
         sprintf (buffer, "%d, %d", sect4->upperLimit.value,
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaprint.cpp:1035:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buffer[25];     /* Stores format of pds1->refTime. */
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaprint.cpp:1167:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buffer[50];     /* Temporary storage for info about scan flag. */
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/metaprint.cpp:1268:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf (buffer, "%d%d%d%d", ((gds->scan & GRIB2BIT_1) / GRIB2BIT_1),
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/myerror.c:89:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char bufpart[330];   /* Used for formatting the int / float options. */
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/myerror.c:90:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char format[20];     /* Used to store the % option. */
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/myerror.c:188:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy (buffer + ipos, bufpart, slen);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/myerror.c:196:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy (buffer + ipos, bufpart, slen);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/myerror.c:204:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy (buffer + ipos, bufpart, slen);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/myerror.c:212:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy (buffer + ipos, bufpart, slen);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/myerror.c:230:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy (buffer + ipos, sval, slen);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/myutil.c:558:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   if ((ifp = fopen (fileIn, "rb")) == NULL) {
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/myutil.c:564:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   if ((ofp = fopen (fileOut, "wb")) == NULL) {
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/myutil.c:1122:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buffer[5];      /* A temporary variable for parsing "is". */
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/myutil.c:1139:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   year = atoi (buffer);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/myutil.c:1142:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   mon = atoi (buffer);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/myutil.c:1144:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   day = atoi (buffer);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/myutil.c:1146:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   hour = atoi (buffer);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/myutil.c:1148:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   min = atoi (buffer);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/myutil.c:1150:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   sec = atoi (buffer);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/myutil.c:1212:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy (buffer, "  0.95");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/myutil.c:1218:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy (buffer, "0.95");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/myutil.c:1224:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy (buffer, "+0.95");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/myutil.c:1230:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy (buffer, "0.95,  ");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/myutil.c:1236:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy (buffer, "0.95,");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/myutil.c:1242:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy (buffer, "0.9.5");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/myutil.c:1248:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy (buffer, "  alph 0.9.5");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/myutil.c:1254:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy (buffer, "  ");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/myutil.c:1275:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy (buffer, "  here  ");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/myutil.c:1279:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy (buffer, "  here  ");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/tdlpack.cpp:337:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buffer[25];     /* Stores format of pds1->refTime. */
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/tdlpack.cpp:452:10:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
         strcpy (*unitName, "[-]");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/tdlpack.cpp:461:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy (*unitName, "[-]");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/tdlpack.cpp:1524:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buffer[24];     /* Read the trailing bytes in the TDLPack record. */
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/tdlpack.cpp:1539:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy (c_ipack, sect0, SECT0LEN_WORD * 2);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/tdlpack.cpp:1640:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy (&li_temp, c_ipack + curLoc, 4);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/tdlpack.cpp:3324:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy ((*lclGroup) + lclIndex, subGroup,
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/tdlpack.cpp:4103:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buffer[6];      /* Used to write reserved values */
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/tendian.cpp:157:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      return memcpy (Dst, Src, num_elem);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/tendian.h:39:22:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  #define MEMCPY_BIG memcpy
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/tendian.h:43:22:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  #define MEMCPY_LIT memcpy
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/weather.c:2187:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
         ugly->vis[word] = atoi (WxVisib[ugly->vis[word]].name);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/weather.c:2272:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buffer[400];    /* Temporary storage as we build up the phrase. */
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/weather.c:2636:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buffer[100];
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/weather.c:2638:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy (buffer, "Pds:R:+:<NoVis>:Mention^Ocnl:R:m:<NoVis>:^Sct:"
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/weather.c:2648:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy (buffer, "Sct:SW:-:<NoVis>:");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/weather.c:2651:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy (buffer, "Ocnl:R:-:<NoVis>:^Ocnl:S:-:<NoVis>:^SChc:ZR:-:<NoVis>:");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/weather.c:2654:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy (buffer, "Wide:FR:-:<NoVis>:OLA");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/weather.c:2657:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy (buffer, "<NoCov>:<NoWx>:<NoInten>:<NoVis>:");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/weather.c:2660:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy (buffer, "Sct:RW:-:<NoVis>:^Iso:T:m:<NoVis>:");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/degrib/weather.c:2663:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy (buffer, "Sct:T:+:<NoVis>:DmgW,LgA");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/dec_png.c:41:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(data,ptr+offset,length);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/enc_jpeg2000.c:103:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char opts[MAXOPTSSIZE];
data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/enc_jpeg2000.c:123:8:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
       strcat(opts,"\nnumgbits=4");
data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/enc_png.c:36:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
     memcpy(ptr+offset,data,length);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/g2_unpack7.c:135:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(lfld, cgrib+ipos, 4 * ndpts );
data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/g2_unpack7.c:162:28:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                  unsigned char temp[8];
data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/g2_unpack7.c:169:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(&d, temp, 8);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/g2_unpack7.c:178:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(&d, src + i * 8, 8);
data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/pack_gp.c:41:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cfeed[1];
data/gdal-3.2.0+dfsg/frmts/grib/degrib/g2clib/reduce.c:35:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cfeed[1];
data/gdal-3.2.0+dfsg/frmts/grib/gribcreatecopy.cpp:903:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&fRefValue, &idrstmpl[TMPL5_R_IDX], 4);
data/gdal-3.2.0+dfsg/frmts/grib/gribcreatecopy.cpp:1091:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&idrstmpl[TMPL5_PRIMARY_MISSING_VALUE_IDX], &fNoData, 4);
data/gdal-3.2.0+dfsg/frmts/grib/gribcreatecopy.cpp:1114:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&fRefValue, &idrstmpl[TMPL5_R_IDX], 4);
data/gdal-3.2.0+dfsg/frmts/grib/gribcreatecopy.cpp:1270:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szDataPointer[32];
data/gdal-3.2.0+dfsg/frmts/grib/gribcreatecopy.cpp:1576:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    int nCompressionRatio = atoi(GetBandOption(papszOptions,
data/gdal-3.2.0+dfsg/frmts/grib/gribcreatecopy.cpp:1842:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    m_nBits = std::max(0, atoi(pszBits));
data/gdal-3.2.0+dfsg/frmts/grib/gribcreatecopy.cpp:1854:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        m_nDecimalScaleFactor = atoi(pszDecimalScaleFactor);
data/gdal-3.2.0+dfsg/frmts/grib/gribcreatecopy.cpp:1876:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            m_nDecimalScaleFactor = atoi(pszDecimalScaleFactor);
data/gdal-3.2.0+dfsg/frmts/grib/gribcreatecopy.cpp:1906:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            pszSpatialDifferencingOrder ? atoi(pszSpatialDifferencingOrder) : 0;
data/gdal-3.2.0+dfsg/frmts/grib/gribcreatecopy.cpp:1964:44:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    GUInt16 nCenter = static_cast<GUInt16>(atoi(GetIDSOption(
data/gdal-3.2.0+dfsg/frmts/grib/gribcreatecopy.cpp:1969:47:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    GUInt16 nSubCenter = static_cast<GUInt16>(atoi(GetIDSOption(
data/gdal-3.2.0+dfsg/frmts/grib/gribcreatecopy.cpp:1974:45:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    GByte nMasterTable = static_cast<GByte>(atoi(GetIDSOption(
data/gdal-3.2.0+dfsg/frmts/grib/gribcreatecopy.cpp:1981:46:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    GByte nSignfRefTime = static_cast<GByte>(atoi(GetIDSOption(
data/gdal-3.2.0+dfsg/frmts/grib/gribcreatecopy.cpp:1997:44:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    GByte nProdStatus = static_cast<GByte>(atoi(GetIDSOption(
data/gdal-3.2.0+dfsg/frmts/grib/gribcreatecopy.cpp:2002:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    GByte nType = static_cast<GByte>(atoi(GetIDSOption(
data/gdal-3.2.0+dfsg/frmts/grib/gribcreatecopy.cpp:2023:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        const int nVal = atoi(papszTokens[i]);
data/gdal-3.2.0+dfsg/frmts/grib/gribcreatecopy.cpp:2094:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            WriteInt32(fp, atoi(papszTokens[i]));
data/gdal-3.2.0+dfsg/frmts/grib/gribcreatecopy.cpp:2113:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    if( nTokens >= 2 && atoi(papszTokens[0]) == 0 )
data/gdal-3.2.0+dfsg/frmts/grib/gribcreatecopy.cpp:2117:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        int nParamNumber = atoi(papszTokens[1]);
data/gdal-3.2.0+dfsg/frmts/grib/gribcreatecopy.cpp:2157:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    int nPDTN = atoi(GetBandOption(
data/gdal-3.2.0+dfsg/frmts/grib/gribcreatecopy.cpp:2229:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            int nVal = atoi(papszTokens[i]);
data/gdal-3.2.0+dfsg/frmts/grib/gribcreatecopy.cpp:2479:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            int nDiscipline = atoi(GetBandOption(
data/gdal-3.2.0+dfsg/frmts/grib/gribdataset.cpp:196:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&nSectSize, abyHead, 4);
data/gdal-3.2.0+dfsg/frmts/grib/gribdataset.cpp:202:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(pabyBody, abyHead, 5);
data/gdal-3.2.0+dfsg/frmts/grib/gribdataset.cpp:329:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&nSectSize, abyHead, 4);
data/gdal-3.2.0+dfsg/frmts/grib/gribdataset.cpp:369:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&nSectSize, abyHead, 4);
data/gdal-3.2.0+dfsg/frmts/grib/gribdataset.cpp:392:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&nSectSize, abyHead, 4);
data/gdal-3.2.0+dfsg/frmts/grib/gribdataset.cpp:398:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(pabyBody, abyHead, 5);
data/gdal-3.2.0+dfsg/frmts/grib/gribdataset.cpp:408:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&nCoordCount, pabyBody + 6-1, 2);
data/gdal-3.2.0+dfsg/frmts/grib/gribdataset.cpp:412:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&nPDTN, pabyBody + 8-1, 2);
data/gdal-3.2.0+dfsg/frmts/grib/gribdataset.cpp:424:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char szByte[10] = { '\0' };
data/gdal-3.2.0+dfsg/frmts/grib/gribdataset.cpp:543:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&nSectSize, abyHead, 4);
data/gdal-3.2.0+dfsg/frmts/grib/gribdataset.cpp:555:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&nSectSize, abyHead, 4);
data/gdal-3.2.0+dfsg/frmts/grib/gribdataset.cpp:561:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(pabyBody, abyHead, 5);
data/gdal-3.2.0+dfsg/frmts/grib/gribdataset.cpp:565:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&nDRTN, pabyBody + 10-1, 2);
data/gdal-3.2.0+dfsg/frmts/grib/gribdataset.cpp:578:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&fRef, pabyBody + 12 - 1, 4);
data/gdal-3.2.0+dfsg/frmts/grib/gribdataset.cpp:585:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&nBinaryScaleFactorUnsigned, pabyBody + 16 - 1, 2);
data/gdal-3.2.0+dfsg/frmts/grib/gribdataset.cpp:594:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&nDecimalScaleFactorUnsigned, pabyBody + 18 - 1, 2);
data/gdal-3.2.0+dfsg/frmts/grib/gribdataset.cpp:618:25:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                        memcpy(&fTemp, &pabyBody[24-1], 4);
data/gdal-3.2.0+dfsg/frmts/grib/gribdataset.cpp:624:29:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                            memcpy(&fTemp, &pabyBody[28-1], 4);
data/gdal-3.2.0+dfsg/frmts/grib/gribdataset.cpp:632:25:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                        memcpy(&iTemp, &pabyBody[24-1], 4);
data/gdal-3.2.0+dfsg/frmts/grib/gribdataset.cpp:638:29:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                            memcpy(&iTemp, &pabyBody[28-1], 4);
data/gdal-3.2.0+dfsg/frmts/grib/gribdataset.cpp:815:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pImage,
data/gdal-3.2.0+dfsg/frmts/grib/gribdataset.cpp:829:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pImage,
data/gdal-3.2.0+dfsg/frmts/grib/gribdataset.cpp:980:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        static_cast<GIntBig>(atoi(CPLGetConfigOption("GRIB_CACHEMAX", "100")))
data/gdal-3.2.0+dfsg/frmts/grib/gribdataset.cpp:1012:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(padfTransform, adfGeoTransform, sizeof(double) * 6);
data/gdal-3.2.0+dfsg/frmts/grib/gribdataset.cpp:1612:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(&m_abyNoData[0], &dfNoData, sizeof(double));
data/gdal-3.2.0+dfsg/frmts/grib/gribdataset.cpp:1757:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&m_adfCurData[0], data, static_cast<size_t>(nx) * ny * sizeof(double));
data/gdal-3.2.0+dfsg/frmts/grib/gribdataset.cpp:1795:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(pabyDstPtr, srcPtr, count[X_IDX] * sizeof(double));
data/gdal-3.2.0+dfsg/frmts/grib/gribdataset.cpp:1837:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(pabyDstPtr, srcPtr, count[X_IDX] * sizeof(double));
data/gdal-3.2.0+dfsg/frmts/gsg/gsagdataset.cpp:64:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char         szEOL[3];
data/gdal-3.2.0+dfsg/frmts/gsg/gsagdataset.cpp:846:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szEOL[3];
data/gdal-3.2.0+dfsg/frmts/gta/gtadataset.cpp:148:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int open( const char *pszFilename, const char *pszMode )
data/gdal-3.2.0+dfsg/frmts/gta/gtadataset.cpp:442:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            nCatCount = atoi( pszCatCount );
data/gdal-3.2.0+dfsg/frmts/gta/gtadataset.cpp:723:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( (void *) pDst, (void *) pSrc, sComponentSize );
data/gdal-3.2.0+dfsg/frmts/gta/gtadataset.cpp:758:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( (void *) pDst, (void *) pSrc, sComponentSize );
data/gdal-3.2.0+dfsg/frmts/gta/gtadataset.cpp:911:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( padfTransform, adfGeoTransform, 6*sizeof(double) );
data/gdal-3.2.0+dfsg/frmts/gta/gtadataset.cpp:1015:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if( poDS->oGTAIO.open( poOpenInfo->pszFilename,
data/gdal-3.2.0+dfsg/frmts/gta/gtadataset.cpp:1128:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        poDS->nGCPs = atoi( poDS->oHeader.global_taglist().get("GDAL/GCP_COUNT") );
data/gdal-3.2.0+dfsg/frmts/gta/gtadataset.cpp:1150:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char pszGCPTagName[64];
data/gdal-3.2.0+dfsg/frmts/gta/gtadataset.cpp:1151:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char pszGCPInfoTagName[64];
data/gdal-3.2.0+dfsg/frmts/gta/gtadataset.cpp:1455:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char pszGCPTagName[64];
data/gdal-3.2.0+dfsg/frmts/gta/gtadataset.cpp:1456:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char pszGCPInfoTagName[64];
data/gdal-3.2.0+dfsg/frmts/gta/gtadataset.cpp:1601:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if( oGTAIO.open( pszFilename, "w" ) != 0 )
data/gdal-3.2.0+dfsg/frmts/gtiff/cogdriver.cpp:185:41:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    const int nEPSGCode = pszAuthCode ? atoi(pszAuthCode) : 0;
data/gdal-3.2.0+dfsg/frmts/gtiff/cogdriver.cpp:260:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        const int nBlockSize = atoi(CSLFetchNameValueDef(
data/gdal-3.2.0+dfsg/frmts/gtiff/cogdriver.cpp:310:48:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        nAlignedLevels = std::min(std::min(10, atoi(
data/gdal-3.2.0+dfsg/frmts/gtiff/cogdriver.cpp:771:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    const int nOvrThresholdSize = atoi(osBlockSize);
data/gdal-3.2.0+dfsg/frmts/gtiff/cogdriver.cpp:950:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        if( pszQuality && atoi(pszQuality) == 100 )
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:193:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        int nOvrBlockSize = atoi(pszVal);
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:725:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(m_pabyJPEGTable, pJPEGTable, m_nJPEGTableSize);
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:728:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( m_pabyJPEGTable + m_nJPEGTableSize, abyAdobeAPP14RGB,
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:910:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(pabyBuffer, m_poGDS->m_pabyJPEGTable, m_poGDS->m_nJPEGTableSize);
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:2275:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pTempBuffer, pabySrcData + nOffset, nPixels * nDTSize);
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:2295:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pabyDstBuffer, pabySrcData + nOffset, nPixels * nDTSize);
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:3975:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:4065:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(abyTrailer,strileData + nStrileSize, 4);
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:4068:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(abyLastBytes, strileData + nStrileSize - 4, 4);
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:4074:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(abyLastBytes, strileData, static_cast<size_t>(nStrileSize));
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:4360:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            atoi(CPLGetConfigOption("GDAL_MAX_RAW_BLOCK_CACHE_SIZE",
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:5546:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy( pasNewExtraSamples, v + count - nNewExtraSamplesCount,
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:5589:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy( pasNewExtraSamples + nNewExtraSamplesCount - count,
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:5651:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy( pasNewExtraSamples, v, count * sizeof(uint16) );
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:6542:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&fVal, &iFloat32, 4);
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:7893:25:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                        memcpy(abyHeader + i, szNewKey, strlen(szNewKey));
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:8598:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(m_pabyTempWriteBuffer, pabyData, cc);
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:8629:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy( pabyData + (static_cast<GPtrDiff_t>(m_nBlockXSize) * iY + iX) * nComponents,
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:8639:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy( pabyData + static_cast<GPtrDiff_t>(m_nBlockXSize) * nComponents * iY,
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:8748:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(m_pabyTempWriteBuffer, pabyData, cc);
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:8813:61:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            EQUAL(pszValue, "ALL_CPUS") ? CPLGetNumCPUs() : atoi(pszValue);
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:9149:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(abyLastBytes, pabyCompressedBuffer + nCompressedBufferSize - 4, 4);
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:9151:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(abyLastBytes, pabyCompressedBuffer, nCompressedBufferSize);
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:9274:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(sJob.pabyBuffer, pabyData, cc);
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:9335:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(psJob->pabyBuffer, pabyData, cc);
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:10110:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(poODS->m_anLercAddCompressionAndVersion, m_anLercAddCompressionAndVersion,
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:10239:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( panExtraSampleValuesNew, panExtraSampleValues,
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:10282:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                atoi(CPLGetConfigOption("JPEG_QUALITY_OVERVIEW","75"));
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:10289:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                atoi(CPLGetConfigOption("WEBP_LEVEL_OVERVIEW","75"));
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:10594:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( panExtraSampleValuesNew, panExtraSampleValues,
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:10682:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                    atoi(CPLGetConfigOption("JPEG_QUALITY_OVERVIEW","75"));
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:10689:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                    atoi(CPLGetConfigOption("WEBP_LEVEL_OVERVIEW","75"));
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:11234:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char szBandId[32] = {};
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:11345:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                    int v = atoi(pszItemValue);
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:11375:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                      atoi(pszItemValue) );
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:11681:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char szValue[128] = {};
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:11952:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( adfRPCTag + 12, sRPC.adfLINE_NUM_COEFF, sizeof(double) * 20 );
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:11953:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( adfRPCTag + 32, sRPC.adfLINE_DEN_COEFF, sizeof(double) * 20 );
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:11954:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( adfRPCTag + 52, sRPC.adfSAMP_NUM_COEFF, sizeof(double) * 20 );
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:11955:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( adfRPCTag + 72, sRPC.adfSAMP_DEN_COEFF, sizeof(double) * 20 );
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:12303:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&nTmp, pabyBuffer + 8, 8);
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:12313:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&nTmp, pabyBuffer + 16, 8);
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:12337:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&nTmp16, pabyBuffer + 24 + i * 20, 2);
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:12340:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&nTmp16, pabyBuffer + 24 + i * 20 + 2, 2);
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:12343:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&nTmp, pabyBuffer + 24 + i * 20 + 4, 8);
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:12360:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&nTmp, pabyBuffer + 24 + i * 20 + 12, 8);
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:12378:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&nTmp, pabyBuffer + 4, 4);
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:12389:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&nTmp16, pabyBuffer + 8, 2);
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:12412:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&nTmp16, pabyBuffer + 10 + i * 12, 2);
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:12415:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&nTmp16, pabyBuffer + 10 + i * 12 + 2, 2);
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:12418:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&nTmp, pabyBuffer + 10 + i * 12 + 4, 4);
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:12433:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&nTmp, pabyBuffer + 10 + i * 12 + 8, 4);
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:12908:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char csUnitStr[128];
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:12946:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(m_adfGeoTransform, adfPamGeoTransform, sizeof(double) * 6);
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:13027:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            pszTIFFTagYRes && atoi(pszTIFFTagResUnit) == 2 )
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:13170:22:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    toff_t nOffset = atol(pszFilename);
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:13653:45:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                        static_cast<uint16>(atoi(papszTokensRed[i]));
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:13655:45:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                        static_cast<uint16>(atoi(papszTokensGreen[i]));
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:13657:45:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                        static_cast<uint16>(atoi(papszTokensBlue[i]));
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:13703:55:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                pTXR[i + j * 2] = static_cast<uint16>(atoi(papszTokens[j]));
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:13908:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char szMessage[1024] = {};
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:14198:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szWorkMDI[200] = {};
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:14267:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(pszXMP, pData, nTagSize);
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:14270:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char *apszMDList[2] = { pszXMP, nullptr };
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:14481:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                atoi(CPLGetXMLValue( psItem, "sample", "-1" ));
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:14504:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                    char *apszMD[2] = { pszUnescapedValue, nullptr };
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:14546:29:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                            char *apszMD[2] = { pszUnescapedValue, nullptr };
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:14619:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        atoi(CPLGetConfigOption("GDAL_READDIR_LIMIT_ON_OPEN", "1000"));
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:14923:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char szID[32] = {};
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:15267:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                            atoi(CPLGetXMLValue( psItem, "sample", "-1" ));
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:15354:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        nLZMAPreset = atoi( pszValue );
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:15372:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        nZSTDLevel = atoi( pszValue );
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:15397:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        nWebPLevel = atoi( pszValue );
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:15420:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        nZLevel = atoi( pszValue );
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:15453:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        nJpegQuality = atoi( pszValue );
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:15468:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        atoi(CSLFetchNameValueDef( papszOptions, "JPEGTABLESMODE",
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:15503:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            int nBits = atoi(papszTokens[nTokens == 1 ? 0 : i]);
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:15594:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        l_nBlockXSize = atoi( pszValue );
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:15607:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        l_nBlockYSize = atoi( pszValue );
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:15660:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        nPredictor = atoi( pszValue );
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:15846:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szOpeningFlag[5] = {};
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:15893:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        l_nBitsPerSample = atoi(CSLFetchNameValue(papszParmList, "NBITS"));
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:16376:53:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        const int l_nJpegQuality = pszJPEGQuality ? atoi(pszJPEGQuality) : 0;
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:17142:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        && atoi(poPBand->GetMetadataItem( "NBITS", "IMAGE_STRUCTURE" )) > 0
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:17411:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy( pasNewExtraSamples, v, count * sizeof(uint16) );
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:18740:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( padfTransform, m_adfGeoTransform, sizeof(double) * 6 );
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:18803:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy( m_adfGeoTransform, padfTransform, sizeof(double)*6 );
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:18807:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( m_adfGeoTransform, padfTransform, sizeof(double)*6 );
data/gdal-3.2.0+dfsg/frmts/gtiff/geotiff.cpp:19193:40:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                    const int nLenMD = atoi(pszStructuralMD +
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_citation.cpp:252:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[512] = { '\0' };
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_citation.cpp:600:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szCTString[512] = { '\0' };
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_citation.cpp:603:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char units[32] = { '\0' };
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_citation.cpp:615:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            strcpy(units, "us_survey_feet");
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_citation.cpp:619:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            strcpy(units, "international_feet");
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_citation.cpp:621:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            strcpy(units, "meters");
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_citation.cpp:687:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                strcpy(units, "us_survey_feet");
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_citation.cpp:689:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                strcpy(units, "international_feet");
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_citation.cpp:691:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                strcpy(units, "meters");
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_citation.cpp:697:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(units, "meters");
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_citation.cpp:716:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            int statePlaneZone = abs(atoi(pStr));
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_citation.cpp:717:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char nad[32];
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_citation.cpp:718:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            strcpy(nad, "HARN");
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_citation.cpp:720:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                strcpy(nad, "NAD83");
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_citation.cpp:723:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                strcpy(nad, "NAD27");
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_citation.cpp:758:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char datumName[128] = { '\0' };
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_citation.cpp:783:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char utmName[64] = { '\0' };
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_citation.cpp:815:41:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                if( psDefn->ProjCode != atoi(apszUtmProjCode[i+2]) )
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_citation.cpp:818:45:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                        static_cast<short>( atoi(apszUtmProjCode[i+2]) );
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_jpeg_copy.cpp:283:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        atoi(CSLFetchNameValueDef(papszCreateOptions, "BLOCKXSIZE", "0"));
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_jpeg_copy.cpp:285:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        atoi(CSLFetchNameValueDef(papszCreateOptions, "BLOCKYSIZE", "0"));
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_jpeg_copy.cpp:359:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[JMSG_LENGTH_MAX] = { '\0' };
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_jpeg_copy.cpp:380:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szTmpFilename[128] = { '\0' };
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_jpeg_copy.cpp:710:25:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                        memcpy( dst_buffer[offset_y],
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_jpeg_copy.cpp:737:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(dst_buffer[offset_y],
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_overview.cpp:178:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        const int nWebpLevel = atoi(pszWebpLevel);
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_overview.cpp:430:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                atoi(hBand->GetMetadataItem("NBITS", "IMAGE_STRUCTURE"));
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_overview.cpp:668:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            nPredictor = atoi( pszPredictor );
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_overview.cpp:979:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        const int nJpegQuality = atoi(pszJPEGQuality);
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_overview.cpp:990:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        const int nWebpLevel = atoi(pszWebpLevel);
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_overview.cpp:1004:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        const int nJpegTablesMode = atoi(pszJPEGTablesMode);
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_overview.cpp:1018:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( panOverviewListSorted, panOverviewList, sizeof(int) * nOverviews);
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_wkt_srs.cpp:340:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char szPeStr[2400] = { '\0' };
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_wkt_srs.cpp:365:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char szPCSName[300] = { '\0' };
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_wkt_srs.cpp:374:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                strcpy( szPCSName, "unnamed" );
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_wkt_srs.cpp:396:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                    char szUOMLength[12];
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_wkt_srs.cpp:417:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char szName[300] = { '\0' };
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_wkt_srs.cpp:419:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy( szName, "unnamed" );
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_wkt_srs.cpp:441:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char szUOMLength[12];
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_wkt_srs.cpp:515:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char szCTString[512] = { '\0' };
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_wkt_srs.cpp:659:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szGCSName[512] = { '\0' };
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_wkt_srs.cpp:822:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                        atoi(pszTmpCode) == atoi(pszTmpVertCode) )
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_wkt_srs.cpp:822:45:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                        atoi(pszTmpCode) == atoi(pszTmpVertCode) )
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_wkt_srs.cpp:869:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char szUOMLength[12];
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_wkt_srs.cpp:1242:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char citation[2048] = { '\0' };
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_wkt_srs.cpp:1248:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            strcpy( citation, "unknown" );
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_wkt_srs.cpp:1273:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char szCTString[512];
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_wkt_srs.cpp:1321:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char szCode[12];
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_wkt_srs.cpp:1351:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char szCode[12];
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_wkt_srs.cpp:1363:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char szInMeters[128] = {};
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_wkt_srs.cpp:1481:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                            nReturn = atoi(pszCode);
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_wkt_srs.cpp:1568:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            atoi(poSRS->GetAuthorityCode("PROJCS|GEOGCS|DATUM|SPHEROID")) );
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_wkt_srs.cpp:1574:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            atoi(poSRS->GetAuthorityCode("GEOGCS|DATUM|SPHEROID")) );
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_wkt_srs.cpp:1598:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        nDatum = atoi(poSRS->GetAuthorityCode("PROJCS|GEOGCS|DATUM"));
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_wkt_srs.cpp:1601:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        nDatum = atoi(poSRS->GetAuthorityCode("GEOGCS|DATUM"));
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_wkt_srs.cpp:1613:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        nGCS = atoi(poSRS->GetAuthorityCode("PROJCS|GEOGCS"));
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_wkt_srs.cpp:1616:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        nGCS = atoi(poSRS->GetAuthorityCode("GEOGCS"));
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_wkt_srs.cpp:1664:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                            nGCS = atoi(pszCode);
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_wkt_srs.cpp:1710:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        nUOMLengthCode = atoi(poSRS->GetAuthorityCode("PROJCS|UNIT"));
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_wkt_srs.cpp:1729:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        nPCS = atoi(poSRS->GetAuthorityCode("PROJCS"));
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_wkt_srs.cpp:2570:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            strcpy(outPeStr, "ESRI PE String = ");
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_wkt_srs.cpp:2822:40:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            if( oRefSRS.importFromEPSG(atoi(pszAuthCode)) == OGRERR_NONE )
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_wkt_srs.cpp:2864:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        if( pszValue && atoi(pszValue) )
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_wkt_srs.cpp:2868:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                        atoi(pszValue) );
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_wkt_srs.cpp:2877:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            if( pszValue && atoi(pszValue) )
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_wkt_srs.cpp:2879:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                            atoi(pszValue) );
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_wkt_srs.cpp:2882:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            if( pszValue && atoi(pszValue) )
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_wkt_srs.cpp:2884:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                            atoi(pszValue) );
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_wkt_srs.cpp:2925:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szFilename[100] = {};
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_wkt_srs.cpp:3044:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char szID[32] = {};
data/gdal-3.2.0+dfsg/frmts/gtiff/gt_wkt_srs.cpp:3109:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szFilename[100] = {};
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_get.c:173:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
           ((char *)val)[count-1] = '\0'; /* replace last char with NULL */
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_keyp.h:116:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char        szTmpBufferForGTIFValueNameEx[160];
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_names.c:49:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char errmsg[80];
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_names.c:55:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	   sprintf(errmsg,"Unknown-%d", key );
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_names.c:82:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(gtif->szTmpBufferForGTIFValueNameEx,"Unknown-%d", key );
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_names.c:153:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(pszOut, pszName, nToCopy);
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_names.c:197:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(gtif->szTmpBufferForGTIFValueNameEx,"Unknown-%d", value );
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_names.c:209:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char szCode[12];
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_names.c:210:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char szName[120];
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_names.c:213:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(szCode, "%d", value);
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_new.c:129:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( &gt->gt_methods, methods, sizeof(TIFFMethod) );
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_new.c:270:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&keyptr->gk_data, &(entptr->ent_val_offset), sizeof(pinfo_t));
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_normalize.c:118:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pnVal, &sVal, 2);
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_normalize.c:158:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char szEPSGName[64];
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_normalize.c:181:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char szCode[12];
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_normalize.c:184:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(szCode, "%d", nPCSCode);
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_normalize.c:224:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                *pnProjOp = (short) atoi(pszConvCode);
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_normalize.c:256:44:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                *pnUOMLengthCode = (short) atoi(pszUnitCode);
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_normalize.c:274:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                *pnGeogCS = (short) atoi(pszGeodCode);
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_normalize.c:312:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char	szAngleString[32];
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_normalize.c:314:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf( szAngleString, "%12.7f", dfAngle );
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_normalize.c:344:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        dfAngle = ABS(atoi(pszAngle));
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_normalize.c:348:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char	szMinutes[3];
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_normalize.c:349:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char	szSeconds[64];
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_normalize.c:358:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            dfAngle += atoi(szMinutes) / 60.0;
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_normalize.c:474:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char szCode[12];
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_normalize.c:477:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(szCode, "%d", nGCSCode);
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_normalize.c:521:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                *pnDatum = (short) atoi(pszDatumCode);
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_normalize.c:539:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                *pnPM = (short) atoi(pszPMCode);
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_normalize.c:571:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                *pnUOMAngle = (short) atoi(pszUnitCode);
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_normalize.c:664:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char szCode[12];
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_normalize.c:667:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(szCode, "%d", nEllipseCode);
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_normalize.c:740:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char szCode[12];
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_normalize.c:743:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(szCode, "%d", nPMCode);
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_normalize.c:842:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char szCode[12];
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_normalize.c:845:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(szCode, "%d", nDatumCode);
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_normalize.c:884:40:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                *pnEllipsoid = (short) atoi(pszEllipsoidCode);
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_normalize.c:961:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char szCode[12];
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_normalize.c:964:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(szCode, "%d", nUOMLengthCode);
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_normalize.c:1070:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char szCode[12];
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_normalize.c:1074:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(szCode, "%d", nUOMAngleCode);
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_normalize.c:1444:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char szProjTRFName[64];
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_normalize.c:1445:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(szProjTRFName, "UTM zone %d%c",
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_normalize.c:1473:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char    szCode[12];
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_normalize.c:1478:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(szCode, "%d", nProjTRFCode);
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_normalize.c:1498:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        nProjMethod = atoi(pszMethodCode);
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_normalize.c:1553:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                if( atoi(pszParamCode) == nEPSGCode )
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_normalize.c:1594:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                    if( atoi(pszParamCode) == nEPSGCode )
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_normalize.c:2709:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	szFormat[30];
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_normalize.c:2710:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char szBuffer[50];
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_print.c:63:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char message[1024];
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_print.c:113:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char message[1024];
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_print.c:117:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(message," (%d,%d):\n",nrows,ncols);
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_print.c:144:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char message[40];
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_print.c:169:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
              char ch = ((char *) data)[in_char++];
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_print.c:238:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(message, "Unknown Type (%d)\n",key->gk_type);
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_print.c:269:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char message[1024];
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_print.c:309:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tagname[100];
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_print.c:312:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char message[1024];
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_print.c:360:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[1000];
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_print.c:361:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char type[20];
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_print.c:365:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char message[2048];
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_simpletags.c:215:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy( st->key_list[i].data, data, count * item_size );
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_simpletags.c:231:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( st->key_list[st->key_count-1].data, data, item_size * count );
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geo_write.c:144:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&(entptr->ent_val_offset), &keyptr->gk_data, sizeof(pinfo_t));
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geotiff_proj4.c:49:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat( pszProjection, "+ellps=WGS84 " );
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geotiff_proj4.c:51:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat( pszProjection, "+ellps=clrk66 " );
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geotiff_proj4.c:53:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat( pszProjection, "+ellps=clrk80 " );
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geotiff_proj4.c:55:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat( pszProjection, "+ellps=GRS80 " );
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geotiff_proj4.c:60:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf( pszProjection+strlen(pszProjection),
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geotiff_proj4.c:108:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                        char szAsBoolean[100];
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geotiff_proj4.c:111:25:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
                        strcat( szAsBoolean,"=yes" );
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geotiff_proj4.c:876:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	szProjection[512];
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geotiff_proj4.c:877:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	szUnits[64];
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geotiff_proj4.c:894:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy( szUnits, "+units=m " );
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geotiff_proj4.c:898:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy( szUnits, "+units=ft " );
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geotiff_proj4.c:902:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy( szUnits, "+units=us-ft " );
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geotiff_proj4.c:906:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy( szUnits, "+units=ind-ft " );
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geotiff_proj4.c:910:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy( szUnits, "+units=link " );
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geotiff_proj4.c:914:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy( szUnits, "+units=ind-yd " );
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geotiff_proj4.c:918:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy( szUnits, "+units=fath " );
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geotiff_proj4.c:922:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy( szUnits, "+units=kmi " );
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geotiff_proj4.c:926:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf( szUnits, "+to_meter=%.10f", psDefn->UOMLengthInMeters );
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geotiff_proj4.c:945:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(szProjection+strlen(szProjection),"+proj=latlong ");
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geotiff_proj4.c:954:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf( szProjection+strlen(szProjection),
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geotiff_proj4.c:964:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf( szProjection+strlen(szProjection),
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geotiff_proj4.c:978:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf( szProjection+strlen(szProjection),
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geotiff_proj4.c:994:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf( szProjection+strlen(szProjection),
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geotiff_proj4.c:1001:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf( szProjection+strlen(szProjection),
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geotiff_proj4.c:1015:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf( szProjection+strlen(szProjection),
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geotiff_proj4.c:1029:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf( szProjection+strlen(szProjection),
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geotiff_proj4.c:1043:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf( szProjection+strlen(szProjection),
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geotiff_proj4.c:1057:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf( szProjection+strlen(szProjection),
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geotiff_proj4.c:1066:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf( szProjection+strlen(szProjection),
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geotiff_proj4.c:1081:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf( szProjection+strlen(szProjection),
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geotiff_proj4.c:1095:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf( szProjection+strlen(szProjection),
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geotiff_proj4.c:1108:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf( szProjection+strlen(szProjection),
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geotiff_proj4.c:1121:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf( szProjection+strlen(szProjection),
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geotiff_proj4.c:1134:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf( szProjection+strlen(szProjection),
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geotiff_proj4.c:1147:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf( szProjection+strlen(szProjection),
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geotiff_proj4.c:1160:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf( szProjection+strlen(szProjection),
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geotiff_proj4.c:1173:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf( szProjection+strlen(szProjection),
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geotiff_proj4.c:1189:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf( szProjection+strlen(szProjection),
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geotiff_proj4.c:1205:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf( szProjection+strlen(szProjection),
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geotiff_proj4.c:1217:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf( szProjection+strlen(szProjection),
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geotiff_proj4.c:1229:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf( szProjection+strlen(szProjection),
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geotiff_proj4.c:1241:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf( szProjection+strlen(szProjection),
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geotiff_proj4.c:1257:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf( szProjection+strlen(szProjection),
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geotiff_proj4.c:1273:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf( szProjection+strlen(szProjection),
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geotiff_proj4.c:1287:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf( szProjection+strlen(szProjection),
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geotiff_proj4.c:1313:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf( szProjection+strlen(szProjection),
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geotiff_proj4.c:1330:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf( szProjection+strlen(szProjection),
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geotiff_proj4.c:1341:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf( szProjection+strlen(szProjection),
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geotiff_proj4.c:1383:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        szLongLat[256];
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geotiff_proj4.c:1399:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(szLongLat, "+proj=longlat ");
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geotiff_proj4.c:1445:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        szLongLat[256];
data/gdal-3.2.0+dfsg/frmts/gtiff/libgeotiff/geotiff_proj4.c:1461:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(szLongLat, "+proj=longlat ");
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_codec.c:115:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char compression_code[20];
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_codec.c:117:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(compression_code, "%d",tif->tif_dir.td_compression );
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_dirread.c:4169:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(new_sampleinfo, tif->tif_dir.td_sampleinfo, old_extrasamples * sizeof(uint16));
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_dirread.c:5744:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			max_nstrips = (uint32) atoi(pszMax);
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_dirread.c:6097:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buffer[2 * IO_CACHE_PAGE_SIZE];
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_dirwrite.c:3394:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( &entry_tag, direntry_raw + 0, sizeof(uint16) );
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_dirwrite.c:3415:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( &entry_type, direntry_raw + 2, sizeof(uint16) );
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_dirwrite.c:3423:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( &value, direntry_raw + 4, sizeof(uint32) );
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_dirwrite.c:3428:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( &value, direntry_raw + 8, sizeof(uint32) );
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_dirwrite.c:3435:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( &entry_count, direntry_raw + 4, sizeof(uint64) );
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_dirwrite.c:3439:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( &entry_offset, direntry_raw + 12, sizeof(uint64) );
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_dirwrite.c:3532:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( buf_to_write, data, count * TIFFDataWidth(datatype) );
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_dirwrite.c:3680:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( &entry_offset, buf_to_write, count*TIFFDataWidth(datatype));
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_dirwrite.c:3691:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( direntry_raw + 2, &entry_type, sizeof(uint16) );
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_dirwrite.c:3700:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( direntry_raw + 4, &value, sizeof(uint32) );
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_dirwrite.c:3705:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( direntry_raw + 8, &value, sizeof(uint32) );
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_dirwrite.c:3711:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( direntry_raw + 4, &entry_count, sizeof(uint64) );
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_dirwrite.c:3715:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( direntry_raw + 12, &entry_offset, sizeof(uint64) );
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_fax3.c:814:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char zeroruns[256] = {
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_fax3.c:832:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char oneruns[256] = {
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_getimage.c:74:28:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
TIFFRGBAImageOK(TIFF* tif, char emsg[1024])
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_getimage.c:81:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(emsg, "Sorry, requested compression method is not configured");
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_getimage.c:92:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(emsg, "Sorry, can not handle images with %d-bit samples",
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_getimage.c:97:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(emsg, "Sorry, can not handle images with IEEE floating-point samples");
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_getimage.c:265:61:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
TIFFRGBAImageBegin(TIFFRGBAImage* img, TIFF* tif, int stop, char emsg[1024])
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_getimage.c:304:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(emsg, "Sorry, can not handle images with %d-bit samples",
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_getimage.c:362:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(emsg, "Missing required \"Colormap\" tag");
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_getimage.c:372:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(emsg, "Out of memory for colormap copy");
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_getimage.c:483:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(emsg, "Sorry, can not handle image");
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_getimage.c:488:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(emsg, "Sorry, can not handle image");
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_getimage.c:523:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char emsg[1024] = "";
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_getimage.c:2899:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char 	emsg[1024] = "";
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_getimage.c:2957:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char 	emsg[1024] = "";
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_jpeg.c:220:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[JMSG_LENGTH_MAX];
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_jpeg.c:236:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[JMSG_LENGTH_MAX];
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_jpeg.c:386:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            sp->max_allowed_scan_number = atoi(sz_max_allowed_scan_number);
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_jpeg.c:1458:59:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                               ((unsigned char *) buf)[iValue] =
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_lzma.c:442:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&sp->stream, &tmp_stream, sizeof(lzma_stream));
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_ojpeg.c:2527:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[JMSG_LENGTH_MAX];
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_ojpeg.c:2535:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[JMSG_LENGTH_MAX];
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_predict.c:728:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( working_copy, bp0, cc0 );
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_print.c:79:34:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			    (unsigned int) ((unsigned char *) raw_data)[j]);
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_print.c:192:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				fputc(((char *)raw_data)[i], fd);
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_swab.c:208:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char TIFFBitRevTable[256] = {
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_swab.c:242:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char TIFFNoBitRevTable[256] = {
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_vsi.c:112:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char          szAccess[32];
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_vsi.c:191:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(d, s, (size_t) c);
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_webp.c:114:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(sp->pBuffer + sp->buffer_offset,
data/gdal-3.2.0+dfsg/frmts/gtiff/libtiff/tif_webp.c:163:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(op,   
data/gdal-3.2.0+dfsg/frmts/gtiff/tif_lerc.c:523:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy( sp->uncompressed_buffer + i * dst_stride,
data/gdal-3.2.0+dfsg/frmts/gtiff/tif_lerc.c:549:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&nan_float32, nan_bytes, 4);
data/gdal-3.2.0+dfsg/frmts/gtiff/tif_lerc.c:601:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(op,
data/gdal-3.2.0+dfsg/frmts/gtiff/tif_lerc.c:668:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(sp->uncompressed_buffer + sp->uncompressed_offset,
data/gdal-3.2.0+dfsg/frmts/gtiff/tif_lerc.c:737:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy( sp->uncompressed_buffer + i * dst_stride,
data/gdal-3.2.0+dfsg/frmts/gtiff/tifvsi.cpp:146:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(buf, data, size);
data/gdal-3.2.0+dfsg/frmts/gtiff/tifvsi.cpp:194:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy( psGTH->abyWriteBuffer + psGTH->nWriteBufferSize,
data/gdal-3.2.0+dfsg/frmts/gtiff/tifvsi.cpp:205:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy( psGTH->abyWriteBuffer + psGTH->nWriteBufferSize, pabyData,
data/gdal-3.2.0+dfsg/frmts/gtiff/tifvsi.cpp:390:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(psGTH->ppCachedData, ppData,
data/gdal-3.2.0+dfsg/frmts/gtiff/tifvsi.cpp:396:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(psGTH->panCachedOffsets, panOffsets,
data/gdal-3.2.0+dfsg/frmts/gtiff/tifvsi.cpp:402:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(psGTH->panCachedSizes, panSizes,
data/gdal-3.2.0+dfsg/frmts/gxf/gxf_ogcwkt.c:210:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    const char	*apszParmNames[8] = { NULL };
data/gdal-3.2.0+dfsg/frmts/gxf/gxf_ogcwkt.c:293:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	szWKT[1024+32];
data/gdal-3.2.0+dfsg/frmts/gxf/gxf_ogcwkt.c:294:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	szGCS[512];
data/gdal-3.2.0+dfsg/frmts/gxf/gxf_ogcwkt.c:295:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	szProjection[512];
data/gdal-3.2.0+dfsg/frmts/gxf/gxf_proj4.c:78:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	szPROJ4[512] = { 0 };
data/gdal-3.2.0+dfsg/frmts/gxf/gxfopen.c:69:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy( pszHTitle, "#EOF" );
data/gdal-3.2.0+dfsg/frmts/gxf/gxfopen.c:103:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            strcpy( pszHTitle, "#EOF" );
data/gdal-3.2.0+dfsg/frmts/gxf/gxfopen.c:196:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	szTitle[71];
data/gdal-3.2.0+dfsg/frmts/gxf/gxfopen.c:244:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            psGXF->nRawXSize = atoi(papszList[0]);
data/gdal-3.2.0+dfsg/frmts/gxf/gxfopen.c:248:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            psGXF->nRawYSize = atoi(papszList[0]);
data/gdal-3.2.0+dfsg/frmts/gxf/gxfopen.c:282:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            psGXF->nSense = atoi(papszList[0]);
data/gdal-3.2.0+dfsg/frmts/gxf/gxfopen.c:335:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            psGXF->nGType = atoi(papszList[0]);
data/gdal-3.2.0+dfsg/frmts/gxf/gxfopen.h:103:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        szDummy[64];
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:108:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            errbuf[256];/* Error report buffer */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:110:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            hdfeosVersion[32];	/* HDFEOS version string */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:206:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		    strcpy(metabuf, "GROUP=SwathStructure\n");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:207:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		    strcat(metabuf, "END_GROUP=SwathStructure\n");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:208:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		    strcat(metabuf, "GROUP=GridStructure\n");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:209:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		    strcat(metabuf, "END_GROUP=GridStructure\n");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:210:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		    strcat(metabuf, "GROUP=PointStructure\n");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:211:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		    strcat(metabuf, "END_GROUP=PointStructure\n");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:212:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		    strcat(metabuf, "END\n");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:302:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			  strcpy(metabuf, "GROUP=SwathStructure\n");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:303:6:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			  strcat(metabuf, "END_GROUP=SwathStructure\n");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:304:6:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			  strcat(metabuf, "GROUP=GridStructure\n");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:305:6:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			  strcat(metabuf, "END_GROUP=GridStructure\n");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:306:6:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			  strcat(metabuf, "GROUP=PointStructure\n");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:307:6:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			  strcat(metabuf, "END_GROUP=PointStructure\n");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:308:6:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			  strcat(metabuf, "END\n");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:376:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		    strcat(errbuf, "\" (opened for READONLY access)");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:377:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		    strcat(errbuf, " does not exist.");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:671:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            attrname[16];	/* Attribute name */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:1003:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            buffer[128];/* Buffer to hold "test" string entry */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:1039:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buffer, ptr[indx], slen[indx]);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:1105:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            dstr[2];    /* string version of input variable "delim" */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:1122:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(liststr + off, ptr[i], slen + 1);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:1187:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            name[128];	/* Object name */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:1604:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(outstring + listlen, ptr[i], slen[i]);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:1701:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           *ptr[8];	/* String pointer array (for dim map parsing) */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:1702:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            type[32];	/* Number type descriptor string */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:1703:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           *metaArr[2];	/* Array of metadata positions */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:1786:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(utlstr, "GROUP=SwathStructure");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:1789:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(utlstr, "GROUP=GridStructure");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:1792:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(utlstr, "GROUP=PointStructure");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:1845:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	    strcpy(type, "DFNT_UCHAR8");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:1848:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	    strcpy(type, "DFNT_CHAR8");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:1851:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	    strcpy(type, "DFNT_FLOAT32");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:1854:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	    strcpy(type, "DFNT_FLOAT64");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:1857:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	    strcpy(type, "DFNT_INT8");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:1860:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	    strcpy(type, "DFNT_UINT8");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:1863:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	    strcpy(type, "DFNT_INT16");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:1866:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	    strcpy(type, "DFNT_UINT16");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:1869:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	    strcpy(type, "DFNT_INT32");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:1872:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	    strcpy(type, "DFNT_UINT32");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:1887:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(utlstr, "\t\tGROUP=Dimension");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:1890:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(utlstr, "\t\tEND_GROUP=Dimension");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:1917:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(utlstr, "\t\tGROUP=DimensionMap");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:1920:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(utlstr, "\t\tEND_GROUP=DimensionMap");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:1955:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(utlstr, "\t\tGROUP=IndexDimensionMap");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:1958:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(utlstr, "\t\tEND_GROUP=IndexDimensionMap");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:1991:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(utlstr, "\t\tGROUP=GeoField");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:1994:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(utlstr, "\t\tEND_GROUP=GeoField");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:2053:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(utlstr, "\t\tGROUP=DataField");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:2056:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(utlstr, "\t\tEND_GROUP=DataField");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:2115:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(utlstr, "\t\tGROUP=MergedFields");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:2118:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(utlstr, "\t\tEND_GROUP=MergedFields");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:2156:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(utlstr, "\t\tGROUP=Level");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:2159:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(utlstr, "\n\t\tEND_GROUP=Level");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:2191:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(utlstr, "\t\t\t\tLevelName=\"");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:2195:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(utlstr, "\t\t\tEND_GROUP=Level_");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:2224:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(utlstr, "\t\tGROUP=LevelLink");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:2227:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(utlstr, "\t\tEND_GROUP=LevelLink");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:2265:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(utlstr, "\t\tGROUP=Dimension");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:2275:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(utlstr, "END_GROUP=SwathStructure");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:2284:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(utlstr, "END_GROUP=GridStructure");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:2293:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(utlstr, "END_GROUP=PointStructure");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:2342:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(metaptr, utlstr, seglen);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:2440:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(retstr, metaptrs[0] + slen, newline - metaptrs[0] - slen);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:2577:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(utlstr, "GROUP=SwathStructure");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:2580:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(utlstr, "GROUP=GridStructure");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:2583:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(utlstr, "GROUP=PointStructure");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:2743:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(fillbuf + i * size, fillval, size);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:2783:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(fillbuf + i * size, fillval, size);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:2826:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	fillbuf = (char *) malloc(dims[rank - 1] * size * n);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:2838:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(fillbuf + i * size, fillval, size);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:3250:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            name[80];	        /* Attribute name */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:3370:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            name[512];	/* Object name */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/EHapi.c:3371:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            class[80];	/* Object class */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:106:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char  GDXSDname[HDFE_NAMBUFSIZE];
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:107:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char  GDXSDdims[HDFE_DIMBUFSIZE];
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:145:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *DimNamePtr[8];
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:345:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            name[80];	/* Vgroup name */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:346:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            class[80];	/* Vgroup class */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:347:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            errbuf[256];/* Buffer for error message */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:348:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            utlbuf[1024];	/* Utility buffer */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:349:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            header[128];/* Structural metadata header string */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:350:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            footer[256];/* Structural metadata footer string */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:351:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            refstr1[128];	/* Upper left ref string (metadata) */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:352:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            refstr2[128];	/* Lower right ref string (metadata) */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:492:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		    strcpy(refstr1, "DEFAULT");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:493:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		    strcpy(refstr2, "DEFAULT");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:521:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	    strcpy(errbuf,
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:523:6:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	    strcat(errbuf, " (%s)");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:612:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            name[80];	/* Vgroup name */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:613:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            class[80];	/* Vgroup class */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:614:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            errbuf[256];/* Buffer for error message */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:615:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            acsCode[1];	/* Read/Write l_access char: "r/w" */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:808:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	    strcpy(errbuf,
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:810:6:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	    strcat(errbuf, " (%s)");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:951:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            gridname[80] /* Grid name */ ;
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:1030:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            utlbuf[1024];	/* Utility Buffer */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:1031:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            projparmbuf[512];	/* Projection parameter metadata
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:1033:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            gridname[80];	/* Grid Name */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:1059:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		    strcpy(utlbuf, "0,");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:1175:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            utlbuf[128];/* Utility Buffer */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:1176:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            gridname[80];	/* Grid Name */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:1423:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            utlbuf[64];	/* Utility buffer */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:1424:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            gridname[80];	/* Grid name */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:1496:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            utlbuf[64];	/* Utility buffer */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:1497:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            gridname[80];	/* Grid name */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:1577:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           *metaptrs[2];/* Pointers to begin and end of SM section */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:1578:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            gridname[80];	/* Grid Name */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:1635:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		size = atoi(utlstr);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:1707:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           *metaptrs[2];/* Pointers to begin and end of SM section */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:1708:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            gridname[80];	/* Grid Name */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:1749:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		*xdimsize = atoi(utlstr);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:1767:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		*ydimsize = atoi(utlstr);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:1899:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           *metaptrs[2];/* Pointers to begin and end of SM section */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:1900:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            gridname[80];	/* Grid Name */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:1902:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            fmt[96];	/* Format String */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:1985:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		    *zonecode = atoi(utlstr);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:2025:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		    strcpy(fmt, "%lf,");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:2027:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(fmt, "%lf,");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:2028:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		    strcat(fmt, "%lf");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:2067:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		    *spherecode = atoi(utlstr);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:2123:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           *metaptrs[2];/* Pointers to begin and end of SM section */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:2124:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            gridname[80];	/* Grid Name */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:2245:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           *metaptrs[2];/* Pointers to begin and end of SM section */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:2246:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            gridname[80];	/* Grid Name */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:2354:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           *metaptrs[2];/* Pointers to begin and end of SM section */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:2355:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            gridname[80];	/* Grid Name */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:2549:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           *metaptrs[2];    /* Pointers to begin and end of SM section */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:2550:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            gridname[80];   /* Grid Name */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:2552:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           *ptr[8];	    /* String pointers for parsed string */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:2553:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            dimstr[64];	    /* Individual dimension entry string */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:2636:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		    memcpy(dimstr, ptr[i] + 1, slen[i] - 2);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:2772:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            utlbuf[512];/* Utility buffer */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:2773:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            utlbuf2[256];	/* Utility buffer 1 */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:2774:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           *ptr[32];	/* String pointer array */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:2775:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            gridname[80];	/* Grid name */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:2776:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            parmbuf[128];	/* Parameter string buffer */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:2777:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            errbuf1[128];	/* Error buffer 1 */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:2778:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            errbuf2[128];	/* Error buffer 2 */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:2783:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            errmsg[128];/* Tiling error message */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:2800:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(errbuf1, "GDXSDname array too small.\nPlease increase ");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:2801:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(errbuf1, "size of HDFE_NAMBUFSIZE in \"HdfEosDef.h\".\n");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:2802:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(errbuf2, "GDXSDdims array too small.\nPlease increase ");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:2803:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(errbuf2, "size of HDFE_DIMBUFSIZE in \"HdfEosDef.h\".\n");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:2864:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(dimbuf, "SOMBlockDim,");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:2907:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(dimcheck, dimbuf, comma - dimbuf);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:3105:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(GDXSDdims, "ONE,");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:3188:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		    memcpy(utlbuf, ptr[i], slen[i]);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:3467:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            utlbuf[256];/* Utility buffer */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:3468:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            gridname[80];	/* Grid name */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:3538:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            name[2048];	/* Merged-Field Names */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:3539:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            gridname[80];	/* Grid Name */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:3542:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           *metaptrs[2];/* Pointers to begin and end of SM section */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:4412:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           *metaptrs[2];/* Pointers to begin and end of SM section */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:4413:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            gridname[80];	/* Grid Name */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:4459:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(utlstr, "\t\tOBJECT=");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:4494:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			size = atoi(utlstr);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:4567:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           *metaptrs[2];/* Pointers to begin and end of SM section */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:4568:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            gridname[80];	/* Grid Name */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:4570:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           *ptr[8];	/* String pointer array */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:4643:8:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			    strcpy(utlstr, "\t\t\t\t");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:4644:8:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			    strcat(utlstr, "DataFieldName");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:4757:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           *metaptrs[2];/* Pointers to begin and end of SM section */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:4758:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            gridname[80];	/* Grid Name */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:4760:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            valName[2][32];	/* Strings to search for */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:4798:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(&valName[0][0], "DimensionName");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:4813:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(&valName[0][0], "DataFieldName");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:4827:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	    strcpy(&valName[0][0], "\t\tOBJECT");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:4975:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            name[80];	/* Fill value "attribute" name */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:5003:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	    strcpy(name, "_FV_");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:5061:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            name[80];	/* Fill value "attribute" name */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:5074:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	    strcpy(name, "_FV_");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:5166:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           *ptr1[3];	/* String pointer array */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:5167:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           *ptr2[3];	/* String pointer array */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:5168:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            dimbuf1[128];	/* Dimension buffer 1 */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:5169:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            dimbuf2[128];	/* Dimension buffer 2 */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:5170:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            gridname[VGNAMELENMAX + 1];	/* Grid name */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:5172:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            fillval[32];/* Fill value buffer */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:5407:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(match, &GDXSDcomb[5 * i], 20);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:5408:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(nambuf, nameptr[i], namelen[i]);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:5410:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dimbuf1, dimptr[i], dimlen[i]);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:5425:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		    memcpy(dimbuf2, dimptr[j], dimlen[j]);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:5443:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(nambuf + strlen(nambuf),
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:5480:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(utlbuf, "MRGFLD_");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:5481:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(utlbuf + 7, nameptr0[0], namelen0[0]);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:5517:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(dimbuf2, ptr1[k + 1], slen1[k + 1]);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:5522:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(dimbuf2, ptr1[k], slen1[k]);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:5546:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		    memcpy(utlbuf, nameptr0[k], namelen0[k]);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:8240:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            dimlist[256];	/* Dimension list */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:8244:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            errbuf[256];/* Error buffer */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:8499:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            dimlist[256];	/* Dimension list */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:8503:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            errbuf[256];/* Error buffer */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:8890:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(GDXRegion[regionID]->DimNamePtr[j], \
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:8935:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dimlist, vertObj, 4);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:8959:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		    memcpy(GDXRegion[regionID]->DimNamePtr[j],
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:8987:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		    vertArr = (char *) calloc(dims[0], size);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:9004:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			    memcpy(&vertINT16, vertArr + i * size, size);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:9024:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(&vertINT16, vertArr + i * size, size);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:9045:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			    memcpy(&vertINT32, vertArr + i * size, size);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:9065:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(&vertINT32, vertArr + i * size, size);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:9086:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			    memcpy(&vertFLT32, vertArr + i * size, size);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:9106:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(&vertFLT32, vertArr + i * size, size);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:9127:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			    memcpy(&vertFLT64, vertArr + i * size, size);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:9147:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(&vertFLT64, vertArr + i * size, size);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:10008:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				    memcpy(&i16[k],
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:10034:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				    memcpy(&i32[k],
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:10058:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				    memcpy(&f32[k],
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/GDapi.c:10082:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				    memcpy(&f64[k],
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:92:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char  SWXSDname[HDFE_NAMBUFSIZE];
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:93:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char  SWXSDdims[HDFE_DIMBUFSIZE];
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:141:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *DimNamePtr[8];
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:265:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            name[80];	/* Vgroup name */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:266:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            class[80];	/* Vgroup class */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:267:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            errbuf[256];/* Buffer for error message */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:268:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            utlbuf[512];/* Utility buffer */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:269:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            utlbuf2[32];/* Utility buffer 2 */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:395:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(utlbuf, "\t\tGROUP=Dimension\n");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:396:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(utlbuf, "\t\tEND_GROUP=Dimension\n");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:397:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(utlbuf, "\t\tGROUP=DimensionMap\n");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:398:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(utlbuf, "\t\tEND_GROUP=DimensionMap\n");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:399:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(utlbuf, "\t\tGROUP=IndexDimensionMap\n");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:400:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(utlbuf, "\t\tEND_GROUP=IndexDimensionMap\n");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:401:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(utlbuf, "\t\tGROUP=GeoField\n");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:402:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(utlbuf, "\t\tEND_GROUP=GeoField\n");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:403:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(utlbuf, "\t\tGROUP=DataField\n");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:404:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(utlbuf, "\t\tEND_GROUP=DataField\n");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:405:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(utlbuf, "\t\tGROUP=MergedFields\n");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:406:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(utlbuf, "\t\tEND_GROUP=MergedFields\n");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:421:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	    strcpy(errbuf,
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:423:6:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	    strcat(errbuf, " (%s)");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:515:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            name[80];	/* Vgroup name */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:516:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            class[80];	/* Vgroup class */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:517:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            errbuf[256];/* Buffer for error message */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:518:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            acsCode[1];	/* Read/Write access char: "r/w" */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:778:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	    strcpy(errbuf,
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:780:6:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	    strcat(errbuf, " (%s)");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:914:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            swathname[80] /* Swath name */ ;
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:991:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           *metaptrs[2];/* Pointers to begin and end of SM section */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:992:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            swathname[80];	/* Swath Name */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:1041:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		size = atoi(utlstr);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:1111:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           *metaptrs[2];/* Pointers to begin and end of SM section */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:1112:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            swathname[80];	/* Swath Name */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:1160:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		*offset = atoi(utlstr);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:1174:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		*increment = atoi(utlstr);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:1242:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            utlbuf[256];/* Utility buffer */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:1322:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           *metaptrs[2];/* Pointers to begin and end of SM section */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:1323:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            swathname[80];	/* Swath Name */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:1326:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    const char           *HDFcomp[5] = {"HDFE_COMP_NONE", "HDFE_COMP_RLE",
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:1531:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           *metaptrs[2];/* Pointers to begin and end of SM section */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:1532:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            swathname[80];	/* Swath Name */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:1534:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           *ptr[8];	/* String pointers for parsed string */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:1535:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            dimstr[64];	/* Individual dimension entry string */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:1637:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(dimstr, ptr[i] + 1, slen[i] - 2);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:1849:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            mapname[80];/* Mapping name (geodim/datadim) */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:1850:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            swathname[80];	/* Swath name */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:1949:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            mapname[80];/* Mapping name (geodim/datadim) */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:1950:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            swathname[80];	/* Swath name */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:1951:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            utlbuf[256];/* Utility buffer */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:2012:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(buf, l_index, 4 * gsize);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:2183:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            utlbuf[512];/* Utility buffer */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:2184:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            utlbuf2[256];	/* Utility buffer 2 */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:2185:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           *ptr[32];	/* String pointer array */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:2186:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            swathname[80];	/* Swath name */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:2187:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            errbuf1[128];	/* Error message buffer 1 */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:2188:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            errbuf2[128];	/* Error message buffer 2 */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:2189:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            compparmbuf[128];	/* Compression parameter string buffer */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:2191:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    const char           *HDFcomp[5] = {"HDFE_COMP_NONE", "HDFE_COMP_RLE",
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:2204:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(errbuf1, "SWXSDname array too small.\nPlease increase ");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:2205:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(errbuf1, "size of HDFE_NAMBUFSIZE in \"HdfEosDef.h\".\n");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:2206:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(errbuf2, "SWXSDdims array too small.\nPlease increase ");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:2207:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(errbuf2, "size of HDFE_DIMBUFSIZE in \"HdfEosDef.h\".\n");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:2253:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(dimcheck, dimbuf, comma - dimbuf);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:2585:8:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			    strcat(SWXSDdims, "ONE,");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:2639:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(utlbuf, ptr[i], slen[i]);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:2926:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            utlbuf[256];/* Utility buffer */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:2927:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            swathname[80];	/* Swath name */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:2991:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            utlbuf[256];/* Utility buffer */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:2992:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            swathname[80];	/* Swath name */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:3339:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           *metaptrs[2];/* Pointers to begin and end of SM section */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:3340:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            swathname[80];	/* Swath Name */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:3426:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			size = atoi(utlstr);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:3504:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           *metaptrs[2];/* Pointers to begin and end of SM section */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:3505:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            swathname[80];	/* Swath Name */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:3583:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			off = atoi(utlstr);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:3591:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			incr = atoi(utlstr);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:3669:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           *metaptrs[2];/* Pointers to begin and end of SM section */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:3670:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            swathname[80];	/* Swath Name */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:3832:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           *metaptrs[2];/* Pointers to begin and end of SM section */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:3833:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            swathname[80];	/* Swath Name */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:3836:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           *ptr[8];	/* String pointer array */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:3880:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(utlstr2, "GeoFieldName");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:3892:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(utlstr2, "DataFieldName");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:3929:8:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			    strcpy(utlstr, "\t\t\t\t");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:4143:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           *metaptrs[2];    /* Pointers to begin and end of SM section */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:4144:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            swathname[80];  /* Swath Name */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:4146:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            valName[2][32]; /* Strings to search for */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:4186:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(&valName[0][0], "DimensionName");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:4201:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(&valName[0][0], "GeoDimension");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:4202:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(&valName[1][0], "DataDimension");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:4217:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(&valName[0][0], "GeoDimension");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:4218:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(&valName[1][0], "DataDimension");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:4233:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(&valName[0][0], "GeoFieldName");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:4248:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(&valName[0][0], "DataFieldName");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:4264:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                strcpy(&valName[0][0], "\t\tOBJECT");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:4507:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            name[2048];	/* Merged-Field Names */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:4508:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            swathname[80];	/* Swath Name */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:4511:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           *metaptrs[2];/* Pointers to begin and end of SM section */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:4748:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            attrName[80];	/* Name of fill value attribute */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:4749:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           *ptr[64];	/* String pointer array */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:4750:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            fieldlist[256];	/* Vdata field list */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:5041:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			    memcpy(buf + i * recsize + mrgOffset,
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:5051:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(buf, datbuf, count[0] * recsize);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:5057:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			    memcpy(buf + i * recsize * incr[0] + mrgOffset,
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:5109:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(datbuf, buf, count[0] * fldsize);
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:5115:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			    memcpy((uint8 *) datbuf + i * fldsize,
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:5326:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            dimlist[256];	/* Dimension list (geolocation
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:5328:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            latName[17];/* Latitude field name */
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:5388:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		  strcpy(latName, "GeodeticLatitude");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:5395:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(latName, "Colatitude");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:5402:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	    strcpy(latName, "Latitude");
data/gdal-3.2.0+dfsg/frmts/hdf4/hdf-eos/SWapi.c:5506:7:  [2] (buffer) memcpy:
  Does not