Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/git-2.29.2+next.20201030/abspath.c
Examining data/git-2.29.2+next.20201030/add-interactive.c
Examining data/git-2.29.2+next.20201030/add-interactive.h
Examining data/git-2.29.2+next.20201030/add-patch.c
Examining data/git-2.29.2+next.20201030/advice.c
Examining data/git-2.29.2+next.20201030/advice.h
Examining data/git-2.29.2+next.20201030/alias.c
Examining data/git-2.29.2+next.20201030/alias.h
Examining data/git-2.29.2+next.20201030/alloc.c
Examining data/git-2.29.2+next.20201030/alloc.h
Examining data/git-2.29.2+next.20201030/apply.c
Examining data/git-2.29.2+next.20201030/apply.h
Examining data/git-2.29.2+next.20201030/archive-tar.c
Examining data/git-2.29.2+next.20201030/archive-zip.c
Examining data/git-2.29.2+next.20201030/archive.c
Examining data/git-2.29.2+next.20201030/archive.h
Examining data/git-2.29.2+next.20201030/attr.c
Examining data/git-2.29.2+next.20201030/attr.h
Examining data/git-2.29.2+next.20201030/banned.h
Examining data/git-2.29.2+next.20201030/base85.c
Examining data/git-2.29.2+next.20201030/bisect.c
Examining data/git-2.29.2+next.20201030/bisect.h
Examining data/git-2.29.2+next.20201030/blame.c
Examining data/git-2.29.2+next.20201030/blame.h
Examining data/git-2.29.2+next.20201030/blob.c
Examining data/git-2.29.2+next.20201030/blob.h
Examining data/git-2.29.2+next.20201030/block-sha1/sha1.c
Examining data/git-2.29.2+next.20201030/block-sha1/sha1.h
Examining data/git-2.29.2+next.20201030/bloom.c
Examining data/git-2.29.2+next.20201030/bloom.h
Examining data/git-2.29.2+next.20201030/branch.c
Examining data/git-2.29.2+next.20201030/branch.h
Examining data/git-2.29.2+next.20201030/builtin.h
Examining data/git-2.29.2+next.20201030/builtin/add.c
Examining data/git-2.29.2+next.20201030/builtin/am.c
Examining data/git-2.29.2+next.20201030/builtin/annotate.c
Examining data/git-2.29.2+next.20201030/builtin/apply.c
Examining data/git-2.29.2+next.20201030/builtin/archive.c
Examining data/git-2.29.2+next.20201030/builtin/bisect--helper.c
Examining data/git-2.29.2+next.20201030/builtin/blame.c
Examining data/git-2.29.2+next.20201030/builtin/branch.c
Examining data/git-2.29.2+next.20201030/builtin/bugreport.c
Examining data/git-2.29.2+next.20201030/builtin/bundle.c
Examining data/git-2.29.2+next.20201030/builtin/cat-file.c
Examining data/git-2.29.2+next.20201030/builtin/check-attr.c
Examining data/git-2.29.2+next.20201030/builtin/check-ignore.c
Examining data/git-2.29.2+next.20201030/builtin/check-mailmap.c
Examining data/git-2.29.2+next.20201030/builtin/check-ref-format.c
Examining data/git-2.29.2+next.20201030/builtin/checkout-index.c
Examining data/git-2.29.2+next.20201030/builtin/checkout.c
Examining data/git-2.29.2+next.20201030/builtin/clean.c
Examining data/git-2.29.2+next.20201030/builtin/clone.c
Examining data/git-2.29.2+next.20201030/builtin/column.c
Examining data/git-2.29.2+next.20201030/builtin/commit-graph.c
Examining data/git-2.29.2+next.20201030/builtin/commit-tree.c
Examining data/git-2.29.2+next.20201030/builtin/commit.c
Examining data/git-2.29.2+next.20201030/builtin/config.c
Examining data/git-2.29.2+next.20201030/builtin/count-objects.c
Examining data/git-2.29.2+next.20201030/builtin/credential-cache--daemon.c
Examining data/git-2.29.2+next.20201030/builtin/credential-cache.c
Examining data/git-2.29.2+next.20201030/builtin/credential-store.c
Examining data/git-2.29.2+next.20201030/builtin/credential.c
Examining data/git-2.29.2+next.20201030/builtin/describe.c
Examining data/git-2.29.2+next.20201030/builtin/diff-files.c
Examining data/git-2.29.2+next.20201030/builtin/diff-index.c
Examining data/git-2.29.2+next.20201030/builtin/diff-tree.c
Examining data/git-2.29.2+next.20201030/builtin/diff.c
Examining data/git-2.29.2+next.20201030/builtin/difftool.c
Examining data/git-2.29.2+next.20201030/builtin/env--helper.c
Examining data/git-2.29.2+next.20201030/builtin/fast-export.c
Examining data/git-2.29.2+next.20201030/builtin/fast-import.c
Examining data/git-2.29.2+next.20201030/builtin/fetch-pack.c
Examining data/git-2.29.2+next.20201030/builtin/fetch.c
Examining data/git-2.29.2+next.20201030/builtin/fmt-merge-msg.c
Examining data/git-2.29.2+next.20201030/builtin/for-each-ref.c
Examining data/git-2.29.2+next.20201030/builtin/fsck.c
Examining data/git-2.29.2+next.20201030/builtin/gc.c
Examining data/git-2.29.2+next.20201030/builtin/get-tar-commit-id.c
Examining data/git-2.29.2+next.20201030/builtin/grep.c
Examining data/git-2.29.2+next.20201030/builtin/hash-object.c
Examining data/git-2.29.2+next.20201030/builtin/help.c
Examining data/git-2.29.2+next.20201030/builtin/index-pack.c
Examining data/git-2.29.2+next.20201030/builtin/init-db.c
Examining data/git-2.29.2+next.20201030/builtin/interpret-trailers.c
Examining data/git-2.29.2+next.20201030/builtin/log.c
Examining data/git-2.29.2+next.20201030/builtin/ls-files.c
Examining data/git-2.29.2+next.20201030/builtin/ls-remote.c
Examining data/git-2.29.2+next.20201030/builtin/ls-tree.c
Examining data/git-2.29.2+next.20201030/builtin/mailinfo.c
Examining data/git-2.29.2+next.20201030/builtin/mailsplit.c
Examining data/git-2.29.2+next.20201030/builtin/merge-base.c
Examining data/git-2.29.2+next.20201030/builtin/merge-file.c
Examining data/git-2.29.2+next.20201030/builtin/merge-index.c
Examining data/git-2.29.2+next.20201030/builtin/merge-ours.c
Examining data/git-2.29.2+next.20201030/builtin/merge-recursive.c
Examining data/git-2.29.2+next.20201030/builtin/merge-tree.c
Examining data/git-2.29.2+next.20201030/builtin/merge.c
Examining data/git-2.29.2+next.20201030/builtin/mktag.c
Examining data/git-2.29.2+next.20201030/builtin/mktree.c
Examining data/git-2.29.2+next.20201030/builtin/multi-pack-index.c
Examining data/git-2.29.2+next.20201030/builtin/mv.c
Examining data/git-2.29.2+next.20201030/builtin/name-rev.c
Examining data/git-2.29.2+next.20201030/builtin/notes.c
Examining data/git-2.29.2+next.20201030/builtin/pack-objects.c
Examining data/git-2.29.2+next.20201030/builtin/pack-redundant.c
Examining data/git-2.29.2+next.20201030/builtin/pack-refs.c
Examining data/git-2.29.2+next.20201030/builtin/patch-id.c
Examining data/git-2.29.2+next.20201030/builtin/prune-packed.c
Examining data/git-2.29.2+next.20201030/builtin/prune.c
Examining data/git-2.29.2+next.20201030/builtin/pull.c
Examining data/git-2.29.2+next.20201030/builtin/push.c
Examining data/git-2.29.2+next.20201030/builtin/range-diff.c
Examining data/git-2.29.2+next.20201030/builtin/read-tree.c
Examining data/git-2.29.2+next.20201030/builtin/rebase.c
Examining data/git-2.29.2+next.20201030/builtin/receive-pack.c
Examining data/git-2.29.2+next.20201030/builtin/reflog.c
Examining data/git-2.29.2+next.20201030/builtin/remote-ext.c
Examining data/git-2.29.2+next.20201030/builtin/remote-fd.c
Examining data/git-2.29.2+next.20201030/builtin/remote.c
Examining data/git-2.29.2+next.20201030/builtin/repack.c
Examining data/git-2.29.2+next.20201030/builtin/replace.c
Examining data/git-2.29.2+next.20201030/builtin/rerere.c
Examining data/git-2.29.2+next.20201030/builtin/reset.c
Examining data/git-2.29.2+next.20201030/builtin/rev-list.c
Examining data/git-2.29.2+next.20201030/builtin/rev-parse.c
Examining data/git-2.29.2+next.20201030/builtin/revert.c
Examining data/git-2.29.2+next.20201030/builtin/rm.c
Examining data/git-2.29.2+next.20201030/builtin/send-pack.c
Examining data/git-2.29.2+next.20201030/builtin/shortlog.c
Examining data/git-2.29.2+next.20201030/builtin/show-branch.c
Examining data/git-2.29.2+next.20201030/builtin/show-index.c
Examining data/git-2.29.2+next.20201030/builtin/show-ref.c
Examining data/git-2.29.2+next.20201030/builtin/sparse-checkout.c
Examining data/git-2.29.2+next.20201030/builtin/stash.c
Examining data/git-2.29.2+next.20201030/builtin/stripspace.c
Examining data/git-2.29.2+next.20201030/builtin/submodule--helper.c
Examining data/git-2.29.2+next.20201030/builtin/symbolic-ref.c
Examining data/git-2.29.2+next.20201030/builtin/tag.c
Examining data/git-2.29.2+next.20201030/builtin/unpack-file.c
Examining data/git-2.29.2+next.20201030/builtin/unpack-objects.c
Examining data/git-2.29.2+next.20201030/builtin/update-index.c
Examining data/git-2.29.2+next.20201030/builtin/update-ref.c
Examining data/git-2.29.2+next.20201030/builtin/update-server-info.c
Examining data/git-2.29.2+next.20201030/builtin/upload-archive.c
Examining data/git-2.29.2+next.20201030/builtin/upload-pack.c
Examining data/git-2.29.2+next.20201030/builtin/var.c
Examining data/git-2.29.2+next.20201030/builtin/verify-commit.c
Examining data/git-2.29.2+next.20201030/builtin/verify-pack.c
Examining data/git-2.29.2+next.20201030/builtin/verify-tag.c
Examining data/git-2.29.2+next.20201030/builtin/worktree.c
Examining data/git-2.29.2+next.20201030/builtin/write-tree.c
Examining data/git-2.29.2+next.20201030/bulk-checkin.c
Examining data/git-2.29.2+next.20201030/bulk-checkin.h
Examining data/git-2.29.2+next.20201030/bundle.c
Examining data/git-2.29.2+next.20201030/bundle.h
Examining data/git-2.29.2+next.20201030/cache-tree.c
Examining data/git-2.29.2+next.20201030/cache-tree.h
Examining data/git-2.29.2+next.20201030/cache.h
Examining data/git-2.29.2+next.20201030/chdir-notify.c
Examining data/git-2.29.2+next.20201030/chdir-notify.h
Examining data/git-2.29.2+next.20201030/checkout.c
Examining data/git-2.29.2+next.20201030/checkout.h
Examining data/git-2.29.2+next.20201030/color.c
Examining data/git-2.29.2+next.20201030/color.h
Examining data/git-2.29.2+next.20201030/column.c
Examining data/git-2.29.2+next.20201030/column.h
Examining data/git-2.29.2+next.20201030/combine-diff.c
Examining data/git-2.29.2+next.20201030/commit-graph.c
Examining data/git-2.29.2+next.20201030/commit-graph.h
Examining data/git-2.29.2+next.20201030/commit-reach.c
Examining data/git-2.29.2+next.20201030/commit-reach.h
Examining data/git-2.29.2+next.20201030/commit-slab-decl.h
Examining data/git-2.29.2+next.20201030/commit-slab-impl.h
Examining data/git-2.29.2+next.20201030/commit-slab.h
Examining data/git-2.29.2+next.20201030/commit.c
Examining data/git-2.29.2+next.20201030/commit.h
Examining data/git-2.29.2+next.20201030/common-main.c
Examining data/git-2.29.2+next.20201030/compat/access.c
Examining data/git-2.29.2+next.20201030/compat/apple-common-crypto.h
Examining data/git-2.29.2+next.20201030/compat/basename.c
Examining data/git-2.29.2+next.20201030/compat/bswap.h
Examining data/git-2.29.2+next.20201030/compat/compiler.h
Examining data/git-2.29.2+next.20201030/compat/fileno.c
Examining data/git-2.29.2+next.20201030/compat/fopen.c
Examining data/git-2.29.2+next.20201030/compat/hstrerror.c
Examining data/git-2.29.2+next.20201030/compat/inet_ntop.c
Examining data/git-2.29.2+next.20201030/compat/inet_pton.c
Examining data/git-2.29.2+next.20201030/compat/memmem.c
Examining data/git-2.29.2+next.20201030/compat/mingw.c
Examining data/git-2.29.2+next.20201030/compat/mingw.h
Examining data/git-2.29.2+next.20201030/compat/mkdir.c
Examining data/git-2.29.2+next.20201030/compat/mkdtemp.c
Examining data/git-2.29.2+next.20201030/compat/mmap.c
Examining data/git-2.29.2+next.20201030/compat/msvc.c
Examining data/git-2.29.2+next.20201030/compat/msvc.h
Examining data/git-2.29.2+next.20201030/compat/nedmalloc/malloc.c.h
Examining data/git-2.29.2+next.20201030/compat/nedmalloc/nedmalloc.c
Examining data/git-2.29.2+next.20201030/compat/nedmalloc/nedmalloc.h
Examining data/git-2.29.2+next.20201030/compat/obstack.c
Examining data/git-2.29.2+next.20201030/compat/obstack.h
Examining data/git-2.29.2+next.20201030/compat/poll/poll.c
Examining data/git-2.29.2+next.20201030/compat/poll/poll.h
Examining data/git-2.29.2+next.20201030/compat/pread.c
Examining data/git-2.29.2+next.20201030/compat/precompose_utf8.c
Examining data/git-2.29.2+next.20201030/compat/precompose_utf8.h
Examining data/git-2.29.2+next.20201030/compat/qsort_s.c
Examining data/git-2.29.2+next.20201030/compat/regex/regcomp.c
Examining data/git-2.29.2+next.20201030/compat/regex/regex.c
Examining data/git-2.29.2+next.20201030/compat/regex/regex.h
Examining data/git-2.29.2+next.20201030/compat/regex/regex_internal.c
Examining data/git-2.29.2+next.20201030/compat/regex/regex_internal.h
Examining data/git-2.29.2+next.20201030/compat/regex/regexec.c
Examining data/git-2.29.2+next.20201030/compat/setenv.c
Examining data/git-2.29.2+next.20201030/compat/sha1-chunked.c
Examining data/git-2.29.2+next.20201030/compat/sha1-chunked.h
Examining data/git-2.29.2+next.20201030/compat/snprintf.c
Examining data/git-2.29.2+next.20201030/compat/stat.c
Examining data/git-2.29.2+next.20201030/compat/strcasestr.c
Examining data/git-2.29.2+next.20201030/compat/strdup.c
Examining data/git-2.29.2+next.20201030/compat/strlcpy.c
Examining data/git-2.29.2+next.20201030/compat/strtoimax.c
Examining data/git-2.29.2+next.20201030/compat/strtoumax.c
Examining data/git-2.29.2+next.20201030/compat/terminal.c
Examining data/git-2.29.2+next.20201030/compat/terminal.h
Examining data/git-2.29.2+next.20201030/compat/unsetenv.c
Examining data/git-2.29.2+next.20201030/compat/vcbuild/include/sys/param.h
Examining data/git-2.29.2+next.20201030/compat/vcbuild/include/sys/time.h
Examining data/git-2.29.2+next.20201030/compat/vcbuild/include/sys/utime.h
Examining data/git-2.29.2+next.20201030/compat/vcbuild/include/unistd.h
Examining data/git-2.29.2+next.20201030/compat/vcbuild/include/utime.h
Examining data/git-2.29.2+next.20201030/compat/win32.h
Examining data/git-2.29.2+next.20201030/compat/win32/alloca.h
Examining data/git-2.29.2+next.20201030/compat/win32/dirent.c
Examining data/git-2.29.2+next.20201030/compat/win32/dirent.h
Examining data/git-2.29.2+next.20201030/compat/win32/lazyload.h
Examining data/git-2.29.2+next.20201030/compat/win32/path-utils.c
Examining data/git-2.29.2+next.20201030/compat/win32/path-utils.h
Examining data/git-2.29.2+next.20201030/compat/win32/pthread.c
Examining data/git-2.29.2+next.20201030/compat/win32/pthread.h
Examining data/git-2.29.2+next.20201030/compat/win32/syslog.c
Examining data/git-2.29.2+next.20201030/compat/win32/syslog.h
Examining data/git-2.29.2+next.20201030/compat/win32/trace2_win32_process_info.c
Examining data/git-2.29.2+next.20201030/compat/win32mmap.c
Examining data/git-2.29.2+next.20201030/compat/winansi.c
Examining data/git-2.29.2+next.20201030/config.c
Examining data/git-2.29.2+next.20201030/config.h
Examining data/git-2.29.2+next.20201030/connect.c
Examining data/git-2.29.2+next.20201030/connect.h
Examining data/git-2.29.2+next.20201030/connected.c
Examining data/git-2.29.2+next.20201030/connected.h
Examining data/git-2.29.2+next.20201030/contrib/credential/gnome-keyring/git-credential-gnome-keyring.c
Examining data/git-2.29.2+next.20201030/contrib/credential/libsecret/git-credential-libsecret.c
Examining data/git-2.29.2+next.20201030/contrib/credential/osxkeychain/git-credential-osxkeychain.c
Examining data/git-2.29.2+next.20201030/contrib/credential/wincred/git-credential-wincred.c
Examining data/git-2.29.2+next.20201030/convert.c
Examining data/git-2.29.2+next.20201030/convert.h
Examining data/git-2.29.2+next.20201030/copy.c
Examining data/git-2.29.2+next.20201030/credential.c
Examining data/git-2.29.2+next.20201030/credential.h
Examining data/git-2.29.2+next.20201030/csum-file.c
Examining data/git-2.29.2+next.20201030/csum-file.h
Examining data/git-2.29.2+next.20201030/ctype.c
Examining data/git-2.29.2+next.20201030/daemon.c
Examining data/git-2.29.2+next.20201030/date.c
Examining data/git-2.29.2+next.20201030/decorate.c
Examining data/git-2.29.2+next.20201030/decorate.h
Examining data/git-2.29.2+next.20201030/delta-islands.c
Examining data/git-2.29.2+next.20201030/delta-islands.h
Examining data/git-2.29.2+next.20201030/delta.h
Examining data/git-2.29.2+next.20201030/diff-delta.c
Examining data/git-2.29.2+next.20201030/diff-lib.c
Examining data/git-2.29.2+next.20201030/diff-no-index.c
Examining data/git-2.29.2+next.20201030/diff.c
Examining data/git-2.29.2+next.20201030/diff.h
Examining data/git-2.29.2+next.20201030/diffcore-break.c
Examining data/git-2.29.2+next.20201030/diffcore-delta.c
Examining data/git-2.29.2+next.20201030/diffcore-order.c
Examining data/git-2.29.2+next.20201030/diffcore-pickaxe.c
Examining data/git-2.29.2+next.20201030/diffcore-rename.c
Examining data/git-2.29.2+next.20201030/diffcore.h
Examining data/git-2.29.2+next.20201030/dir-iterator.c
Examining data/git-2.29.2+next.20201030/dir-iterator.h
Examining data/git-2.29.2+next.20201030/dir.c
Examining data/git-2.29.2+next.20201030/dir.h
Examining data/git-2.29.2+next.20201030/editor.c
Examining data/git-2.29.2+next.20201030/entry.c
Examining data/git-2.29.2+next.20201030/environment.c
Examining data/git-2.29.2+next.20201030/ewah/bitmap.c
Examining data/git-2.29.2+next.20201030/ewah/ewah_bitmap.c
Examining data/git-2.29.2+next.20201030/ewah/ewah_io.c
Examining data/git-2.29.2+next.20201030/ewah/ewah_rlw.c
Examining data/git-2.29.2+next.20201030/ewah/ewok.h
Examining data/git-2.29.2+next.20201030/ewah/ewok_rlw.h
Examining data/git-2.29.2+next.20201030/exec-cmd.c
Examining data/git-2.29.2+next.20201030/exec-cmd.h
Examining data/git-2.29.2+next.20201030/fetch-negotiator.c
Examining data/git-2.29.2+next.20201030/fetch-negotiator.h
Examining data/git-2.29.2+next.20201030/fetch-pack.c
Examining data/git-2.29.2+next.20201030/fetch-pack.h
Examining data/git-2.29.2+next.20201030/fmt-merge-msg.c
Examining data/git-2.29.2+next.20201030/fmt-merge-msg.h
Examining data/git-2.29.2+next.20201030/fsck.c
Examining data/git-2.29.2+next.20201030/fsck.h
Examining data/git-2.29.2+next.20201030/fsmonitor.c
Examining data/git-2.29.2+next.20201030/fsmonitor.h
Examining data/git-2.29.2+next.20201030/fuzz-commit-graph.c
Examining data/git-2.29.2+next.20201030/fuzz-pack-headers.c
Examining data/git-2.29.2+next.20201030/fuzz-pack-idx.c
Examining data/git-2.29.2+next.20201030/gettext.c
Examining data/git-2.29.2+next.20201030/gettext.h
Examining data/git-2.29.2+next.20201030/git-compat-util.h
Examining data/git-2.29.2+next.20201030/git.c
Examining data/git-2.29.2+next.20201030/gpg-interface.c
Examining data/git-2.29.2+next.20201030/gpg-interface.h
Examining data/git-2.29.2+next.20201030/graph.c
Examining data/git-2.29.2+next.20201030/graph.h
Examining data/git-2.29.2+next.20201030/grep.c
Examining data/git-2.29.2+next.20201030/grep.h
Examining data/git-2.29.2+next.20201030/hash.h
Examining data/git-2.29.2+next.20201030/hashmap.c
Examining data/git-2.29.2+next.20201030/hashmap.h
Examining data/git-2.29.2+next.20201030/help.c
Examining data/git-2.29.2+next.20201030/help.h
Examining data/git-2.29.2+next.20201030/hex.c
Examining data/git-2.29.2+next.20201030/http-backend.c
Examining data/git-2.29.2+next.20201030/http-fetch.c
Examining data/git-2.29.2+next.20201030/http-push.c
Examining data/git-2.29.2+next.20201030/http-walker.c
Examining data/git-2.29.2+next.20201030/http.c
Examining data/git-2.29.2+next.20201030/http.h
Examining data/git-2.29.2+next.20201030/ident.c
Examining data/git-2.29.2+next.20201030/imap-send.c
Examining data/git-2.29.2+next.20201030/iterator.h
Examining data/git-2.29.2+next.20201030/json-writer.c
Examining data/git-2.29.2+next.20201030/json-writer.h
Examining data/git-2.29.2+next.20201030/khash.h
Examining data/git-2.29.2+next.20201030/kwset.c
Examining data/git-2.29.2+next.20201030/kwset.h
Examining data/git-2.29.2+next.20201030/levenshtein.c
Examining data/git-2.29.2+next.20201030/levenshtein.h
Examining data/git-2.29.2+next.20201030/line-log.c
Examining data/git-2.29.2+next.20201030/line-log.h
Examining data/git-2.29.2+next.20201030/line-range.c
Examining data/git-2.29.2+next.20201030/line-range.h
Examining data/git-2.29.2+next.20201030/linear-assignment.c
Examining data/git-2.29.2+next.20201030/linear-assignment.h
Examining data/git-2.29.2+next.20201030/list-objects-filter-options.c
Examining data/git-2.29.2+next.20201030/list-objects-filter-options.h
Examining data/git-2.29.2+next.20201030/list-objects-filter.c
Examining data/git-2.29.2+next.20201030/list-objects-filter.h
Examining data/git-2.29.2+next.20201030/list-objects.c
Examining data/git-2.29.2+next.20201030/list-objects.h
Examining data/git-2.29.2+next.20201030/list.h
Examining data/git-2.29.2+next.20201030/ll-merge.c
Examining data/git-2.29.2+next.20201030/ll-merge.h
Examining data/git-2.29.2+next.20201030/lockfile.c
Examining data/git-2.29.2+next.20201030/lockfile.h
Examining data/git-2.29.2+next.20201030/log-tree.c
Examining data/git-2.29.2+next.20201030/log-tree.h
Examining data/git-2.29.2+next.20201030/ls-refs.c
Examining data/git-2.29.2+next.20201030/ls-refs.h
Examining data/git-2.29.2+next.20201030/mailinfo.c
Examining data/git-2.29.2+next.20201030/mailinfo.h
Examining data/git-2.29.2+next.20201030/mailmap.c
Examining data/git-2.29.2+next.20201030/mailmap.h
Examining data/git-2.29.2+next.20201030/match-trees.c
Examining data/git-2.29.2+next.20201030/mem-pool.c
Examining data/git-2.29.2+next.20201030/mem-pool.h
Examining data/git-2.29.2+next.20201030/merge-blobs.c
Examining data/git-2.29.2+next.20201030/merge-blobs.h
Examining data/git-2.29.2+next.20201030/merge-recursive.c
Examining data/git-2.29.2+next.20201030/merge-recursive.h
Examining data/git-2.29.2+next.20201030/merge.c
Examining data/git-2.29.2+next.20201030/mergesort.c
Examining data/git-2.29.2+next.20201030/mergesort.h
Examining data/git-2.29.2+next.20201030/midx.c
Examining data/git-2.29.2+next.20201030/midx.h
Examining data/git-2.29.2+next.20201030/name-hash.c
Examining data/git-2.29.2+next.20201030/negotiator/default.c
Examining data/git-2.29.2+next.20201030/negotiator/default.h
Examining data/git-2.29.2+next.20201030/negotiator/noop.c
Examining data/git-2.29.2+next.20201030/negotiator/noop.h
Examining data/git-2.29.2+next.20201030/negotiator/skipping.c
Examining data/git-2.29.2+next.20201030/negotiator/skipping.h
Examining data/git-2.29.2+next.20201030/notes-cache.c
Examining data/git-2.29.2+next.20201030/notes-cache.h
Examining data/git-2.29.2+next.20201030/notes-merge.c
Examining data/git-2.29.2+next.20201030/notes-merge.h
Examining data/git-2.29.2+next.20201030/notes-utils.c
Examining data/git-2.29.2+next.20201030/notes-utils.h
Examining data/git-2.29.2+next.20201030/notes.c
Examining data/git-2.29.2+next.20201030/notes.h
Examining data/git-2.29.2+next.20201030/object-store.h
Examining data/git-2.29.2+next.20201030/object.c
Examining data/git-2.29.2+next.20201030/object.h
Examining data/git-2.29.2+next.20201030/oid-array.c
Examining data/git-2.29.2+next.20201030/oid-array.h
Examining data/git-2.29.2+next.20201030/oidmap.c
Examining data/git-2.29.2+next.20201030/oidmap.h
Examining data/git-2.29.2+next.20201030/oidset.c
Examining data/git-2.29.2+next.20201030/oidset.h
Examining data/git-2.29.2+next.20201030/pack-bitmap-write.c
Examining data/git-2.29.2+next.20201030/pack-bitmap.c
Examining data/git-2.29.2+next.20201030/pack-bitmap.h
Examining data/git-2.29.2+next.20201030/pack-check.c
Examining data/git-2.29.2+next.20201030/pack-objects.c
Examining data/git-2.29.2+next.20201030/pack-objects.h
Examining data/git-2.29.2+next.20201030/pack-revindex.c
Examining data/git-2.29.2+next.20201030/pack-revindex.h
Examining data/git-2.29.2+next.20201030/pack-write.c
Examining data/git-2.29.2+next.20201030/pack.h
Examining data/git-2.29.2+next.20201030/packfile.c
Examining data/git-2.29.2+next.20201030/packfile.h
Examining data/git-2.29.2+next.20201030/pager.c
Examining data/git-2.29.2+next.20201030/parse-options-cb.c
Examining data/git-2.29.2+next.20201030/parse-options.c
Examining data/git-2.29.2+next.20201030/parse-options.h
Examining data/git-2.29.2+next.20201030/patch-delta.c
Examining data/git-2.29.2+next.20201030/patch-ids.c
Examining data/git-2.29.2+next.20201030/patch-ids.h
Examining data/git-2.29.2+next.20201030/path.c
Examining data/git-2.29.2+next.20201030/path.h
Examining data/git-2.29.2+next.20201030/pathspec.c
Examining data/git-2.29.2+next.20201030/pathspec.h
Examining data/git-2.29.2+next.20201030/pkt-line.c
Examining data/git-2.29.2+next.20201030/pkt-line.h
Examining data/git-2.29.2+next.20201030/ppc/sha1.c
Examining data/git-2.29.2+next.20201030/ppc/sha1.h
Examining data/git-2.29.2+next.20201030/preload-index.c
Examining data/git-2.29.2+next.20201030/pretty.c
Examining data/git-2.29.2+next.20201030/pretty.h
Examining data/git-2.29.2+next.20201030/prio-queue.c
Examining data/git-2.29.2+next.20201030/prio-queue.h
Examining data/git-2.29.2+next.20201030/progress.c
Examining data/git-2.29.2+next.20201030/progress.h
Examining data/git-2.29.2+next.20201030/promisor-remote.c
Examining data/git-2.29.2+next.20201030/promisor-remote.h
Examining data/git-2.29.2+next.20201030/prompt.c
Examining data/git-2.29.2+next.20201030/prompt.h
Examining data/git-2.29.2+next.20201030/protocol.c
Examining data/git-2.29.2+next.20201030/protocol.h
Examining data/git-2.29.2+next.20201030/prune-packed.c
Examining data/git-2.29.2+next.20201030/prune-packed.h
Examining data/git-2.29.2+next.20201030/quote.c
Examining data/git-2.29.2+next.20201030/quote.h
Examining data/git-2.29.2+next.20201030/range-diff.c
Examining data/git-2.29.2+next.20201030/range-diff.h
Examining data/git-2.29.2+next.20201030/reachable.c
Examining data/git-2.29.2+next.20201030/reachable.h
Examining data/git-2.29.2+next.20201030/read-cache.c
Examining data/git-2.29.2+next.20201030/rebase-interactive.c
Examining data/git-2.29.2+next.20201030/rebase-interactive.h
Examining data/git-2.29.2+next.20201030/rebase.c
Examining data/git-2.29.2+next.20201030/rebase.h
Examining data/git-2.29.2+next.20201030/ref-filter.c
Examining data/git-2.29.2+next.20201030/ref-filter.h
Examining data/git-2.29.2+next.20201030/reflog-walk.c
Examining data/git-2.29.2+next.20201030/reflog-walk.h
Examining data/git-2.29.2+next.20201030/refs.c
Examining data/git-2.29.2+next.20201030/refs.h
Examining data/git-2.29.2+next.20201030/refs/debug.c
Examining data/git-2.29.2+next.20201030/refs/files-backend.c
Examining data/git-2.29.2+next.20201030/refs/iterator.c
Examining data/git-2.29.2+next.20201030/refs/packed-backend.c
Examining data/git-2.29.2+next.20201030/refs/packed-backend.h
Examining data/git-2.29.2+next.20201030/refs/ref-cache.c
Examining data/git-2.29.2+next.20201030/refs/ref-cache.h
Examining data/git-2.29.2+next.20201030/refs/refs-internal.h
Examining data/git-2.29.2+next.20201030/refspec.c
Examining data/git-2.29.2+next.20201030/refspec.h
Examining data/git-2.29.2+next.20201030/remote-curl.c
Examining data/git-2.29.2+next.20201030/remote.c
Examining data/git-2.29.2+next.20201030/remote.h
Examining data/git-2.29.2+next.20201030/replace-object.c
Examining data/git-2.29.2+next.20201030/replace-object.h
Examining data/git-2.29.2+next.20201030/repo-settings.c
Examining data/git-2.29.2+next.20201030/repository.c
Examining data/git-2.29.2+next.20201030/repository.h
Examining data/git-2.29.2+next.20201030/rerere.c
Examining data/git-2.29.2+next.20201030/rerere.h
Examining data/git-2.29.2+next.20201030/reset.c
Examining data/git-2.29.2+next.20201030/reset.h
Examining data/git-2.29.2+next.20201030/resolve-undo.c
Examining data/git-2.29.2+next.20201030/resolve-undo.h
Examining data/git-2.29.2+next.20201030/revision.c
Examining data/git-2.29.2+next.20201030/revision.h
Examining data/git-2.29.2+next.20201030/run-command.c
Examining data/git-2.29.2+next.20201030/run-command.h
Examining data/git-2.29.2+next.20201030/send-pack.c
Examining data/git-2.29.2+next.20201030/send-pack.h
Examining data/git-2.29.2+next.20201030/sequencer.c
Examining data/git-2.29.2+next.20201030/sequencer.h
Examining data/git-2.29.2+next.20201030/serve.c
Examining data/git-2.29.2+next.20201030/serve.h
Examining data/git-2.29.2+next.20201030/server-info.c
Examining data/git-2.29.2+next.20201030/setup.c
Examining data/git-2.29.2+next.20201030/sh-i18n--envsubst.c
Examining data/git-2.29.2+next.20201030/sha1-file.c
Examining data/git-2.29.2+next.20201030/sha1-lookup.c
Examining data/git-2.29.2+next.20201030/sha1-lookup.h
Examining data/git-2.29.2+next.20201030/sha1-name.c
Examining data/git-2.29.2+next.20201030/sha1dc/sha1.c
Examining data/git-2.29.2+next.20201030/sha1dc/sha1.h
Examining data/git-2.29.2+next.20201030/sha1dc/ubc_check.c
Examining data/git-2.29.2+next.20201030/sha1dc/ubc_check.h
Examining data/git-2.29.2+next.20201030/sha1dc_git.c
Examining data/git-2.29.2+next.20201030/sha1dc_git.h
Examining data/git-2.29.2+next.20201030/sha256/block/sha256.c
Examining data/git-2.29.2+next.20201030/sha256/block/sha256.h
Examining data/git-2.29.2+next.20201030/sha256/gcrypt.h
Examining data/git-2.29.2+next.20201030/shallow.c
Examining data/git-2.29.2+next.20201030/shallow.h
Examining data/git-2.29.2+next.20201030/shell.c
Examining data/git-2.29.2+next.20201030/shortlog.h
Examining data/git-2.29.2+next.20201030/sideband.c
Examining data/git-2.29.2+next.20201030/sideband.h
Examining data/git-2.29.2+next.20201030/sigchain.c
Examining data/git-2.29.2+next.20201030/sigchain.h
Examining data/git-2.29.2+next.20201030/split-index.c
Examining data/git-2.29.2+next.20201030/split-index.h
Examining data/git-2.29.2+next.20201030/stable-qsort.c
Examining data/git-2.29.2+next.20201030/strbuf.c
Examining data/git-2.29.2+next.20201030/strbuf.h
Examining data/git-2.29.2+next.20201030/streaming.c
Examining data/git-2.29.2+next.20201030/streaming.h
Examining data/git-2.29.2+next.20201030/string-list.c
Examining data/git-2.29.2+next.20201030/string-list.h
Examining data/git-2.29.2+next.20201030/strvec.c
Examining data/git-2.29.2+next.20201030/strvec.h
Examining data/git-2.29.2+next.20201030/sub-process.c
Examining data/git-2.29.2+next.20201030/sub-process.h
Examining data/git-2.29.2+next.20201030/submodule-config.c
Examining data/git-2.29.2+next.20201030/submodule-config.h
Examining data/git-2.29.2+next.20201030/submodule.c
Examining data/git-2.29.2+next.20201030/submodule.h
Examining data/git-2.29.2+next.20201030/symlinks.c
Examining data/git-2.29.2+next.20201030/t/helper/test-advise.c
Examining data/git-2.29.2+next.20201030/t/helper/test-bloom.c
Examining data/git-2.29.2+next.20201030/t/helper/test-chmtime.c
Examining data/git-2.29.2+next.20201030/t/helper/test-config.c
Examining data/git-2.29.2+next.20201030/t/helper/test-ctype.c
Examining data/git-2.29.2+next.20201030/t/helper/test-date.c
Examining data/git-2.29.2+next.20201030/t/helper/test-delta.c
Examining data/git-2.29.2+next.20201030/t/helper/test-dir-iterator.c
Examining data/git-2.29.2+next.20201030/t/helper/test-drop-caches.c
Examining data/git-2.29.2+next.20201030/t/helper/test-dump-cache-tree.c
Examining data/git-2.29.2+next.20201030/t/helper/test-dump-fsmonitor.c
Examining data/git-2.29.2+next.20201030/t/helper/test-dump-split-index.c
Examining data/git-2.29.2+next.20201030/t/helper/test-dump-untracked-cache.c
Examining data/git-2.29.2+next.20201030/t/helper/test-example-decorate.c
Examining data/git-2.29.2+next.20201030/t/helper/test-fake-ssh.c
Examining data/git-2.29.2+next.20201030/t/helper/test-genrandom.c
Examining data/git-2.29.2+next.20201030/t/helper/test-genzeros.c
Examining data/git-2.29.2+next.20201030/t/helper/test-hash-speed.c
Examining data/git-2.29.2+next.20201030/t/helper/test-hash.c
Examining data/git-2.29.2+next.20201030/t/helper/test-hashmap.c
Examining data/git-2.29.2+next.20201030/t/helper/test-index-version.c
Examining data/git-2.29.2+next.20201030/t/helper/test-json-writer.c
Examining data/git-2.29.2+next.20201030/t/helper/test-lazy-init-name-hash.c
Examining data/git-2.29.2+next.20201030/t/helper/test-match-trees.c
Examining data/git-2.29.2+next.20201030/t/helper/test-mergesort.c
Examining data/git-2.29.2+next.20201030/t/helper/test-mktemp.c
Examining data/git-2.29.2+next.20201030/t/helper/test-oid-array.c
Examining data/git-2.29.2+next.20201030/t/helper/test-oidmap.c
Examining data/git-2.29.2+next.20201030/t/helper/test-online-cpus.c
Examining data/git-2.29.2+next.20201030/t/helper/test-parse-options.c
Examining data/git-2.29.2+next.20201030/t/helper/test-parse-pathspec-file.c
Examining data/git-2.29.2+next.20201030/t/helper/test-path-utils.c
Examining data/git-2.29.2+next.20201030/t/helper/test-pkt-line.c
Examining data/git-2.29.2+next.20201030/t/helper/test-prio-queue.c
Examining data/git-2.29.2+next.20201030/t/helper/test-proc-receive.c
Examining data/git-2.29.2+next.20201030/t/helper/test-progress.c
Examining data/git-2.29.2+next.20201030/t/helper/test-reach.c
Examining data/git-2.29.2+next.20201030/t/helper/test-read-cache.c
Examining data/git-2.29.2+next.20201030/t/helper/test-read-graph.c
Examining data/git-2.29.2+next.20201030/t/helper/test-read-midx.c
Examining data/git-2.29.2+next.20201030/t/helper/test-ref-store.c
Examining data/git-2.29.2+next.20201030/t/helper/test-regex.c
Examining data/git-2.29.2+next.20201030/t/helper/test-repository.c
Examining data/git-2.29.2+next.20201030/t/helper/test-revision-walking.c
Examining data/git-2.29.2+next.20201030/t/helper/test-run-command.c
Examining data/git-2.29.2+next.20201030/t/helper/test-scrap-cache-tree.c
Examining data/git-2.29.2+next.20201030/t/helper/test-serve-v2.c
Examining data/git-2.29.2+next.20201030/t/helper/test-sha1.c
Examining data/git-2.29.2+next.20201030/t/helper/test-sha256.c
Examining data/git-2.29.2+next.20201030/t/helper/test-sigchain.c
Examining data/git-2.29.2+next.20201030/t/helper/test-strcmp-offset.c
Examining data/git-2.29.2+next.20201030/t/helper/test-string-list.c
Examining data/git-2.29.2+next.20201030/t/helper/test-submodule-config.c
Examining data/git-2.29.2+next.20201030/t/helper/test-submodule-nested-repo-config.c
Examining data/git-2.29.2+next.20201030/t/helper/test-subprocess.c
Examining data/git-2.29.2+next.20201030/t/helper/test-tool.c
Examining data/git-2.29.2+next.20201030/t/helper/test-tool.h
Examining data/git-2.29.2+next.20201030/t/helper/test-trace2.c
Examining data/git-2.29.2+next.20201030/t/helper/test-urlmatch-normalization.c
Examining data/git-2.29.2+next.20201030/t/helper/test-wildmatch.c
Examining data/git-2.29.2+next.20201030/t/helper/test-windows-named-pipe.c
Examining data/git-2.29.2+next.20201030/t/helper/test-write-cache.c
Examining data/git-2.29.2+next.20201030/t/helper/test-xml-encode.c
Examining data/git-2.29.2+next.20201030/t/t0200/test.c
Examining data/git-2.29.2+next.20201030/t/t4051/appended1.c
Examining data/git-2.29.2+next.20201030/t/t4051/appended2.c
Examining data/git-2.29.2+next.20201030/t/t4051/dummy.c
Examining data/git-2.29.2+next.20201030/t/t4051/hello.c
Examining data/git-2.29.2+next.20201030/t/t4051/includes.c
Examining data/git-2.29.2+next.20201030/t/t4256/1/mailinfo.c
Examining data/git-2.29.2+next.20201030/tag.c
Examining data/git-2.29.2+next.20201030/tag.h
Examining data/git-2.29.2+next.20201030/tar.h
Examining data/git-2.29.2+next.20201030/tempfile.c
Examining data/git-2.29.2+next.20201030/tempfile.h
Examining data/git-2.29.2+next.20201030/thread-utils.c
Examining data/git-2.29.2+next.20201030/thread-utils.h
Examining data/git-2.29.2+next.20201030/tmp-objdir.c
Examining data/git-2.29.2+next.20201030/tmp-objdir.h
Examining data/git-2.29.2+next.20201030/trace.c
Examining data/git-2.29.2+next.20201030/trace.h
Examining data/git-2.29.2+next.20201030/trace2.c
Examining data/git-2.29.2+next.20201030/trace2.h
Examining data/git-2.29.2+next.20201030/trace2/tr2_cfg.c
Examining data/git-2.29.2+next.20201030/trace2/tr2_cfg.h
Examining data/git-2.29.2+next.20201030/trace2/tr2_cmd_name.c
Examining data/git-2.29.2+next.20201030/trace2/tr2_cmd_name.h
Examining data/git-2.29.2+next.20201030/trace2/tr2_dst.c
Examining data/git-2.29.2+next.20201030/trace2/tr2_dst.h
Examining data/git-2.29.2+next.20201030/trace2/tr2_sid.c
Examining data/git-2.29.2+next.20201030/trace2/tr2_sid.h
Examining data/git-2.29.2+next.20201030/trace2/tr2_sysenv.c
Examining data/git-2.29.2+next.20201030/trace2/tr2_sysenv.h
Examining data/git-2.29.2+next.20201030/trace2/tr2_tbuf.c
Examining data/git-2.29.2+next.20201030/trace2/tr2_tbuf.h
Examining data/git-2.29.2+next.20201030/trace2/tr2_tgt.h
Examining data/git-2.29.2+next.20201030/trace2/tr2_tgt_event.c
Examining data/git-2.29.2+next.20201030/trace2/tr2_tgt_normal.c
Examining data/git-2.29.2+next.20201030/trace2/tr2_tgt_perf.c
Examining data/git-2.29.2+next.20201030/trace2/tr2_tls.c
Examining data/git-2.29.2+next.20201030/trace2/tr2_tls.h
Examining data/git-2.29.2+next.20201030/trailer.c
Examining data/git-2.29.2+next.20201030/trailer.h
Examining data/git-2.29.2+next.20201030/transport-helper.c
Examining data/git-2.29.2+next.20201030/transport-internal.h
Examining data/git-2.29.2+next.20201030/transport.c
Examining data/git-2.29.2+next.20201030/transport.h
Examining data/git-2.29.2+next.20201030/tree-diff.c
Examining data/git-2.29.2+next.20201030/tree-walk.c
Examining data/git-2.29.2+next.20201030/tree-walk.h
Examining data/git-2.29.2+next.20201030/tree.c
Examining data/git-2.29.2+next.20201030/tree.h
Examining data/git-2.29.2+next.20201030/unicode-width.h
Examining data/git-2.29.2+next.20201030/unix-socket.c
Examining data/git-2.29.2+next.20201030/unix-socket.h
Examining data/git-2.29.2+next.20201030/unpack-trees.c
Examining data/git-2.29.2+next.20201030/unpack-trees.h
Examining data/git-2.29.2+next.20201030/upload-pack.c
Examining data/git-2.29.2+next.20201030/upload-pack.h
Examining data/git-2.29.2+next.20201030/url.c
Examining data/git-2.29.2+next.20201030/url.h
Examining data/git-2.29.2+next.20201030/urlmatch.c
Examining data/git-2.29.2+next.20201030/urlmatch.h
Examining data/git-2.29.2+next.20201030/usage.c
Examining data/git-2.29.2+next.20201030/userdiff.c
Examining data/git-2.29.2+next.20201030/userdiff.h
Examining data/git-2.29.2+next.20201030/utf8.c
Examining data/git-2.29.2+next.20201030/utf8.h
Examining data/git-2.29.2+next.20201030/varint.c
Examining data/git-2.29.2+next.20201030/varint.h
Examining data/git-2.29.2+next.20201030/vcs-svn/fast_export.h
Examining data/git-2.29.2+next.20201030/vcs-svn/line_buffer.h
Examining data/git-2.29.2+next.20201030/vcs-svn/sliding_window.h
Examining data/git-2.29.2+next.20201030/vcs-svn/svndiff.h
Examining data/git-2.29.2+next.20201030/vcs-svn/svndump.h
Examining data/git-2.29.2+next.20201030/version.c
Examining data/git-2.29.2+next.20201030/version.h
Examining data/git-2.29.2+next.20201030/versioncmp.c
Examining data/git-2.29.2+next.20201030/walker.c
Examining data/git-2.29.2+next.20201030/walker.h
Examining data/git-2.29.2+next.20201030/wildmatch.c
Examining data/git-2.29.2+next.20201030/wildmatch.h
Examining data/git-2.29.2+next.20201030/worktree.c
Examining data/git-2.29.2+next.20201030/worktree.h
Examining data/git-2.29.2+next.20201030/wrapper.c
Examining data/git-2.29.2+next.20201030/write-or-die.c
Examining data/git-2.29.2+next.20201030/ws.c
Examining data/git-2.29.2+next.20201030/wt-status.c
Examining data/git-2.29.2+next.20201030/wt-status.h
Examining data/git-2.29.2+next.20201030/xdiff-interface.c
Examining data/git-2.29.2+next.20201030/xdiff-interface.h
Examining data/git-2.29.2+next.20201030/xdiff/xdiff.h
Examining data/git-2.29.2+next.20201030/xdiff/xdiffi.c
Examining data/git-2.29.2+next.20201030/xdiff/xdiffi.h
Examining data/git-2.29.2+next.20201030/xdiff/xemit.c
Examining data/git-2.29.2+next.20201030/xdiff/xemit.h
Examining data/git-2.29.2+next.20201030/xdiff/xhistogram.c
Examining data/git-2.29.2+next.20201030/xdiff/xinclude.h
Examining data/git-2.29.2+next.20201030/xdiff/xmacros.h
Examining data/git-2.29.2+next.20201030/xdiff/xmerge.c
Examining data/git-2.29.2+next.20201030/xdiff/xpatience.c
Examining data/git-2.29.2+next.20201030/xdiff/xprepare.c
Examining data/git-2.29.2+next.20201030/xdiff/xprepare.h
Examining data/git-2.29.2+next.20201030/xdiff/xtypes.h
Examining data/git-2.29.2+next.20201030/xdiff/xutils.c
Examining data/git-2.29.2+next.20201030/xdiff/xutils.h
Examining data/git-2.29.2+next.20201030/zlib.c

FINAL RESULTS:

data/git-2.29.2+next.20201030/builtin/index-pack.c:1517:3:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
		chmod(final_pack_name, 0444);
data/git-2.29.2+next.20201030/builtin/index-pack.c:1525:3:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
		chmod(final_index_name, 0444);
data/git-2.29.2+next.20201030/builtin/init-db.c:265:8:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
		  || readlink(path, junk, sizeof(junk)-1) != -1);
data/git-2.29.2+next.20201030/builtin/init-db.c:289:16:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
		filemode = (!chmod(path, st1.st_mode ^ S_IXUSR) &&
data/git-2.29.2+next.20201030/builtin/init-db.c:292:6:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
				!chmod(path, st1.st_mode));
data/git-2.29.2+next.20201030/builtin/repack.c:513:5:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
				chmod(fname_old, statbuffer.st_mode);
data/git-2.29.2+next.20201030/compat/mingw.c:793:22:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
						buf->st_size = readlink(file_name, buffer, MAXIMUM_REPARSE_DATA_BUFFER_SIZE);
data/git-2.29.2+next.20201030/compat/mingw.h:123:19:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
static inline int readlink(const char *path, char *buf, size_t bufsiz)
data/git-2.29.2+next.20201030/compat/mingw.h:254:9:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
#define chmod mingw_chmod
data/git-2.29.2+next.20201030/config.c:2886:7:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
		if (chmod(get_lock_file_path(&lock), st.st_mode & 07777) < 0) {
data/git-2.29.2+next.20201030/config.c:3124:6:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
	if (chmod(get_lock_file_path(&lock), st.st_mode & 07777) < 0) {
data/git-2.29.2+next.20201030/path.c:674:9:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
		len = readlink(path, buffer, sizeof(buffer)-1);
data/git-2.29.2+next.20201030/path.c:901:4:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
			chmod(path, (new_mode & ~S_IFMT)) < 0)
data/git-2.29.2+next.20201030/strbuf.c:572:9:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
		len = readlink(path, sb->buf, hint);
data/git-2.29.2+next.20201030/t/helper/test-chmtime.c:119:5:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
				chmod(argv[i], sb.st_mode | S_IWUSR)) {
data/git-2.29.2+next.20201030/add-interactive.c:698:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf(Q_("updated %d path\n",
data/git-2.29.2+next.20201030/add-interactive.c:805:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf(Q_("reverted %d path\n",
data/git-2.29.2+next.20201030/add-interactive.c:887:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf(Q_("added %d path\n",
data/git-2.29.2+next.20201030/add-patch.c:289:2:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	vfprintf(stderr, fmt, args);
data/git-2.29.2+next.20201030/advice.c:307:2:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	fprintf(stderr, fmt, new_name);
data/git-2.29.2+next.20201030/advice.h:78:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
__attribute__((format (printf, 1, 2)))
data/git-2.29.2+next.20201030/apply.c:376:2:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	fprintf(output, fmt, sb.buf);
data/git-2.29.2+next.20201030/banned.h:13:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
#undef strcpy
data/git-2.29.2+next.20201030/banned.h:14:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
#define strcpy(x,y) BANNED(strcpy)
data/git-2.29.2+next.20201030/banned.h:14:28:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
#define strcpy(x,y) BANNED(strcpy)
data/git-2.29.2+next.20201030/banned.h:15:8:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
#undef strcat
data/git-2.29.2+next.20201030/banned.h:16:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
#define strcat(x,y) BANNED(strcat)
data/git-2.29.2+next.20201030/banned.h:16:28:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
#define strcat(x,y) BANNED(strcat)
data/git-2.29.2+next.20201030/banned.h:22:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#undef sprintf
data/git-2.29.2+next.20201030/banned.h:23:8:  [4] (buffer) vsprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#undef vsprintf
data/git-2.29.2+next.20201030/banned.h:25:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#define sprintf(...) BANNED(sprintf)
data/git-2.29.2+next.20201030/banned.h:25:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#define sprintf(...) BANNED(sprintf)
data/git-2.29.2+next.20201030/banned.h:26:9:  [4] (buffer) vsprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#define vsprintf(...) BANNED(vsprintf)
data/git-2.29.2+next.20201030/banned.h:26:30:  [4] (buffer) vsprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#define vsprintf(...) BANNED(vsprintf)
data/git-2.29.2+next.20201030/banned.h:28:9:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
#define sprintf(buf,fmt,arg) BANNED(sprintf)
data/git-2.29.2+next.20201030/banned.h:28:37:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#define sprintf(buf,fmt,arg) BANNED(sprintf)
data/git-2.29.2+next.20201030/banned.h:29:9:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
#define vsprintf(buf,fmt,arg) BANNED(vsprintf)
data/git-2.29.2+next.20201030/banned.h:29:38:  [4] (buffer) vsprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#define vsprintf(buf,fmt,arg) BANNED(vsprintf)
data/git-2.29.2+next.20201030/base85.c:6:16:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define say(a) fprintf(stderr, a)
data/git-2.29.2+next.20201030/base85.c:7:19:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define say1(a,b) fprintf(stderr, a, b)
data/git-2.29.2+next.20201030/base85.c:8:21:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define say2(a,b,c) fprintf(stderr, a, b, c)
data/git-2.29.2+next.20201030/bisect.c:1088:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(Q_("Bisecting: %d revision left to test after this %s\n",
data/git-2.29.2+next.20201030/builtin/add.c:412:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		fprintf(stderr, _(ignore_error));
data/git-2.29.2+next.20201030/builtin/am.c:207:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		vfprintf(fp, fmt, ap);
data/git-2.29.2+next.20201030/builtin/bisect--helper.c:109:8:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	res = vfprintf(fp, format, args);
data/git-2.29.2+next.20201030/builtin/branch.c:278:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			printf(remote_branch
data/git-2.29.2+next.20201030/builtin/check-attr.c:45:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			printf("%s%c" /* path */
data/git-2.29.2+next.20201030/builtin/checkout.c:981:2:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	fprintf(stderr,
data/git-2.29.2+next.20201030/builtin/checkout.c:1000:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		fprintf(stderr,
data/git-2.29.2+next.20201030/builtin/clean.c:166:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			printf(dry_run ?  _(msg_would_skip_git_dir) : _(msg_skip_git_dir),
data/git-2.29.2+next.20201030/builtin/clean.c:252:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			printf(dry_run ?  _(msg_would_remove) : _(msg_remove), dels.items[i].string);
data/git-2.29.2+next.20201030/builtin/clean.c:301:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(singleton ?
data/git-2.29.2+next.20201030/builtin/clean.c:1051:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
				printf(dry_run ? _(msg_would_remove) : _(msg_remove), qname);
data/git-2.29.2+next.20201030/builtin/clean.c:1063:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
				printf(dry_run ? _(msg_would_remove) : _(msg_remove), qname);
data/git-2.29.2+next.20201030/builtin/clone.c:948:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (!access(alternates, F_OK)) {
data/git-2.29.2+next.20201030/builtin/clone.c:1217:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if (!access(mkpath("%s/shallow", path), F_OK)) {
data/git-2.29.2+next.20201030/builtin/credential-store.c:106:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if (!access(fn->string, F_OK)) {
data/git-2.29.2+next.20201030/builtin/credential-store.c:133:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if (!access(fn->string, F_OK))
data/git-2.29.2+next.20201030/builtin/fast-import.c:407:2:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	vsnprintf(message, sizeof(message), err, params);
data/git-2.29.2+next.20201030/builtin/gc.c:437:4:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
			fscanf(fp, scan_fmt, &pid, locking_host) == 2 &&
data/git-2.29.2+next.20201030/builtin/help.c:228:3:  [4] (shell) execlp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		execlp(path, "emacsclient", "-e", man_page.buf, (char *)NULL);
data/git-2.29.2+next.20201030/builtin/help.c:250:3:  [4] (shell) execlp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		execlp(path, filename, "newTab", man_page.buf, (char *)NULL);
data/git-2.29.2+next.20201030/builtin/help.c:260:2:  [4] (shell) execlp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	execlp(path, "man", page, (char *)NULL);
data/git-2.29.2+next.20201030/builtin/help.c:268:2:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	execl(SHELL_PATH, SHELL_PATH, "-c", shell_cmd.buf, (char *)NULL);
data/git-2.29.2+next.20201030/builtin/help.c:460:2:  [4] (shell) execlp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	execlp("info", "info", "gitman", page, (char *)NULL);
data/git-2.29.2+next.20201030/builtin/index-pack.c:372:38:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		       ...) __attribute__((format (printf, 2, 3)));
data/git-2.29.2+next.20201030/builtin/index-pack.c:380:2:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	vsnprintf(buf, sizeof(buf), format, params);
data/git-2.29.2+next.20201030/builtin/index-pack.c:1667:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf("%s %-6s %"PRIuMAX" %"PRIuMAX" %"PRIuMAX,
data/git-2.29.2+next.20201030/builtin/init-db.c:264:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	reinit = (!access(path, R_OK)
data/git-2.29.2+next.20201030/builtin/init-db.c:324:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if (!access(path, F_OK))
data/git-2.29.2+next.20201030/builtin/init-db.c:473:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			printf(get_shared_repository()
data/git-2.29.2+next.20201030/builtin/init-db.c:478:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			printf(get_shared_repository()
data/git-2.29.2+next.20201030/builtin/init-db.c:687:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if (access(get_git_work_tree(), X_OK))
data/git-2.29.2+next.20201030/builtin/receive-pack.c:420:67:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
static void rp_error(const char *err, ...) __attribute__((format (printf, 1, 2)));
data/git-2.29.2+next.20201030/builtin/receive-pack.c:421:69:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
static void rp_warning(const char *err, ...) __attribute__((format (printf, 1, 2)));
data/git-2.29.2+next.20201030/builtin/receive-pack.c:429:8:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	sz += vsnprintf(msg + sz, sizeof(msg) - sz, err, params);
data/git-2.29.2+next.20201030/builtin/remote.c:1008:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf(fmt, arg);
data/git-2.29.2+next.20201030/builtin/reset.c:46:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	return !access(git_path_merge_head(the_repository), F_OK);
data/git-2.29.2+next.20201030/builtin/submodule--helper.c:1571:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			printf(format, displaypath);
data/git-2.29.2+next.20201030/builtin/submodule--helper.c:1887:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if (require_init && !access(path, X_OK) && !is_empty_dir(path))
data/git-2.29.2+next.20201030/builtin/update-index.c:52:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
__attribute__((format (printf, 1, 2)))
data/git-2.29.2+next.20201030/builtin/update-index.c:61:2:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	vprintf(fmt, vp);
data/git-2.29.2+next.20201030/builtin/upload-archive.c:52:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
__attribute__((format (printf, 1, 2)))
data/git-2.29.2+next.20201030/cache.h:1812:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
__attribute__((format (printf, 2, 3)))
data/git-2.29.2+next.20201030/cache.h:1846:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
__attribute__((format (printf, 2, 3)))
data/git-2.29.2+next.20201030/color.c:427:7:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	r += vfprintf(fp, fmt, args);
data/git-2.29.2+next.20201030/color.h:118:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
__attribute__((format (printf, 3, 4)))
data/git-2.29.2+next.20201030/color.h:120:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
__attribute__((format (printf, 3, 4)))
data/git-2.29.2+next.20201030/commit-graph.c:2346:2:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	vfprintf(stderr, fmt, ap);
data/git-2.29.2+next.20201030/commit.c:1494:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		fprintf(stderr, _(commit_utf8_warn));
data/git-2.29.2+next.20201030/compat/access.c:14:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		return access(path, mode);
data/git-2.29.2+next.20201030/compat/inet_ntop.c:53:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	nprinted = snprintf(tmp, sizeof(tmp), fmt, src[0], src[1], src[2], src[3]);
data/git-2.29.2+next.20201030/compat/mingw.c:199:2:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	vsnprintf(question, sizeof(question), format, args);
data/git-2.29.2+next.20201030/compat/mingw.c:323:2:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
	wcscpy(wbuf, wpath);
data/git-2.29.2+next.20201030/compat/mingw.c:605:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (hide && !access(filename, F_OK) && set_hidden_flag(wfilename, 0)) {
data/git-2.29.2+next.20201030/compat/mingw.c:634:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (hide && !access(filename, F_OK) && set_hidden_flag(wfilename, 0)) {
data/git-2.29.2+next.20201030/compat/mingw.c:1019:19:  [4] (tmpfile) mktemp:
  Temporary file race condition (CWE-377).
	char *filename = mktemp(template);
data/git-2.29.2+next.20201030/compat/mingw.h:247:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
#undef access
data/git-2.29.2+next.20201030/compat/mingw.h:248:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
#define access mingw_access
data/git-2.29.2+next.20201030/compat/mingw.h:257:9:  [4] (tmpfile) mktemp:
  Temporary file race condition (CWE-377).
#define mktemp mingw_mktemp
data/git-2.29.2+next.20201030/compat/mingw.h:408:9:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
#define execvp mingw_execvp
data/git-2.29.2+next.20201030/compat/mingw.h:410:9:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
#define execv mingw_execv
data/git-2.29.2+next.20201030/compat/mkdtemp.c:5:8:  [4] (tmpfile) mktemp:
  Temporary file race condition (CWE-377).
	if (!*mktemp(template) || mkdir(template, 0700))
data/git-2.29.2+next.20201030/compat/precompose_utf8.c:53:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		precomposed_unicode = access(path.buf, R_OK) ? 0 : 1;
data/git-2.29.2+next.20201030/compat/snprintf.c:19:8:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#undef vsnprintf
data/git-2.29.2+next.20201030/compat/snprintf.c:28:9:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		ret = vsnprintf(str, maxsize-SNPRINTF_SIZE_CORR, format, cp);
data/git-2.29.2+next.20201030/compat/snprintf.c:49:9:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		ret = vsnprintf(str, maxsize-SNPRINTF_SIZE_CORR, format, cp);
data/git-2.29.2+next.20201030/compat/terminal.c:366:9:  [4] (misc) getpass:
  This function is obsolete and not portable. It was in SUSv2 but removed by
  POSIX.2. What it does exactly varies considerably between systems,
  particularly in where its prompt is displayed and where it gets its data
  (e.g., /dev/tty, stdin, stderr, etc.). In addition, some implementations
  overflow buffers. (CWE-676, CWE-120, CWE-20). Make the specific calls to do
  exactly what you want. If you continue to use it, or write your own, be
  sure to zero the password as soon as possible to avoid leaving the
  cleartext password visible in the process' address space.
	return getpass(prompt);
data/git-2.29.2+next.20201030/compat/terminal.c:380:8:  [4] (misc) getpass:
  This function is obsolete and not portable. It was in SUSv2 but removed by
  POSIX.2. What it does exactly varies considerably between systems,
  particularly in where its prompt is displayed and where it gets its data
  (e.g., /dev/tty, stdin, stderr, etc.). In addition, some implementations
  overflow buffers. (CWE-676, CWE-120, CWE-20). Make the specific calls to do
  exactly what you want. If you continue to use it, or write your own, be
  sure to zero the password as soon as possible to avoid leaving the
  cleartext password visible in the process' address space.
	res = getpass("");
data/git-2.29.2+next.20201030/compat/win32/syslog.c:16:6:  [4] (format) syslog:
  If syslog's format strings can be influenced by an attacker, they can be
  exploited (CWE-134). Use a constant format string for syslog.
void syslog(int priority, const char *fmt, ...)
data/git-2.29.2+next.20201030/compat/win32/syslog.c:27:12:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	str_len = vsnprintf(NULL, 0, fmt, ap);
data/git-2.29.2+next.20201030/compat/win32/syslog.c:42:2:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	vsnprintf(str, str_len + 1, fmt, ap);
data/git-2.29.2+next.20201030/compat/win32/syslog.h:18:6:  [4] (format) syslog:
  If syslog's format strings can be influenced by an attacker, they can be
  exploited (CWE-134). Use a constant format string for syslog.
void syslog(int priority, const char *fmt, ...);
data/git-2.29.2+next.20201030/compat/winansi.c:631:6:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
	if (swprintf(name, ARRAY_SIZE(name) - 1, L"\\\\.\\pipe\\winansi%lu",
data/git-2.29.2+next.20201030/config.c:2393:32:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
NORETURN __attribute__((format(printf, 2, 3)))
data/git-2.29.2+next.20201030/config.h:607:91:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
NORETURN void git_die_config(const char *key, const char *err, ...) __attribute__((format(printf, 2, 3)));
data/git-2.29.2+next.20201030/contrib/credential/osxkeychain/git-credential-osxkeychain.c:18:2:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	vsnprintf(msg, sizeof(msg), err, params);
data/git-2.29.2+next.20201030/contrib/credential/wincred/git-credential-wincred.c:19:2:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	vsnprintf(msg, sizeof(msg), err, params);
data/git-2.29.2+next.20201030/daemon.c:86:3:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		vsnprintf(buf, sizeof(buf), err, params);
data/git-2.29.2+next.20201030/daemon.c:97:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		vfprintf(stderr, err, params);
data/git-2.29.2+next.20201030/daemon.c:108:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
__attribute__((format (printf, 1, 2)))
data/git-2.29.2+next.20201030/daemon.c:117:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
__attribute__((format (printf, 1, 2)))
data/git-2.29.2+next.20201030/daemon.c:408:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (!export_all_trees && access("git-daemon-export-ok", F_OK)) {
data/git-2.29.2+next.20201030/fetch-pack.c:60:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
__attribute__((format (printf, 2, 3)))
data/git-2.29.2+next.20201030/fetch-pack.c:70:2:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	vfprintf(stderr, fmt, params);
data/git-2.29.2+next.20201030/fsck.c:291:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
__attribute__((format (printf, 5, 6)))
data/git-2.29.2+next.20201030/fsck.h:90:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
__attribute__((format (printf,3,4)))
data/git-2.29.2+next.20201030/gettext.c:83:8:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	ret = vsnprintf(buf, sizeof(buf), fmt, ap);
data/git-2.29.2+next.20201030/git-compat-util.h:458:67:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
NORETURN void usagef(const char *err, ...) __attribute__((format (printf, 1, 2)));
data/git-2.29.2+next.20201030/git-compat-util.h:459:64:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
NORETURN void die(const char *err, ...) __attribute__((format (printf, 1, 2)));
data/git-2.29.2+next.20201030/git-compat-util.h:460:70:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
NORETURN void die_errno(const char *err, ...) __attribute__((format (printf, 1, 2)));
data/git-2.29.2+next.20201030/git-compat-util.h:461:56:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
int error(const char *err, ...) __attribute__((format (printf, 1, 2)));
data/git-2.29.2+next.20201030/git-compat-util.h:462:62:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
int error_errno(const char *err, ...) __attribute__((format (printf, 1, 2)));
data/git-2.29.2+next.20201030/git-compat-util.h:463:59:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
void warning(const char *err, ...) __attribute__((format (printf, 1, 2)));
data/git-2.29.2+next.20201030/git-compat-util.h:464:65:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
void warning_errno(const char *err, ...) __attribute__((format (printf, 1, 2)));
data/git-2.29.2+next.20201030/git-compat-util.h:777:8:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#ifdef snprintf
data/git-2.29.2+next.20201030/git-compat-util.h:778:8:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#undef snprintf
data/git-2.29.2+next.20201030/git-compat-util.h:780:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define snprintf git_snprintf
data/git-2.29.2+next.20201030/git-compat-util.h:783:8:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#ifdef vsnprintf
data/git-2.29.2+next.20201030/git-compat-util.h:784:8:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#undef vsnprintf
data/git-2.29.2+next.20201030/git-compat-util.h:786:9:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define vsnprintf git_vsnprintf
data/git-2.29.2+next.20201030/git-compat-util.h:980:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
__attribute__((format (printf, 3, 4)))
data/git-2.29.2+next.20201030/git-compat-util.h:1187:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
__attribute__((format (printf, 3, 4))) NORETURN
data/git-2.29.2+next.20201030/git-compat-util.h:1191:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
__attribute__((format (printf, 1, 2))) NORETURN
data/git-2.29.2+next.20201030/git-compat-util.h:1262:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
#  ifdef access
data/git-2.29.2+next.20201030/git-compat-util.h:1263:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
#  undef access
data/git-2.29.2+next.20201030/git-compat-util.h:1265:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
#  define access(path, mode) git_access(path, mode)
data/git-2.29.2+next.20201030/http-backend.c:66:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
__attribute__((format (printf, 2, 3)))
data/git-2.29.2+next.20201030/http-backend.c:75:6:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	n = vsnprintf(buffer, sizeof(buffer), fmt, args);
data/git-2.29.2+next.20201030/http-backend.c:126:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
__attribute__((format (printf, 2, 3)))
data/git-2.29.2+next.20201030/http-backend.c:137:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		vfprintf(stderr, err, params);
data/git-2.29.2+next.20201030/http-backend.c:142:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
__attribute__((format (printf, 2, 3)))
data/git-2.29.2+next.20201030/http-backend.c:153:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		vfprintf(stderr, err, params);
data/git-2.29.2+next.20201030/http-backend.c:786:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	    access("git-daemon-export-ok", F_OK) )
data/git-2.29.2+next.20201030/imap-send.c:62:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
__attribute__((format (printf, 1, 2)))
data/git-2.29.2+next.20201030/imap-send.c:64:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
__attribute__((format (printf, 1, 2)))
data/git-2.29.2+next.20201030/imap-send.c:69:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
__attribute__((format (printf, 3, 4)))
data/git-2.29.2+next.20201030/imap-send.c:77:8:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	len = vsnprintf(tmp, sizeof(tmp), fmt, ap);
data/git-2.29.2+next.20201030/imap-send.c:460:3:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		vprintf(msg, va);
data/git-2.29.2+next.20201030/imap-send.c:472:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		vfprintf(stderr, msg, va);
data/git-2.29.2+next.20201030/imap-send.c:513:36:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	if (blen <= 0 || (unsigned)(ret = vsnprintf(buf, blen, fmt, va)) >= (unsigned)blen)
data/git-2.29.2+next.20201030/imap-send.c:584:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
__attribute__((format (printf, 3, 4)))
data/git-2.29.2+next.20201030/imap-send.c:600:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
__attribute__((format (printf, 3, 4)))
data/git-2.29.2+next.20201030/mailmap.c:8:23:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define debug_mm(...) fprintf(stderr, __VA_ARGS__)
data/git-2.29.2+next.20201030/merge-recursive.c:324:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
__attribute__((format (printf, 3, 4)))
data/git-2.29.2+next.20201030/midx.c:1075:2:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	vfprintf(stderr, fmt, ap);
data/git-2.29.2+next.20201030/notes-merge.c:530:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf(t->dirty ?
data/git-2.29.2+next.20201030/packfile.c:365:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if (!access(buf.buf, F_OK)) {
data/git-2.29.2+next.20201030/packfile.c:717:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (!access(p->pack_name, F_OK))
data/git-2.29.2+next.20201030/packfile.c:721:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (!access(p->pack_name, F_OK))
data/git-2.29.2+next.20201030/path.c:62:8:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	len = vsnprintf(buf, n, fmt, args);
data/git-2.29.2+next.20201030/path.h:17:25:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	__attribute__((format (printf, 1, 2)));
data/git-2.29.2+next.20201030/path.h:23:25:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	__attribute__((format (printf, 1, 2)));
data/git-2.29.2+next.20201030/path.h:29:25:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	__attribute__((format (printf, 3, 4)));
data/git-2.29.2+next.20201030/path.h:43:25:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	__attribute__((format (printf, 3, 4)));
data/git-2.29.2+next.20201030/path.h:50:25:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	__attribute__((format (printf, 1, 2)));
data/git-2.29.2+next.20201030/path.h:71:25:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	__attribute__((format (printf, 2, 3)));
data/git-2.29.2+next.20201030/path.h:80:25:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	__attribute__((format (printf, 3, 4)));
data/git-2.29.2+next.20201030/path.h:87:25:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	__attribute__((format (printf, 1, 2)));
data/git-2.29.2+next.20201030/path.h:93:25:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	__attribute__((format (printf, 1, 2)));
data/git-2.29.2+next.20201030/path.h:101:25:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	__attribute__((format (printf, 2, 3)));
data/git-2.29.2+next.20201030/path.h:108:25:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	__attribute__((format (printf, 2, 3)));
data/git-2.29.2+next.20201030/path.h:117:25:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	__attribute__((format (printf, 2, 3)));
data/git-2.29.2+next.20201030/path.h:128:25:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	__attribute__((format (printf, 3, 4)));
data/git-2.29.2+next.20201030/path.h:135:25:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	__attribute__((format (printf, 2, 3)));
data/git-2.29.2+next.20201030/path.h:144:25:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	__attribute__((format (printf, 3, 4)));
data/git-2.29.2+next.20201030/pkt-line.h:26:76:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
void packet_write_fmt(int fd, const char *fmt, ...) __attribute__((format (printf, 2, 3)));
data/git-2.29.2+next.20201030/pkt-line.h:31:88:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
void packet_buf_write(struct strbuf *buf, const char *fmt, ...) __attribute__((format (printf, 2, 3)));
data/git-2.29.2+next.20201030/pkt-line.h:34:82:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
int packet_write_fmt_gently(int fd, const char *fmt, ...) __attribute__((format (printf, 2, 3)));
data/git-2.29.2+next.20201030/pkt-line.h:228:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
__attribute__((format (printf, 2, 3)))
data/git-2.29.2+next.20201030/pkt-line.h:230:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
__attribute__((format (printf, 2, 3)))
data/git-2.29.2+next.20201030/read-cache.c:1482:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(fmt, name);
data/git-2.29.2+next.20201030/rebase-interactive.c:126:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		fprintf(stderr, _(edit_todo_list_advice));
data/git-2.29.2+next.20201030/rebase-interactive.c:206:2:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	fprintf(stderr, _(edit_todo_list_advice));
data/git-2.29.2+next.20201030/rebase-interactive.c:246:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		fprintf(stderr, _(edit_todo_list_advice));
data/git-2.29.2+next.20201030/refs.c:383:2:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	fprintf(d->fp, d->msg_fmt, refname);
data/git-2.29.2+next.20201030/refs.c:1201:12:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
		if (1 != sscanf(refname, scanf_fmts[i], short_name))
data/git-2.29.2+next.20201030/refspec.h:61:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
__attribute__((format (printf,2,3)))
data/git-2.29.2+next.20201030/remote.c:1699:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
__attribute__((format (printf,2,3)))
data/git-2.29.2+next.20201030/run-command.c:235:7:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	if (!execvp(file, argv))
data/git-2.29.2+next.20201030/run-command.c:1318:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (access(path.buf, X_OK) < 0) {
data/git-2.29.2+next.20201030/run-command.c:1323:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if (access(path.buf, X_OK) >= 0)
data/git-2.29.2+next.20201030/server-info.c:38:9:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		ret = vfprintf(uic->cur_fp, fmt, ap);
data/git-2.29.2+next.20201030/setup.c:358:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if (access(getenv(DB_ENVIRONMENT), X_OK))
data/git-2.29.2+next.20201030/setup.c:364:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if (access(path.buf, X_OK))
data/git-2.29.2+next.20201030/setup.c:370:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (access(path.buf, X_OK))
data/git-2.29.2+next.20201030/sha1-file.c:735:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (!access(mkpath("%s/shallow", ref_git), F_OK)) {
data/git-2.29.2+next.20201030/sha1-file.c:742:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (!access(mkpath("%s/info/grafts", ref_git), F_OK)) {
data/git-2.29.2+next.20201030/sha1-file.c:896:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (access(fn, F_OK))
data/git-2.29.2+next.20201030/shell.c:55:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (!access(NOLOGIN_COMMAND, F_OK)) {
data/git-2.29.2+next.20201030/shell.c:143:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if (access(COMMAND_DIR, R_OK | X_OK) == -1) {
data/git-2.29.2+next.20201030/shell.c:189:4:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
			execv(user_argv[0], (char *const *) user_argv);
data/git-2.29.2+next.20201030/strbuf.c:261:8:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	len = vsnprintf(sb->buf + sb->len, 0, fmt, cp);
data/git-2.29.2+next.20201030/strbuf.c:273:9:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	len2 = vsnprintf(sb->buf + pos, len + 1, fmt, ap);
data/git-2.29.2+next.20201030/strbuf.c:394:8:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	len = vsnprintf(sb->buf + sb->len, sb->alloc - sb->len, fmt, cp);
data/git-2.29.2+next.20201030/strbuf.c:400:9:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		len = vsnprintf(sb->buf + sb->len, sb->alloc - sb->len, fmt, ap);
data/git-2.29.2+next.20201030/strbuf.c:933:8:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	ret = vprintf(fmt, ap);
data/git-2.29.2+next.20201030/strbuf.c:945:8:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	ret = vfprintf(fp, fmt, ap);
data/git-2.29.2+next.20201030/strbuf.h:407:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
__attribute__((format (printf,2,3)))
data/git-2.29.2+next.20201030/strbuf.h:414:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
__attribute__((format (printf, 2, 3)))
data/git-2.29.2+next.20201030/strbuf.h:417:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
__attribute__((format (printf,2,0)))
data/git-2.29.2+next.20201030/strbuf.h:723:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
__attribute__((format (printf,1,2)))
data/git-2.29.2+next.20201030/strbuf.h:725:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
__attribute__((format (printf,2,3)))
data/git-2.29.2+next.20201030/strbuf.h:735:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
__attribute__((format (printf, 1, 0)))
data/git-2.29.2+next.20201030/strbuf.h:737:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
__attribute__((format (printf, 1, 2)))
data/git-2.29.2+next.20201030/strvec.h:51:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
__attribute__((format (printf,2,3)))
data/git-2.29.2+next.20201030/t/helper/test-drop-caches.c:122:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	return system("sync");
data/git-2.29.2+next.20201030/t/helper/test-drop-caches.c:127:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	return system("echo 3 | sudo tee /proc/sys/vm/drop_caches");
data/git-2.29.2+next.20201030/t/helper/test-drop-caches.c:134:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	return system("sync");
data/git-2.29.2+next.20201030/t/helper/test-drop-caches.c:139:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	return system("sudo purge");
data/git-2.29.2+next.20201030/t/helper/test-dump-fsmonitor.c:19:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf((istate->cache[i]->ce_flags & CE_FSMONITOR_VALID) ? "+" : "-");
data/git-2.29.2+next.20201030/t/helper/test-parse-options.c:67:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
__attribute__((format (printf,3,4)))
data/git-2.29.2+next.20201030/t/helper/test-repository.c:32:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf("%"PRItime, c->date);
data/git-2.29.2+next.20201030/trace.h:134:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
__attribute__((format (printf, 1, 2)))
data/git-2.29.2+next.20201030/trace.h:137:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
__attribute__((format (printf, 2, 3)))
data/git-2.29.2+next.20201030/trace.h:143:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
__attribute__((format (printf, 2, 3)))
data/git-2.29.2+next.20201030/trace.h:168:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
__attribute__((format (printf, 2, 3)))
data/git-2.29.2+next.20201030/trace.h:181:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
__attribute__((format (printf, 2, 3)))
data/git-2.29.2+next.20201030/trace.h:184:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
__attribute__((format (printf, 1, 2)))
data/git-2.29.2+next.20201030/trace.h:269:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
__attribute__((format (printf, 4, 5)))
data/git-2.29.2+next.20201030/trace.h:272:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
__attribute__((format (printf, 4, 5)))
data/git-2.29.2+next.20201030/trace.h:277:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
__attribute__((format (printf, 4, 5)))
data/git-2.29.2+next.20201030/trace.h:280:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
__attribute__((format (printf, 4, 5)))
data/git-2.29.2+next.20201030/trace2.h:478:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
__attribute__((format (printf, 1, 2)))
data/git-2.29.2+next.20201030/transport-helper.c:1286:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
__attribute__((format (printf, 1, 2)))
data/git-2.29.2+next.20201030/transport-helper.c:1306:2:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	vsnprintf(msgbuf, PBUFFERSIZE, fmt, args);
data/git-2.29.2+next.20201030/upload-pack.c:991:32:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
NORETURN __attribute__((format(printf,2,3)))
data/git-2.29.2+next.20201030/usage.c:21:6:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	if (vsnprintf(p, pend - p, err, params) < 0)
data/git-2.29.2+next.20201030/utf8.h:15:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
__attribute__((format (printf, 2, 3)))
data/git-2.29.2+next.20201030/walker.c:20:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		vfprintf(stderr, fmt, ap);
data/git-2.29.2+next.20201030/walker.h:20:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
__attribute__((format (printf, 2, 3)))
data/git-2.29.2+next.20201030/worktree.h:143:25:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	__attribute__((format (printf, 2, 3)));
data/git-2.29.2+next.20201030/wrapper.c:589:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	int ret = access(path, mode);
data/git-2.29.2+next.20201030/wrapper.c:597:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	int ret = access(path, mode);
data/git-2.29.2+next.20201030/wrapper.c:617:8:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	len = vsnprintf(dst, max, fmt, ap);
data/git-2.29.2+next.20201030/write-or-die.c:49:8:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	ret = vfprintf(f, fmt, ap);
data/git-2.29.2+next.20201030/wt-status.h:170:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
__attribute__((format (printf, 3, 4)))
data/git-2.29.2+next.20201030/wt-status.h:172:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
__attribute__((format (printf, 3, 4)))
data/git-2.29.2+next.20201030/abspath.c:210:23:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
	if (strbuf_realpath(&realpath, path, die_on_error))
data/git-2.29.2+next.20201030/abspath.c:211:27:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
		retval = strbuf_detach(&realpath, NULL);
data/git-2.29.2+next.20201030/abspath.c:213:18:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
	strbuf_release(&realpath);
data/git-2.29.2+next.20201030/builtin/am.c:1583:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		committer = fmt_ident(getenv("GIT_COMMITTER_NAME"),
data/git-2.29.2+next.20201030/builtin/am.c:1584:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
				      getenv("GIT_COMMITTER_EMAIL"),
data/git-2.29.2+next.20201030/builtin/am.c:1595:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	reflog_msg = getenv("GIT_REFLOG_ACTION");
data/git-2.29.2+next.20201030/builtin/bugreport.c:37:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	shell = getenv("SHELL");
data/git-2.29.2+next.20201030/builtin/checkout.c:892:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	reflog_msg = getenv("GIT_REFLOG_ACTION");
data/git-2.29.2+next.20201030/builtin/clone.c:459:21:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
			strbuf_realpath(&realpath, src->buf, 1);
data/git-2.29.2+next.20201030/builtin/clone.c:460:14:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
			if (!link(realpath.buf, dest->buf))
data/git-2.29.2+next.20201030/builtin/clone.c:475:18:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
	strbuf_release(&realpath);
data/git-2.29.2+next.20201030/builtin/clone.c:1057:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		work_tree = getenv("GIT_WORK_TREE");
data/git-2.29.2+next.20201030/builtin/commit.c:378:35:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		old_index_env = xstrdup_or_null(getenv(INDEX_ENVIRONMENT));
data/git-2.29.2+next.20201030/builtin/commit.c:594:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	name = xstrdup_or_null(getenv("GIT_AUTHOR_NAME"));
data/git-2.29.2+next.20201030/builtin/commit.c:595:26:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	email = xstrdup_or_null(getenv("GIT_AUTHOR_EMAIL"));
data/git-2.29.2+next.20201030/builtin/commit.c:596:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	date = xstrdup_or_null(getenv("GIT_AUTHOR_DATE"));
data/git-2.29.2+next.20201030/builtin/commit.c:1599:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	reflog_msg = getenv("GIT_REFLOG_ACTION");
data/git-2.29.2+next.20201030/builtin/config.c:635:45:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	given_config_source.file = xstrdup_or_null(getenv(CONFIG_ENVIRONMENT));
data/git-2.29.2+next.20201030/builtin/difftool.c:359:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	tmp = getenv("TMPDIR");
data/git-2.29.2+next.20201030/builtin/fast-import.c:2095:7:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
	char realpath[GIT_MAX_HEXSZ + ((GIT_MAX_HEXSZ / 2) - 1) + 1];
data/git-2.29.2+next.20201030/builtin/fast-import.c:2137:48:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
			construct_path_with_fanout(hex_oid, fanout, realpath);
data/git-2.29.2+next.20201030/builtin/fast-import.c:2138:26:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
			if (!strcmp(fullpath, realpath)) {
data/git-2.29.2+next.20201030/builtin/fast-import.c:2147:32:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
			tree_content_set(orig_root, realpath,
data/git-2.29.2+next.20201030/builtin/fetch.c:589:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char *rla = getenv("GIT_REFLOG_ACTION");
data/git-2.29.2+next.20201030/builtin/help.c:236:24:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *display = getenv("DISPLAY");
data/git-2.29.2+next.20201030/builtin/help.c:405:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *old_path = getenv("MANPATH");
data/git-2.29.2+next.20201030/builtin/help.c:443:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *fallback = getenv("GIT_MAN_VIEWER");
data/git-2.29.2+next.20201030/builtin/index-pack.c:1243:24:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (nr_threads > 1 || getenv("GIT_FORCE_THREADS")) {
data/git-2.29.2+next.20201030/builtin/init-db.c:108:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		template_dir = getenv(TEMPLATE_DIR_ENVIRONMENT);
data/git-2.29.2+next.20201030/builtin/init-db.c:378:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *env = getenv(GIT_DEFAULT_HASH_ENVIRONMENT);
data/git-2.29.2+next.20201030/builtin/init-db.c:633:28:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	git_dir = xstrdup_or_null(getenv(GIT_DIR_ENVIRONMENT));
data/git-2.29.2+next.20201030/builtin/init-db.c:634:30:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	work_tree = xstrdup_or_null(getenv(GIT_WORK_TREE_ENVIRONMENT));
data/git-2.29.2+next.20201030/builtin/merge-recursive.c:19:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	name = getenv(githead_env);
data/git-2.29.2+next.20201030/builtin/merge.c:439:34:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		strbuf_addstr(&reflog_message, getenv("GIT_REFLOG_ACTION"));
data/git-2.29.2+next.20201030/builtin/merge.c:444:4:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
			getenv("GIT_REFLOG_ACTION"), msg);
data/git-2.29.2+next.20201030/builtin/merge.c:1040:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *e = getenv(name);
data/git-2.29.2+next.20201030/builtin/pull.c:917:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (!getenv("GIT_REFLOG_ACTION"))
data/git-2.29.2+next.20201030/builtin/rebase.c:1266:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	env = getenv(GIT_REFLOG_ACTION_ENVIRONMENT);
data/git-2.29.2+next.20201030/builtin/rebase.c:1980:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
					    getenv(GIT_REFLOG_ACTION_ENVIRONMENT),
data/git-2.29.2+next.20201030/builtin/rebase.c:2058:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		    getenv(GIT_REFLOG_ACTION_ENVIRONMENT), options.onto_name);
data/git-2.29.2+next.20201030/builtin/reset.c:181:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *rla = getenv("GIT_REFLOG_ACTION");
data/git-2.29.2+next.20201030/builtin/rev-parse.c:846:26:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
				const char *gitdir = getenv(GIT_DIR_ENVIRONMENT);
data/git-2.29.2+next.20201030/builtin/rev-parse.c:863:24:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
						strbuf_realpath(&realpath, gitdir, 1);
data/git-2.29.2+next.20201030/builtin/rev-parse.c:864:12:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
						puts(realpath.buf);
data/git-2.29.2+next.20201030/builtin/rev-parse.c:865:23:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
						strbuf_release(&realpath);
data/git-2.29.2+next.20201030/builtin/stash.c:1014:34:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	old_index_env = xstrdup_or_null(getenv(INDEX_ENVIRONMENT));
data/git-2.29.2+next.20201030/builtin/tag.c:311:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char *rla = getenv("GIT_REFLOG_ACTION");
data/git-2.29.2+next.20201030/builtin/worktree.c:392:19:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
	strbuf_realpath(&realpath, sb_git.buf, 1);
data/git-2.29.2+next.20201030/builtin/worktree.c:393:27:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
	write_file(sb.buf, "%s", realpath.buf);
data/git-2.29.2+next.20201030/builtin/worktree.c:394:19:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
	strbuf_realpath(&realpath, get_git_common_dir(), 1);
data/git-2.29.2+next.20201030/builtin/worktree.c:396:6:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
		   realpath.buf, name);
data/git-2.29.2+next.20201030/builtin/worktree.c:482:18:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
	strbuf_release(&realpath);
data/git-2.29.2+next.20201030/compat/mingw.c:1591:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	strace_env = getenv("GIT_STRACE_COMMANDS");
data/git-2.29.2+next.20201030/compat/mingw.c:1667:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		    !getenv("SUPPRESS_HANDLE_INHERITANCE_WARNING")) {
data/git-2.29.2+next.20201030/compat/mingw.c:1725:2:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
	EnterCriticalSection(&pinfo_cs);
data/git-2.29.2+next.20201030/compat/mingw.c:2437:3:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
		EnterCriticalSection(&pinfo_cs);
data/git-2.29.2+next.20201030/compat/mingw.c:2549:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char *tmp = getenv("TMPDIR");
data/git-2.29.2+next.20201030/compat/mingw.c:2553:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		if (!(tmp = getenv("TMP")))
data/git-2.29.2+next.20201030/compat/mingw.c:2554:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
			tmp = getenv("TEMP");
data/git-2.29.2+next.20201030/compat/mingw.c:2557:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
			tmp = getenv("TMPDIR");
data/git-2.29.2+next.20201030/compat/mingw.c:2572:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (!getenv("TERM"))
data/git-2.29.2+next.20201030/compat/mingw.c:2576:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (!getenv("HOME")) {
data/git-2.29.2+next.20201030/compat/mingw.c:2582:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		if ((tmp = getenv("HOMEDRIVE"))) {
data/git-2.29.2+next.20201030/compat/mingw.c:2585:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
			if ((tmp = getenv("HOMEPATH"))) {
data/git-2.29.2+next.20201030/compat/mingw.c:2595:22:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		if (!tmp && (tmp = getenv("USERPROFILE")))
data/git-2.29.2+next.20201030/compat/mingw.c:2870:2:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
	InitializeCriticalSection(&pinfo_cs);
data/git-2.29.2+next.20201030/compat/mingw.h:286:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define getenv       mingw_getenv
data/git-2.29.2+next.20201030/compat/nedmalloc/malloc.c.h:1923:32:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
#define ACQUIRE_LOCK(s)       (EnterCriticalSection(s), 0)
data/git-2.29.2+next.20201030/compat/nedmalloc/malloc.c.h:1940:7:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
      InitializeCriticalSection(&malloc_global_mutex);
data/git-2.29.2+next.20201030/compat/regex/regcomp.c:885:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  codeset_name = getenv ("LC_ALL");
data/git-2.29.2+next.20201030/compat/regex/regcomp.c:887:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    codeset_name = getenv ("LC_CTYPE");
data/git-2.29.2+next.20201030/compat/regex/regcomp.c:889:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    codeset_name = getenv ("LANG");
data/git-2.29.2+next.20201030/compat/setenv.c:15:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		oldval = getenv(name);
data/git-2.29.2+next.20201030/compat/win32/pthread.h:24:43:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
#define pthread_mutex_init(a,b) return_0((InitializeCriticalSection((a)), 0))
data/git-2.29.2+next.20201030/compat/win32/pthread.h:26:28:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
#define pthread_mutex_lock EnterCriticalSection
data/git-2.29.2+next.20201030/config.c:338:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *old = getenv(CONFIG_DATA_ENVIRONMENT);
data/git-2.29.2+next.20201030/config.c:477:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *env = getenv(CONFIG_DATA_ENVIRONMENT);
data/git-2.29.2+next.20201030/config.c:1693:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *v = getenv(k);
data/git-2.29.2+next.20201030/config.c:1703:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *v = getenv(k);
data/git-2.29.2+next.20201030/config.c:2351:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		core_fsmonitor = getenv("GIT_TEST_FSMONITOR");
data/git-2.29.2+next.20201030/connect.c:928:22:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	git_proxy_command = getenv("GIT_PROXY_COMMAND");
data/git-2.29.2+next.20201030/connect.c:1052:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if ((ssh = getenv("GIT_SSH_COMMAND")))
data/git-2.29.2+next.20201030/connect.c:1072:24:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *variant = getenv("GIT_SSH_VARIANT");
data/git-2.29.2+next.20201030/connect.c:1156:22:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char *target_host = getenv("GIT_OVERRIDE_VIRTUAL_HOST");
data/git-2.29.2+next.20201030/connect.c:1284:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		ssh = getenv("GIT_SSH");
data/git-2.29.2+next.20201030/daemon.c:762:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char *addr = getenv("REMOTE_ADDR"), *port = getenv("REMOTE_PORT");
data/git-2.29.2+next.20201030/daemon.c:762:46:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char *addr = getenv("REMOTE_ADDR"), *port = getenv("REMOTE_PORT");
data/git-2.29.2+next.20201030/date.c:122:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	x = getenv("GIT_TEST_DATE_NOW");
data/git-2.29.2+next.20201030/diff.c:508:38:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	external_diff_cmd = xstrdup_or_null(getenv("GIT_EXTERNAL_DIFF"));
data/git-2.29.2+next.20201030/diff.c:3602:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		diffopts = getenv("GIT_DIFF_OPTS");
data/git-2.29.2+next.20201030/editor.c:13:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *terminal = getenv("TERM");
data/git-2.29.2+next.20201030/editor.c:19:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *editor = getenv("GIT_EDITOR");
data/git-2.29.2+next.20201030/editor.c:25:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		editor = getenv("VISUAL");
data/git-2.29.2+next.20201030/editor.c:27:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		editor = getenv("EDITOR");
data/git-2.29.2+next.20201030/editor.c:40:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *editor = getenv("GIT_SEQUENCE_EDITOR");
data/git-2.29.2+next.20201030/editor.c:79:20:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
		strbuf_realpath(&realpath, path, 1);
data/git-2.29.2+next.20201030/editor.c:80:13:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
		args[1] = realpath.buf;
data/git-2.29.2+next.20201030/editor.c:87:20:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
			strbuf_release(&realpath);
data/git-2.29.2+next.20201030/editor.c:94:19:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
		strbuf_release(&realpath);
data/git-2.29.2+next.20201030/environment.c:161:22:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *value = getenv(name);
data/git-2.29.2+next.20201030/environment.c:185:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (getenv(NO_REPLACE_OBJECTS_ENVIRONMENT))
data/git-2.29.2+next.20201030/environment.c:187:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	replace_ref_base = getenv(GIT_REPLACE_REF_BASE_ENVIRONMENT);
data/git-2.29.2+next.20201030/environment.c:192:35:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	git_namespace = expand_namespace(getenv(GIT_NAMESPACE_ENVIRONMENT));
data/git-2.29.2+next.20201030/environment.c:193:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	shallow_file = getenv(GIT_SHALLOW_FILE_ENVIRONMENT);
data/git-2.29.2+next.20201030/environment.c:243:34:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		super_prefix = xstrdup_or_null(getenv(GIT_SUPER_PREFIX_ENVIRONMENT));
data/git-2.29.2+next.20201030/environment.c:261:20:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
		strbuf_realpath(&realpath, new_work_tree, 1);
data/git-2.29.2+next.20201030/environment.c:262:19:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
		new_work_tree = realpath.buf;
data/git-2.29.2+next.20201030/environment.c:272:18:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
	strbuf_release(&realpath);
data/git-2.29.2+next.20201030/environment.c:359:20:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
		strbuf_realpath(&realpath, path, 1);
data/git-2.29.2+next.20201030/environment.c:360:10:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
		path = realpath.buf;
data/git-2.29.2+next.20201030/environment.c:367:18:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
	strbuf_release(&realpath);
data/git-2.29.2+next.20201030/environment.c:421:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		const char *v = getenv("GIT_PRINT_SHA1_ELLIPSIS");
data/git-2.29.2+next.20201030/exec-cmd.c:287:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		const char *env = getenv(EXEC_PATH_ENVIRONMENT);
data/git-2.29.2+next.20201030/exec-cmd.c:307:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *old_path = getenv("PATH");
data/git-2.29.2+next.20201030/gettext.c:19:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *env = getenv("LC_ALL"), *dot;
data/git-2.29.2+next.20201030/gettext.c:22:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		env = getenv("LC_CTYPE");
data/git-2.29.2+next.20201030/gettext.c:24:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		env = getenv("LANG");
data/git-2.29.2+next.20201030/gettext.c:53:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	retval = getenv("LANGUAGE");
data/git-2.29.2+next.20201030/gettext.c:178:22:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *podir = getenv(GIT_TEXT_DOMAIN_DIR_ENVIRONMENT);
data/git-2.29.2+next.20201030/gettext.c:215:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		const char *env = getenv("LC_ALL");
data/git-2.29.2+next.20201030/gettext.c:217:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
			env = getenv("LC_CTYPE");
data/git-2.29.2+next.20201030/gettext.c:219:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
			env = getenv("LANG");
data/git-2.29.2+next.20201030/help.c:263:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *env_path = getenv("PATH");
data/git-2.29.2+next.20201030/http-backend.c:40:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		const char *query = getenv("QUERY_STRING");
data/git-2.29.2+next.20201030/http-backend.c:274:22:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		const char *user = getenv("REMOTE_USER");
data/git-2.29.2+next.20201030/http-backend.c:354:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *str = getenv("CONTENT_LENGTH");
data/git-2.29.2+next.20201030/http-backend.c:462:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *encoding = getenv("HTTP_CONTENT_ENCODING");
data/git-2.29.2+next.20201030/http-backend.c:463:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *user = getenv("REMOTE_USER");
data/git-2.29.2+next.20201030/http-backend.c:464:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *host = getenv("REMOTE_ADDR");
data/git-2.29.2+next.20201030/http-backend.c:479:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (!getenv("GIT_COMMITTER_NAME"))
data/git-2.29.2+next.20201030/http-backend.c:481:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (!getenv("GIT_COMMITTER_EMAIL"))
data/git-2.29.2+next.20201030/http-backend.c:619:28:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *actual_type = getenv("CONTENT_TYPE");
data/git-2.29.2+next.20201030/http-backend.c:682:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char *pathinfo = getenv("PATH_INFO");
data/git-2.29.2+next.20201030/http-backend.c:683:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char *root = getenv("GIT_PROJECT_ROOT");
data/git-2.29.2+next.20201030/http-backend.c:684:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char *path = getenv("PATH_TRANSLATED");
data/git-2.29.2+next.20201030/http-backend.c:726:22:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *proto = getenv("SERVER_PROTOCOL");
data/git-2.29.2+next.20201030/http-backend.c:741:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char *method = getenv("REQUEST_METHOD");
data/git-2.29.2+next.20201030/http-backend.c:785:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (!getenv("GIT_HTTP_EXPORT_ALL") &&
data/git-2.29.2+next.20201030/http.c:553:39:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	var_override(&http_proxy_authmethod, getenv("GIT_HTTP_PROXY_AUTHMETHOD"));
data/git-2.29.2+next.20201030/http.c:917:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (getenv("GIT_SSL_VERSION"))
data/git-2.29.2+next.20201030/http.c:918:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		ssl_version = getenv("GIT_SSL_VERSION");
data/git-2.29.2+next.20201030/http.c:933:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (getenv("GIT_SSL_CIPHER_LIST"))
data/git-2.29.2+next.20201030/http.c:934:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		ssl_cipherlist = getenv("GIT_SSL_CIPHER_LIST");
data/git-2.29.2+next.20201030/http.c:991:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (getenv("GIT_CURL_VERBOSE"))
data/git-2.29.2+next.20201030/http.c:994:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (getenv("GIT_TRACE_CURL_NO_DATA"))
data/git-2.29.2+next.20201030/http.c:1024:35:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
			var_override(&curl_http_proxy, getenv("HTTPS_PROXY"));
data/git-2.29.2+next.20201030/http.c:1025:35:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
			var_override(&curl_http_proxy, getenv("https_proxy"));
data/git-2.29.2+next.20201030/http.c:1027:35:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
			var_override(&curl_http_proxy, getenv("http_proxy"));
data/git-2.29.2+next.20201030/http.c:1030:35:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
			var_override(&curl_http_proxy, getenv("ALL_PROXY"));
data/git-2.29.2+next.20201030/http.c:1031:35:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
			var_override(&curl_http_proxy, getenv("all_proxy"));
data/git-2.29.2+next.20201030/http.c:1085:32:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		var_override(&curl_no_proxy, getenv("NO_PROXY"));
data/git-2.29.2+next.20201030/http.c:1086:32:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		var_override(&curl_no_proxy, getenv("no_proxy"));
data/git-2.29.2+next.20201030/http.c:1099:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *val = getenv(envname);
data/git-2.29.2+next.20201030/http.c:1169:29:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		char *http_max_requests = getenv("GIT_HTTP_MAX_REQUESTS");
data/git-2.29.2+next.20201030/http.c:1179:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (getenv("GIT_SSL_NO_VERIFY"))
data/git-2.29.2+next.20201030/http.c:1193:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	low_speed_limit = getenv("GIT_HTTP_LOW_SPEED_LIMIT");
data/git-2.29.2+next.20201030/http.c:1196:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	low_speed_time = getenv("GIT_HTTP_LOW_SPEED_TIME");
data/git-2.29.2+next.20201030/http.c:1213:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (getenv("GIT_PROXY_SSL_CERT_PASSWORD_PROTECTED"))
data/git-2.29.2+next.20201030/http.c:1216:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (getenv("GIT_CURL_FTP_NO_EPSV"))
data/git-2.29.2+next.20201030/http.c:1222:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		    getenv("GIT_SSL_CERT_PASSWORD_PROTECTED") &&
data/git-2.29.2+next.20201030/ident.c:169:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		const char *email = getenv("EMAIL");
data/git-2.29.2+next.20201030/ident.c:472:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		name = getenv("GIT_AUTHOR_NAME");
data/git-2.29.2+next.20201030/ident.c:473:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		email = getenv("GIT_AUTHOR_EMAIL");
data/git-2.29.2+next.20201030/ident.c:476:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		name = getenv("GIT_COMMITTER_NAME");
data/git-2.29.2+next.20201030/ident.c:477:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		email = getenv("GIT_COMMITTER_EMAIL");
data/git-2.29.2+next.20201030/ident.c:486:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (getenv("GIT_AUTHOR_NAME"))
data/git-2.29.2+next.20201030/ident.c:488:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (getenv("GIT_AUTHOR_EMAIL"))
data/git-2.29.2+next.20201030/ident.c:490:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	return fmt_ident(getenv("GIT_AUTHOR_NAME"),
data/git-2.29.2+next.20201030/ident.c:491:5:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
			 getenv("GIT_AUTHOR_EMAIL"),
data/git-2.29.2+next.20201030/ident.c:493:5:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
			 getenv("GIT_AUTHOR_DATE"),
data/git-2.29.2+next.20201030/ident.c:499:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (getenv("GIT_COMMITTER_NAME"))
data/git-2.29.2+next.20201030/ident.c:501:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (getenv("GIT_COMMITTER_EMAIL"))
data/git-2.29.2+next.20201030/ident.c:503:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	return fmt_ident(getenv("GIT_COMMITTER_NAME"),
data/git-2.29.2+next.20201030/ident.c:504:5:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
			 getenv("GIT_COMMITTER_EMAIL"),
data/git-2.29.2+next.20201030/ident.c:506:5:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
			 getenv("GIT_COMMITTER_DATE"),
data/git-2.29.2+next.20201030/ident.c:608:24:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if ((*given & bit) || getenv(key))
data/git-2.29.2+next.20201030/imap-send.c:1466:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (0 < verbosity || getenv("GIT_CURL_VERBOSE"))
data/git-2.29.2+next.20201030/lockfile.c:114:3:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		srand((unsigned int)getpid());
data/git-2.29.2+next.20201030/merge-recursive.c:3843:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	merge_verbosity = getenv("GIT_MERGE_VERBOSITY");
data/git-2.29.2+next.20201030/notes-utils.c:127:33:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *rewrite_mode_env = getenv(GIT_NOTES_REWRITE_MODE_ENVIRONMENT);
data/git-2.29.2+next.20201030/notes-utils.c:128:33:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *rewrite_refs_env = getenv(GIT_NOTES_REWRITE_REF_ENVIRONMENT);
data/git-2.29.2+next.20201030/notes.c:984:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		notes_ref = getenv(GIT_NOTES_REF_ENVIRONMENT);
data/git-2.29.2+next.20201030/notes.c:1091:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		display_ref_env = getenv(GIT_NOTES_DISPLAY_REF_ENVIRONMENT);
data/git-2.29.2+next.20201030/pager.c:55:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	pager = getenv("GIT_PAGER");
data/git-2.29.2+next.20201030/pager.c:62:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		pager = getenv("PAGER");
data/git-2.29.2+next.20201030/pager.c:89:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		if (!getenv(argv[i])) {
data/git-2.29.2+next.20201030/pager.c:166:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	col_string = getenv("COLUMNS");
data/git-2.29.2+next.20201030/path.c:740:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
			const char *home = getenv("HOME");
data/git-2.29.2+next.20201030/path.c:1506:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	config_home = getenv("XDG_CONFIG_HOME");
data/git-2.29.2+next.20201030/path.c:1510:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	home = getenv("HOME");
data/git-2.29.2+next.20201030/path.c:1521:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	cache_home = getenv("XDG_CACHE_HOME");
data/git-2.29.2+next.20201030/path.c:1525:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	home = getenv("HOME");
data/git-2.29.2+next.20201030/prompt.c:52:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		askpass = getenv("GIT_ASKPASS");
data/git-2.29.2+next.20201030/prompt.c:56:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
			askpass = getenv("SSH_ASKPASS");
data/git-2.29.2+next.20201030/protocol.c:33:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	git_test_v = getenv(git_test_k);
data/git-2.29.2+next.20201030/protocol.c:47:29:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *git_protocol = getenv(GIT_PROTOCOL_ENVIRONMENT);
data/git-2.29.2+next.20201030/read-cache.c:1635:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char *envversion = getenv("GIT_INDEX_VERSION");
data/git-2.29.2+next.20201030/read-cache.c:3460:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		if (getenv("GIT_TEST_VALIDATE_INDEX_CACHE_ENTRIES"))
data/git-2.29.2+next.20201030/refs.c:570:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *env = getenv("GIT_TEST_DEFAULT_INITIAL_BRANCH_NAME");
data/git-2.29.2+next.20201030/refs.c:2025:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (getenv(GIT_QUARANTINE_ENVIRONMENT)) {
data/git-2.29.2+next.20201030/reset.c:94:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	reflog_action = getenv(GIT_REFLOG_ACTION_ENVIRONMENT);
data/git-2.29.2+next.20201030/run-command.c:183:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *p = getenv("PATH");
data/git-2.29.2+next.20201030/run-command.c:609:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		if (val || !getenv(var))
data/git-2.29.2+next.20201030/run-command.c:630:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		oldval = getenv(var);
data/git-2.29.2+next.20201030/sequencer.c:386:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char *msg = getenv("GIT_CHERRY_PICK_HELP");
data/git-2.29.2+next.20201030/sequencer.c:1461:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		committer = fmt_ident(getenv("GIT_COMMITTER_NAME"),
data/git-2.29.2+next.20201030/sequencer.c:1462:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
				      getenv("GIT_COMMITTER_EMAIL"),
data/git-2.29.2+next.20201030/sequencer.c:1494:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
				    getenv("GIT_REFLOG_ACTION"), msg, &err)) {
data/git-2.29.2+next.20201030/sequencer.c:3926:24:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char *reflog_action = getenv(GIT_REFLOG_ACTION);
data/git-2.29.2+next.20201030/sequencer.c:4022:31:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	prev_reflog_action = xstrdup(getenv(GIT_REFLOG_ACTION));
data/git-2.29.2+next.20201030/setup.c:64:21:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
			strbuf_realpath(&realpath, path0, 1);
data/git-2.29.2+next.20201030/setup.c:65:18:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
			if (fspathcmp(realpath.buf, work_tree) == 0) {
data/git-2.29.2+next.20201030/setup.c:67:21:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
				strbuf_release(&realpath);
data/git-2.29.2+next.20201030/setup.c:75:19:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
	strbuf_realpath(&realpath, path0, 1);
data/git-2.29.2+next.20201030/setup.c:76:16:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
	if (fspathcmp(realpath.buf, work_tree) == 0) {
data/git-2.29.2+next.20201030/setup.c:78:19:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
		strbuf_release(&realpath);
data/git-2.29.2+next.20201030/setup.c:82:18:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
	strbuf_release(&realpath);
data/git-2.29.2+next.20201030/setup.c:290:35:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *git_env_common_dir = getenv(GIT_COMMON_DIR_ENVIRONMENT);
data/git-2.29.2+next.20201030/setup.c:357:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (getenv(DB_ENVIRONMENT)) {
data/git-2.29.2+next.20201030/setup.c:358:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		if (access(getenv(DB_ENVIRONMENT), X_OK))
data/git-2.29.2+next.20201030/setup.c:429:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (getenv(GIT_WORK_TREE_ENVIRONMENT))
data/git-2.29.2+next.20201030/setup.c:788:19:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
	strbuf_realpath(&realpath, dir, 1);
data/git-2.29.2+next.20201030/setup.c:789:9:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
	path = realpath.buf;
data/git-2.29.2+next.20201030/setup.c:806:30:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *work_tree_env = getenv(GIT_WORK_TREE_ENVIRONMENT);
data/git-2.29.2+next.20201030/setup.c:909:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (getenv(GIT_WORK_TREE_ENVIRONMENT) || git_work_tree_cfg) {
data/git-2.29.2+next.20201030/setup.c:960:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (getenv(GIT_WORK_TREE_ENVIRONMENT) || git_work_tree_cfg) {
data/git-2.29.2+next.20201030/setup.c:1055:33:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *env_ceiling_dirs = getenv(CEILING_DIRECTORIES_ENVIRONMENT);
data/git-2.29.2+next.20201030/setup.c:1067:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	gitdirenv = getenv(GIT_DIR_ENVIRONMENT);
data/git-2.29.2+next.20201030/setup.c:1304:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	    getenv(GIT_DIR_ENVIRONMENT)) {
data/git-2.29.2+next.20201030/setup.c:1306:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
			const char *gitdir = getenv(GIT_DIR_ENVIRONMENT);
data/git-2.29.2+next.20201030/sh-i18n--envsubst.c:398:29:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		  const char *env_value = getenv (buffer);
data/git-2.29.2+next.20201030/shell.c:43:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *home = getenv("HOME");
data/git-2.29.2+next.20201030/strbuf.c:900:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		char *pwd = getenv("PWD");
data/git-2.29.2+next.20201030/t/helper/test-fake-ssh.c:7:32:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *trash_directory = getenv("TRASH_DIRECTORY");
data/git-2.29.2+next.20201030/t/helper/test-path-utils.c:308:21:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
			strbuf_realpath(&realpath, argv[2], 1);
data/git-2.29.2+next.20201030/t/helper/test-path-utils.c:309:9:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
			puts(realpath.buf);
data/git-2.29.2+next.20201030/t/helper/test-path-utils.c:313:19:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
		strbuf_release(&realpath);
data/git-2.29.2+next.20201030/tempfile.c:187:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	tmpdir = getenv("TMPDIR");
data/git-2.29.2+next.20201030/tmp-objdir.c:98:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	old = getenv(key);
data/git-2.29.2+next.20201030/trace.c:40:46:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	trace = override_envvar ? override_envvar : getenv(key->key);
data/git-2.29.2+next.20201030/trace2/tr2_cfg.c:134:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		const char *val = getenv(buf->buf);
data/git-2.29.2+next.20201030/trace2/tr2_cmd_name.c:10:28:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *parent_name = getenv(TR2_ENVVAR_PARENT_NAME);
data/git-2.29.2+next.20201030/trace2/tr2_sid.c:76:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	parent_sid = getenv(TR2_ENVVAR_PARENT_SID);
data/git-2.29.2+next.20201030/trace2/tr2_sysenv.c:103:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		const char *v = getenv(tr2_sysenv_settings[var].env_var_name);
data/git-2.29.2+next.20201030/transport-helper.c:1268:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (getenv("GIT_TRANSPORT_HELPER_DEBUG"))
data/git-2.29.2+next.20201030/transport-helper.c:1301:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		debug_enabled = getenv("GIT_TRANSLOOP_DEBUG") ? 1 : 0;
data/git-2.29.2+next.20201030/transport.c:897:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		const char *v = getenv("GIT_ALLOW_PROTOCOL");
data/git-2.29.2+next.20201030/version.c:13:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		agent = getenv("GIT_USER_AGENT");
data/git-2.29.2+next.20201030/worktree.c:317:19:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
	strbuf_realpath(&realpath, git_common_path("worktrees/%s", wt->id), 1);
data/git-2.29.2+next.20201030/worktree.c:318:24:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
	ret = fspathcmp(path, realpath.buf);
data/git-2.29.2+next.20201030/worktree.c:326:18:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
	strbuf_release(&realpath);
data/git-2.29.2+next.20201030/write-or-die.c:25:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
			cp = getenv("GIT_FLUSH");
data/git-2.29.2+next.20201030/add-interactive.h:9:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char header_color[COLOR_MAXLEN];
data/git-2.29.2+next.20201030/add-interactive.h:10:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char help_color[COLOR_MAXLEN];
data/git-2.29.2+next.20201030/add-interactive.h:11:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char prompt_color[COLOR_MAXLEN];
data/git-2.29.2+next.20201030/add-interactive.h:12:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char error_color[COLOR_MAXLEN];
data/git-2.29.2+next.20201030/add-interactive.h:13:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char reset_color[COLOR_MAXLEN];
data/git-2.29.2+next.20201030/add-interactive.h:14:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fraginfo_color[COLOR_MAXLEN];
data/git-2.29.2+next.20201030/add-interactive.h:15:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char context_color[COLOR_MAXLEN];
data/git-2.29.2+next.20201030/add-interactive.h:16:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char file_old_color[COLOR_MAXLEN];
data/git-2.29.2+next.20201030/add-interactive.h:17:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char file_new_color[COLOR_MAXLEN];
data/git-2.29.2+next.20201030/add-patch.c:23:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *diff_cmd[4], *apply_args[4], *apply_check_args[4];
data/git-2.29.2+next.20201030/add-patch.c:25:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *prompt_mode[PROMPT_MODE_MAX];
data/git-2.29.2+next.20201030/add-patch.c:1587:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char errbuf[1024];
data/git-2.29.2+next.20201030/apply.c:1077:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(patch->old_oid_prefix, line, len);
data/git-2.29.2+next.20201030/apply.c:1090:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(patch->new_oid_prefix, line, len);
data/git-2.29.2+next.20201030/apply.c:2360:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(new_buf, fixed, l_len);
data/git-2.29.2+next.20201030/apply.c:2796:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(result, img->buf, applied_at);
data/git-2.29.2+next.20201030/apply.c:2797:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(result + applied_at, postimage->buf, postimage->len);
data/git-2.29.2+next.20201030/apply.c:2798:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(result + applied_at + postimage->len,
data/git-2.29.2+next.20201030/apply.c:2903:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(old, patch + 1, plen);
data/git-2.29.2+next.20201030/apply.c:4300:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ce->name, path, namelen);
data/git-2.29.2+next.20201030/apply.c:4365:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, O_CREAT | O_EXCL | O_WRONLY, (mode & 0100) ? 0777 : 0666);
data/git-2.29.2+next.20201030/apply.c:4434:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char newpath[PATH_MAX];
data/git-2.29.2+next.20201030/apply.c:4471:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ce->name, patch->new_name, namelen);
data/git-2.29.2+next.20201030/apply.c:4534:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char namebuf[PATH_MAX];
data/git-2.29.2+next.20201030/apply.c:4573:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(namebuf, patch->new_name, cnt);
data/git-2.29.2+next.20201030/apply.c:4574:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(namebuf + cnt, ".rej", 5);
data/git-2.29.2+next.20201030/apply.c:4576:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	rej = fopen(namebuf, "w");
data/git-2.29.2+next.20201030/apply.c:4833:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	state->p_value = atoi(arg);
data/git-2.29.2+next.20201030/apply.c:4903:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(arg, O_RDONLY);
data/git-2.29.2+next.20201030/apply.h:147:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char old_oid_prefix[GIT_MAX_HEXSZ + 1];
data/git-2.29.2+next.20201030/apply.h:148:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char new_oid_prefix[GIT_MAX_HEXSZ + 1];
data/git-2.29.2+next.20201030/archive-tar.c:15:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char block[BLOCKSIZE];
data/git-2.29.2+next.20201030/archive-tar.c:62:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(block + offset, buf, chunk);
data/git-2.29.2+next.20201030/archive-tar.c:74:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(block + offset, buf, size);
data/git-2.29.2+next.20201030/archive-tar.c:120:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BLOCKSIZE];
data/git-2.29.2+next.20201030/archive-tar.c:173:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[40]; /* big enough for 2^128 in decimal, plus NUL */
data/git-2.29.2+next.20201030/archive-tar.c:221:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(header->magic, "ustar", 6);
data/git-2.29.2+next.20201030/archive-tar.c:222:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(header->version, "00", 2);
data/git-2.29.2+next.20201030/archive-tar.c:273:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(header.prefix, path, plen);
data/git-2.29.2+next.20201030/archive-tar.c:274:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(header.name, path + plen + 1, rest);
data/git-2.29.2+next.20201030/archive-tar.c:282:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(header.name, path, pathlen);
data/git-2.29.2+next.20201030/archive-tar.c:291:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(header.linkname, buffer, size);
data/git-2.29.2+next.20201030/archive-tar.c:432:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *argv[2];
data/git-2.29.2+next.20201030/archive-zip.c:33:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char magic[4];
data/git-2.29.2+next.20201030/archive-zip.c:34:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char version[2];
data/git-2.29.2+next.20201030/archive-zip.c:35:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char flags[2];
data/git-2.29.2+next.20201030/archive-zip.c:36:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char compression_method[2];
data/git-2.29.2+next.20201030/archive-zip.c:37:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char mtime[2];
data/git-2.29.2+next.20201030/archive-zip.c:38:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char mdate[2];
data/git-2.29.2+next.20201030/archive-zip.c:39:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char crc32[4];
data/git-2.29.2+next.20201030/archive-zip.c:40:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char compressed_size[4];
data/git-2.29.2+next.20201030/archive-zip.c:41:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char size[4];
data/git-2.29.2+next.20201030/archive-zip.c:42:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char filename_length[2];
data/git-2.29.2+next.20201030/archive-zip.c:43:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char extra_length[2];
data/git-2.29.2+next.20201030/archive-zip.c:44:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char _end[1];
data/git-2.29.2+next.20201030/archive-zip.c:48:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char magic[4];
data/git-2.29.2+next.20201030/archive-zip.c:49:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char crc32[4];
data/git-2.29.2+next.20201030/archive-zip.c:50:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char compressed_size[4];
data/git-2.29.2+next.20201030/archive-zip.c:51:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char size[4];
data/git-2.29.2+next.20201030/archive-zip.c:52:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char _end[1];
data/git-2.29.2+next.20201030/archive-zip.c:56:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char magic[4];
data/git-2.29.2+next.20201030/archive-zip.c:57:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char crc32[4];
data/git-2.29.2+next.20201030/archive-zip.c:58:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char compressed_size[8];
data/git-2.29.2+next.20201030/archive-zip.c:59:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char size[8];
data/git-2.29.2+next.20201030/archive-zip.c:60:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char _end[1];
data/git-2.29.2+next.20201030/archive-zip.c:64:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char magic[4];
data/git-2.29.2+next.20201030/archive-zip.c:65:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char disk[2];
data/git-2.29.2+next.20201030/archive-zip.c:66:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char directory_start_disk[2];
data/git-2.29.2+next.20201030/archive-zip.c:67:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char entries_on_this_disk[2];
data/git-2.29.2+next.20201030/archive-zip.c:68:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char entries[2];
data/git-2.29.2+next.20201030/archive-zip.c:69:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char size[4];
data/git-2.29.2+next.20201030/archive-zip.c:70:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char offset[4];
data/git-2.29.2+next.20201030/archive-zip.c:71:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char comment_length[2];
data/git-2.29.2+next.20201030/archive-zip.c:72:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char _end[1];
data/git-2.29.2+next.20201030/archive-zip.c:76:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char magic[2];
data/git-2.29.2+next.20201030/archive-zip.c:77:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char extra_size[2];
data/git-2.29.2+next.20201030/archive-zip.c:78:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char flags[1];
data/git-2.29.2+next.20201030/archive-zip.c:79:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char mtime[4];
data/git-2.29.2+next.20201030/archive-zip.c:80:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char _end[1];
data/git-2.29.2+next.20201030/archive-zip.c:84:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char magic[2];
data/git-2.29.2+next.20201030/archive-zip.c:85:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char extra_size[2];
data/git-2.29.2+next.20201030/archive-zip.c:86:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char size[8];
data/git-2.29.2+next.20201030/archive-zip.c:87:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char compressed_size[8];
data/git-2.29.2+next.20201030/archive-zip.c:88:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char _end[1];
data/git-2.29.2+next.20201030/archive-zip.c:92:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char magic[4];
data/git-2.29.2+next.20201030/archive-zip.c:93:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char record_size[8];
data/git-2.29.2+next.20201030/archive-zip.c:94:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char creator_version[2];
data/git-2.29.2+next.20201030/archive-zip.c:95:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char version[2];
data/git-2.29.2+next.20201030/archive-zip.c:96:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char disk[4];
data/git-2.29.2+next.20201030/archive-zip.c:97:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char directory_start_disk[4];
data/git-2.29.2+next.20201030/archive-zip.c:98:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char entries_on_this_disk[8];
data/git-2.29.2+next.20201030/archive-zip.c:99:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char entries[8];
data/git-2.29.2+next.20201030/archive-zip.c:100:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char size[8];
data/git-2.29.2+next.20201030/archive-zip.c:101:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char offset[8];
data/git-2.29.2+next.20201030/archive-zip.c:102:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char _end[1];
data/git-2.29.2+next.20201030/archive-zip.c:106:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char magic[4];
data/git-2.29.2+next.20201030/archive-zip.c:107:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char disk[4];
data/git-2.29.2+next.20201030/archive-zip.c:108:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char offset[8];
data/git-2.29.2+next.20201030/archive-zip.c:109:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char number_of_disks[4];
data/git-2.29.2+next.20201030/archive-zip.c:110:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char _end[1];
data/git-2.29.2+next.20201030/archive-zip.c:419:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char buf[STREAM_BUFFER_SIZE];
data/git-2.29.2+next.20201030/archive-zip.c:442:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char buf[STREAM_BUFFER_SIZE];
data/git-2.29.2+next.20201030/archive-zip.c:447:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char compressed[STREAM_BUFFER_SIZE * 2];
data/git-2.29.2+next.20201030/archive.c:111:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[FLEX_ARRAY];
data/git-2.29.2+next.20201030/attr.c:32:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[FLEX_ARRAY]; /* attribute name */
data/git-2.29.2+next.20201030/attr.c:402:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(p, name, namelen);
data/git-2.29.2+next.20201030/attr.c:715:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[2048];
data/git-2.29.2+next.20201030/base85.c:28:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char de85[256];
data/git-2.29.2+next.20201030/base85.c:107:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024];
data/git-2.29.2+next.20201030/base85.c:126:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char t[4] = { -1,-1,-1,-1 };
data/git-2.29.2+next.20201030/bisect.c:717:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char bisect_rev_hex[GIT_MAX_HEXSZ + 1];
data/git-2.29.2+next.20201030/bisect.c:919:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(filename, O_CREAT | O_TRUNC | O_WRONLY, 0600);
data/git-2.29.2+next.20201030/bisect.c:966:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE *fp = fopen(filename, "r");
data/git-2.29.2+next.20201030/blame.c:139:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	merge_head = open(git_path_merge_head(r), O_RDONLY);
data/git-2.29.2+next.20201030/blame.c:289:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ce->name, path, len);
data/git-2.29.2+next.20201030/blame.c:1323:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *paths[2];
data/git-2.29.2+next.20201030/blame.c:1461:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(e, src, sizeof(*e));
data/git-2.29.2+next.20201030/blame.c:1479:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst, src, sizeof(*src));
data/git-2.29.2+next.20201030/blame.c:2031:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(best_so_far, potential, sizeof(struct blame_entry[3]));
data/git-2.29.2+next.20201030/blame.h:64:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[FLEX_ARRAY];
data/git-2.29.2+next.20201030/block-sha1/sha1.c:217:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(lenW + (char *)ctx->W, data, left);
data/git-2.29.2+next.20201030/block-sha1/sha1.c:231:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ctx->W, data, len);
data/git-2.29.2+next.20201030/block-sha1/sha1.c:234:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void blk_SHA1_Final(unsigned char hashout[20], blk_SHA_CTX *ctx)
data/git-2.29.2+next.20201030/block-sha1/sha1.c:236:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static const unsigned char pad[64] = { 0x80 };
data/git-2.29.2+next.20201030/block-sha1/sha1.h:17:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void blk_SHA1_Final(unsigned char hashout[20], blk_SHA_CTX *ctx);
data/git-2.29.2+next.20201030/bloom.c:16:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    const char path[FLEX_ARRAY];
data/git-2.29.2+next.20201030/builtin/add.c:281:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	out = open(file, O_CREAT | O_WRONLY | O_TRUNC, 0666);
data/git-2.29.2+next.20201030/builtin/am.c:707:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			in = fopen(*paths, "r");
data/git-2.29.2+next.20201030/builtin/am.c:715:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		out = fopen(mail, "w");
data/git-2.29.2+next.20201030/builtin/am.c:800:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen(*paths, "r");
data/git-2.29.2+next.20201030/builtin/am.c:1646:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char reply[64];
data/git-2.29.2+next.20201030/builtin/am.c:2080:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		const char *av[4] = { "show", NULL, "--", NULL };
data/git-2.29.2+next.20201030/builtin/archive.c:15:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	int output_fd = open(output_file, O_CREAT | O_WRONLY | O_TRUNC, 0666);
data/git-2.29.2+next.20201030/builtin/bisect--helper.c:106:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen(path, mode);
data/git-2.29.2+next.20201030/builtin/bisect--helper.c:270:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen(git_path_bisect_log(), "a");
data/git-2.29.2+next.20201030/builtin/bisect--helper.c:396:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen(git_path_bisect_terms(), "r");
data/git-2.29.2+next.20201030/builtin/bisect--helper.c:442:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE *fp = fopen(git_path_bisect_log(), "a");
data/git-2.29.2+next.20201030/builtin/bisect--helper.c:518:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen(git_path_bisect_log(), "a");
data/git-2.29.2+next.20201030/builtin/blame.c:54:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char repeated_meta_color[COLOR_MAXLEN];
data/git-2.29.2+next.20201030/builtin/blame.c:308:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		tz = atoi(tz_str);
data/git-2.29.2+next.20201030/builtin/blame.c:350:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hex[GIT_MAX_HEXSZ + 1];
data/git-2.29.2+next.20201030/builtin/blame.c:384:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char col[COLOR_MAXLEN];
data/git-2.29.2+next.20201030/builtin/blame.c:446:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hex[GIT_MAX_HEXSZ + 1];
data/git-2.29.2+next.20201030/builtin/bugreport.c:172:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	report = open(report_path.buf, O_CREAT | O_EXCL | O_WRONLY, 0666);
data/git-2.29.2+next.20201030/builtin/cat-file.c:141:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			const char *ls_args[3] = { NULL };
data/git-2.29.2+next.20201030/builtin/check-ignore.c:129:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *pathspec[2] = { NULL, NULL };
data/git-2.29.2+next.20201030/builtin/checkout-index.c:19:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char topath[4][TEMPORARY_FILENAME_LENGTH + 1];
data/git-2.29.2+next.20201030/builtin/checkout.c:129:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ce->name, base->buf, base->len);
data/git-2.29.2+next.20201030/builtin/checkout.c:130:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ce->name + base->len, pathname, len - base->len);
data/git-2.29.2+next.20201030/builtin/checkout.c:475:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char rev_oid[GIT_MAX_HEXSZ + 1];
data/git-2.29.2+next.20201030/builtin/clean.c:501:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			bottom = atoi((*ptr)->buf);
data/git-2.29.2+next.20201030/builtin/clean.c:504:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			bottom = atoi((*ptr)->buf);
data/git-2.29.2+next.20201030/builtin/clean.c:509:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				top = atoi(strchr((*ptr)->buf, '-') + 1);
data/git-2.29.2+next.20201030/builtin/clone.c:174:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char signature[8];
data/git-2.29.2+next.20201030/builtin/clone.c:176:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			int len, fd = open(path->buf, O_RDONLY);
data/git-2.29.2+next.20201030/builtin/clone.c:1028:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if (option_depth && atoi(option_depth) < 1)
data/git-2.29.2+next.20201030/builtin/commit-tree.c:91:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(arg, O_RDONLY);
data/git-2.29.2+next.20201030/builtin/commit.c:1031:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *av[20];
data/git-2.29.2+next.20201030/builtin/commit.c:1667:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		const char *exclude_gpgsig[3] = { "gpgsig", "gpgsig-sha256", NULL };
data/git-2.29.2+next.20201030/builtin/config.c:275:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char v[COLOR_MAXLEN];
data/git-2.29.2+next.20201030/builtin/config.c:432:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char v[COLOR_MAXLEN];
data/git-2.29.2+next.20201030/builtin/config.c:452:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char parsed_color[COLOR_MAXLEN];
data/git-2.29.2+next.20201030/builtin/config.c:799:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			int fd = open(config_file, O_CREAT | O_EXCL | O_WRONLY, 0666);
data/git-2.29.2+next.20201030/builtin/credential-cache--daemon.c:27:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&e->item, c, sizeof(*c));
data/git-2.29.2+next.20201030/builtin/credential-cache--daemon.c:72:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(&entries[i], &entries[entries_nr], sizeof(*entries));
data/git-2.29.2+next.20201030/builtin/credential-cache--daemon.c:110:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	*timeout = atoi(p);
data/git-2.29.2+next.20201030/builtin/credential-cache.c:27:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char in[1024];
data/git-2.29.2+next.20201030/builtin/credential-cache.c:45:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[128];
data/git-2.29.2+next.20201030/builtin/credential-store.c:19:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fh = fopen(fn, "r");
data/git-2.29.2+next.20201030/builtin/diff-tree.c:108:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[1000];
data/git-2.29.2+next.20201030/builtin/difftool.c:105:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		int fd = open(buf.buf, O_RDONLY);
data/git-2.29.2+next.20201030/builtin/difftool.c:124:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[FLEX_ARRAY];
data/git-2.29.2+next.20201030/builtin/difftool.c:146:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char left[PATH_MAX], right[PATH_MAX];
data/git-2.29.2+next.20201030/builtin/difftool.c:147:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char path[FLEX_ARRAY];
data/git-2.29.2+next.20201030/builtin/difftool.c:183:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[FLEX_ARRAY];
data/git-2.29.2+next.20201030/builtin/difftool.c:335:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmpdir[PATH_MAX];
data/git-2.29.2+next.20201030/builtin/fast-export.c:125:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char orig[FLEX_ARRAY];
data/git-2.29.2+next.20201030/builtin/fast-export.c:1088:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[512];
data/git-2.29.2+next.20201030/builtin/fast-import.c:90:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str_dat[FLEX_ARRAY]; /* more */
data/git-2.29.2+next.20201030/builtin/fast-import.c:314:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE *rpt = fopen(loc, "w");
data/git-2.29.2+next.20201030/builtin/fast-import.c:405:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char message[2 * PATH_MAX];
data/git-2.29.2+next.20201030/builtin/fast-import.c:582:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(c->str_dat, s, len);
data/git-2.29.2+next.20201030/builtin/fast-import.c:727:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(b, a, sizeof(*a));
data/git-2.29.2+next.20201030/builtin/fast-import.c:764:14:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	const char *tmpfile;
data/git-2.29.2+next.20201030/builtin/fast-import.c:783:9:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	return tmpfile;
data/git-2.29.2+next.20201030/builtin/fast-import.c:932:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hdr[96];
data/git-2.29.2+next.20201030/builtin/fast-import.c:1537:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(backup_leaf, e, sizeof(*backup_leaf));
data/git-2.29.2+next.20201030/builtin/fast-import.c:1587:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(leaf, e, sizeof(*leaf));
data/git-2.29.2+next.20201030/builtin/fast-import.c:1746:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[512];
data/git-2.29.2+next.20201030/builtin/fast-import.c:1770:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE *f = fopen(import_marks_file, "r");
data/git-2.29.2+next.20201030/builtin/fast-import.c:2079:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(path + i, hex_sha1 + j, the_hash_algo->hexsz - j);
data/git-2.29.2+next.20201030/builtin/fast-import.c:2095:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char realpath[GIT_MAX_HEXSZ + ((GIT_MAX_HEXSZ / 2) - 1) + 1];
data/git-2.29.2+next.20201030/builtin/fast-import.c:2121:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(hex_oid + hex_oid_len, e->name->str_dat,
data/git-2.29.2+next.20201030/builtin/fast-import.c:2125:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(fullpath + tmp_fullpath_len, e->name->str_dat,
data/git-2.29.2+next.20201030/builtin/fast-import.c:2173:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hex_oid[GIT_MAX_HEXSZ], path[GIT_MAX_HEXSZ + (GIT_MAX_HEXSZ / 2) - 1 + 1];
data/git-2.29.2+next.20201030/builtin/fast-import.c:2432:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[GIT_MAX_RAWSZ * 3];
data/git-2.29.2+next.20201030/builtin/fast-import.c:2970:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char output[GIT_MAX_HEXSZ + 2];
data/git-2.29.2+next.20201030/builtin/fast-import.c:3327:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen(f, "r");
data/git-2.29.2+next.20201030/builtin/fetch.c:282:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char refname[FLEX_ARRAY];
data/git-2.29.2+next.20201030/builtin/fetch.c:925:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen(filename, "a");
data/git-2.29.2+next.20201030/builtin/fetch.c:1840:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if (depth && atoi(depth) < 1)
data/git-2.29.2+next.20201030/builtin/fmt-merge-msg.c:44:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		in = fopen(inpath, "r");
data/git-2.29.2+next.20201030/builtin/gc.c:397:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char my_host[HOST_NAME_MAX + 1];
data/git-2.29.2+next.20201030/builtin/gc.c:416:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		static char locking_host[HOST_NAME_MAX + 1];
data/git-2.29.2+next.20201030/builtin/gc.c:422:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fp = fopen(pidfile_path, "r");
data/git-2.29.2+next.20201030/builtin/get-tar-commit-id.c:19:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[HEADERSIZE];
data/git-2.29.2+next.20201030/builtin/grep.c:674:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char hex[GIT_MAX_HEXSZ + 1];
data/git-2.29.2+next.20201030/builtin/grep.c:754:34:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	patterns = from_stdin ? stdin : fopen(arg, "r");
data/git-2.29.2+next.20201030/builtin/hash-object.c:56:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, O_RDONLY);
data/git-2.29.2+next.20201030/builtin/help.c:21:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[FLEX_ARRAY];
data/git-2.29.2+next.20201030/builtin/help.c:27:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[FLEX_ARRAY];
data/git-2.29.2+next.20201030/builtin/help.c:207:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	version = atoi(buffer.buf);
data/git-2.29.2+next.20201030/builtin/index-pack.c:132:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char input_buffer[4096];
data/git-2.29.2+next.20201030/builtin/index-pack.c:190:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		thread_data[i].pack_fd = open(curr_pack, O_RDONLY);
data/git-2.29.2+next.20201030/builtin/index-pack.c:340:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			output_fd = open(pack_name, O_CREAT|O_EXCL|O_RDWR, 0600);
data/git-2.29.2+next.20201030/builtin/index-pack.c:346:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		input_fd = open(pack_name, O_RDONLY);
data/git-2.29.2+next.20201030/builtin/index-pack.c:377:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024];
data/git-2.29.2+next.20201030/builtin/index-pack.c:449:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char fixed_buf[8192];
data/git-2.29.2+next.20201030/builtin/index-pack.c:454:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hdr[32];
data/git-2.29.2+next.20201030/builtin/index-pack.c:1277:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char read_hash[GIT_MAX_RAWSZ], tail_hash[GIT_MAX_RAWSZ];
data/git-2.29.2+next.20201030/builtin/index-pack.c:1314:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char outbuf[4096];
data/git-2.29.2+next.20201030/builtin/index-pack.c:1339:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char header[10];
data/git-2.29.2+next.20201030/builtin/index-pack.c:1706:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char pack_hash[GIT_MAX_RAWSZ];
data/git-2.29.2+next.20201030/builtin/init-db.c:184:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char repo_version_string[10];
data/git-2.29.2+next.20201030/builtin/init-db.c:210:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char junk[2];
data/git-2.29.2+next.20201030/builtin/init-db.c:449:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[10];
data/git-2.29.2+next.20201030/builtin/log.c:980:27:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((rev->diffopt.file = fopen(filename.buf, "w")) == NULL) {
data/git-2.29.2+next.20201030/builtin/log.c:1826:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&rev.notes_opt, &notes_opt, sizeof(notes_opt));
data/git-2.29.2+next.20201030/builtin/ls-files.c:87:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char alttag[4];
data/git-2.29.2+next.20201030/builtin/ls-files.c:91:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(alttag, tag, 3);
data/git-2.29.2+next.20201030/builtin/ls-files.c:440:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		static const char *(matchbuf[1]);
data/git-2.29.2+next.20201030/builtin/ls-tree.c:95:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char size_text[24];
data/git-2.29.2+next.20201030/builtin/mailsplit.c:78:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(name, O_WRONLY | O_CREAT | O_EXCL, 0666);
data/git-2.29.2+next.20201030/builtin/mailsplit.c:191:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		f = fopen(file, "r");
data/git-2.29.2+next.20201030/builtin/mailsplit.c:225:41:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE *f = !strcmp(file, "-") ? stdin : fopen(file, "r");
data/git-2.29.2+next.20201030/builtin/merge-file.c:28:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *names[3] = { NULL, NULL, NULL };
data/git-2.29.2+next.20201030/builtin/merge-file.c:100:34:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		FILE *f = to_stdout ? stdout : fopen(fpath, "wb");
data/git-2.29.2+next.20201030/builtin/merge-index.c:13:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hexbuf[4][GIT_MAX_HEXSZ + 1];
data/git-2.29.2+next.20201030/builtin/merge-index.c:14:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ownbuf[4][60];
data/git-2.29.2+next.20201030/builtin/merge-recursive.c:13:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char githead_env[8 + GIT_MAX_HEXSZ + 1];
data/git-2.29.2+next.20201030/builtin/merge-tree.c:139:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		static const char *desc[4] = { "result", "base", "our", "their" };
data/git-2.29.2+next.20201030/builtin/merge.c:330:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *args[7];
data/git-2.29.2+next.20201030/builtin/merge.c:348:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *args[6];
data/git-2.29.2+next.20201030/builtin/merge.c:1119:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(filename, O_RDONLY);
data/git-2.29.2+next.20201030/builtin/mktag.c:45:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char type[20];
data/git-2.29.2+next.20201030/builtin/mktag.c:84:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(type, type_line+5, typelen);
data/git-2.29.2+next.20201030/builtin/mktag.c:142:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	      tagger_line[5] == '\n' && atoi(tagger_line+1) <= 1400))
data/git-2.29.2+next.20201030/builtin/mktree.c:16:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[FLEX_ARRAY];
data/git-2.29.2+next.20201030/builtin/mv.c:56:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		free((char *) result[i]);
data/git-2.29.2+next.20201030/builtin/mv.c:68:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(with_slash, path, len);
data/git-2.29.2+next.20201030/builtin/name-rev.c:608:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buffer[2048];
data/git-2.29.2+next.20201030/builtin/notes.c:137:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *show_args[5] =
data/git-2.29.2+next.20201030/builtin/notes.c:175:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(d->edit_path, O_CREAT | O_TRUNC | O_WRONLY, 0600);
data/git-2.29.2+next.20201030/builtin/notes.c:681:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		const char *show_args[3] = {"show", oid_to_hex(note), NULL};
data/git-2.29.2+next.20201030/builtin/pack-objects.c:220:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char ibuf[1024 * 16];
data/git-2.29.2+next.20201030/builtin/pack-objects.c:221:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char obuf[1024 * 16];
data/git-2.29.2+next.20201030/builtin/pack-objects.c:266:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char fakebuf[4096], *in;
data/git-2.29.2+next.20201030/builtin/pack-objects.c:309:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char header[MAX_PACK_OBJECT_HEADER],
data/git-2.29.2+next.20201030/builtin/pack-objects.c:426:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char header[MAX_PACK_OBJECT_HEADER],
data/git-2.29.2+next.20201030/builtin/pack-objects.c:879:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char header[MAX_PACK_OBJECT_HEADER];
data/git-2.29.2+next.20201030/builtin/pack-objects.c:905:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			unsigned char ofs_header[10];
data/git-2.29.2+next.20201030/builtin/pack-objects.c:2967:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ex->pack_hash_hex, oid_end + 1, pack_end - oid_end - 1);
data/git-2.29.2+next.20201030/builtin/pack-objects.c:2976:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[GIT_MAX_HEXSZ + 1 + PATH_MAX + 2];
data/git-2.29.2+next.20201030/builtin/pack-objects.c:3331:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[1000];
data/git-2.29.2+next.20201030/builtin/pack-redundant.c:200:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(p, entry, sizeof(struct pack_list));
data/git-2.29.2+next.20201030/builtin/pack-redundant.c:232:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ret, A, sizeof(struct pack_list));
data/git-2.29.2+next.20201030/builtin/pack-redundant.c:560:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[GIT_MAX_HEXSZ + 2]; /* hex hash + \n + \0 */
data/git-2.29.2+next.20201030/builtin/patch-id.c:49:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	*p_before = atoi(q);
data/git-2.29.2+next.20201030/builtin/patch-id.c:50:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	*p_after = atoi(r);
data/git-2.29.2+next.20201030/builtin/read-tree.c:99:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[24];
data/git-2.29.2+next.20201030/builtin/rebase.c:308:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	interactive = fopen(path_interactive(), "w");
data/git-2.29.2+next.20201030/builtin/rebase.c:855:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	format_patch.out = open(rebased_patches,
data/git-2.29.2+next.20201030/builtin/rebase.c:900:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	am.in = open(rebased_patches, O_RDONLY);
data/git-2.29.2+next.20201030/builtin/receive-pack.c:344:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ref_name[FLEX_ARRAY]; /* more */
data/git-2.29.2+next.20201030/builtin/receive-pack.c:426:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[4096];
data/git-2.29.2+next.20201030/builtin/receive-pack.c:458:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char data[128];
data/git-2.29.2+next.20201030/builtin/receive-pack.c:523:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char key[GIT_MAX_BLKSZ];
data/git-2.29.2+next.20201030/builtin/receive-pack.c:524:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char k_ipad[GIT_MAX_BLKSZ];
data/git-2.29.2+next.20201030/builtin/receive-pack.c:525:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char k_opad[GIT_MAX_BLKSZ];
data/git-2.29.2+next.20201030/builtin/receive-pack.c:536:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(key, key_in, key_len);
data/git-2.29.2+next.20201030/builtin/receive-pack.c:561:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hash[GIT_MAX_RAWSZ];
data/git-2.29.2+next.20201030/builtin/receive-pack.c:803:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *argv[2];
data/git-2.29.2+next.20201030/builtin/receive-pack.c:934:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *argv[5];
data/git-2.29.2+next.20201030/builtin/receive-pack.c:1098:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *argv[2];
data/git-2.29.2+next.20201030/builtin/receive-pack.c:1162:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			version = atoi(reader.line + 8);
data/git-2.29.2+next.20201030/builtin/receive-pack.c:2189:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char hostname[HOST_NAME_MAX + 1];
data/git-2.29.2+next.20201030/builtin/reflog.c:53:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char reflog[FLEX_ARRAY];
data/git-2.29.2+next.20201030/builtin/reflog.c:434:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pattern[FLEX_ARRAY];
data/git-2.29.2+next.20201030/builtin/remote-ext.c:168:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[MAXCOMMAND];
data/git-2.29.2+next.20201030/builtin/remote-fd.c:26:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[MAXCOMMAND];
data/git-2.29.2+next.20201030/builtin/repack.c:252:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(promisor_name, O_CREAT|O_EXCL|O_WRONLY, 0600);
data/git-2.29.2+next.20201030/builtin/replace.c:227:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(filename, O_WRONLY | O_CREAT | O_TRUNC, 0666);
data/git-2.29.2+next.20201030/builtin/replace.c:256:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(filename, O_RDONLY);
data/git-2.29.2+next.20201030/builtin/replace.c:316:8:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	char *tmpfile;
data/git-2.29.2+next.20201030/builtin/replace.c:336:41:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	if (export_object(&old_oid, type, raw, tmpfile)) {
data/git-2.29.2+next.20201030/builtin/replace.c:337:8:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
		free(tmpfile);
data/git-2.29.2+next.20201030/builtin/replace.c:340:20:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	if (launch_editor(tmpfile, NULL, NULL) < 0) {
data/git-2.29.2+next.20201030/builtin/replace.c:341:8:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
		free(tmpfile);
data/git-2.29.2+next.20201030/builtin/replace.c:344:41:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	if (import_object(&new_oid, type, raw, tmpfile)) {
data/git-2.29.2+next.20201030/builtin/replace.c:345:8:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
		free(tmpfile);
data/git-2.29.2+next.20201030/builtin/replace.c:348:7:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	free(tmpfile);
data/git-2.29.2+next.20201030/builtin/rev-list.c:300:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hex[GIT_MAX_HEXSZ + 1] = "";
data/git-2.29.2+next.20201030/builtin/shortlog.c:89:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(p, "/.../", 5);
data/git-2.29.2+next.20201030/builtin/shortlog.c:129:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static const char *author_match[2] = { "Author: ", "author " };
data/git-2.29.2+next.20201030/builtin/shortlog.c:130:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static const char *committer_match[2] = { "Commit: ", "committer " };
data/git-2.29.2+next.20201030/builtin/shortlog.c:174:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char value[FLEX_ARRAY];
data/git-2.29.2+next.20201030/builtin/show-branch.c:320:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *ref_name[MAX_REVS + 1];
data/git-2.29.2+next.20201030/builtin/show-branch.c:624:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *reflog_msg[MAX_REVS];
data/git-2.29.2+next.20201030/builtin/show-branch.c:726:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			static const char *fake_av[2];
data/git-2.29.2+next.20201030/builtin/show-ref.c:108:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024];
data/git-2.29.2+next.20201030/builtin/submodule--helper.c:1050:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			int fd = open(p->sm_path, O_RDONLY);
data/git-2.29.2+next.20201030/builtin/submodule--helper.c:1131:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			total_commits = atoi(sb_rev_list.buf);
data/git-2.29.2+next.20201030/builtin/tag.c:253:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(path, O_CREAT | O_TRUNC | O_WRONLY, 0600);
data/git-2.29.2+next.20201030/builtin/unpack-file.c:7:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char path[50];
data/git-2.29.2+next.20201030/builtin/unpack-objects.c:21:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char buffer[4096];
data/git-2.29.2+next.20201030/builtin/update-index.c:98:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, O_CREAT | O_RDWR, 0644);
data/git-2.29.2+next.20201030/builtin/update-index.c:281:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ce->name, path, len);
data/git-2.29.2+next.20201030/builtin/update-index.c:417:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ce->name, path, len);
data/git-2.29.2+next.20201030/builtin/update-index.c:619:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ce->name, path, namelen);
data/git-2.29.2+next.20201030/builtin/upload-archive.c:67:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[16384];
data/git-2.29.2+next.20201030/builtin/worktree.c:94:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(git_path("worktrees/%s/gitdir", id), O_RDONLY);
data/git-2.29.2+next.20201030/builtin/worktree.c:931:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1];
data/git-2.29.2+next.20201030/bulk-checkin.c:103:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char obuf[16384];
data/git-2.29.2+next.20201030/bulk-checkin.c:116:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char ibuf[16384];
data/git-2.29.2+next.20201030/bulk-checkin.c:198:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char obuf[16384];
data/git-2.29.2+next.20201030/bundle.c:133:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	int fd = open(path, O_RDONLY);
data/git-2.29.2+next.20201030/bundle.c:143:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	int fd = open(path, O_RDONLY);
data/git-2.29.2+next.20201030/cache-tree.h:14:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[FLEX_ARRAY];
data/git-2.29.2+next.20201030/cache.h:151:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[FLEX_ARRAY]; /* more */
data/git-2.29.2+next.20201030/cache.h:223:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&dst->ce_stat_data, &src->ce_stat_data,
data/git-2.29.2+next.20201030/cache.h:1167:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(sha_dst, sha_src, the_hash_algo->rawsz);
data/git-2.29.2+next.20201030/cache.h:1172:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst->hash, src->hash, GIT_MAX_RAWSZ);
data/git-2.29.2+next.20201030/cache.h:1194:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(oid->hash, hash, the_hash_algo->rawsz);
data/git-2.29.2+next.20201030/cache.h:1373:38:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
int finalize_object_file(const char *tmpfile, const char *filename);
data/git-2.29.2+next.20201030/cache.h:1378:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern const signed char hexval_table[256];
data/git-2.29.2+next.20201030/combine-diff.c:51:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(p->path, path, len);
data/git-2.29.2+next.20201030/combine-diff.c:120:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[FLEX_ARRAY];
data/git-2.29.2+next.20201030/combine-diff.c:1074:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		} else if (0 <= (fd = open(elem->path, O_RDONLY))) {
data/git-2.29.2+next.20201030/commit-graph.c:536:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen(chain_name, "r");
data/git-2.29.2+next.20201030/commit-graph.c:2373:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	devnull = open("/dev/null", O_WRONLY);
data/git-2.29.2+next.20201030/commit.c:1161:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hex[GIT_MAX_HEXSZ + 1];
data/git-2.29.2+next.20201030/commit.c:1417:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char replace[2];
data/git-2.29.2+next.20201030/commit.h:49:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[FLEX_ARRAY];
data/git-2.29.2+next.20201030/commit.h:301:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[FLEX_ARRAY];
data/git-2.29.2+next.20201030/compat/fopen.c:20:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		return fopen(path, mode);
data/git-2.29.2+next.20201030/compat/fopen.c:22:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (!(fp = fopen(path, mode)))
data/git-2.29.2+next.20201030/compat/hstrerror.c:7:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buffer[48];
data/git-2.29.2+next.20201030/compat/inet_ntop.c:50:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[sizeof "255.255.255.255"];
data/git-2.29.2+next.20201030/compat/inet_ntop.c:81:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[sizeof "ffff:ffff:ffff:ffff:ffff:ffff:255.255.255.255"], *tp;
data/git-2.29.2+next.20201030/compat/inet_pton.c:57:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char tmp[NS_INADDRSZ], *tp;
data/git-2.29.2+next.20201030/compat/inet_pton.c:86:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dst, tmp, NS_INADDRSZ);
data/git-2.29.2+next.20201030/compat/inet_pton.c:110:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char tmp[NS_IN6ADDRSZ], *tp, *endp, *colonp;
data/git-2.29.2+next.20201030/compat/inet_pton.c:184:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dst, tmp, NS_IN6ADDRSZ);
data/git-2.29.2+next.20201030/compat/mingw.c:156:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char answer[1024];
data/git-2.29.2+next.20201030/compat/mingw.c:194:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char question[4096];
data/git-2.29.2+next.20201030/compat/mingw.c:289:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t wpathname[MAX_PATH];
data/git-2.29.2+next.20201030/compat/mingw.c:322:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t wbuf[MAX_PATH + 2];
data/git-2.29.2+next.20201030/compat/mingw.c:324:2:  [2] (buffer) wcscat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Risk is low because the source is a constant string.
	wcscat(wbuf, L"\\*");
data/git-2.29.2+next.20201030/compat/mingw.c:343:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t wpathname[MAX_PATH];
data/git-2.29.2+next.20201030/compat/mingw.c:421:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t wpath[MAX_PATH];
data/git-2.29.2+next.20201030/compat/mingw.c:515:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t wfilename[MAX_PATH];
data/git-2.29.2+next.20201030/compat/mingw.c:533:3:  [2] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer. Risk is low because the source is a constant string.
		wcscpy(wfilename, L"nul");
data/git-2.29.2+next.20201030/compat/mingw.c:587:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#undef fopen
data/git-2.29.2+next.20201030/compat/mingw.c:592:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t wfilename[MAX_PATH], wotype[4];
data/git-2.29.2+next.20201030/compat/mingw.c:594:3:  [2] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer. Risk is low because the source is a constant string.
		wcscpy(wfilename, L"nul");
data/git-2.29.2+next.20201030/compat/mingw.c:621:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t wfilename[MAX_PATH], wotype[4];
data/git-2.29.2+next.20201030/compat/mingw.c:623:3:  [2] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer. Risk is low because the source is a constant string.
		wcscpy(wfilename, L"nul");
data/git-2.29.2+next.20201030/compat/mingw.c:685:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t wfilename[MAX_PATH];
data/git-2.29.2+next.20201030/compat/mingw.c:694:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t wdirname[MAX_PATH];
data/git-2.29.2+next.20201030/compat/mingw.c:702:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t wfilename[MAX_PATH];
data/git-2.29.2+next.20201030/compat/mingw.c:769:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t wfilename[MAX_PATH];
data/git-2.29.2+next.20201030/compat/mingw.c:792:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char buffer[MAXIMUM_REPARSE_DATA_BUFFER_SIZE];
data/git-2.29.2+next.20201030/compat/mingw.c:841:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char alt_name[PATH_MAX];
data/git-2.29.2+next.20201030/compat/mingw.c:860:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(alt_name, file_name, namelen);
data/git-2.29.2+next.20201030/compat/mingw.c:939:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t wfilename[MAX_PATH];
data/git-2.29.2+next.20201030/compat/mingw.c:1007:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t wtemplate[MAX_PATH];
data/git-2.29.2+next.20201030/compat/mingw.c:1017:5:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
int mkstemp(char *template)
data/git-2.29.2+next.20201030/compat/mingw.c:1022:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	return open(filename, O_RDWR | O_CREAT, 0600);
data/git-2.29.2+next.20201030/compat/mingw.c:1077:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t cwd[MAX_PATH], wpointer[MAX_PATH];
data/git-2.29.2+next.20201030/compat/mingw.c:1203:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buf[100];
data/git-2.29.2+next.20201030/compat/mingw.c:1212:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(cmd, O_RDONLY);
data/git-2.29.2+next.20201030/compat/mingw.c:1243:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[MAX_PATH];
data/git-2.29.2+next.20201030/compat/mingw.c:1244:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t wpath[MAX_PATH];
data/git-2.29.2+next.20201030/compat/mingw.c:1500:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t wcmd[MAX_PATH], wdir[MAX_PATH], *wargs, *wenvblk = NULL;
data/git-2.29.2+next.20201030/compat/mingw.c:1884:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char *values[GETENV_MAX_RETAIN];
data/git-2.29.2+next.20201030/compat/mingw.c:1889:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t w_value[32768];
data/git-2.29.2+next.20201030/compat/mingw.c:2083:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t wpold[MAX_PATH], wpnew[MAX_PATH];
data/git-2.29.2+next.20201030/compat/mingw.c:2163:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static wchar_t wbuffer[1024];
data/git-2.29.2+next.20201030/compat/mingw.c:2188:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char user_name[100];
data/git-2.29.2+next.20201030/compat/mingw.c:2190:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t buf[100];
data/git-2.29.2+next.20201030/compat/mingw.c:2398:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t woldpath[MAX_PATH], wnewpath[MAX_PATH];
data/git-2.29.2+next.20201030/compat/mingw.c:2749:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	return memcpy(malloc_startup(len), buffer, len);
data/git-2.29.2+next.20201030/compat/mingw.c:2756:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t buf[MAX_PATH];
data/git-2.29.2+next.20201030/compat/mingw.h:106:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sysname[16];
data/git-2.29.2+next.20201030/compat/mingw.h:107:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char nodename[1];
data/git-2.29.2+next.20201030/compat/mingw.h:108:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char release[16];
data/git-2.29.2+next.20201030/compat/mingw.h:109:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char version[16];
data/git-2.29.2+next.20201030/compat/mingw.h:110:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char machine[1];
data/git-2.29.2+next.20201030/compat/mingw.h:205:5:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
int mkstemp(char *template);
data/git-2.29.2+next.20201030/compat/mingw.h:229:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#define open mingw_open
data/git-2.29.2+next.20201030/compat/mingw.h:235:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#define fopen mingw_fopen
data/git-2.29.2+next.20201030/compat/nedmalloc/malloc.c.h:1545:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	   (dev_zero_fd = open("/dev/zero", O_RDWR), \
data/git-2.29.2+next.20201030/compat/nedmalloc/malloc.c.h:3076:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char buf[sizeof(size_t)];
data/git-2.29.2+next.20201030/compat/nedmalloc/malloc.c.h:3078:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((fd = open("/dev/urandom", O_RDONLY)) >= 0 &&
data/git-2.29.2+next.20201030/compat/nedmalloc/malloc.c.h:4424:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(newmem, oldmem, (oc < bytes)? oc : bytes);
data/git-2.29.2+next.20201030/compat/nedmalloc/nedmalloc.c:828:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(ret, mem, memsize<size ? memsize : size);
data/git-2.29.2+next.20201030/compat/obstack.h:149:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char	contents[4];		/* objects begin here */
data/git-2.29.2+next.20201030/compat/obstack.h:300:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy (__o->next_free, where, __len);				\
data/git-2.29.2+next.20201030/compat/obstack.h:310:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy (__o->next_free, where, __len);				\
data/git-2.29.2+next.20201030/compat/obstack.h:436:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy ((h)->next_free, where, (h)->temp.tempint),			\
data/git-2.29.2+next.20201030/compat/obstack.h:443:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy ((h)->next_free, where, (h)->temp.tempint),			\
data/git-2.29.2+next.20201030/compat/poll/poll.c:220:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char data[64];
data/git-2.29.2+next.20201030/compat/poll/poll.c:269:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char data[64];
data/git-2.29.2+next.20201030/compat/precompose_utf8.c:49:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	output_fd = open(path.buf, O_CREAT|O_EXCL|O_RDWR, 0600);
data/git-2.29.2+next.20201030/compat/precompose_utf8.h:21:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char   d_name[NAME_MAX+1];
data/git-2.29.2+next.20201030/compat/qsort_s.c:32:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(tmp, b1, s);
data/git-2.29.2+next.20201030/compat/qsort_s.c:37:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(tmp, b2, s);
data/git-2.29.2+next.20201030/compat/qsort_s.c:44:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(tmp, b1, n1 * s);
data/git-2.29.2+next.20201030/compat/qsort_s.c:45:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(b, t, (n - n2) * s);
data/git-2.29.2+next.20201030/compat/qsort_s.c:52:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024];
data/git-2.29.2+next.20201030/compat/regex/regcomp.c:221:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   wchar_t wtmp[2];
data/git-2.29.2+next.20201030/compat/regex/regcomp.c:222:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tmp[2];
data/git-2.29.2+next.20201030/compat/regex/regcomp.c:425:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		  char buf[256];
data/git-2.29.2+next.20201030/compat/regex/regcomp.c:575:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy (errbuf, msg, errbuf_size - 1);
data/git-2.29.2+next.20201030/compat/regex/regcomp.c:579:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy (errbuf, msg, msg_size);
data/git-2.29.2+next.20201030/compat/regex/regcomp.c:2495:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy ((void *) &start_token, (void *) token, sizeof start_token);
data/git-2.29.2+next.20201030/compat/regex/regcomp.c:2660:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    wchar_t cmp_buf[6] = {L'\0', L'\0', L'\0', L'\0', L'\0', L'\0'};
data/git-2.29.2+next.20201030/compat/regex/regcomp.c:3126:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char start_name_buf[BRACKET_NAME_BUF_SIZE];
data/git-2.29.2+next.20201030/compat/regex/regcomp.c:3127:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char end_name_buf[BRACKET_NAME_BUF_SIZE];
data/git-2.29.2+next.20201030/compat/regex/regcomp.c:3445:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char char_buf[2];
data/git-2.29.2+next.20201030/compat/regex/regex.h:572:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		    const char *__restrict __cstring, size_t __nmatch,
data/git-2.29.2+next.20201030/compat/regex/regex_internal.c:214:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char buf[MB_LEN_MAX];
data/git-2.29.2+next.20201030/compat/regex/regex_internal.c:217:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char buf[64];
data/git-2.29.2+next.20201030/compat/regex/regex_internal.c:285:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[MB_LEN_MAX];
data/git-2.29.2+next.20201030/compat/regex/regex_internal.c:288:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[64];
data/git-2.29.2+next.20201030/compat/regex/regex_internal.c:330:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		    memcpy (pstr->mbs + byte_idx, buf, mbclen);
data/git-2.29.2+next.20201030/compat/regex/regex_internal.c:338:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy (pstr->mbs + byte_idx,
data/git-2.29.2+next.20201030/compat/regex/regex_internal.c:398:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		  memcpy (pstr->mbs + byte_idx, buf, mbclen);
data/git-2.29.2+next.20201030/compat/regex/regex_internal.c:423:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		    memcpy (pstr->mbs + byte_idx, buf, mbcdlen);
data/git-2.29.2+next.20201030/compat/regex/regex_internal.c:442:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		  memcpy (pstr->mbs + byte_idx, p, mbclen);
data/git-2.29.2+next.20201030/compat/regex/regex_internal.c:445:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	      memcpy (pstr->mbs + byte_idx, p, mbclen);
data/git-2.29.2+next.20201030/compat/regex/regex_internal.c:740:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			  unsigned char buf[6];
data/git-2.29.2+next.20201030/compat/regex/regex_internal.c:1050:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (dest->elems, src->elems, src->nelem * sizeof (int));
data/git-2.29.2+next.20201030/compat/regex/regex_internal.c:1144:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (dest->elems, dest->elems + sbase, delta * sizeof (int));
data/git-2.29.2+next.20201030/compat/regex/regex_internal.c:1188:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (dest->elems + id, src1->elems + i1,
data/git-2.29.2+next.20201030/compat/regex/regex_internal.c:1194:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (dest->elems + id, src2->elems + i2,
data/git-2.29.2+next.20201030/compat/regex/regex_internal.c:1225:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (dest->elems, src->elems, src->nelem * sizeof (int));
data/git-2.29.2+next.20201030/compat/regex/regex_internal.c:1246:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (dest->elems + sbase, src->elems, (is + 1) * sizeof (int));
data/git-2.29.2+next.20201030/compat/regex/regex_internal.c:1274:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	      memcpy (dest->elems, dest->elems + sbase,
data/git-2.29.2+next.20201030/compat/regex/regex_internal.h:188:31:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define bitset_copy(dest,src) memcpy (dest, src, sizeof (bitset_t))
data/git-2.29.2+next.20201030/compat/regex/regexec.c:377:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy (s, string1, length1);
data/git-2.29.2+next.20201030/compat/regex/regexec.c:378:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy (s + length1, string2, length2);
data/git-2.29.2+next.20201030/compat/regex/regexec.c:1371:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (fs->stack[num].regs, regs, sizeof (regmatch_t) * nregs);
data/git-2.29.2+next.20201030/compat/regex/regexec.c:1384:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (regs, fs->stack[num].regs, sizeof (regmatch_t) * nregs);
data/git-2.29.2+next.20201030/compat/regex/regexec.c:1440:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (prev_idx_match, pmatch, sizeof (regmatch_t) * nmatch);
data/git-2.29.2+next.20201030/compat/regex/regexec.c:1550:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	      memcpy (prev_idx_match, pmatch, sizeof (regmatch_t) * nmatch);
data/git-2.29.2+next.20201030/compat/regex/regexec.c:1561:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy (pmatch, prev_idx_match, sizeof (regmatch_t) * nmatch);
data/git-2.29.2+next.20201030/compat/setenv.c:27:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(envstr, name, namelen);
data/git-2.29.2+next.20201030/compat/setenv.c:29:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(envstr + namelen + 1, value, valuelen);
data/git-2.29.2+next.20201030/compat/strdup.c:9:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(s2, s1, len);
data/git-2.29.2+next.20201030/compat/strlcpy.c:9:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dest, src, len);
data/git-2.29.2+next.20201030/compat/terminal.c:42:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	term_fd = open("/dev/tty", O_RDWR);
data/git-2.29.2+next.20201030/compat/terminal.c:208:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	input_fh = fopen(INPUT_PATH, "r" FORCE_TEXT);
data/git-2.29.2+next.20201030/compat/terminal.c:212:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	output_fh = fopen(OUTPUT_PATH, "w" FORCE_TEXT);
data/git-2.29.2+next.20201030/compat/terminal.c:252:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sequence[FLEX_ARRAY];
data/git-2.29.2+next.20201030/compat/win32/dirent.c:23:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t pattern[MAX_PATH + 2]; /* + 2 for '/' '*' */
data/git-2.29.2+next.20201030/compat/win32/dirent.h:13:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char d_name[MAX_PATH * 3]; /* file name (* 3 for UTF-8 conversion) */
data/git-2.29.2+next.20201030/compat/winansi.c:134:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static wchar_t wbuf[2 * BUFFER_SIZE + 1];
data/git-2.29.2+next.20201030/compat/winansi.c:343:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buffer[BUFFER_SIZE];
data/git-2.29.2+next.20201030/compat/winansi.c:611:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t name[32];
data/git-2.29.2+next.20201030/config.c:2791:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	in_fd = open(config_filename, O_RDONLY);
data/git-2.29.2+next.20201030/config.c:3089:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024];
data/git-2.29.2+next.20201030/config.c:3111:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (!(config_file = fopen(config_filename, "rb"))) {
data/git-2.29.2+next.20201030/connect.c:408:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ref->old_oid.hash, old_oid.hash, reader->hash_algo->rawsz);
data/git-2.29.2+next.20201030/connect.c:430:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(peeled->old_oid.hash, peeled_oid.hash,
data/git-2.29.2+next.20201030/connect.c:698:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char addr[NI_MAXHOST];
data/git-2.29.2+next.20201030/connect.c:816:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&sa.sin_addr, *ap, he->h_length);
data/git-2.29.2+next.20201030/connect.c:1111:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			variant = basename((char *)ssh_argv[0]);
data/git-2.29.2+next.20201030/contrib/credential/gnome-keyring/git-credential-gnome-keyring.c:381:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				c->port = atoi(value);
data/git-2.29.2+next.20201030/contrib/credential/libsecret/git-credential-libsecret.c:280:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				c->port = atoi(value);
data/git-2.29.2+next.20201030/contrib/credential/osxkeychain/git-credential-osxkeychain.c:15:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[4096];
data/git-2.29.2+next.20201030/contrib/credential/osxkeychain/git-credential-osxkeychain.c:115:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024];
data/git-2.29.2+next.20201030/contrib/credential/osxkeychain/git-credential-osxkeychain.c:151:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				port = atoi(colon);
data/git-2.29.2+next.20201030/contrib/credential/wincred/git-credential-wincred.c:16:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[4096];
data/git-2.29.2+next.20201030/contrib/credential/wincred/git-credential-wincred.c:245:13:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
	int wlen = MultiByteToWideChar(CP_UTF8, 0, str, -1, NULL, 0);
data/git-2.29.2+next.20201030/contrib/credential/wincred/git-credential-wincred.c:247:2:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
	MultiByteToWideChar(CP_UTF8, 0, str, -1, wstr, wlen);
data/git-2.29.2+next.20201030/contrib/credential/wincred/git-credential-wincred.c:253:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024];
data/git-2.29.2+next.20201030/contrib/credential/wincred/git-credential-wincred.c:305:2:  [2] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer. Risk is low because the source is a constant string.
	wcscpy(target, L"git:");
data/git-2.29.2+next.20201030/convert.c:1138:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(dst, "Id$", 3);
data/git-2.29.2+next.20201030/convert.c:1715:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[FILTER_BUFFER];
data/git-2.29.2+next.20201030/convert.c:1822:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ident[GIT_MAX_HEXSZ + 5]; /* ": x40 $" */
data/git-2.29.2+next.20201030/convert.c:1845:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(*output_p, ident->left.buf, to_drain);
data/git-2.29.2+next.20201030/convert.c:2024:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst, src, sizeof(*dst));
data/git-2.29.2+next.20201030/copy.c:6:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buffer[8192];
data/git-2.29.2+next.20201030/copy.c:36:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fdi = open(src, O_RDONLY)) < 0)
data/git-2.29.2+next.20201030/copy.c:38:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fdo = open(dst, O_WRONLY | O_CREAT | O_EXCL, mode)) < 0) {
data/git-2.29.2+next.20201030/csum-file.c:17:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char check_buffer[8192];
data/git-2.29.2+next.20201030/csum-file.c:104:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(f->buffer + offset, buf, nr);
data/git-2.29.2+next.20201030/csum-file.c:131:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	sink = open("/dev/null", O_WRONLY);
data/git-2.29.2+next.20201030/csum-file.c:134:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	check = open(name, O_RDONLY);
data/git-2.29.2+next.20201030/csum-file.h:19:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buffer[8192];
data/git-2.29.2+next.20201030/ctype.c:20:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const unsigned char sane_ctype[256] = {
data/git-2.29.2+next.20201030/ctype.c:33:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const unsigned char tolower_trans_tbl[256] = {
data/git-2.29.2+next.20201030/daemon.c:85:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[1024];
data/git-2.29.2+next.20201030/daemon.c:172:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char rpath[PATH_MAX];
data/git-2.29.2+next.20201030/daemon.c:173:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char interp_path[PATH_MAX];
data/git-2.29.2+next.20201030/daemon.c:323:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *argv[8];
data/git-2.29.2+next.20201030/daemon.c:683:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		static char addrbuf[HOST_NAME_MAX + 1];
data/git-2.29.2+next.20201030/daemon.c:709:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		static char addrbuf[HOST_NAME_MAX + 1];
data/git-2.29.2+next.20201030/daemon.c:717:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&sa.sin_addr, *ap, hent->h_length);
data/git-2.29.2+next.20201030/daemon.c:845:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&newborn->cld, cld, sizeof(*cld));
data/git-2.29.2+next.20201030/daemon.c:846:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&newborn->address, addr, addrlen);
data/git-2.29.2+next.20201030/daemon.c:913:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[128] = "";
data/git-2.29.2+next.20201030/daemon.c:921:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[128] = "";
data/git-2.29.2+next.20201030/daemon.c:969:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char ip[INET_ADDRSTRLEN];
data/git-2.29.2+next.20201030/daemon.c:971:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char ip[INET6_ADDRSTRLEN];
data/git-2.29.2+next.20201030/daemon.c:994:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pbuf[NI_MAXSERV];
data/git-2.29.2+next.20201030/daemon.c:1335:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			timeout = atoi(v);
data/git-2.29.2+next.20201030/daemon.c:1339:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			init_timeout = atoi(v);
data/git-2.29.2+next.20201030/daemon.c:1343:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			max_connections = atoi(v);
data/git-2.29.2+next.20201030/date.c:124:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		now->tv_sec = atoi(x);
data/git-2.29.2+next.20201030/delta-islands.c:53:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(b, old, size);
data/git-2.29.2+next.20201030/delta-islands.c:363:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&sha_core, oid->hash, sizeof(uint64_t));
data/git-2.29.2+next.20201030/diff-lib.c:133:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(dpath->path, ce->name, path_len);
data/git-2.29.2+next.20201030/diff-lib.c:363:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(p->path, new_entry->name, pathlen);
data/git-2.29.2+next.20201030/diff-lib.c:576:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char merge_base_hex[GIT_MAX_HEXSZ + 1];
data/git-2.29.2+next.20201030/diff-no-index.c:247:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *paths[2];
data/git-2.29.2+next.20201030/diff.c:527:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hex[GIT_MAX_HEXSZ + 1];
data/git-2.29.2+next.20201030/diff.c:528:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mode[10];
data/git-2.29.2+next.20201030/diff.c:795:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(f, e, sizeof(struct emitted_diff_symbol));
data/git-2.29.2+next.20201030/diff.c:1665:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static const char atat[2] = { '@', '@' };
data/git-2.29.2+next.20201030/diff.c:1876:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buffer->text.ptr + buffer->text.size, line, len);
data/git-2.29.2+next.20201030/diff.c:2115:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(out->ptr + out->size, buffer->text.ptr + i, j - i);
data/git-2.29.2+next.20201030/diff.c:2234:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(o, orig_opts, sizeof(struct diff_options));
data/git-2.29.2+next.20201030/diff.c:3326:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char line[71];
data/git-2.29.2+next.20201030/diff.c:3413:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *lbl[2];
data/git-2.29.2+next.20201030/diff.c:4041:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(s->path, O_RDONLY);
data/git-2.29.2+next.20201030/diff.c:4562:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(options, &default_diff_options, sizeof(*options));
data/git-2.29.2+next.20201030/diff.c:5609:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(options->parseopts, parseopts, sizeof(parseopts));
data/git-2.29.2+next.20201030/diff.c:5728:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		static char hex[GIT_MAX_HEXSZ + 1];
data/git-2.29.2+next.20201030/diff.c:6080:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hash[GIT_MAX_RAWSZ];
data/git-2.29.2+next.20201030/diff.c:6115:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[12];
data/git-2.29.2+next.20201030/diff.c:6851:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *argv[3];
data/git-2.29.2+next.20201030/diff.h:335:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char output_indicators[3];
data/git-2.29.2+next.20201030/diffcore-pickaxe.c:223:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char errbuf[1024];
data/git-2.29.2+next.20201030/dir.c:1057:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(fname, O_RDONLY);
data/git-2.29.2+next.20201030/dir.c:3096:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char intbuf[16];
data/git-2.29.2+next.20201030/dir.c:3147:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char varbuf[16];
data/git-2.29.2+next.20201030/dir.c:3232:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(to, data, sizeof(*to));
data/git-2.29.2+next.20201030/dir.c:3274:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(untracked, &ud, sizeof(ud));
data/git-2.29.2+next.20201030/dir.c:3275:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(untracked->name, data, eos - data + 1);
data/git-2.29.2+next.20201030/dir.h:44:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[FLEX_ARRAY]; /* more */
data/git-2.29.2+next.20201030/dir.h:184:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[FLEX_ARRAY];
data/git-2.29.2+next.20201030/entry.c:83:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	return open(path, O_WRONLY | O_CREAT | O_EXCL, mode);
data/git-2.29.2+next.20201030/entry.c:105:10:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
		return mkstemp(path);
data/git-2.29.2+next.20201030/environment.c:311:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(name, O_RDWR|O_CREAT|O_EXCL, 0600);
data/git-2.29.2+next.20201030/environment.c:317:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	return open(name, O_RDWR|O_CREAT|O_EXCL, 0600);
data/git-2.29.2+next.20201030/ewah/ewah_bitmap.c:148:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(self->buffer + self->buffer_size,
data/git-2.29.2+next.20201030/ewah/ewah_io.c:120:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(self->buffer, ptr, data_len);
data/git-2.29.2+next.20201030/exec-cmd.c:108:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[MAXPATHLEN];
data/git-2.29.2+next.20201030/exec-cmd.c:134:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[PATH_MAX];
data/git-2.29.2+next.20201030/exec-cmd.c:349:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *argv[MAX_ARGS + 1];
data/git-2.29.2+next.20201030/fetch-pack.c:856:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char hostname[HOST_NAME_MAX + 1];
data/git-2.29.2+next.20201030/fetch-pack.c:1631:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char packname[GIT_MAX_HEXSZ + 1];
data/git-2.29.2+next.20201030/fsmonitor.c:134:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(sb->buf + fixup, &ewah_size, sizeof(uint32_t));
data/git-2.29.2+next.20201030/gettext.c:79:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[26];
data/git-2.29.2+next.20201030/git-compat-util.h:608:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char _swap_buffer[sizeof(a)];			\
data/git-2.29.2+next.20201030/git-compat-util.h:609:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(_swap_buffer, _swap_a_ptr, sizeof(a));		\
data/git-2.29.2+next.20201030/git-compat-util.h:610:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(_swap_a_ptr, _swap_b_ptr, sizeof(a) +		\
data/git-2.29.2+next.20201030/git-compat-util.h:612:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(_swap_b_ptr, _swap_buffer, sizeof(a));		\
data/git-2.29.2+next.20201030/git-compat-util.h:768:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#  ifdef fopen
data/git-2.29.2+next.20201030/git-compat-util.h:769:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#   undef fopen
data/git-2.29.2+next.20201030/git-compat-util.h:771:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#  define fopen(a,b) git_fopen(a,b)
data/git-2.29.2+next.20201030/git-compat-util.h:898:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dst, src, st_mult(size, n));
data/git-2.29.2+next.20201030/git-compat-util.h:953:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *)(x)->flexname, (buf), flex_array_len_); \
data/git-2.29.2+next.20201030/git-compat-util.h:958:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((x) + 1, (buf), flex_array_len_); \
data/git-2.29.2+next.20201030/git-compat-util.h:990:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern const unsigned char tolower_trans_tbl[256];
data/git-2.29.2+next.20201030/git-compat-util.h:1007:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern const unsigned char sane_ctype[256];
data/git-2.29.2+next.20201030/graph.c:93:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char color[COLOR_MAXLEN];
data/git-2.29.2+next.20201030/grep.c:384:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char where[1024];
data/git-2.29.2+next.20201030/grep.c:651:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char errbuf[1024];
data/git-2.29.2+next.20201030/grep.c:735:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char errbuf[1024];
data/git-2.29.2+next.20201030/grep.c:1433:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[32];
data/git-2.29.2+next.20201030/grep.c:1444:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[32];
data/git-2.29.2+next.20201030/grep.c:1557:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[1];
data/git-2.29.2+next.20201030/grep.c:2001:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[32];
data/git-2.29.2+next.20201030/grep.c:2151:6:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	i = open(filename, O_RDONLY);
data/git-2.29.2+next.20201030/grep.h:160:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char colors[NR_GREP_COLORS][COLOR_MAXLEN];
data/git-2.29.2+next.20201030/hash.h:70:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst, src, sizeof(*dst));
data/git-2.29.2+next.20201030/hash.h:76:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst, src, sizeof(*dst));
data/git-2.29.2+next.20201030/hash.h:182:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hash[GIT_MAX_RAWSZ];
data/git-2.29.2+next.20201030/hashmap.c:285:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char data[FLEX_ARRAY];
data/git-2.29.2+next.20201030/help.h:12:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[FLEX_ARRAY];
data/git-2.29.2+next.20201030/hex.c:3:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const signed char hexval_table[256] = {
data/git-2.29.2+next.20201030/hex.c:142:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char hexbuffer[4][GIT_MAX_HEXSZ + 1];
data/git-2.29.2+next.20201030/http-backend.c:69:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buffer[1024];
data/git-2.29.2+next.20201030/http-backend.c:182:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(p, O_RDONLY);
data/git-2.29.2+next.20201030/http-backend.c:373:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char in_buf[8192];
data/git-2.29.2+next.20201030/http-backend.c:374:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char out_buf[8192];
data/git-2.29.2+next.20201030/http-backend.c:445:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[8192];
data/git-2.29.2+next.20201030/http-push.c:83:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static signed char remote_dir_exists[256];
data/git-2.29.2+next.20201030/http-push.c:128:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char errorstr[CURL_ERROR_SIZE];
data/git-2.29.2+next.20201030/http-push.c:149:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmpfile_suffix[GIT_MAX_HEXSZ + 1];
data/git-2.29.2+next.20201030/http-push.c:363:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hdr[50];
data/git-2.29.2+next.20201030/http-push.c:766:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char lock_token_hash[GIT_MAX_RAWSZ];
data/git-2.29.2+next.20201030/http-push.c:783:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(lock->tmpfile_suffix + 1, hash_to_hex(lock_token_hash), the_hash_algo->hexsz);
data/git-2.29.2+next.20201030/http-push.c:850:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char timeout_header[25];
data/git-2.29.2+next.20201030/http.c:47:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char curl_errorstr[CURL_ERROR_SIZE];
data/git-2.29.2+next.20201030/http.c:183:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ptr, buffer->buf.buf + buffer->posn, size);
data/git-2.29.2+next.20201030/http.c:1171:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			max_requests = atoi(http_max_requests);
data/git-2.29.2+next.20201030/http.c:1832:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char q_format[32];
data/git-2.29.2+next.20201030/http.c:1897:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[128];
data/git-2.29.2+next.20201030/http.c:2104:15:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	strbuf_addf(&tmpfile, "%s.temp", filename);
data/git-2.29.2+next.20201030/http.c:2105:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	result = fopen(tmpfile.buf, "a");
data/git-2.29.2+next.20201030/http.c:2105:17:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	result = fopen(tmpfile.buf, "a");
data/git-2.29.2+next.20201030/http.c:2107:41:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
		error("Unable to open local file %s", tmpfile.buf);
data/git-2.29.2+next.20201030/http.c:2115:45:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	if (ret == HTTP_OK && finalize_object_file(tmpfile.buf, filename))
data/git-2.29.2+next.20201030/http.c:2118:18:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	strbuf_release(&tmpfile);
data/git-2.29.2+next.20201030/http.c:2257:24:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	strbuf_release(&preq->tmpfile);
data/git-2.29.2+next.20201030/http.c:2271:27:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	tmpfile_fd = xopen(preq->tmpfile.buf, O_RDONLY);
data/git-2.29.2+next.20201030/http.c:2292:15:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	unlink(preq->tmpfile.buf);
data/git-2.29.2+next.20201030/http.c:2327:21:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	strbuf_init(&preq->tmpfile, 0);
data/git-2.29.2+next.20201030/http.c:2331:21:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	strbuf_addf(&preq->tmpfile, "%s.temp", sha1_pack_name(packed_git_hash));
data/git-2.29.2+next.20201030/http.c:2332:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	preq->packfile = fopen(preq->tmpfile.buf, "a");
data/git-2.29.2+next.20201030/http.c:2332:31:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	preq->packfile = fopen(preq->tmpfile.buf, "a");
data/git-2.29.2+next.20201030/http.c:2335:15:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
		      preq->tmpfile.buf);
data/git-2.29.2+next.20201030/http.c:2363:24:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	strbuf_release(&preq->tmpfile);
data/git-2.29.2+next.20201030/http.c:2373:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char expn[4096];
data/git-2.29.2+next.20201030/http.c:2416:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char prev_buf[PREV_BUF_SIZE];
data/git-2.29.2+next.20201030/http.c:2422:21:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	strbuf_init(&freq->tmpfile, 0);
data/git-2.29.2+next.20201030/http.c:2427:21:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	strbuf_addf(&freq->tmpfile, "%s.temp", filename.buf);
data/git-2.29.2+next.20201030/http.c:2431:15:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	rename(freq->tmpfile.buf, prevfile.buf);
data/git-2.29.2+next.20201030/http.c:2432:23:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	unlink_or_warn(freq->tmpfile.buf);
data/git-2.29.2+next.20201030/http.c:2437:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	freq->localfile = open(freq->tmpfile.buf,
data/git-2.29.2+next.20201030/http.c:2437:31:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	freq->localfile = open(freq->tmpfile.buf,
data/git-2.29.2+next.20201030/http.c:2444:29:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
		char *dir = strrchr(freq->tmpfile.buf, '/');
data/git-2.29.2+next.20201030/http.c:2447:16:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
			mkdir(freq->tmpfile.buf, 0777);
data/git-2.29.2+next.20201030/http.c:2450:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		freq->localfile = open(freq->tmpfile.buf,
data/git-2.29.2+next.20201030/http.c:2450:32:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
		freq->localfile = open(freq->tmpfile.buf,
data/git-2.29.2+next.20201030/http.c:2456:14:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
			    freq->tmpfile.buf);
data/git-2.29.2+next.20201030/http.c:2470:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	prevlocal = open(prevfile.buf, O_RDONLY);
data/git-2.29.2+next.20201030/http.c:2503:16:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
					    freq->tmpfile.buf);
data/git-2.29.2+next.20201030/http.c:2561:18:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
		if (stat(freq->tmpfile.buf, &st) == 0)
data/git-2.29.2+next.20201030/http.c:2563:26:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
				unlink_or_warn(freq->tmpfile.buf);
data/git-2.29.2+next.20201030/http.c:2570:24:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
		unlink_or_warn(freq->tmpfile.buf);
data/git-2.29.2+next.20201030/http.c:2574:24:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
		unlink_or_warn(freq->tmpfile.buf);
data/git-2.29.2+next.20201030/http.c:2578:44:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	freq->rename = finalize_object_file(freq->tmpfile.buf, filename.buf);
data/git-2.29.2+next.20201030/http.c:2586:23:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	unlink_or_warn(freq->tmpfile.buf);
data/git-2.29.2+next.20201030/http.c:2604:24:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	strbuf_release(&freq->tmpfile);
data/git-2.29.2+next.20201030/http.h:121:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char curl_errorstr[CURL_ERROR_SIZE];
data/git-2.29.2+next.20201030/http.h:229:16:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	struct strbuf tmpfile;
data/git-2.29.2+next.20201030/http.h:252:16:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	struct strbuf tmpfile;
data/git-2.29.2+next.20201030/http.h:255:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char errorstr[CURL_ERROR_SIZE];
data/git-2.29.2+next.20201030/ident.c:126:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[HOST_NAME_MAX + 1];
data/git-2.29.2+next.20201030/imap-send.c:75:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[8192];
data/git-2.29.2+next.20201030/imap-send.c:123:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024];
data/git-2.29.2+next.20201030/imap-send.c:245:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cname[1000];
data/git-2.29.2+next.20201030/imap-send.c:526:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024];
data/git-2.29.2+next.20201030/imap-send.c:700:53:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if (!(arg = next_arg(&s)) || !(ctx->uidvalidity = atoi(arg))) {
data/git-2.29.2+next.20201030/imap-send.c:705:50:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if (!(arg = next_arg(&s)) || !(imap->uidnext = atoi(arg))) {
data/git-2.29.2+next.20201030/imap-send.c:718:53:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if (!(arg = next_arg(&s)) || !(ctx->uidvalidity = atoi(arg)) ||
data/git-2.29.2+next.20201030/imap-send.c:719:52:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		    !(arg = next_arg(&s)) || !(*(int *)cb->ctx = atoi(arg))) {
data/git-2.29.2+next.20201030/imap-send.c:805:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			tag = atoi(arg);
data/git-2.29.2+next.20201030/imap-send.c:878:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hash[16];
data/git-2.29.2+next.20201030/imap-send.c:879:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hex[33];
data/git-2.29.2+next.20201030/imap-send.c:994:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char portstr[6];
data/git-2.29.2+next.20201030/imap-send.c:1011:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char addr[NI_MAXHOST];
data/git-2.29.2+next.20201030/kwset.c:83:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char delta[NCHAR];	/* Delta table for rapid search. */
data/git-2.29.2+next.20201030/kwset.c:389:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char delta[NCHAR];
data/git-2.29.2+next.20201030/kwset.c:492:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(kwset->delta, delta, NCHAR);
data/git-2.29.2+next.20201030/line-log.c:362:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[4096];
data/git-2.29.2+next.20201030/line-log.c:789:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst, src, sizeof(struct diff_queue_struct));
data/git-2.29.2+next.20201030/line-log.c:1131:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&rg->diff, pairdiff, sizeof(struct diff_ranges));
data/git-2.29.2+next.20201030/line-range.c:111:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char errbuf[1024];
data/git-2.29.2+next.20201030/line-range.c:121:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[1];
data/git-2.29.2+next.20201030/line-range.c:144:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char errbuf[1024];
data/git-2.29.2+next.20201030/line-range.c:211:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char errbuf[1024];
data/git-2.29.2+next.20201030/ll-merge.c:188:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char temp[4][50];
data/git-2.29.2+next.20201030/ll-merge.c:219:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(temp[1], O_RDONLY);
data/git-2.29.2+next.20201030/ll-merge.c:389:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		marker_size = atoi(check->items[1].value);
data/git-2.29.2+next.20201030/ll-merge.c:416:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		marker_size = atoi(check->items[0].value);
data/git-2.29.2+next.20201030/log-tree.c:797:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&dq, &diff_queued_diff, sizeof(diff_queued_diff));
data/git-2.29.2+next.20201030/log-tree.c:812:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&dq, &diff_queued_diff, sizeof(diff_queued_diff));
data/git-2.29.2+next.20201030/mailinfo.c:344:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *header[MAX_HDR_PARSED] = {
data/git-2.29.2+next.20201030/mailinfo.c:1171:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	cmitmsg = fopen(msg, "w");
data/git-2.29.2+next.20201030/mailinfo.c:1176:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	mi->patchfile = fopen(patch, "w");
data/git-2.29.2+next.20201030/mailmap.c:181:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[1024];
data/git-2.29.2+next.20201030/mailmap.c:187:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(filename, "r");
data/git-2.29.2+next.20201030/mem-pool.c:105:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	return memcpy(ret, str, len);
data/git-2.29.2+next.20201030/mem-pool.c:115:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	return memcpy(ret, str, actual_len);
data/git-2.29.2+next.20201030/merge-recursive.c:44:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[FLEX_ARRAY];
data/git-2.29.2+next.20201030/merge-recursive.c:977:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			fd = open(path, O_WRONLY | O_TRUNC | O_CREAT, mode);
data/git-2.29.2+next.20201030/merge-recursive.c:1100:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char merged_revision[GIT_MAX_HEXSZ + 2];
data/git-2.29.2+next.20201030/midx.c:635:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&deduplicated_entries[*nr_objects],
data/git-2.29.2+next.20201030/midx.c:651:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char padding[MIDX_CHUNK_ALIGNMENT];
data/git-2.29.2+next.20201030/midx.h:35:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char object_dir[FLEX_ARRAY];
data/git-2.29.2+next.20201030/name-hash.c:16:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[FLEX_ARRAY];
data/git-2.29.2+next.20201030/name-hash.c:699:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy((void *)startPtr, dir->name + (startPtr - name), ptr - startPtr);
data/git-2.29.2+next.20201030/notes-merge.c:32:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hex_oid[GIT_MAX_HEXSZ];
data/git-2.29.2+next.20201030/notes.c:412:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(object_oid.hash, subtree->key_oid.hash, prefix_len);
data/git-2.29.2+next.20201030/notes.c:560:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char path[FANOUT_PATH_MAX];
data/git-2.29.2+next.20201030/notes.c:631:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[2]; /* path to subtree in next, if any */
data/git-2.29.2+next.20201030/notes.c:828:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buf, cur_msg, cur_len);
data/git-2.29.2+next.20201030/notes.c:831:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buf + cur_len + 2, new_msg, new_len);
data/git-2.29.2+next.20201030/object-store.h:23:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char loose_objects_subdir_seen[256];
data/git-2.29.2+next.20201030/object-store.h:86:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hash[GIT_MAX_RAWSZ];
data/git-2.29.2+next.20201030/object-store.h:89:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pack_name[FLEX_ARRAY]; /* more */
data/git-2.29.2+next.20201030/object.c:324:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char object_array_slopbuf[1];
data/git-2.29.2+next.20201030/oidset.c:56:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen(path, "r");
data/git-2.29.2+next.20201030/pack-bitmap-write.c:40:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char pack_checksum[GIT_MAX_RAWSZ];
data/git-2.29.2+next.20201030/pack-bitmap-write.c:531:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(header.magic, BITMAP_IDX_SIGNATURE, sizeof(BITMAP_IDX_SIGNATURE));
data/git-2.29.2+next.20201030/pack-bitmap.h:17:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char magic[ARRAY_SIZE(BITMAP_IDX_SIGNATURE)];
data/git-2.29.2+next.20201030/pack-bitmap.h:21:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char checksum[GIT_MAX_RAWSZ];
data/git-2.29.2+next.20201030/pack-check.c:57:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hash[GIT_MAX_RAWSZ], *pack_sig;
data/git-2.29.2+next.20201030/pack-check.c:170:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hash[GIT_MAX_RAWSZ];
data/git-2.29.2+next.20201030/pack-write.c:78:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			fd = open(index_name, O_CREAT|O_EXCL|O_WRONLY, 0600);
data/git-2.29.2+next.20201030/pack-write.c:256:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			unsigned char hash[GIT_MAX_RAWSZ];
data/git-2.29.2+next.20201030/pack-write.c:282:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char packname[GIT_MAX_HEXSZ + 6];
data/git-2.29.2+next.20201030/packfile.c:239:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(p->pack_name, path, alloc); /* includes NUL */
data/git-2.29.2+next.20201030/packfile.c:512:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hash[GIT_MAX_RAWSZ];
data/git-2.29.2+next.20201030/packfile.c:714:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(p->pack_name, path, path_len);
data/git-2.29.2+next.20201030/packfile.c:1092:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char delta_head[20], *in;
data/git-2.29.2+next.20201030/pager.c:119:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[64];
data/git-2.29.2+next.20201030/pager.c:167:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if (col_string && (n_cols = atoi(col_string)) > 0)
data/git-2.29.2+next.20201030/parse-options.c:437:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char short_opts[128];
data/git-2.29.2+next.20201030/parse-options.c:677:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(newopt + i, options + j, sizeof(*newopt));
data/git-2.29.2+next.20201030/patch-delta.c:62:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(out, (char *) src_buf + cp_off, cp_size);
data/git-2.29.2+next.20201030/patch-delta.c:68:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(out, data, cmd);
data/git-2.29.2+next.20201030/path.c:171:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(new_node->contents, key, new_node->len);
data/git-2.29.2+next.20201030/path.c:203:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(child->children, root->children, sizeof(root->children));
data/git-2.29.2+next.20201030/path.c:663:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[256];
data/git-2.29.2+next.20201030/path.c:683:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, O_RDONLY);
data/git-2.29.2+next.20201030/pkt-line.c:5:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char packet_buffer[LARGE_PACKET_MAX];
data/git-2.29.2+next.20201030/pkt-line.c:199:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char packet_write_buffer[LARGE_PACKET_MAX];
data/git-2.29.2+next.20201030/pkt-line.c:208:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(packet_write_buffer + 4, buf, size);
data/git-2.29.2+next.20201030/pkt-line.c:247:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buf[LARGE_PACKET_DATA_MAX];
data/git-2.29.2+next.20201030/pkt-line.c:296:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dst, *src_buf, ret);
data/git-2.29.2+next.20201030/pkt-line.c:316:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int packet_length(const char lenbuf_hex[4])
data/git-2.29.2+next.20201030/pkt-line.c:328:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char linelen[4];
data/git-2.29.2+next.20201030/pkt-line.c:458:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[LARGE_PACKET_MAX + 1];
data/git-2.29.2+next.20201030/pkt-line.h:85:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int packet_length(const char lenbuf_hex[4]);
data/git-2.29.2+next.20201030/pkt-line.h:218:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char packet_buffer[LARGE_PACKET_MAX];
data/git-2.29.2+next.20201030/ppc/sha1.c:39:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&c->buf.b[c->cnt], p, nb);
data/git-2.29.2+next.20201030/ppc/sha1.c:70:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(hash, c->hash, 20);
data/git-2.29.2+next.20201030/ppc/sha1.h:13:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char b[64];
data/git-2.29.2+next.20201030/pretty.c:966:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char color[COLOR_MAXLEN];
data/git-2.29.2+next.20201030/pretty.c:1565:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(sb->buf + sb_len + offset, local_sb.buf,
data/git-2.29.2+next.20201030/promisor-remote.h:17:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char name[FLEX_ARRAY];
data/git-2.29.2+next.20201030/prompt.c:11:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *args[3];
data/git-2.29.2+next.20201030/quote.c:213:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static signed char const cq_lookup[256] = {
data/git-2.29.2+next.20201030/read-cache.c:132:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(new_entry->name, new_name, namelen + 1);
data/git-2.29.2+next.20201030/read-cache.c:688:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(new_entry->name, alias->name, len);
data/git-2.29.2+next.20201030/read-cache.c:730:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ce->name, path, namelen);
data/git-2.29.2+next.20201030/read-cache.c:840:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ce->name, path, len);
data/git-2.29.2+next.20201030/read-cache.c:866:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ce->name, path, len);
data/git-2.29.2+next.20201030/read-cache.c:1459:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(updated->name, ce->name, ce->ce_namelen + 1);
data/git-2.29.2+next.20201030/read-cache.c:1685:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char data[GIT_MAX_RAWSZ + 2 * sizeof(uint16_t)];
data/git-2.29.2+next.20201030/read-cache.c:1686:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[FLEX_ARRAY];
data/git-2.29.2+next.20201030/read-cache.c:1707:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hash[GIT_MAX_RAWSZ];
data/git-2.29.2+next.20201030/read-cache.c:1837:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ce->name, name, len);
data/git-2.29.2+next.20201030/read-cache.c:1842:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(ce->name, previous_ce->name, copy_len);
data/git-2.29.2+next.20201030/read-cache.c:1843:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ce->name + copy_len, name, len + 1 - copy_len);
data/git-2.29.2+next.20201030/read-cache.c:1846:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ce->name, name, len + 1);
data/git-2.29.2+next.20201030/read-cache.c:2163:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, O_RDONLY);
data/git-2.29.2+next.20201030/read-cache.c:2457:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char write_buffer[WRITE_BUFFER_SIZE];
data/git-2.29.2+next.20201030/read-cache.c:2479:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(write_buffer + buffered, data, partial);
data/git-2.29.2+next.20201030/read-cache.c:2615:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static unsigned char padding[8] = { 0x00 };
data/git-2.29.2+next.20201030/read-cache.c:2635:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char to_remove_vi[16];
data/git-2.29.2+next.20201030/read-cache.c:2674:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hash[GIT_MAX_RAWSZ];
data/git-2.29.2+next.20201030/read-cache.c:2679:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, O_RDONLY);
data/git-2.29.2+next.20201030/read-cache.c:3320:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(new_ce->name, ce->name, len);
data/git-2.29.2+next.20201030/read-cache.c:3439:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(new_entry, ce, size);
data/git-2.29.2+next.20201030/read-cache.c:3486:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hash[GIT_MAX_RAWSZ];
data/git-2.29.2+next.20201030/read-cache.c:3535:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&extsize, mmap + src_offset + 4, 4);
data/git-2.29.2+next.20201030/read-cache.c:3561:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hash[GIT_MAX_RAWSZ];
data/git-2.29.2+next.20201030/ref-filter.c:120:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char color[COLOR_MAXLEN];
data/git-2.29.2+next.20201030/ref-filter.c:1751:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char buf[256], *cp = buf;
data/git-2.29.2+next.20201030/ref-filter.c:2228:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		free((char *)used_atom[i].name);
data/git-2.29.2+next.20201030/ref-filter.h:43:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char refname[FLEX_ARRAY];
data/git-2.29.2+next.20201030/refs.c:51:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char refname_disposition[256] = {
data/git-2.29.2+next.20201030/refs.c:1698:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[FLEX_ARRAY];
data/git-2.29.2+next.20201030/refs/debug.c:59:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char o[GIT_MAX_HEXSZ + 1] = "null";
data/git-2.29.2+next.20201030/refs/debug.c:60:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char n[GIT_MAX_HEXSZ + 1] = "null";
data/git-2.29.2+next.20201030/refs/debug.c:282:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char o[GIT_MAX_HEXSZ + 1] = "null";
data/git-2.29.2+next.20201030/refs/debug.c:283:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char n[GIT_MAX_HEXSZ + 1] = "null";
data/git-2.29.2+next.20201030/refs/files-backend.c:440:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, O_RDONLY);
data/git-2.29.2+next.20201030/refs/files-backend.c:1015:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[FLEX_ARRAY];
data/git-2.29.2+next.20201030/refs/files-backend.c:1533:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	*fd = open(path, O_APPEND | O_WRONLY | O_CREAT, 0666);
data/git-2.29.2+next.20201030/refs/files-backend.c:1572:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		*logfd = open(logfile, O_APPEND | O_WRONLY, 0666);
data/git-2.29.2+next.20201030/refs/files-backend.c:1946:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	logfp = fopen(sb.buf, "r");
data/git-2.29.2+next.20201030/refs/files-backend.c:1959:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[BUFSIZ];
data/git-2.29.2+next.20201030/refs/files-backend.c:2058:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	logfp = fopen(sb.buf, "r");
data/git-2.29.2+next.20201030/refs/packed-backend.c:393:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dst, records[i].start, records[i].len);
data/git-2.29.2+next.20201030/refs/packed-backend.c:480:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(snapshot->refs->path, O_RDONLY);
data/git-2.29.2+next.20201030/refs/packed-backend.c:687:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(buf_copy, snapshot->start, size);
data/git-2.29.2+next.20201030/refs/ref-cache.h:154:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[FLEX_ARRAY];
data/git-2.29.2+next.20201030/refs/refs-internal.h:149:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char refname[FLEX_ARRAY];
data/git-2.29.2+next.20201030/remote-curl.c:648:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(buf - 4, "0001", 4);
data/git-2.29.2+next.20201030/remote-curl.c:651:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(buf - 4, "0000", 4);
data/git-2.29.2+next.20201030/remote-curl.c:705:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ptr, rpc->buf + rpc->pos, avail);
data/git-2.29.2+next.20201030/remote-curl.c:734:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char len_buf[4];
data/git-2.29.2+next.20201030/remote-curl.c:746:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&state->len_buf[state->len_filled], ptr, digits_remaining);
data/git-2.29.2+next.20201030/remote-curl.c:1105:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[4096];
data/git-2.29.2+next.20201030/remote.c:858:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ref->name, prefix, prefixlen);
data/git-2.29.2+next.20201030/remote.c:859:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ref->name + prefixlen, name, len);
data/git-2.29.2+next.20201030/remote.c:876:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cpy, ref, len);
data/git-2.29.2+next.20201030/remote.h:162:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[FLEX_ARRAY]; /* more */
data/git-2.29.2+next.20201030/rerere.c:32:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hash[GIT_MAX_HEXSZ];
data/git-2.29.2+next.20201030/rerere.c:144:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hash[GIT_MAX_RAWSZ];
data/git-2.29.2+next.20201030/rerere.c:210:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char hash[GIT_MAX_RAWSZ];
data/git-2.29.2+next.20201030/rerere.c:477:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	io.input = fopen(path, "r");
data/git-2.29.2+next.20201030/rerere.c:483:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		io.io.output = fopen(output, "w");
data/git-2.29.2+next.20201030/rerere.c:688:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(path, "w");
data/git-2.29.2+next.20201030/rerere.c:827:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char hash[GIT_MAX_RAWSZ];
data/git-2.29.2+next.20201030/rerere.c:1006:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		io.io.output = fopen(output, "w");
data/git-2.29.2+next.20201030/rerere.c:1029:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hash[GIT_MAX_RAWSZ];
data/git-2.29.2+next.20201030/revision.c:840:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char treesame[FLEX_ARRAY];
data/git-2.29.2+next.20201030/revision.c:2182:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		revs->max_count = atoi(optarg);
data/git-2.29.2+next.20201030/revision.c:2186:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		revs->skip_count = atoi(optarg);
data/git-2.29.2+next.20201030/revision.c:2197:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		revs->max_count = atoi(argv[1]);
data/git-2.29.2+next.20201030/revision.c:2201:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		revs->max_count = atoi(optarg);
data/git-2.29.2+next.20201030/revision.c:2204:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		revs->max_age = atoi(optarg);
data/git-2.29.2+next.20201030/revision.c:2213:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		revs->min_age = atoi(optarg);
data/git-2.29.2+next.20201030/revision.c:2282:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		revs->min_parents = atoi(optarg);
data/git-2.29.2+next.20201030/revision.c:2286:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		revs->max_parents = atoi(optarg);
data/git-2.29.2+next.20201030/run-command.c:147:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[3] = { 0 };
data/git-2.29.2+next.20201030/run-command.c:149:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	int fd = open(name, O_RDONLY);
data/git-2.29.2+next.20201030/run-command.c:761:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		null_fd = open("/dev/null", O_RDWR | O_CLOEXEC);
data/git-2.29.2+next.20201030/run-command.c:903:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fhin = open("/dev/null", O_RDWR);
data/git-2.29.2+next.20201030/run-command.c:910:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fherr = open("/dev/null", O_RDWR);
data/git-2.29.2+next.20201030/run-command.c:917:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fhout = open("/dev/null", O_RDWR);
data/git-2.29.2+next.20201030/sequencer.c:1114:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *argv[3];
data/git-2.29.2+next.20201030/sequencer.c:2353:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, O_RDONLY);
data/git-2.29.2+next.20201030/sequencer.c:2904:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(git_path_head_file(), "r");
data/git-2.29.2+next.20201030/sequencer.c:3036:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		int fd = open(done, O_CREAT | O_WRONLY | O_APPEND, 0666);
data/git-2.29.2+next.20201030/sequencer.c:3121:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hex[GIT_MAX_HEXSZ + 1];
data/git-2.29.2+next.20201030/sequencer.c:3137:30:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	log_tree_opt.diffopt.file = fopen(buf.buf, "w");
data/git-2.29.2+next.20201030/sequencer.c:4040:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				FILE *f = fopen(rebase_path_msgnum(), "w");
data/git-2.29.2+next.20201030/sequencer.c:4276:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			child.in = open(rebase_path_rewritten_list(), O_RDONLY);
data/git-2.29.2+next.20201030/sequencer.c:4287:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				hook.in = open(rebase_path_rewritten_list(),
data/git-2.29.2+next.20201030/sequencer.c:4678:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char label[FLEX_ARRAY];
data/git-2.29.2+next.20201030/sequencer.c:4694:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char string[FLEX_ARRAY];
data/git-2.29.2+next.20201030/sequencer.c:5301:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char shortonto[GIT_MAX_HEXSZ + 1];
data/git-2.29.2+next.20201030/sequencer.c:5392:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char subject[FLEX_ARRAY];
data/git-2.29.2+next.20201030/setup.c:636:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(format, &fresh, sizeof(fresh));
data/git-2.29.2+next.20201030/setup.c:751:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, O_RDONLY);
data/git-2.29.2+next.20201030/setup.c:1405:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	int fd = open("/dev/null", O_RDWR, 0);
data/git-2.29.2+next.20201030/sha1-file.c:179:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buf[GIT_MAX_HEXSZ + 1];
data/git-2.29.2+next.20201030/sha1-file.c:185:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buf[GIT_MAX_HEXSZ + 1];
data/git-2.29.2+next.20201030/sha1-file.c:645:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	in = fopen(alts, "r");
data/git-2.29.2+next.20201030/sha1-file.c:992:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hdr[MAX_HEADER_LEN];
data/git-2.29.2+next.20201030/sha1-file.c:1011:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[1024 * 16];
data/git-2.29.2+next.20201030/sha1-file.c:1032:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(name, flags | o_cloexec);
data/git-2.29.2+next.20201030/sha1-file.c:1036:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(name, flags | o_cloexec);
data/git-2.29.2+next.20201030/sha1-file.c:1244:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buf, (char *) buffer + bytes, n);
data/git-2.29.2+next.20201030/sha1-file.c:1364:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hdr[MAX_HEADER_LEN];
data/git-2.29.2+next.20201030/sha1-file.c:1611:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(co->buf, buf, len);
data/git-2.29.2+next.20201030/sha1-file.c:1729:38:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
int finalize_object_file(const char *tmpfile, const char *filename)
data/git-2.29.2+next.20201030/sha1-file.c:1735:16:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	else if (link(tmpfile, filename))
data/git-2.29.2+next.20201030/sha1-file.c:1751:15:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
		if (!rename(tmpfile, filename))
data/git-2.29.2+next.20201030/sha1-file.c:1755:17:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	unlink_or_warn(tmpfile);
data/git-2.29.2+next.20201030/sha1-file.c:1780:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hdr[MAX_HEADER_LEN];
data/git-2.29.2+next.20201030/sha1-file.c:1845:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char compressed[4096];
data/git-2.29.2+next.20201030/sha1-file.c:1934:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hdr[MAX_HEADER_LEN];
data/git-2.29.2+next.20201030/sha1-file.c:1976:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hdr[MAX_HEADER_LEN];
data/git-2.29.2+next.20201030/sha1-file.c:2215:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(path, O_RDONLY);
data/git-2.29.2+next.20201030/sha1-file.c:2436:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[4096];
data/git-2.29.2+next.20201030/sha1-file.c:2496:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hdr[MAX_HEADER_LEN];
data/git-2.29.2+next.20201030/sha1-name.c:25:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hex_pfx[GIT_MAX_HEXSZ + 1];
data/git-2.29.2+next.20201030/sha1-name.c:730:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char hexbuffer[4][GIT_MAX_HEXSZ + 1];
data/git-2.29.2+next.20201030/sha1dc/sha1.c:197:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(W, m, 16 * 4);
data/git-2.29.2+next.20201030/sha1dc/sha1.c:1834:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ctx->buffer + left, buf, fill);
data/git-2.29.2+next.20201030/sha1dc/sha1.c:1847:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ctx->buffer, buf, 64);
data/git-2.29.2+next.20201030/sha1dc/sha1.c:1856:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ctx->buffer + left, buf, len);
data/git-2.29.2+next.20201030/sha1dc/sha1.c:1860:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char sha1_padding[64] =
data/git-2.29.2+next.20201030/sha1dc/sha1.c:1868:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int SHA1DCFinal(unsigned char output[20], SHA1_CTX *ctx)
data/git-2.29.2+next.20201030/sha1dc/sha1.h:42:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buffer[64];
data/git-2.29.2+next.20201030/sha1dc_git.c:17:31:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void git_SHA1DCFinal(unsigned char hash[20], SHA1_CTX *ctx)
data/git-2.29.2+next.20201030/sha256/block/sha256.c:162:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(len_buf + ctx->buf, data, left);
data/git-2.29.2+next.20201030/sha256/block/sha256.c:176:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ctx->buf, data, len);
data/git-2.29.2+next.20201030/sha256/block/sha256.c:181:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static const unsigned char pad[64] = { 0x80 };
data/git-2.29.2+next.20201030/sha256/gcrypt.h:22:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(digest, gcry_md_read(*ctx, GCRY_MD_SHA256), SHA256_DIGEST_SIZE);
data/git-2.29.2+next.20201030/shallow.c:58:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024];
data/git-2.29.2+next.20201030/shallow.c:71:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (!*path || (fp = fopen(path, "r")) == NULL) {
data/git-2.29.2+next.20201030/shallow.c:565:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(tmp, *refs, bitmap_size);
data/git-2.29.2+next.20201030/shallow.c:570:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(*refs, tmp, bitmap_size);
data/git-2.29.2+next.20201030/shell.c:15:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *my_argv[4];
data/git-2.29.2+next.20201030/sideband.c:13:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char color[COLOR_MAXLEN];
data/git-2.29.2+next.20201030/sideband.c:237:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char hdr[5];
data/git-2.29.2+next.20201030/stable-qsort.c:31:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(tmp, b1, s);
data/git-2.29.2+next.20201030/stable-qsort.c:36:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(tmp, b2, s);
data/git-2.29.2+next.20201030/stable-qsort.c:43:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(tmp, b1, n1 * s);
data/git-2.29.2+next.20201030/stable-qsort.c:44:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(b, t, (n - n2) * s);
data/git-2.29.2+next.20201030/stable-qsort.c:51:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024];
data/git-2.29.2+next.20201030/strbuf.c:51:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char strbuf_slopbuf[1];
data/git-2.29.2+next.20201030/strbuf.c:243:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(sb->buf + pos, data, dlen);
data/git-2.29.2+next.20201030/strbuf.c:296:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(sb->buf + sb->len, data, len);
data/git-2.29.2+next.20201030/strbuf.c:303:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(sb->buf + sb->len, sb2->buf, sb2->len);
data/git-2.29.2+next.20201030/strbuf.c:359:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char prefix1[3];
data/git-2.29.2+next.20201030/strbuf.c:360:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char prefix2[2];
data/git-2.29.2+next.20201030/strbuf.c:757:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, O_RDONLY);
data/git-2.29.2+next.20201030/strbuf.c:1164:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, O_WRONLY | O_CREAT | O_TRUNC, 0666);
data/git-2.29.2+next.20201030/streaming.c:64:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ibuf[FILTER_BUFFER];
data/git-2.29.2+next.20201030/streaming.c:65:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char obuf[FILTER_BUFFER];
data/git-2.29.2+next.20201030/streaming.c:86:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char hdr[32];
data/git-2.29.2+next.20201030/streaming.c:210:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(buf + filled, fs->obuf + fs->o_ptr, to_move);
data/git-2.29.2+next.20201030/streaming.c:302:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(buf, st->u.loose.hdr + st->u.loose.hdr_used, to_copy);
data/git-2.29.2+next.20201030/streaming.c:491:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(buf, st->u.incore.buf + st->u.incore.read_ptr, read_size);
data/git-2.29.2+next.20201030/streaming.c:534:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[1024 * 16];
data/git-2.29.2+next.20201030/t/helper/test-date.c:20:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		time_t t = atoi(*argv);
data/git-2.29.2+next.20201030/t/helper/test-date.c:30:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		time_t t = atoi(*argv);
data/git-2.29.2+next.20201030/t/helper/test-date.c:52:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		tz = atoi(arg);
data/git-2.29.2+next.20201030/t/helper/test-delta.c:31:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(argv[2], O_RDONLY);
data/git-2.29.2+next.20201030/t/helper/test-delta.c:45:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(argv[3], O_RDONLY);
data/git-2.29.2+next.20201030/t/helper/test-delta.c:72:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open (argv[4], O_WRONLY|O_CREAT|O_TRUNC, 0666);
data/git-2.29.2+next.20201030/t/helper/test-drop-caches.c:9:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Buffer[MAX_PATH];
data/git-2.29.2+next.20201030/t/helper/test-drop-caches.c:23:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(szVolumeAccessPath, Buffer, dos_drive_prefix);
data/git-2.29.2+next.20201030/t/helper/test-dump-cache-tree.c:46:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char path[PATH_MAX];
data/git-2.29.2+next.20201030/t/helper/test-fake-ssh.c:17:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(buf.buf, "w");
data/git-2.29.2+next.20201030/t/helper/test-genrandom.c:20:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	c = (unsigned char *) argv[1];
data/git-2.29.2+next.20201030/t/helper/test-hash-speed.c:16:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hash[GIT_MAX_RAWSZ];
data/git-2.29.2+next.20201030/t/helper/test-hash.c:7:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hash[GIT_MAX_HEXSZ];
data/git-2.29.2+next.20201030/t/helper/test-hashmap.c:11:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char key[FLEX_ARRAY];
data/git-2.29.2+next.20201030/t/helper/test-hashmap.c:44:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(entry->key, key, klen + 1);
data/git-2.29.2+next.20201030/t/helper/test-hashmap.c:45:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(entry->key + klen + 1, value, vlen + 1);
data/git-2.29.2+next.20201030/t/helper/test-hashmap.c:89:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[16];
data/git-2.29.2+next.20201030/t/helper/test-hashmap.c:255:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			perf_hashmap(atoi(p1), atoi(p2));
data/git-2.29.2+next.20201030/t/helper/test-hashmap.c:255:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			perf_hashmap(atoi(p1), atoi(p2));
data/git-2.29.2+next.20201030/t/helper/test-json-writer.c:450:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[MAX_LINE_LENGTH];
data/git-2.29.2+next.20201030/t/helper/test-lazy-init-name-hash.c:29:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[FLEX_ARRAY];
data/git-2.29.2+next.20201030/t/helper/test-oidmap.c:9:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[FLEX_ARRAY];
data/git-2.29.2+next.20201030/t/helper/test-path-utils.c:61:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[1024];
data/git-2.29.2+next.20201030/t/helper/test-path-utils.c:426:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		int fd = open(argv[2], O_RDONLY), offset = atoi(argv[3]);
data/git-2.29.2+next.20201030/t/helper/test-path-utils.c:426:46:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		int fd = open(argv[2], O_RDONLY), offset = atoi(argv[3]);
data/git-2.29.2+next.20201030/t/helper/test-path-utils.c:427:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buffer[65536];
data/git-2.29.2+next.20201030/t/helper/test-pkt-line.c:22:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char line[LARGE_PACKET_MAX];
data/git-2.29.2+next.20201030/t/helper/test-prio-queue.c:44:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			*v = atoi(*argv);
data/git-2.29.2+next.20201030/t/helper/test-proc-receive.c:30:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ref_name[FLEX_ARRAY]; /* more */
data/git-2.29.2+next.20201030/t/helper/test-proc-receive.c:43:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			server_version = atoi(reader->line+8);
data/git-2.29.2+next.20201030/t/helper/test-ref-store.c:17:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	return atoi(notnull(arg, name));
data/git-2.29.2+next.20201030/t/helper/test-regex.c:47:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char errbuf[64];
data/git-2.29.2+next.20201030/t/helper/test-run-command.c:261:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char buf[20];
data/git-2.29.2+next.20201030/t/helper/test-run-command.c:334:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[PATH_MAX];
data/git-2.29.2+next.20201030/t/helper/test-run-command.c:411:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	jobs = atoi(argv[2]);
data/git-2.29.2+next.20201030/t/helper/test-string-list.c:52:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		int maxsplit = atoi(argv[4]);
data/git-2.29.2+next.20201030/t/helper/test-string-list.c:66:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		int maxsplit = atoi(argv[4]);
data/git-2.29.2+next.20201030/t/helper/test-windows-named-pipe.c:17:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[TEST_BUFSIZE + 1];
data/git-2.29.2+next.20201030/t/helper/test-xml-encode.c:11:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[1024], tmp[4], *tmp2 = NULL;
data/git-2.29.2+next.20201030/t/t4256/1/mailinfo.c:345:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *header[MAX_HDR_PARSED] = {
data/git-2.29.2+next.20201030/t/t4256/1/mailinfo.c:1154:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	cmitmsg = fopen(msg, "w");
data/git-2.29.2+next.20201030/t/t4256/1/mailinfo.c:1159:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	mi->patchfile = fopen(patch, "w");
data/git-2.29.2+next.20201030/tag.c:137:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char type[20];
data/git-2.29.2+next.20201030/tag.c:166:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(type, bufptr, nl - bufptr);
data/git-2.29.2+next.20201030/tar.h:12:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[100];		/*   0 */
data/git-2.29.2+next.20201030/tar.h:13:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mode[8];		/* 100 */
data/git-2.29.2+next.20201030/tar.h:14:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char uid[8];		/* 108 */
data/git-2.29.2+next.20201030/tar.h:15:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char gid[8];		/* 116 */
data/git-2.29.2+next.20201030/tar.h:16:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char size[12];		/* 124 */
data/git-2.29.2+next.20201030/tar.h:17:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mtime[12];		/* 136 */
data/git-2.29.2+next.20201030/tar.h:18:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char chksum[8];		/* 148 */
data/git-2.29.2+next.20201030/tar.h:19:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char typeflag[1];	/* 156 */
data/git-2.29.2+next.20201030/tar.h:20:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char linkname[100];	/* 157 */
data/git-2.29.2+next.20201030/tar.h:21:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char magic[6];		/* 257 */
data/git-2.29.2+next.20201030/tar.h:22:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char version[2];	/* 263 */
data/git-2.29.2+next.20201030/tar.h:23:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char uname[32];		/* 265 */
data/git-2.29.2+next.20201030/tar.h:24:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char gname[32];		/* 297 */
data/git-2.29.2+next.20201030/tar.h:25:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char devmajor[8];	/* 329 */
data/git-2.29.2+next.20201030/tar.h:26:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char devminor[8];	/* 337 */
data/git-2.29.2+next.20201030/tar.h:27:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char prefix[155];	/* 345 */
data/git-2.29.2+next.20201030/tempfile.c:138:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	tempfile->fd = open(tempfile->filename.buf,
data/git-2.29.2+next.20201030/tempfile.c:142:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		tempfile->fd = open(tempfile->filename.buf,
data/git-2.29.2+next.20201030/tempfile.c:282:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	tempfile->fd = open(tempfile->filename.buf, O_WRONLY|O_TRUNC);
data/git-2.29.2+next.20201030/trace.c:48:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		key->fd = atoi(trace);
data/git-2.29.2+next.20201030/trace.c:50:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		int fd = open(trace, O_WRONLY | O_APPEND | O_CREAT, 0666);
data/git-2.29.2+next.20201030/trace2/tr2_dst.c:33:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			tr2env_dst_debug = atoi(env_value) > 0;
data/git-2.29.2+next.20201030/trace2/tr2_dst.c:73:55:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if (max_files_var && *max_files_var && ((max_files = atoi(max_files_var)) >= 0))
data/git-2.29.2+next.20201030/trace2/tr2_dst.c:103:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		dst->fd = open(sentinel_path.buf, O_WRONLY | O_CREAT | O_EXCL, 0666);
data/git-2.29.2+next.20201030/trace2/tr2_dst.c:140:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			dst->fd = open(path.buf, O_WRONLY | O_CREAT | O_EXCL, 0666);
data/git-2.29.2+next.20201030/trace2/tr2_dst.c:176:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	int fd = open(tgt_value, O_WRONLY | O_APPEND | O_CREAT, 0666);
data/git-2.29.2+next.20201030/trace2/tr2_dst.c:335:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		dst->fd = atoi(tgt_value);
data/git-2.29.2+next.20201030/trace2/tr2_sid.c:35:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hash[GIT_MAX_RAWSZ + 1];
data/git-2.29.2+next.20201030/trace2/tr2_sid.c:36:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hex[GIT_MAX_HEXSZ + 1];
data/git-2.29.2+next.20201030/trace2/tr2_sid.c:37:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hostname[HOST_NAME_MAX + 1];
data/git-2.29.2+next.20201030/trace2/tr2_tbuf.h:10:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[32];
data/git-2.29.2+next.20201030/trace2/tr2_tgt_event.c:56:45:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if (nesting && *nesting && ((max_nesting = atoi(nesting)) > 0))
data/git-2.29.2+next.20201030/transport-helper.c:355:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[16];
data/git-2.29.2+next.20201030/transport-helper.c:653:62:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static int connect_helper(struct transport *transport, const char *name,
data/git-2.29.2+next.20201030/transport-helper.c:654:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		   const char *exec, int fd[2])
data/git-2.29.2+next.20201030/transport-helper.c:1297:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msgbuf[PBUFFERSIZE];
data/git-2.29.2+next.20201030/transport-helper.c:1338:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFFERSIZE];
data/git-2.29.2+next.20201030/transport-internal.h:60:53:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	int (*connect)(struct transport *connection, const char *name,
data/git-2.29.2+next.20201030/transport-internal.h:61:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		       const char *executable, int fd[2]);
data/git-2.29.2+next.20201030/transport.c:689:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hex[GIT_MAX_HEXSZ + 1];
data/git-2.29.2+next.20201030/transport.c:820:59:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static int connect_git(struct transport *transport, const char *name,
data/git-2.29.2+next.20201030/transport.c:821:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		       const char *executable, int fd[2])
data/git-2.29.2+next.20201030/transport.c:1169:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *argv[4];
data/git-2.29.2+next.20201030/transport.c:1430:58:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int transport_connect(struct transport *transport, const char *name,
data/git-2.29.2+next.20201030/transport.c:1431:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		      const char *exec, int fd[2])
data/git-2.29.2+next.20201030/transport.h:261:58:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int transport_connect(struct transport *transport, const char *name,
data/git-2.29.2+next.20201030/transport.h:262:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		      const char *exec, int fd[2]);
data/git-2.29.2+next.20201030/tree-diff.c:160:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(p->path, base->buf, base->len);
data/git-2.29.2+next.20201030/tree-diff.c:161:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(p->path + base->len, path, pathlen);
data/git-2.29.2+next.20201030/tree-diff.c:636:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			const char *path[2];
data/git-2.29.2+next.20201030/tree-walk.c:200:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(path + pos, name, namelen);
data/git-2.29.2+next.20201030/tree.c:32:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ce->name, base, baselen);
data/git-2.29.2+next.20201030/tree.c:33:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ce->name + baselen, pathname, len+1);
data/git-2.29.2+next.20201030/unix-socket.c:70:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(sa->sun_path, path, size);
data/git-2.29.2+next.20201030/unpack-trees.c:27:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *unpack_plumbing_errors[NB_UNPACK_TREES_WARNING_TYPES] = {
data/git-2.29.2+next.20201030/unpack-trees.c:809:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(tree_ce->name, src[0]->name, len + 1);
data/git-2.29.2+next.20201030/unpack-trees.c:1492:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char label[100];
data/git-2.29.2+next.20201030/unpack-trees.h:72:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *msgs[NB_UNPACK_TREES_WARNING_TYPES];
data/git-2.29.2+next.20201030/upload-pack.c:194:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[8193];
data/git-2.29.2+next.20201030/upload-pack.c:270:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char progress[128];
data/git-2.29.2+next.20201030/upload-pack.c:514:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char last_hex[GIT_MAX_HEXSZ + 1];
data/git-2.29.2+next.20201030/upload-pack.c:674:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char namebuf[GIT_MAX_HEXSZ + 2]; /* ^ + hash + LF */
data/git-2.29.2+next.20201030/upload-pack.c:712:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1];
data/git-2.29.2+next.20201030/urlmatch.c:605:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(item->util, &matched, sizeof(matched));
data/git-2.29.2+next.20201030/usage.c:11:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[4096];
data/git-2.29.2+next.20201030/usage.c:19:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(msg, prefix, prefix_len);
data/git-2.29.2+next.20201030/usage.c:177:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str_error[256], *err;
data/git-2.29.2+next.20201030/usage.c:201:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024];
data/git-2.29.2+next.20201030/usage.c:218:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024];
data/git-2.29.2+next.20201030/usage.c:240:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024];
data/git-2.29.2+next.20201030/usage.c:262:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char prefix[256];
data/git-2.29.2+next.20201030/usage.c:299:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char data[FLEX_ARRAY];
data/git-2.29.2+next.20201030/utf8.c:376:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(dst, src, n);
data/git-2.29.2+next.20201030/utf8.c:390:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(dst, subst, subst_len);
data/git-2.29.2+next.20201030/utf8.c:397:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dst, old, src - old);
data/git-2.29.2+next.20201030/utf8.c:596:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(out, bom_str, bom_len);
data/git-2.29.2+next.20201030/varint.c:22:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char varint[16];
data/git-2.29.2+next.20201030/varint.c:28:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(buf, varint + pos, sizeof(varint) - pos);
data/git-2.29.2+next.20201030/vcs-svn/line_buffer.h:9:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line_buffer[LINE_BUFFER_LEN];
data/git-2.29.2+next.20201030/walker.c:265:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			free((char *) write_ref[targets]);
data/git-2.29.2+next.20201030/wrapper.c:99:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	return memcpy(xmallocz(len), data, len);
data/git-2.29.2+next.20201030/wrapper.c:190:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		int fd = open(path, oflag, mode);
data/git-2.29.2+next.20201030/wrapper.c:360:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		FILE *fp = fopen(path, mode);
data/git-2.29.2+next.20201030/wrapper.c:385:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE *ret = fopen(path, "w");
data/git-2.29.2+next.20201030/wrapper.c:389:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			ret = fopen(path, "w");
data/git-2.29.2+next.20201030/wrapper.c:413:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE *fp = fopen(path, mode);
data/git-2.29.2+next.20201030/wrapper.c:425:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char origtemplate[PATH_MAX];
data/git-2.29.2+next.20201030/wrapper.c:428:7:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
	fd = mkstemp(filename_template);
data/git-2.29.2+next.20201030/wrapper.c:492:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(pattern, O_CREAT | O_EXCL | O_RDWR, mode);
data/git-2.29.2+next.20201030/wrapper.c:522:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char origtemplate[PATH_MAX];
data/git-2.29.2+next.20201030/write-or-die.c:27:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				skip_stdout_flush = (atoi(cp) == 0);
data/git-2.29.2+next.20201030/ws.c:56:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			unsigned tabwidth = atoi(string + 9);
data/git-2.29.2+next.20201030/wt-status.c:129:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(s->color_palette, default_wt_status_colors,
data/git-2.29.2+next.20201030/wt-status.c:1092:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char comment_line_string[3];
data/git-2.29.2+next.20201030/wt-status.c:1269:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE *f = fopen(git_path("%s", fname), "r");
data/git-2.29.2+next.20201030/wt-status.c:2122:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sub[5])
data/git-2.29.2+next.20201030/wt-status.c:2199:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char key[3];
data/git-2.29.2+next.20201030/wt-status.c:2200:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char submodule_token[5];
data/git-2.29.2+next.20201030/wt-status.c:2269:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char submodule_token[5];
data/git-2.29.2+next.20201030/wt-status.h:121:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char color_palette[WT_STATUS_MAXSLOT][COLOR_MAXLEN];
data/git-2.29.2+next.20201030/xdiff-interface.c:157:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((f = fopen(filename, "rb")) == NULL)
data/git-2.29.2+next.20201030/xdiff-interface.c:236:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buffer, line, result);
data/git-2.29.2+next.20201030/xdiff/xemit.c:108:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(buf, rec, len);
data/git-2.29.2+next.20201030/xdiff/xemit.c:126:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dummy[1];
data/git-2.29.2+next.20201030/xdiff/xemit.c:132:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[80];
data/git-2.29.2+next.20201030/xdiff/xemit.c:139:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *buf, dummy[1];
data/git-2.29.2+next.20201030/xdiff/xmerge.c:124:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(dest + size, recs[i]->ptr, recs[i]->size);
data/git-2.29.2+next.20201030/xdiff/xmerge.c:221:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(dest + size + 1, name1, marker1_size - 1);
data/git-2.29.2+next.20201030/xdiff/xmerge.c:242:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(dest + size + 1, name3, marker3_size - 1);
data/git-2.29.2+next.20201030/xdiff/xmerge.c:273:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(dest + size + 1, name2, marker2_size - 1);
data/git-2.29.2+next.20201030/xdiff/xmerge.c:668:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(result->ptr, mf2->ptr, mf2->size);
data/git-2.29.2+next.20201030/xdiff/xmerge.c:672:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(result->ptr, mf1->ptr, mf1->size);
data/git-2.29.2+next.20201030/xdiff/xutils.c:323:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[32];
data/git-2.29.2+next.20201030/xdiff/xutils.c:348:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[128];
data/git-2.29.2+next.20201030/xdiff/xutils.c:350:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buf, "@@ -", 4);
data/git-2.29.2+next.20201030/xdiff/xutils.c:356:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(buf + nb, ",", 1);
data/git-2.29.2+next.20201030/xdiff/xutils.c:362:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buf + nb, " +", 2);
data/git-2.29.2+next.20201030/xdiff/xutils.c:368:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(buf + nb, ",", 1);
data/git-2.29.2+next.20201030/xdiff/xutils.c:374:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buf + nb, " @@", 3);
data/git-2.29.2+next.20201030/xdiff/xutils.c:380:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(buf + nb, func, funclen);
data/git-2.29.2+next.20201030/xdiff/xutils.c:428:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(diff_env->xdf1.rchg + line1 - 1, env.xdf1.rchg, count1);
data/git-2.29.2+next.20201030/xdiff/xutils.c:429:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(diff_env->xdf2.rchg + line2 - 1, env.xdf2.rchg, count2);
data/git-2.29.2+next.20201030/abspath.c:240:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t pfx_len = pfx ? strlen(pfx) : 0;
data/git-2.29.2+next.20201030/apply.c:479:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (len < strlen(" +0500") || line[len-strlen(" +0500")] != ' ')
data/git-2.29.2+next.20201030/apply.c:479:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (len < strlen(" +0500") || line[len-strlen(" +0500")] != ' ')
data/git-2.29.2+next.20201030/apply.c:481:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	tz = line + len - strlen(" +0500");
data/git-2.29.2+next.20201030/apply.c:497:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (len < strlen(" +08:00") || line[len - strlen(":00")] != ':')
data/git-2.29.2+next.20201030/apply.c:497:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (len < strlen(" +08:00") || line[len - strlen(":00")] != ':')
data/git-2.29.2+next.20201030/apply.c:499:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	tz = line + len - strlen(" +08:00");
data/git-2.29.2+next.20201030/apply.c:515:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (len < strlen("72-02-05") || line[len-strlen("-05")] != '-')
data/git-2.29.2+next.20201030/apply.c:515:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (len < strlen("72-02-05") || line[len-strlen("-05")] != '-')
data/git-2.29.2+next.20201030/apply.c:517:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	p = date = line + len - strlen("72-02-05");
data/git-2.29.2+next.20201030/apply.c:524:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (date - line >= strlen("19") &&
data/git-2.29.2+next.20201030/apply.c:526:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		date -= strlen("19");
data/git-2.29.2+next.20201030/apply.c:535:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (len < strlen(" 07:01:32") || line[len-strlen(":32")] != ':')
data/git-2.29.2+next.20201030/apply.c:535:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (len < strlen(" 07:01:32") || line[len-strlen(":32")] != ':')
data/git-2.29.2+next.20201030/apply.c:537:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	p = time = line + len - strlen(" 07:01:32");
data/git-2.29.2+next.20201030/apply.c:672:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int deflen = strlen(def);
data/git-2.29.2+next.20201030/apply.c:1147:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	line += strlen("diff --git ");
data/git-2.29.2+next.20201030/apply.c:1148:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	llen -= strlen("diff --git ");
data/git-2.29.2+next.20201030/apply.c:1354:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			int oplen = strlen(p->str);
data/git-2.29.2+next.20201030/apply.c:1432:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ex = strlen(expect);
data/git-2.29.2+next.20201030/apply.c:2160:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				int len = strlen(binhdr[i]);
data/git-2.29.2+next.20201030/apply.c:3148:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(patch->old_oid_prefix) != hexsz ||
data/git-2.29.2+next.20201030/apply.c:3149:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    strlen(patch->new_oid_prefix) != hexsz ||
data/git-2.29.2+next.20201030/apply.c:3412:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		} else if (has_symlink_leading_path(name, strlen(name))) {
data/git-2.29.2+next.20201030/apply.c:3526:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	pos = index_name_pos(state->repo->index, name, strlen(name));
data/git-2.29.2+next.20201030/apply.c:3696:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					 strlen(old_name));
data/git-2.29.2+next.20201030/apply.c:3754:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		pos = index_name_pos(state->repo->index, new_name, strlen(new_name));
data/git-2.29.2+next.20201030/apply.c:3781:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (has_symlink_leading_path(new_name, strlen(new_name)))
data/git-2.29.2+next.20201030/apply.c:4047:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	pos = index_name_pos(state->repo->index, path, strlen(path));
data/git-2.29.2+next.20201030/apply.c:4262:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			len = strlen(patch->old_name);
data/git-2.29.2+next.20201030/apply.c:4269:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			len = strlen(patch->new_name);
data/git-2.29.2+next.20201030/apply.c:4297:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int namelen = strlen(path);
data/git-2.29.2+next.20201030/apply.c:4463:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	namelen = strlen(patch->new_name);
data/git-2.29.2+next.20201030/apply.c:4567:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cnt = strlen(patch->new_name);
data/git-2.29.2+next.20201030/archive-tar.c:151:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = 1 + 1 + strlen(keyword) + 1 + valuelen + 1;
data/git-2.29.2+next.20201030/archive-tar.c:404:16:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
			tar_umask = umask(0);
data/git-2.29.2+next.20201030/archive-tar.c:405:4:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
			umask(tar_umask);
data/git-2.29.2+next.20201030/archive.c:203:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = st_add4(base->len, 1, strlen(filename), 1);
data/git-2.29.2+next.20201030/archive.c:456:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		dwim_ref(name, strlen(name), &oid, &ref, 0);
data/git-2.29.2+next.20201030/archive.c:629:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	args->baselen = strlen(base);
data/git-2.29.2+next.20201030/archive.c:671:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int prefixlen = strlen(filename) - strlen(ext);
data/git-2.29.2+next.20201030/archive.c:671:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int prefixlen = strlen(filename) - strlen(ext);
data/git-2.29.2+next.20201030/attr.c:250:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return git_attr_internal(name, strlen(name));
data/git-2.29.2+next.20201030/attr.c:366:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(ATTRIBUTE_MACRO_PREFIX) < namelen &&
data/git-2.29.2+next.20201030/attr.c:374:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		name += strlen(ATTRIBUTE_MACRO_PREFIX);
data/git-2.29.2+next.20201030/attr.c:724:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			skip_utf8_bom(&bufp, strlen(bufp));
data/git-2.29.2+next.20201030/banned.h:17:8:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
#undef strncpy
data/git-2.29.2+next.20201030/banned.h:18:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
#define strncpy(x,y,n) BANNED(strncpy)
data/git-2.29.2+next.20201030/banned.h:18:31:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
#define strncpy(x,y,n) BANNED(strncpy)
data/git-2.29.2+next.20201030/banned.h:19:8:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
#undef strncat
data/git-2.29.2+next.20201030/banned.h:20:9:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
#define strncat(x,y,n) BANNED(strncat)
data/git-2.29.2+next.20201030/banned.h:20:31:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
#define strncat(x,y,n) BANNED(strncat)
data/git-2.29.2+next.20201030/base85.c:110:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int len = strlen(av[2]);
data/git-2.29.2+next.20201030/blame.c:111:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	pos = index_name_pos(r->index, path, strlen(path));
data/git-2.29.2+next.20201030/blame.c:278:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(path);
data/git-2.29.2+next.20201030/blame.c:1308:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	fill_bloom_key(path, strlen(path), bd->keys[bd->nr], bd->settings);
data/git-2.29.2+next.20201030/bloom.c:285:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			fill_bloom_key(e->path, strlen(e->path), &key, settings);
data/git-2.29.2+next.20201030/branch.c:209:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    ref->buf + strlen("refs/heads/"));
data/git-2.29.2+next.20201030/branch.c:284:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	switch (dwim_ref(start_name, strlen(start_name), &oid, &real_ref, 0)) {
data/git-2.29.2+next.20201030/builtin/am.c:1294:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	state->msg_len = strlen(state->msg);
data/git-2.29.2+next.20201030/builtin/blame.c:119:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	tmp += strlen(what);
data/git-2.29.2+next.20201030/builtin/blame.c:122:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(tmp);
data/git-2.29.2+next.20201030/builtin/blame.c:604:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len = strlen(uniq);
data/git-2.29.2+next.20201030/builtin/blame.c:631:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		num = strlen(suspect->path);
data/git-2.29.2+next.20201030/builtin/blame.c:683:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return prefix_path(prefix, prefix ? strlen(prefix) : 0, path);
data/git-2.29.2+next.20201030/builtin/blame.c:729:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (color_parse_mem(value, strlen(value), repeated_meta_color))
data/git-2.29.2+next.20201030/builtin/blame.c:1007:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		blame_date_width = strlen(show_date(0, 0, &blame_date_mode)) + 1; /* add the null */
data/git-2.29.2+next.20201030/builtin/branch.c:422:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		maxwidth = calc_maxwidth(&array, strlen(remote_prefix));
data/git-2.29.2+next.20201030/builtin/cat-file.c:234:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int alen = strlen(atom);
data/git-2.29.2+next.20201030/builtin/cat-file.c:404:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			       (uintmax_t)strlen(obj_name), obj_name);
data/git-2.29.2+next.20201030/builtin/cat-file.c:408:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			       (uintmax_t)strlen(obj_name), obj_name);
data/git-2.29.2+next.20201030/builtin/cat-file.c:412:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			       (uintmax_t)strlen(obj_name), obj_name);
data/git-2.29.2+next.20201030/builtin/check-attr.c:64:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		prefix_path(prefix, prefix ? strlen(prefix) : 0, file);
data/git-2.29.2+next.20201030/builtin/check-mailmap.c:24:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (split_ident_line(&ident, contact, strlen(contact)))
data/git-2.29.2+next.20201030/builtin/check-ref-format.c:23:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char *ret = xmallocz(strlen(refname));
data/git-2.29.2+next.20201030/builtin/checkout-index.c:50:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int namelen = strlen(name);
data/git-2.29.2+next.20201030/builtin/checkout-index.c:199:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	prefix_length = prefix ? strlen(prefix) : 0;
data/git-2.29.2+next.20201030/builtin/checkout-index.c:214:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	state.base_dir_len = strlen(state.base_dir);
data/git-2.29.2+next.20201030/builtin/checkout.c:126:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = base->len + strlen(pathname);
data/git-2.29.2+next.20201030/builtin/checkout.c:667:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (!dwim_ref(branch->name, strlen(branch->name), &branch->oid, &branch->refname, 0))
data/git-2.29.2+next.20201030/builtin/checkout.c:1366:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (dwim_ref(branch_info->name, strlen(branch_info->name), &oid, &to_free, 0) == 1) {
data/git-2.29.2+next.20201030/builtin/clean.c:381:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(choice);
data/git-2.29.2+next.20201030/builtin/clone.c:218:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const char *end = repo + strlen(repo), *start, *ptr;
data/git-2.29.2+next.20201030/builtin/clone.c:323:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char *end = dir + strlen(dir);
data/git-2.29.2+next.20201030/builtin/commit.c:625:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (split_ident_line(&ident, force_author, strlen(force_author)) < 0)
data/git-2.29.2+next.20201030/builtin/config.c:325:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		for (tl = key + strlen(key) - 1;
data/git-2.29.2+next.20201030/builtin/credential-store.c:162:2:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	umask(077);
data/git-2.29.2+next.20201030/builtin/describe.c:447:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				w = strlen(_(prio_names[i]));
data/git-2.29.2+next.20201030/builtin/diff-tree.c:63:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len = strlen(line);
data/git-2.29.2+next.20201030/builtin/difftool.c:301:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (strbuf_readlink(&link, path, strlen(path)))
data/git-2.29.2+next.20201030/builtin/fast-export.c:146:11:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
		return !equal;
data/git-2.29.2+next.20201030/builtin/fast-export.c:352:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len_a = strlen(name_a);
data/git-2.29.2+next.20201030/builtin/fast-export.c:353:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len_b = strlen(name_b);
data/git-2.29.2+next.20201030/builtin/fast-export.c:419:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = strlen(oid_hex);
data/git-2.29.2+next.20201030/builtin/fast-export.c:507:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	bol = memmem(begin, end ? end - begin : strlen(begin),
data/git-2.29.2+next.20201030/builtin/fast-export.c:508:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		     needle, strlen(needle));
data/git-2.29.2+next.20201030/builtin/fast-export.c:511:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	bol += strlen(needle);
data/git-2.29.2+next.20201030/builtin/fast-export.c:710:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			  ? strlen(reencoded) : message
data/git-2.29.2+next.20201030/builtin/fast-export.c:711:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			  ? strlen(message) : 0),
data/git-2.29.2+next.20201030/builtin/fast-export.c:801:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		message_size = strlen(message);
data/git-2.29.2+next.20201030/builtin/fast-export.c:810:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		tagger_end = tagger + strlen(tagger);
data/git-2.29.2+next.20201030/builtin/fast-export.c:946:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (dwim_ref(e->name, strlen(e->name), &oid, &full_name, 0) != 1)
data/git-2.29.2+next.20201030/builtin/fast-export.c:1173:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		keylen = strlen(arg);
data/git-2.29.2+next.20201030/builtin/fast-import.c:592:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	unsigned int hc = hc_str(name, strlen(name)) % branch_table_sz;
data/git-2.29.2+next.20201030/builtin/fast-import.c:603:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	unsigned int hc = hc_str(name, strlen(name)) % branch_table_sz;
data/git-2.29.2+next.20201030/builtin/fast-import.c:796:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	write_or_die(keep_fd, keep_msg, strlen(keep_msg));
data/git-2.29.2+next.20201030/builtin/fast-import.c:875:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		new_p = add_packed_git(idx_name, strlen(idx_name), 1);
data/git-2.29.2+next.20201030/builtin/fast-import.c:1277:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		e->name = to_atom(c, strlen(c));
data/git-2.29.2+next.20201030/builtin/fast-import.c:1833:18:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	int term_char = fgetc(stdin);
data/git-2.29.2+next.20201030/builtin/fast-import.c:3046:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (size < hexsz + strlen("object ") ||
data/git-2.29.2+next.20201030/builtin/fast-import.c:3047:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    get_oid_hex(buf + strlen("object "), oid))
data/git-2.29.2+next.20201030/builtin/fast-import.c:3051:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (size < hexsz + strlen("tree ") ||
data/git-2.29.2+next.20201030/builtin/fast-import.c:3052:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    get_oid_hex(buf + strlen("tree "), oid))
data/git-2.29.2+next.20201030/builtin/fetch.c:302:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = strlen(refname);
data/git-2.29.2+next.20201030/builtin/fetch.c:703:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	nlen = strlen(needle);
data/git-2.29.2+next.20201030/builtin/fetch.c:714:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	plen = strlen(p);
data/git-2.29.2+next.20201030/builtin/fetch.c:719:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		      placeholder, strlen(placeholder));
data/git-2.29.2+next.20201030/builtin/fetch.c:750:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int width = (summary_width + strlen(summary) - gettext_width(summary));
data/git-2.29.2+next.20201030/builtin/fetch.c:1001:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			url_len = strlen(url);
data/git-2.29.2+next.20201030/builtin/fetch.c:1169:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	url_len = strlen(url);
data/git-2.29.2+next.20201030/builtin/grep.c:502:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		name_base_len = strlen(repo->submodule_prefix);
data/git-2.29.2+next.20201030/builtin/grep.c:642:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = name ? strlen(name) : 0;
data/git-2.29.2+next.20201030/builtin/grep.c:1137:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int len = strlen(pager);
data/git-2.29.2+next.20201030/builtin/help.c:206:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	strbuf_remove(&buffer, 0, strlen("emacsclient"));
data/git-2.29.2+next.20201030/builtin/index-pack.c:1459:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int msg_len = strlen(msg);
data/git-2.29.2+next.20201030/builtin/index-pack.c:1529:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		p = add_packed_git(final_index_name, strlen(final_index_name), 0);
data/git-2.29.2+next.20201030/builtin/index-pack.c:1628:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	struct packed_git *p = add_packed_git(pack_name, strlen(pack_name), 1);
data/git-2.29.2+next.20201030/builtin/init-db.c:470:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int len = strlen(git_dir);
data/git-2.29.2+next.20201030/builtin/log.c:771:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len = strlen(value);
data/git-2.29.2+next.20201030/builtin/log.c:958:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int suffix_len = strlen(rev->patch_suffix) + 1;
data/git-2.29.2+next.20201030/builtin/log.c:1048:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (signature[strlen(signature)-1] != '\n')
data/git-2.29.2+next.20201030/builtin/log.c:1073:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (dwim_ref(ref, strlen(ref), &branch_oid, &full_ref, 0) &&
data/git-2.29.2+next.20201030/builtin/log.c:1278:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	outdir_offset = strlen(prefix);
data/git-2.29.2+next.20201030/builtin/log.c:1895:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (split_ident_line(&rev.from_ident, from, strlen(from)))
data/git-2.29.2+next.20201030/builtin/ls-files.c:228:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (max_prefix_len > strlen(fullname))
data/git-2.29.2+next.20201030/builtin/ls-files.c:234:62:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	} else if (match_pathspec(repo->index, &pathspec, fullname, strlen(fullname),
data/git-2.29.2+next.20201030/builtin/ls-files.c:267:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(path);
data/git-2.29.2+next.20201030/builtin/ls-files.c:396:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	common_prefix_len = strlen(common_prefix);
data/git-2.29.2+next.20201030/builtin/ls-files.c:590:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		prefix_len = strlen(prefix);
data/git-2.29.2+next.20201030/builtin/ls-tree.c:50:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(pathname);
data/git-2.29.2+next.20201030/builtin/ls-tree.c:52:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		speclen = strlen(spec);
data/git-2.29.2+next.20201030/builtin/ls-tree.c:154:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		chomp_prefix = strlen(prefix);
data/git-2.29.2+next.20201030/builtin/mailsplit.c:52:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t min = strlen(">From ");
data/git-2.29.2+next.20201030/builtin/mailsplit.c:234:10:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		peek = fgetc(f);
data/git-2.29.2+next.20201030/builtin/merge-index.c:48:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int pos = cache_name_pos(path, strlen(path));
data/git-2.29.2+next.20201030/builtin/merge-recursive.c:16:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(branch) != the_hash_algo->hexsz)
data/git-2.29.2+next.20201030/builtin/merge.c:503:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (dwim_ref(remote, strlen(remote), &branch_head, &found_ref, 0) > 0) {
data/git-2.29.2+next.20201030/builtin/merge.c:522:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	for (len = 0, ptr = remote + strlen(remote);
data/git-2.29.2+next.20201030/builtin/mktag.c:79:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	typelen = tag_line - type_line - strlen("type \n");
data/git-2.29.2+next.20201030/builtin/mktree.c:23:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = strlen(path);
data/git-2.29.2+next.20201030/builtin/mv.c:31:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int prefixlen = prefix ? strlen(prefix) : 0;
data/git-2.29.2+next.20201030/builtin/mv.c:36:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int length = strlen(pathspec[i]);
data/git-2.29.2+next.20201030/builtin/mv.c:65:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = strlen(path);
data/git-2.29.2+next.20201030/builtin/mv.c:183:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		length = strlen(src);
data/git-2.29.2+next.20201030/builtin/mv.c:212:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				dst_len = strlen(dst);
data/git-2.29.2+next.20201030/builtin/mv.c:245:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		else if (is_dir_sep(dst[strlen(dst) - 1]))
data/git-2.29.2+next.20201030/builtin/mv.c:294:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		pos = cache_name_pos(src, strlen(src));
data/git-2.29.2+next.20201030/builtin/notes.c:185:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strbuf_add_commented_lines(&buf, "\n", strlen("\n"));
data/git-2.29.2+next.20201030/builtin/notes.c:186:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strbuf_add_commented_lines(&buf, _(note_template), strlen(_(note_template)));
data/git-2.29.2+next.20201030/builtin/notes.c:220:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	strbuf_grow(&d->buf, strlen(arg) + 2);
data/git-2.29.2+next.20201030/builtin/pack-objects.c:996:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		write_in_full(1, ex->pack_hash_hex, strlen(ex->pack_hash_hex));
data/git-2.29.2+next.20201030/builtin/pack-objects.c:998:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		write_in_full(1, ex->uri, strlen(ex->uri));
data/git-2.29.2+next.20201030/builtin/pack-objects.c:3346:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int len = strlen(line);
data/git-2.29.2+next.20201030/builtin/pack-redundant.c:533:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(filename) < 40)
data/git-2.29.2+next.20201030/builtin/patch-id.c:72:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    starts_with(line, "\\ ") && 12 < strlen(line))
data/git-2.29.2+next.20201030/builtin/range-diff.c:71:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			a_len = strlen(a);
data/git-2.29.2+next.20201030/builtin/receive-pack.c:373:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(prefix);
data/git-2.29.2+next.20201030/builtin/receive-pack.c:564:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	hmac_hash(hash, buf.buf, buf.len, cert_nonce_seed, strlen(cert_nonce_seed));
data/git-2.29.2+next.20201030/builtin/receive-pack.c:580:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int key_len = strlen(key);
data/git-2.29.2+next.20201030/builtin/receive-pack.c:662:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	noncelen = strlen(nonce);
data/git-2.29.2+next.20201030/builtin/receive-pack.c:664:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (noncelen != strlen(expect)) {
data/git-2.29.2+next.20201030/builtin/receive-pack.c:1163:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			linelen = strlen(reader.line);
data/git-2.29.2+next.20201030/builtin/receive-pack.c:2030:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		linelen = strlen(reader->line);
data/git-2.29.2+next.20201030/builtin/receive-pack.c:2052:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				len = strlen(hash);
data/git-2.29.2+next.20201030/builtin/reflog.c:643:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (!dwim_log(argv[i], strlen(argv[i]), &oid, &ref)) {
data/git-2.29.2+next.20201030/builtin/remote-ext.c:178:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		i = strlen(buffer);
data/git-2.29.2+next.20201030/builtin/remote-fd.c:36:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		i = strlen(buffer);
data/git-2.29.2+next.20201030/builtin/remote.c:278:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	key += strlen("branch.");
data/git-2.29.2+next.20201030/builtin/remote.c:463:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		else if (strlen(spec->src))
data/git-2.29.2+next.20201030/builtin/remote.c:726:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				      ptr-buf2.buf + strlen(":refs/remotes/"),
data/git-2.29.2+next.20201030/builtin/remote.c:727:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				      strlen(rename.old_name), rename.new_name,
data/git-2.29.2+next.20201030/builtin/remote.c:728:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				      strlen(rename.new_name));
data/git-2.29.2+next.20201030/builtin/remote.c:779:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strbuf_splice(&buf, strlen("refs/remotes/"), strlen(rename.old_name),
data/git-2.29.2+next.20201030/builtin/remote.c:779:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strbuf_splice(&buf, strlen("refs/remotes/"), strlen(rename.old_name),
data/git-2.29.2+next.20201030/builtin/remote.c:780:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				rename.new_name, strlen(rename.new_name));
data/git-2.29.2+next.20201030/builtin/remote.c:794:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strbuf_splice(&buf, strlen("refs/remotes/"), strlen(rename.old_name),
data/git-2.29.2+next.20201030/builtin/remote.c:794:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strbuf_splice(&buf, strlen("refs/remotes/"), strlen(rename.old_name),
data/git-2.29.2+next.20201030/builtin/remote.c:795:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				rename.new_name, strlen(rename.new_name));
data/git-2.29.2+next.20201030/builtin/remote.c:798:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strbuf_splice(&buf2, strlen("refs/remotes/"), strlen(rename.old_name),
data/git-2.29.2+next.20201030/builtin/remote.c:798:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strbuf_splice(&buf2, strlen("refs/remotes/"), strlen(rename.old_name),
data/git-2.29.2+next.20201030/builtin/remote.c:799:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				rename.new_name, strlen(rename.new_name));
data/git-2.29.2+next.20201030/builtin/remote.c:982:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int n = strlen(item->string);
data/git-2.29.2+next.20201030/builtin/remote.c:1027:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ((n = strlen(branch_item->string)) > show_info->width)
data/git-2.29.2+next.20201030/builtin/remote.c:1083:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ((n = strlen(push_item->string)) > show_info->width)
data/git-2.29.2+next.20201030/builtin/remote.c:1085:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ((n = strlen(push_info->dest)) > show_info->width2)
data/git-2.29.2+next.20201030/builtin/repack.c:72:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	dirlen = strlen(packdir) + 1;
data/git-2.29.2+next.20201030/builtin/repack.c:549:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			size_t len = strlen(item->string);
data/git-2.29.2+next.20201030/builtin/reset.c:426:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			dwim_ref(rev, strlen(rev), &dummy, &ref, 0);
data/git-2.29.2+next.20201030/builtin/rev-parse.c:93:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(str);
data/git-2.29.2+next.20201030/builtin/rev-parse.c:139:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			switch (dwim_ref(name, strlen(name), &discard, &full, 0)) {
data/git-2.29.2+next.20201030/builtin/rev-parse.c:870:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				len = strlen(cwd);
data/git-2.29.2+next.20201030/builtin/rm.c:72:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		pos = cache_name_pos(name, strlen(name));
data/git-2.29.2+next.20201030/builtin/rm.c:117:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		pos = cache_name_pos(name, strlen(name));
data/git-2.29.2+next.20201030/builtin/shortlog.c:73:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			eol = oneline + strlen(oneline);
data/git-2.29.2+next.20201030/builtin/shortlog.c:85:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			int dot3len = strlen(dot3);
data/git-2.29.2+next.20201030/builtin/shortlog.c:88:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					int taillen = strlen(p) - dot3len;
data/git-2.29.2+next.20201030/builtin/shortlog.c:108:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (split_ident_line(&ident, in, strlen(in)))
data/git-2.29.2+next.20201030/builtin/show-branch.c:744:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (!dwim_ref(*av, strlen(*av), &oid, &ref, 0))
data/git-2.29.2+next.20201030/builtin/show-ref.c:64:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int reflen = strlen(refname);
data/git-2.29.2+next.20201030/builtin/show-ref.c:67:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			int len = strlen(m);
data/git-2.29.2+next.20201030/builtin/show-ref.c:109:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int matchlen = match ? strlen(match) : 0;
data/git-2.29.2+next.20201030/builtin/show-ref.c:114:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int len = strlen(buf);
data/git-2.29.2+next.20201030/builtin/sparse-checkout.c:191:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(pattern))
data/git-2.29.2+next.20201030/builtin/stash.c:167:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	} else if (strspn(commit, "0123456789") == strlen(commit)) {
data/git-2.29.2+next.20201030/builtin/submodule--helper.c:147:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = strlen(remoteurl);
data/git-2.29.2+next.20201030/builtin/submodule--helper.c:395:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (!is_dir_sep(path[strlen(path) - 1]))
data/git-2.29.2+next.20201030/builtin/update-index.c:232:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int namelen = strlen(path);
data/git-2.29.2+next.20201030/builtin/update-index.c:373:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(path);
data/git-2.29.2+next.20201030/builtin/update-index.c:413:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(path);
data/git-2.29.2+next.20201030/builtin/update-index.c:437:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	pos = cache_name_pos(path, strlen(path));
data/git-2.29.2+next.20201030/builtin/update-index.c:628:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int namelen = strlen(path);
data/git-2.29.2+next.20201030/builtin/update-index.c:924:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				prefix, prefix ? strlen(prefix) : 0);
data/git-2.29.2+next.20201030/builtin/update-index.c:959:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int prefix_length = prefix ? strlen(prefix) : 0;
data/git-2.29.2+next.20201030/builtin/update-ref.c:418:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (input.buf[strlen(prefix)] != c)
data/git-2.29.2+next.20201030/builtin/update-ref.c:453:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		cmd->fn(transaction, input.buf + strlen(cmd->prefix) + !!cmd->args,
data/git-2.29.2+next.20201030/builtin/upload-archive.c:44:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strvec_push(&sent_argv, buf + strlen(arg_cmd));
data/git-2.29.2+next.20201030/builtin/upload-archive.c:68:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ssize_t sz = read(child_fd, buf, sizeof(buf));
data/git-2.29.2+next.20201030/builtin/var.c:32:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	const char *(*read)(int);
data/git-2.29.2+next.20201030/builtin/var.c:47:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	for (ptr = git_vars; ptr->read; ptr++)
data/git-2.29.2+next.20201030/builtin/var.c:48:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if ((val = ptr->read(0)))
data/git-2.29.2+next.20201030/builtin/var.c:57:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	for (ptr = git_vars; ptr->read; ptr++) {
data/git-2.29.2+next.20201030/builtin/var.c:59:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			val = ptr->read(IDENT_STRICT);
data/git-2.29.2+next.20201030/builtin/worktree.c:269:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(path);
data/git-2.29.2+next.20201030/builtin/worktree.c:661:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int cur_path_len = strlen(wt->path);
data/git-2.29.2+next.20201030/builtin/worktree.c:693:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int path_len = strlen(wt[i]->path);
data/git-2.29.2+next.20201030/builtin/worktree.c:697:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		sha1_len = strlen(find_unique_abbrev(&wt[i]->head_oid, *abbrev));
data/git-2.29.2+next.20201030/bundle.c:406:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (dwim_ref(e->name, strlen(e->name), &oid, &ref, 0) != 1)
data/git-2.29.2+next.20201030/bundle.c:466:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		write_or_die(bundle_fd, display_ref, strlen(display_ref));
data/git-2.29.2+next.20201030/bundle.c:502:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		write_or_die(bundle_fd, v2_bundle_signature, strlen(v2_bundle_signature));
data/git-2.29.2+next.20201030/bundle.c:505:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		write_or_die(bundle_fd, v3_bundle_signature, strlen(v3_bundle_signature));
data/git-2.29.2+next.20201030/bundle.c:506:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		write_or_die(bundle_fd, capability, strlen(capability));
data/git-2.29.2+next.20201030/bundle.c:507:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		write_or_die(bundle_fd, the_hash_algo->name, strlen(the_hash_algo->name));
data/git-2.29.2+next.20201030/cache-tree.c:98:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int pathlen = strlen(path);
data/git-2.29.2+next.20201030/cache-tree.c:190:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int this_len = strlen(this_name);
data/git-2.29.2+next.20201030/cache-tree.c:191:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (this_len < strlen(next_name) &&
data/git-2.29.2+next.20201030/cache.h:1830:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return write_in_full(fd, str, strlen(str));
data/git-2.29.2+next.20201030/color.c:193:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return color_parse_mem(value, strlen(value), dst);
data/git-2.29.2+next.20201030/column.c:44:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	data->cols = (data->opts.width - strlen(data->opts.indent)) / *width;
data/git-2.29.2+next.20201030/column.c:86:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		total_width = strlen(data->opts.indent);
data/git-2.29.2+next.20201030/column.c:257:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		name_len = strlen(opts[i].name);
data/git-2.29.2+next.20201030/combine-diff.c:22:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return base_name_compare(one->path, strlen(one->path), one->mode,
data/git-2.29.2+next.20201030/combine-diff.c:23:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				 two->path, strlen(two->path), two->mode);
data/git-2.29.2+next.20201030/combine-diff.c:48:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			len = strlen(path);
data/git-2.29.2+next.20201030/combine-diff.c:746:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(line);
data/git-2.29.2+next.20201030/commit.c:924:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	switch (dwim_ref(refname, strlen(refname), &oid, &full_refname, 0)) {
data/git-2.29.2+next.20201030/commit.c:982:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int gpg_sig_header_len = strlen(gpg_sig_header);
data/git-2.29.2+next.20201030/commit.c:1025:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int gpg_sig_header_len = strlen(gpg_sig_header);
data/git-2.29.2+next.20201030/commit.c:1249:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t xlen = strlen(*exclude);
data/git-2.29.2+next.20201030/commit.c:1567:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int key_len = strlen(key);
data/git-2.29.2+next.20201030/compat/apple-common-crypto.h:64:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return (int)strlen((const char *)out);
data/git-2.29.2+next.20201030/compat/apple-common-crypto.h:94:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return (int)strlen((const char *)out);
data/git-2.29.2+next.20201030/compat/inet_ntop.c:139:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			tp += strlen(tp);
data/git-2.29.2+next.20201030/compat/mingw.c:159:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t answer_len = strlen(answer);
data/git-2.29.2+next.20201030/compat/mingw.c:172:16:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			while ((c = getchar()) != EOF && c != '\n')
data/git-2.29.2+next.20201030/compat/mingw.c:567:8:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#undef fgetc
data/git-2.29.2+next.20201030/compat/mingw.c:572:10:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		return fgetc(stream);
data/git-2.29.2+next.20201030/compat/mingw.c:576:8:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ch = fgetc(stream);
data/git-2.29.2+next.20201030/compat/mingw.c:731:10:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int n = wcslen(wfilename);
data/git-2.29.2+next.20201030/compat/mingw.c:852:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	namelen = strlen(file_name);
data/git-2.29.2+next.20201030/compat/mingw.c:1012:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (xwcstoutf(template, wtemplate, strlen(template) + 1) < 0)
data/git-2.29.2+next.20201030/compat/mingw.c:1208:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	n = strlen(cmd);
data/git-2.29.2+next.20201030/compat/mingw.c:1215:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	n = read(fd, buf, sizeof(buf)-1);
data/git-2.29.2+next.20201030/compat/mingw.c:1252:8:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	wpath[wcslen(wpath)-4] = '\0';
data/git-2.29.2+next.20201030/compat/mingw.c:1255:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			path[strlen(path)-4] = '\0';
data/git-2.29.2+next.20201030/compat/mingw.c:1270:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len = strlen(cmd);
data/git-2.29.2+next.20201030/compat/mingw.c:1344:15:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			size_t s = wcslen(p) + 1;
data/git-2.29.2+next.20201030/compat/mingw.c:1362:7:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		s = wcslen(p) + 1;
data/git-2.29.2+next.20201030/compat/mingw.c:1370:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		delta_size += strlen(deltaenv[i]) * 2 + 1;
data/git-2.29.2+next.20201030/compat/mingw.c:1393:10:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size = wcslen(array[i]) + 1;
data/git-2.29.2+next.20201030/compat/mingw.c:1438:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t component_len = strlen(component);
data/git-2.29.2+next.20201030/compat/mingw.c:1466:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			size_t len = strlen(p);
data/git-2.29.2+next.20201030/compat/mingw.c:1894:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len_key = strlen(name) + 1;
data/git-2.29.2+next.20201030/compat/mingw.c:1932:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
	wchar_t *wide, *equal;
data/git-2.29.2+next.20201030/compat/mingw.c:1938:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size = strlen(namevalue) * 2 + 1;
data/git-2.29.2+next.20201030/compat/mingw.c:1944:7:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
	if (!equal)
data/git-2.29.2+next.20201030/compat/mingw.c:2462:55:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
int xutftowcsn(wchar_t *wcs, const char *utfs, size_t wcslen, int utflen)
data/git-2.29.2+next.20201030/compat/mingw.c:2466:22:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (!utf || !wcs || wcslen < 1) {
data/git-2.29.2+next.20201030/compat/mingw.c:2480:15:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (wpos >= wcslen) {
data/git-2.29.2+next.20201030/compat/mingw.c:2505:16:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				wpos + 1 < wcslen &&
data/git-2.29.2+next.20201030/compat/mingw.c:2526:15:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (wpos < wcslen)
data/git-2.29.2+next.20201030/compat/mingw.c:2844:11:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	maxlen = wcslen(wargv[0]);
data/git-2.29.2+next.20201030/compat/mingw.c:2846:24:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		maxlen = max(maxlen, wcslen(wargv[i]));
data/git-2.29.2+next.20201030/compat/mingw.h:232:9:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#define fgetc mingw_fgetc
data/git-2.29.2+next.20201030/compat/mingw.h:523:54:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
int xutftowcsn(wchar_t *wcs, const char *utf, size_t wcslen, int utflen);
data/git-2.29.2+next.20201030/compat/mingw.h:528:67:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
static inline int xutftowcs(wchar_t *wcs, const char *utf, size_t wcslen)
data/git-2.29.2+next.20201030/compat/mingw.h:530:30:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return xutftowcsn(wcs, utf, wcslen, -1);
data/git-2.29.2+next.20201030/compat/mkdir.c:9:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = strlen(dir);
data/git-2.29.2+next.20201030/compat/nedmalloc/malloc.c.h:761:32:  [1] (free) memalign:
  On some systems (though not Linux-based systems) an attempt to free()
  results from memalign() may fail. This may, on a few systems, be
  exploitable. Also note that memalign() may not check that the boundary
  parameter is correct (CWE-676). Use posix_memalign instead (defined in
  POSIX's 1003.1d). Don't switch to valloc(); it is marked as obsolete in BSD
  4.3, as legacy in SUSv2, and is no longer defined in SUSv3. In some cases,
  malloc()'s alignment may be sufficient.
#define dlmemalign             memalign
data/git-2.29.2+next.20201030/compat/nedmalloc/malloc.c.h:3079:4:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	  read(fd, buf, sizeof(buf)) == sizeof(buf)) {
data/git-2.29.2+next.20201030/compat/nedmalloc/nedmalloc.h:71:34:  [1] (free) memalign:
  On some systems (though not Linux-based systems) an attempt to free()
  results from memalign() may fail. This may, on a few systems, be
  exploitable. Also note that memalign() may not check that the boundary
  parameter is correct (CWE-676). Use posix_memalign instead (defined in
  POSIX's 1003.1d). Don't switch to valloc(); it is marked as obsolete in BSD
  4.3, as legacy in SUSv2, and is no longer defined in SUSv3. In some cases,
  malloc()'s alignment may be sufficient.
 #define nedmemalign             memalign
data/git-2.29.2+next.20201030/compat/precompose_utf8.c:118:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t namelenz = strlen(res->d_name) + 1; /* \0 */
data/git-2.29.2+next.20201030/compat/regex/regcomp.c:523:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ret = re_compile_internal (preg, pattern, strlen (pattern), syntax);
data/git-2.29.2+next.20201030/compat/regex/regcomp.c:569:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  msg_size = strlen (msg) + 1; /* Includes the null.  */
data/git-2.29.2+next.20201030/compat/regex/regcomp.c:725:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ret = re_compile_internal (&re_comp_buf, s, strlen (s), re_syntax_options);
data/git-2.29.2+next.20201030/compat/regex/regcomp.c:791:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy (dfa->re_str, pattern, length + 1);
data/git-2.29.2+next.20201030/compat/regex/regcomp.c:2650:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	   && strlen ((char *) start_elem->opr.name) > 1)
data/git-2.29.2+next.20201030/compat/regex/regcomp.c:2652:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	      && strlen ((char *) end_elem->opr.name) > 1), 0))
data/git-2.29.2+next.20201030/compat/regex/regcomp.c:2772:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t name_len = strlen ((const char *) name);
data/git-2.29.2+next.20201030/compat/regex/regcomp.c:2865:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  size_t sym_name_len = strlen ((char *) br_elem->opr.name);
data/git-2.29.2+next.20201030/compat/regex/regcomp.c:3001:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t name_len = strlen ((const char *) name);
data/git-2.29.2+next.20201030/compat/regex/regcomp.c:3461:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (BE (idx1 == 0 || cp < name + strlen ((const char *) name), 0))
data/git-2.29.2+next.20201030/compat/regex/regcomp.c:3514:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (BE (strlen ((const char *) name) != 1, 0))
data/git-2.29.2+next.20201030/compat/regex/regexec.c:240:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      length = strlen (string);
data/git-2.29.2+next.20201030/compat/setenv.c:19:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	namelen = strlen(name);
data/git-2.29.2+next.20201030/compat/setenv.c:20:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	valuelen = strlen(value);
data/git-2.29.2+next.20201030/compat/strcasestr.c:5:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int nlen = strlen(needle);
data/git-2.29.2+next.20201030/compat/strcasestr.c:6:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int hlen = strlen(haystack) - nlen + 1;
data/git-2.29.2+next.20201030/compat/strdup.c:5:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = strlen(s1) + 1;
data/git-2.29.2+next.20201030/compat/strlcpy.c:5:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t ret = strlen(src);
data/git-2.29.2+next.20201030/compat/terminal.c:184:57:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (!ReadFile(GetStdHandle(STD_INPUT_HANDLE), &ch, 1, &read, NULL))
data/git-2.29.2+next.20201030/compat/terminal.c:187:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (!read) {
data/git-2.29.2+next.20201030/compat/terminal.c:194:9:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#define getchar mingw_getchar
data/git-2.29.2+next.20201030/compat/terminal.c:323:7:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ch = getchar();
data/git-2.29.2+next.20201030/compat/terminal.c:351:9:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			ch = getchar();
data/git-2.29.2+next.20201030/compat/unsetenv.c:11:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     nmln = strlen(name);
data/git-2.29.2+next.20201030/compat/unsetenv.c:15:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  enln = strlen(environ[src]);
data/git-2.29.2+next.20201030/compat/win32/syslog.c:53:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		memmove(pos + 2, pos + 1, strlen(pos));
data/git-2.29.2+next.20201030/compat/winansi.c:79:31:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		WriteConsoleW(console, msg, wcslen(msg), &dummy, NULL);
data/git-2.29.2+next.20201030/compat/winansi.c:141:31:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		WriteConsoleW(console, err, wcslen(err), &dummy, NULL);
data/git-2.29.2+next.20201030/config.c:396:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		*store_key = xmallocz(strlen(key));
data/git-2.29.2+next.20201030/config.c:3163:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				store.baselen = strlen(new_name);
data/git-2.29.2+next.20201030/config.c:3175:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					if (strlen(output) > 0) {
data/git-2.29.2+next.20201030/config.c:3193:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		length = strlen(output);
data/git-2.29.2+next.20201030/connect.c:227:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int nul_location = strlen(line);
data/git-2.29.2+next.20201030/connect.c:262:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(line) != len)
data/git-2.29.2+next.20201030/connect.c:264:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			line + strlen(line));
data/git-2.29.2+next.20201030/connect.c:519:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(feature);
data/git-2.29.2+next.20201030/connect.c:567:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(hash);
data/git-2.29.2+next.20201030/connect.c:884:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int rhost_len = strlen(rhost_name);
data/git-2.29.2+next.20201030/connect.c:899:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			matchlen = strlen(value);
data/git-2.29.2+next.20201030/connect.c:901:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			hostlen = strlen(for_pos + 5);
data/git-2.29.2+next.20201030/contrib/credential/gnome-keyring/git-credential-gnome-keyring.c:356:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		line_len = strlen(buf);
data/git-2.29.2+next.20201030/contrib/credential/libsecret/git-credential-libsecret.c:255:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		line_len = strlen(buf);
data/git-2.29.2+next.20201030/contrib/credential/osxkeychain/git-credential-osxkeychain.c:32:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define KEYCHAIN_ITEM(x) (x ? strlen(x) : 0), x
data/git-2.29.2+next.20201030/contrib/credential/osxkeychain/git-credential-osxkeychain.c:122:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		buf[strlen(buf)-1] = '\0';
data/git-2.29.2+next.20201030/contrib/credential/wincred/git-credential-wincred.c:139:23:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		delim_pos = start + wcslen(start);
data/git-2.29.2+next.20201030/contrib/credential/wincred/git-credential-wincred.c:148:9:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = wcslen(start);
data/git-2.29.2+next.20201030/contrib/credential/wincred/git-credential-wincred.c:152:38:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		*ptarget = delim_pos ? delim_pos + wcslen(delim) : start + len;
data/git-2.29.2+next.20201030/contrib/credential/wincred/git-credential-wincred.c:193:26:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				creds[i]->UserName ? wcslen(creds[i]->UserName) : 0);
data/git-2.29.2+next.20201030/contrib/credential/wincred/git-credential-wincred.c:214:29:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cred.CredentialBlobSize = (wcslen(password)) * sizeof(WCHAR);
data/git-2.29.2+next.20201030/contrib/credential/wincred/git-credential-wincred.c:257:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int len = strlen(buf);
data/git-2.29.2+next.20201030/contrib/credential/wincred/git-credential-wincred.c:306:2:  [1] (buffer) wcsncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, or
  automatically resizing strings.
	wcsncat(target, protocol, ARRAY_SIZE(target));
data/git-2.29.2+next.20201030/contrib/credential/wincred/git-credential-wincred.c:307:2:  [1] (buffer) wcsncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, or
  automatically resizing strings. Risk is low because the source is a
  constant string.
	wcsncat(target, L"://", ARRAY_SIZE(target));
data/git-2.29.2+next.20201030/contrib/credential/wincred/git-credential-wincred.c:309:3:  [1] (buffer) wcsncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, or
  automatically resizing strings.
		wcsncat(target, wusername, ARRAY_SIZE(target));
data/git-2.29.2+next.20201030/contrib/credential/wincred/git-credential-wincred.c:310:3:  [1] (buffer) wcsncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, or
  automatically resizing strings. Risk is low because the source is a
  constant character.
		wcsncat(target, L"@", ARRAY_SIZE(target));
data/git-2.29.2+next.20201030/contrib/credential/wincred/git-credential-wincred.c:313:3:  [1] (buffer) wcsncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, or
  automatically resizing strings.
		wcsncat(target, host, ARRAY_SIZE(target));
data/git-2.29.2+next.20201030/contrib/credential/wincred/git-credential-wincred.c:315:3:  [1] (buffer) wcsncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, or
  automatically resizing strings. Risk is low because the source is a
  constant character.
		wcsncat(target, L"/", ARRAY_SIZE(target));
data/git-2.29.2+next.20201030/contrib/credential/wincred/git-credential-wincred.c:316:3:  [1] (buffer) wcsncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, or
  automatically resizing strings.
		wcsncat(target, path, ARRAY_SIZE(target));
data/git-2.29.2+next.20201030/convert.c:294:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			int stripped_len = strlen(stripped) - strlen("BE");
data/git-2.29.2+next.20201030/convert.c:294:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			int stripped_len = strlen(stripped) - strlen("BE");
data/git-2.29.2+next.20201030/convert.c:357:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	next = found + strlen(enc_name);
data/git-2.29.2+next.20201030/convert.c:358:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(check_roundtrip_encoding);
data/git-2.29.2+next.20201030/convert.c:841:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	assert(strlen(filter_type) < LARGE_PACKET_DATA_MAX - strlen("command=\n"));
data/git-2.29.2+next.20201030/convert.c:841:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	assert(strlen(filter_type) < LARGE_PACKET_DATA_MAX - strlen("command=\n"));
data/git-2.29.2+next.20201030/convert.c:846:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	err = strlen(path) > LARGE_PACKET_DATA_MAX - strlen("pathname=\n");
data/git-2.29.2+next.20201030/convert.c:846:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	err = strlen(path) > LARGE_PACKET_DATA_MAX - strlen("pathname=\n");
data/git-2.29.2+next.20201030/convert.c:1236:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (ATTR_UNSET(value) || !strlen(value))
data/git-2.29.2+next.20201030/credential.c:482:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		p = c->path + strlen(c->path) - 1;
data/git-2.29.2+next.20201030/daemon.c:195:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			int namlen, restlen = strlen(dir);
data/git-2.29.2+next.20201030/daemon.c:271:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int pathlen = strlen(path);
data/git-2.29.2+next.20201030/daemon.c:281:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			int len = strlen(*pp);
data/git-2.29.2+next.20201030/daemon.c:613:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			vallen = strlen(val) + 1;
data/git-2.29.2+next.20201030/daemon.c:646:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	for (; extra_args < end; extra_args += strlen(extra_args) + 1) {
data/git-2.29.2+next.20201030/daemon.c:776:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(line);
data/git-2.29.2+next.20201030/date.c:472:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (match >= 3 || match == strlen(timezone_names[i].name)) {
data/git-2.29.2+next.20201030/date.c:1186:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int len = strlen(s->name);
data/git-2.29.2+next.20201030/date.c:1196:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			int len = strlen(number_name[i]);
data/git-2.29.2+next.20201030/date.c:1212:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int len = strlen(tl->type);
data/git-2.29.2+next.20201030/diff.c:1350:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			    nneof, strlen(nneof));
data/git-2.29.2+next.20201030/diff.c:1555:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			  strlen(" 0 files changed\n"));
data/git-2.29.2+next.20201030/diff.c:1558:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		emit_line(o, "", "", " ...\n", strlen(" ...\n"));
data/git-2.29.2+next.20201030/diff.c:1585:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	emit_diff_symbol(o, DIFF_SYMBOL_SUBMODULE_DEL, line, strlen(line), 0);
data/git-2.29.2+next.20201030/diff.c:1590:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	emit_diff_symbol(o, DIFF_SYMBOL_SUBMODULE_ADD, line, strlen(line), 0);
data/git-2.29.2+next.20201030/diff.c:1596:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			 path, strlen(path), 0);
data/git-2.29.2+next.20201030/diff.c:1602:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			 path, strlen(path), 0);
data/git-2.29.2+next.20201030/diff.c:1608:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			 header, strlen(header), 0);
data/git-2.29.2+next.20201030/diff.c:1613:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	emit_diff_symbol(o, DIFF_SYMBOL_SUBMODULE_ERROR, err, strlen(err), 0);
data/git-2.29.2+next.20201030/diff.c:2140:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				 line_prefix, strlen(line_prefix), 0);
data/git-2.29.2+next.20201030/diff.c:2168:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					 line_prefix, strlen(line_prefix), 0);
data/git-2.29.2+next.20201030/diff.c:2358:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				 strlen(ecbdata->label_path[0]), 0);
data/git-2.29.2+next.20201030/diff.c:2361:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				 strlen(ecbdata->label_path[1]), 0);
data/git-2.29.2+next.20201030/diff.c:2436:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len_a = strlen(a);
data/git-2.29.2+next.20201030/diff.c:2437:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len_b = strlen(b);
data/git-2.29.2+next.20201030/diff.c:2664:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(file->print_name);
data/git-2.29.2+next.20201030/diff.c:2718:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		width = term_columns() - strlen(line_prefix);
data/git-2.29.2+next.20201030/diff.c:2787:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		name_len = strlen(name);
data/git-2.29.2+next.20201030/diff.c:2965:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int namelen = strlen(f->name);
data/git-2.29.2+next.20201030/diff.c:3306:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				 s, strlen(s), 0);
data/git-2.29.2+next.20201030/diff.c:3314:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				 s, strlen(s), 0);
data/git-2.29.2+next.20201030/diff.c:3335:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(line);
data/git-2.29.2+next.20201030/diff.c:3904:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(name);
data/git-2.29.2+next.20201030/diff.c:4141:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	temp->tempfile = mks_tempfile_ts(tempfile.buf, strlen(base) + 1);
data/git-2.29.2+next.20201030/diff.c:4645:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		options->prefix_length = strlen(options->prefix);
data/git-2.29.2+next.20201030/diff.c:5156:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	options->line_prefix_length = strlen(options->line_prefix);
data/git-2.29.2+next.20201030/diff.c:5706:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	abblen = strlen(abbrev);
data/git-2.29.2+next.20201030/diff.c:6109:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	the_hash_algo->update_fn(ctx, str, strlen(str));
data/git-2.29.2+next.20201030/diff.c:6157:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len1 = remove_space(p->one->path, strlen(p->one->path));
data/git-2.29.2+next.20201030/diff.c:6158:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len2 = remove_space(p->two->path, strlen(p->two->path));
data/git-2.29.2+next.20201030/diffcore-pickaxe.c:255:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			kwsincr(kws, needle, strlen(needle));
data/git-2.29.2+next.20201030/diffcore-rename.c:113:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int src_len = strlen(src->path), dst_len = strlen(dst->path);
data/git-2.29.2+next.20201030/diffcore-rename.c:113:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int src_len = strlen(src->path), dst_len = strlen(dst->path);
data/git-2.29.2+next.20201030/dir.c:92:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int pattern_len = strlen(++pattern);
data/git-2.29.2+next.20201030/dir.c:93:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int string_len = strlen(string);
data/git-2.29.2+next.20201030/dir.c:538:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						strlen(submodule_name),
data/git-2.29.2+next.20201030/dir.c:618:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(p);
data/git-2.29.2+next.20201030/dir.c:664:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	char *set, *read;
data/git-2.29.2+next.20201030/dir.c:671:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while (*read) {
data/git-2.29.2+next.20201030/dir.c:676:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		*set = *read;
data/git-2.29.2+next.20201030/dir.c:902:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(path);
data/git-2.29.2+next.20201030/dir.c:976:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (!cmp && strlen(d->name) > len)
data/git-2.29.2+next.20201030/dir.c:1095:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				 (pos = index_name_pos(istate, fname, strlen(fname))) >= 0 &&
data/git-2.29.2+next.20201030/dir.c:1599:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int pathlen = strlen(pathname);
data/git-2.29.2+next.20201030/dir.c:3132:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	strbuf_add(out, untracked->name, strlen(untracked->name) + 1);
data/git-2.29.2+next.20201030/dir.c:3136:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			   strlen(untracked->untracked[i]) + 1);
data/git-2.29.2+next.20201030/dir.c:3163:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	strbuf_add(out, untracked->exclude_per_dir, strlen(untracked->exclude_per_dir) + 1);
data/git-2.29.2+next.20201030/dir.c:3375:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	next += exclude_per_dir_offset + strlen(exclude_per_dir) + 1;
data/git-2.29.2+next.20201030/dir.c:3490:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				 path, strlen(path));
data/git-2.29.2+next.20201030/entry.c:226:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						       strlen(path->string), 0);
data/git-2.29.2+next.20201030/exec-cmd.c:155:12:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len = wcslen(_wpgmptr) * 3 + 1;
data/git-2.29.2+next.20201030/fmt-merge-msg.c:106:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int i, len = strlen(line);
data/git-2.29.2+next.20201030/fmt-merge-msg.c:183:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int len = strlen(origin);
data/git-2.29.2+next.20201030/fmt-merge-msg.c:242:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	name += strlen(field);
data/git-2.29.2+next.20201030/fmt-merge-msg.c:539:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						strlen(origins.items[first_tag].string));
data/git-2.29.2+next.20201030/fmt-merge-msg.c:547:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					strlen(origins.items[i].string));
data/git-2.29.2+next.20201030/fmt-merge-msg.c:578:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = newline ? newline - p : strlen(p);
data/git-2.29.2+next.20201030/fmt-merge-msg.c:652:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = newline ? newline - p : strlen(p);
data/git-2.29.2+next.20201030/fsck.c:117:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int len = strlen(p);
data/git-2.29.2+next.20201030/fsck.c:235:34:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
		int len = strcspn(buf, " ,|"), equal;
data/git-2.29.2+next.20201030/fsck.c:245:8:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
		     equal < len && buf[equal] != '=' && buf[equal] != ':';
data/git-2.29.2+next.20201030/fsck.c:245:27:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
		     equal < len && buf[equal] != '=' && buf[equal] != ':';
data/git-2.29.2+next.20201030/fsck.c:245:48:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
		     equal < len && buf[equal] != '=' && buf[equal] != ':';
data/git-2.29.2+next.20201030/fsck.c:247:8:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
			buf[equal] = tolower(buf[equal]);
data/git-2.29.2+next.20201030/fsck.c:247:29:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
			buf[equal] = tolower(buf[equal]);
data/git-2.29.2+next.20201030/fsck.c:248:7:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
		buf[equal] = '\0';
data/git-2.29.2+next.20201030/fsck.c:453:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int len = strlen(name), power;
data/git-2.29.2+next.20201030/fsck.c:570:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len1 = strlen(name1);
data/git-2.29.2+next.20201030/fsck.c:571:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len2 = strlen(name2);
data/git-2.29.2+next.20201030/fsck.c:1067:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			url += strlen("../");
data/git-2.29.2+next.20201030/fsck.c:1071:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			url += strlen("./");
data/git-2.29.2+next.20201030/fsmonitor.c:160:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int pos = index_name_pos(istate, name, strlen(name));
data/git-2.29.2+next.20201030/gettext.c:207:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return is_utf8 ? utf8_strwidth(s) : strlen(s);
data/git-2.29.2+next.20201030/gettext.h:43:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return strlen(s);
data/git-2.29.2+next.20201030/git-compat-util.h:563:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t prefix_len = strlen(prefix);
data/git-2.29.2+next.20201030/git-compat-util.h:579:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t suflen = strlen(suffix);
data/git-2.29.2+next.20201030/git-compat-util.h:595:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	*len = strlen(str);
data/git-2.29.2+next.20201030/git-compat-util.h:962:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	FLEX_ALLOC_MEM((x), flexname, (str), strlen(str))
data/git-2.29.2+next.20201030/git-compat-util.h:964:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	FLEXPTR_ALLOC_MEM((x), ptrname, (str), strlen(str))
data/git-2.29.2+next.20201030/git-compat-util.h:1248:27:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#define getc_unlocked(fh) getc(fh)
data/git-2.29.2+next.20201030/git.c:58:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int token_len = strlen(token);
data/git-2.29.2+next.20201030/git.c:657:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			add_cmdname(cmds, name, strlen(name));
data/git-2.29.2+next.20201030/graph.c:90:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	end = string + strlen(string);
data/git-2.29.2+next.20201030/graph.c:136:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	line->width += strlen(s);
data/git-2.29.2+next.20201030/grep.c:192:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	opt->prefix_length = (prefix && *prefix) ? strlen(prefix) : 0;
data/git-2.29.2+next.20201030/grep.c:339:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	struct grep_pat *p = create_grep_pat(pat, strlen(pat), "header", 0,
data/git-2.29.2+next.20201030/grep.c:349:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	append_grep_pat(opt, pat, strlen(pat), origin, no, t);
data/git-2.29.2+next.20201030/grep.c:674:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	       const int no_jit_len = strlen(no_jit);
data/git-2.29.2+next.20201030/grep.c:1121:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		opt->output(opt, color, strlen(color));
data/git-2.29.2+next.20201030/grep.c:1123:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		opt->output(opt, GIT_COLOR_RESET, strlen(GIT_COLOR_RESET));
data/git-2.29.2+next.20201030/grep.c:1138:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	output_color(opt, name, strlen(name), opt->colors[GREP_COLOR_FILENAME]);
data/git-2.29.2+next.20201030/grep.c:1423:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		output_color(opt, name, strlen(name), opt->colors[GREP_COLOR_FILENAME]);
data/git-2.29.2+next.20201030/grep.c:1429:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		output_color(opt, name, strlen(name), opt->colors[GREP_COLOR_FILENAME]);
data/git-2.29.2+next.20201030/grep.c:1435:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		output_color(opt, buf, strlen(buf), opt->colors[GREP_COLOR_LINENO]);
data/git-2.29.2+next.20201030/grep.c:1446:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		output_color(opt, buf, strlen(buf), opt->colors[GREP_COLOR_COLUMNNO]);
data/git-2.29.2+next.20201030/grep.c:1918:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				output_color(opt, gs->name, strlen(gs->name),
data/git-2.29.2+next.20201030/grep.c:2003:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			output_color(opt, gs->name, strlen(gs->name),
data/git-2.29.2+next.20201030/grep.c:2008:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		opt->output(opt, buf, strlen(buf));
data/git-2.29.2+next.20201030/hashmap.h:544:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return memintern(string, strlen(string));
data/git-2.29.2+next.20201030/help.c:86:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			size_t len = strlen(cmds[i].name);
data/git-2.29.2+next.20201030/help.c:117:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (longest < strlen(cmds[i].name))
data/git-2.29.2+next.20201030/help.c:118:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			longest = strlen(cmds[i].name);
data/git-2.29.2+next.20201030/help.c:250:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		entlen = strlen(ent);
data/git-2.29.2+next.20201030/help.c:443:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t len = strlen(alias_list.items[i].string);
data/git-2.29.2+next.20201030/help.c:483:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		add_cmdname(&aliases, p, strlen(p));
data/git-2.29.2+next.20201030/http-backend.c:594:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t objdirlen = strlen(get_object_directory());
data/git-2.29.2+next.20201030/http-push.c:779:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			the_hash_algo->update_fn(&hash_ctx, lock->token, strlen(lock->token));
data/git-2.29.2+next.20201030/http-push.c:802:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	old_namelen = strlen(ctx->name);
data/git-2.29.2+next.20201030/http-push.c:803:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	new_len = old_namelen + strlen(c) + 2;
data/git-2.29.2+next.20201030/http-push.c:830:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ep = ctx->name + strlen(ctx->name) - strlen(c) - 1;
data/git-2.29.2+next.20201030/http-push.c:830:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ep = ctx->name + strlen(ctx->name) - strlen(c) - 1;
data/git-2.29.2+next.20201030/http-push.c:859:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ep = strchr(url + strlen(repo->url) + 1, '/');
data/git-2.29.2+next.20201030/http-push.c:1025:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(path) != the_hash_algo->hexsz + 1)
data/git-2.29.2+next.20201030/http-push.c:1592:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int patlen = strlen(pattern);
data/git-2.29.2+next.20201030/http-push.c:1601:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int namelen = strlen(name);
data/git-2.29.2+next.20201030/http-push.c:1759:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			repo->path_len = strlen(repo->url);
data/git-2.29.2+next.20201030/http-push.c:1763:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					repo->path_len = strlen(repo->path);
data/git-2.29.2+next.20201030/http-walker.c:295:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				serverlen = strlen(base);
data/git-2.29.2+next.20201030/http-walker.c:611:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	for (s = data->alt->base + strlen(data->alt->base) - 1; *s == '/'; --s)
data/git-2.29.2+next.20201030/http.c:685:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				cookie = semicolon + strlen("; ");
data/git-2.29.2+next.20201030/http.c:712:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strbuf_insertstr((*header), strlen(text), ": ");
data/git-2.29.2+next.20201030/http.c:1270:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		memset(proxy_auth.password, 0, strlen(proxy_auth.password));
data/git-2.29.2+next.20201030/http.c:1281:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		memset(cert_auth.password, 0, strlen(cert_auth.password));
data/git-2.29.2+next.20201030/http.c:1287:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		memset(proxy_cert_auth.password, 0, strlen(proxy_cert_auth.password));
data/git-2.29.2+next.20201030/http.c:1718:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = strlen(name);
data/git-2.29.2+next.20201030/ident.c:238:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(src);
data/git-2.29.2+next.20201030/imap-send.c:256:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			    strlen((const char *)subj_alt_name->d.ia5->data) == (size_t)subj_alt_name->d.ia5->length &&
data/git-2.29.2+next.20201030/imap-send.c:270:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(cname) == (size_t)len && host_matches(hostname, cname))
data/git-2.29.2+next.20201030/imap-send.c:886:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	encoded_len = strlen(challenge_64);
data/git-2.29.2+next.20201030/imap-send.c:892:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (!HMAC(EVP_md5(), pass, strlen(pass), (unsigned char *)challenge, decoded_len, hash, NULL))
data/git-2.29.2+next.20201030/imap-send.c:903:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	resp_len = strlen(response);
data/git-2.29.2+next.20201030/imap-send.c:930:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ret = socket_write(&ctx->imap->buf.sock, response, strlen(response));
data/git-2.29.2+next.20201030/imap-send.c:931:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (ret != strlen(response))
data/git-2.29.2+next.20201030/levenshtein.c:44:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len1 = strlen(string1), len2 = strlen(string2);
data/git-2.29.2+next.20201030/levenshtein.c:44:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len1 = strlen(string1), len2 = strlen(string2);
data/git-2.29.2+next.20201030/line-log.c:586:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		full_name = prefix_path(prefix, prefix ? strlen(prefix) : 0,
data/git-2.29.2+next.20201030/line-log.c:1169:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		fill_bloom_key(range->path, strlen(range->path), &key, rev->bloom_filter_settings);
data/git-2.29.2+next.20201030/list-objects-filter.c:377:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		match = path_matches_pattern_list(pathname, strlen(pathname),
data/git-2.29.2+next.20201030/list-objects-filter.c:439:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		match = path_matches_pattern_list(pathname, strlen(pathname),
data/git-2.29.2+next.20201030/log-tree.c:147:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (get_oid_hex(refname + strlen(git_replace_ref_base),
data/git-2.29.2+next.20201030/log-tree.c:370:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int max_len = start_len + FORMAT_PATCH_NAME_MAX - (strlen(suffix) + 1);
data/git-2.29.2+next.20201030/mailinfo.c:227:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ap += strlen(name);
data/git-2.29.2+next.20201030/mailinfo.c:367:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (len != strlen(SAMPLE))
data/git-2.29.2+next.20201030/mailinfo.c:374:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return !memcmp(SAMPLE + (cp - line), cp, strlen(SAMPLE) - (cp - line));
data/git-2.29.2+next.20201030/mailinfo.c:914:10:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		peek = fgetc(in);
data/git-2.29.2+next.20201030/mailinfo.c:1117:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			len = strlen(sp);
data/git-2.29.2+next.20201030/mailinfo.c:1187:10:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		peek = fgetc(mi->input);
data/git-2.29.2+next.20201030/mailmap.c:153:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int len = strlen(buffer);
data/git-2.29.2+next.20201030/mailmap.c:350:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				*emaillen = strlen(*email);
data/git-2.29.2+next.20201030/mailmap.c:354:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				*namelen = strlen(*name);
data/git-2.29.2+next.20201030/match-trees.c:202:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(name) == toplen &&
data/git-2.29.2+next.20201030/match-trees.c:218:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
							 strlen(desc.entry.path) +
data/git-2.29.2+next.20201030/mem-pool.c:102:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = strlen(str) + 1;
data/git-2.29.2+next.20201030/merge-recursive.c:547:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int onelen = strlen(one);
data/git-2.29.2+next.20201030/merge-recursive.c:548:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int twolen = strlen(two);
data/git-2.29.2+next.20201030/merge-recursive.c:612:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int len = strlen(path);
data/git-2.29.2+next.20201030/merge-recursive.c:702:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			ce = index_file_exists(opt->repo->index, path, strlen(path),
data/git-2.29.2+next.20201030/merge-recursive.c:778:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		!has_symlink_leading_path(path, strlen(path));
data/git-2.29.2+next.20201030/merge-recursive.c:788:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int pos = index_name_pos(&opt->priv->orig_index, path, strlen(path));
data/git-2.29.2+next.20201030/merge-recursive.c:805:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int pos = index_name_pos(&opt->priv->orig_index, path, strlen(path));
data/git-2.29.2+next.20201030/merge-recursive.c:835:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int pos = index_name_pos(istate, path, strlen(path));
data/git-2.29.2+next.20201030/merge-recursive.c:866:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			       path, strlen(path), ignore_case);
data/git-2.29.2+next.20201030/merge-recursive.c:879:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t pathlen = strlen(path);
data/git-2.29.2+next.20201030/merge-recursive.c:880:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t df_pathlen = strlen(df_path);
data/git-2.29.2+next.20201030/merge-recursive.c:1907:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	oldlen = strlen(entry->dir);
data/git-2.29.2+next.20201030/merge-recursive.c:1918:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	newlen = entry->new_dir.len + (strlen(old_path) - oldlen) + 1;
data/git-2.29.2+next.20201030/merge-recursive.c:3089:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		pos = index_name_pos(&opt->priv->orig_index, path, strlen(path));
data/git-2.29.2+next.20201030/merge-recursive.c:3092:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			pos = index_name_pos(opt->repo->index, path, strlen(path));
data/git-2.29.2+next.20201030/merge-recursive.c:3738:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			   name, strlen(name));
data/git-2.29.2+next.20201030/midx.c:177:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		cur_pack_name += strlen(cur_pack_name) + 1;
data/git-2.29.2+next.20201030/midx.c:665:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		writelen = strlen(info[i].pack_name) + 1;
data/git-2.29.2+next.20201030/midx.c:915:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			pack_name_concat_len += strlen(packs.info[i].pack_name) + 1;
data/git-2.29.2+next.20201030/notes-cache.c:63:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (commit_tree(c->validity, strlen(c->validity), &tree_oid, NULL,
data/git-2.29.2+next.20201030/notes-merge.c:728:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			    strlen(msg), result_oid);
data/git-2.29.2+next.20201030/notes.c:416:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t path_len = strlen(entry.path);
data/git-2.29.2+next.20201030/notes.c:691:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t path_len = strlen(path);
data/git-2.29.2+next.20201030/notes.c:758:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t note_path_len = strlen(note_path);
data/git-2.29.2+next.20201030/notes.c:1273:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			msglen = strlen(msg);
data/git-2.29.2+next.20201030/object.c:43:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(str);
data/git-2.29.2+next.20201030/packfile.c:236:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t alloc = st_add(strlen(path), 1);
data/git-2.29.2+next.20201030/packfile.c:712:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	alloc = st_add3(path_len, strlen(".promisor"), 1);
data/git-2.29.2+next.20201030/parse-options.c:416:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(arg) < 3)
data/git-2.29.2+next.20201030/parse-options.c:488:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    strcspn(opts->argh, " _") != strlen(opts->argh))
data/git-2.29.2+next.20201030/path.c:73:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len = strlen(dir);
data/git-2.29.2+next.20201030/path.c:81:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len = strlen(dir);
data/git-2.29.2+next.20201030/path.c:91:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int newlen = strlen(newdir);
data/git-2.29.2+next.20201030/path.c:168:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	new_node->len = strlen(key);
data/git-2.29.2+next.20201030/path.c:404:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			      repo->graft_file, strlen(repo->graft_file));
data/git-2.29.2+next.20201030/path.c:407:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			      repo->index_file, strlen(repo->index_file));
data/git-2.29.2+next.20201030/path.c:797:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int len = strlen(path);
data/git-2.29.2+next.20201030/path.c:818:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			strbuf_attach(&used_path, newpath, strlen(newpath),
data/git-2.29.2+next.20201030/path.c:819:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				      strlen(newpath));
data/git-2.29.2+next.20201030/path.c:937:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int in_len = in ? strlen(in) : 0;
data/git-2.29.2+next.20201030/path.c:938:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int prefix_len = prefix ? strlen(prefix) : 0;
data/git-2.29.2+next.20201030/path.c:1219:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int len = strlen(ceil);
data/git-2.29.2+next.20201030/path.c:1250:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int path_len = strlen(path), suffix_len = strlen(suffix);
data/git-2.29.2+next.20201030/path.c:1250:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int path_len = strlen(path), suffix_len = strlen(suffix);
data/git-2.29.2+next.20201030/path.c:1477:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return is_ntfs_dot_generic(name, dotgit_name, strlen(dotgit_name),
data/git-2.29.2+next.20201030/pathspec.c:126:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ret = xmallocz(strlen(value));
data/git-2.29.2+next.20201030/pathspec.c:172:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			attr_len = strlen(attr);
data/git-2.29.2+next.20201030/pathspec.c:177:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			attr_len = strlen(attr);
data/git-2.29.2+next.20201030/pathspec.c:319:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (strlen(pathspec_magic[i].name) == len &&
data/git-2.29.2+next.20201030/pathspec.c:451:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	item->len = strlen(item->match);
data/git-2.29.2+next.20201030/pathspec.c:567:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		item->nowildcard_len = item->len = strlen(prefix);
data/git-2.29.2+next.20201030/pathspec.c:584:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	prefixlen = prefix ? strlen(prefix) : 0;
data/git-2.29.2+next.20201030/pkt-line.c:56:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(buf);
data/git-2.29.2+next.20201030/pretty.c:137:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		match_len = strlen(commit_formats[i].name);
data/git-2.29.2+next.20201030/pretty.c:373:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	strbuf_grow(sb, len * 3 + strlen(encoding) + 100);
data/git-2.29.2+next.20201030/pretty.c:375:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	line_len += strlen(encoding) + 5; /* 5 for =??q? */
data/git-2.29.2+next.20201030/pretty.c:404:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			line_len = strlen(encoding) + 5 + 1; /* =??q? plus SP */
data/git-2.29.2+next.20201030/pretty.c:494:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    last_line_length(sb) + strlen(" <") + maillen + strlen(">"))
data/git-2.29.2+next.20201030/pretty.c:494:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    last_line_length(sb) + strlen(" <") + maillen + strlen(">"))
data/git-2.29.2+next.20201030/pretty.c:594:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	strbuf_attach(&tmp, buf, strlen(buf), strlen(buf) + 1);
data/git-2.29.2+next.20201030/pretty.c:594:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	strbuf_attach(&tmp, buf, strlen(buf), strlen(buf) + 1);
data/git-2.29.2+next.20201030/pretty.c:600:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strbuf_splice(&tmp, start + strlen("encoding "),
data/git-2.29.2+next.20201030/pretty.c:601:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					  len - strlen("encoding \n"),
data/git-2.29.2+next.20201030/pretty.c:602:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					  encoding, strlen(encoding));
data/git-2.29.2+next.20201030/pretty.c:953:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return format_person_part(sb, part, ident, strlen(ident), dmode);
data/git-2.29.2+next.20201030/quote.c:373:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	quote_c_style_counted(rel, strlen(rel), out, NULL,
data/git-2.29.2+next.20201030/range-diff.c:168:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				   line[strlen(line) - 1] == ':') {
data/git-2.29.2+next.20201030/range-diff.c:172:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					    (int)(strlen(line) - 1), line);
data/git-2.29.2+next.20201030/range-diff.c:291:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	mf1.size = strlen(a);
data/git-2.29.2+next.20201030/range-diff.c:293:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	mf2.size = strlen(b);
data/git-2.29.2+next.20201030/range-diff.c:384:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				strlen(find_unique_abbrev(oid,
data/git-2.29.2+next.20201030/range-diff.c:445:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	spec->size = strlen(p);
data/git-2.29.2+next.20201030/read-cache.c:125:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int namelen = strlen(new_name);
data/git-2.29.2+next.20201030/read-cache.c:621:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int pos = index_name_pos(istate, path, strlen(path));
data/git-2.29.2+next.20201030/read-cache.c:722:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	namelen = strlen(path);
data/git-2.29.2+next.20201030/read-cache.c:836:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(path);
data/git-2.29.2+next.20201030/read-cache.c:862:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(path);
data/git-2.29.2+next.20201030/read-cache.c:1816:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(name);
data/git-2.29.2+next.20201030/read-cache.c:3367:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(path);
data/git-2.29.2+next.20201030/rebase-interactive.c:69:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	strbuf_add_commented_lines(buf, msg, strlen(msg));
data/git-2.29.2+next.20201030/rebase-interactive.c:78:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	strbuf_add_commented_lines(buf, msg, strlen(msg));
data/git-2.29.2+next.20201030/rebase-interactive.c:89:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	strbuf_add_commented_lines(buf, msg, strlen(msg));
data/git-2.29.2+next.20201030/ref-filter.c:589:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int len = strlen(used_atom[i].name);
data/git-2.29.2+next.20201030/ref-filter.c:605:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int len = strlen(valid_atom[i].name);
data/git-2.29.2+next.20201030/ref-filter.c:1156:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int wholen = strlen(who);
data/git-2.29.2+next.20201030/ref-filter.c:1231:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	*sig = buf + parse_signature(buf, strlen(buf));
data/git-2.29.2+next.20201030/ref-filter.c:1232:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	*siglen = strlen(*sig);
data/git-2.29.2+next.20201030/ref-filter.c:1255:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	*bodylen = strlen(buf);
data/git-2.29.2+next.20201030/ref-filter.c:1318:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			v->s = xstrfmt("%"PRIuMAX, (uintmax_t)strlen(subpos));
data/git-2.29.2+next.20201030/ref-filter.c:1900:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int namelen = strlen(refname);
data/git-2.29.2+next.20201030/ref-filter.c:1908:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int plen = strlen(p);
data/git-2.29.2+next.20201030/ref-filter.c:2459:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		sp = cp + strlen(cp);
data/git-2.29.2+next.20201030/ref-filter.c:2510:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const char *end = atom + strlen(atom);
data/git-2.29.2+next.20201030/reflog-walk.c:163:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			int ret = dwim_log(branch, strlen(branch),
data/git-2.29.2+next.20201030/reflog-walk.c:247:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(info->message);
data/git-2.29.2+next.20201030/refs.c:227:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t restlen = strlen(rest);
data/git-2.29.2+next.20201030/refs.c:542:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const int abbrev_name_len = strlen(abbrev_name);
data/git-2.29.2+next.20201030/refs.c:559:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len = strlen(prefix);
data/git-2.29.2+next.20201030/refs.c:1175:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			total_len += strlen(ref_rev_parse_rules[nr_rules]) - 2 + 1;
data/git-2.29.2+next.20201030/refs.c:1204:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		short_name_len = strlen(short_name);
data/git-2.29.2+next.20201030/refs.c:1271:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(ref);
data/git-2.29.2+next.20201030/refs.c:1475:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return do_for_each_ref(refs, prefix, fn, strlen(prefix), 0, cb_data);
data/git-2.29.2+next.20201030/refs.c:1507:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				    strlen(git_replace_ref_base),
data/git-2.29.2+next.20201030/refs.c:1813:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(submodule);
data/git-2.29.2+next.20201030/refs.c:2124:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	strbuf_grow(&dirname, strlen(refname) + 1);
data/git-2.29.2+next.20201030/refs/files-backend.c:223:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int prefix_len = strlen(prefix);
data/git-2.29.2+next.20201030/refs/files-backend.c:247:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int dirnamelen = strlen(dirname);
data/git-2.29.2+next.20201030/refs/files-backend.c:1509:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t len = strlen(path);
data/git-2.29.2+next.20201030/refs/iterator.c:340:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (strlen(iter->iter0->refname) <= iter->trim)
data/git-2.29.2+next.20201030/refs/ref-cache.c:208:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	entry_index = search_ref_dir(dir, refname, strlen(refname));
data/git-2.29.2+next.20201030/refs/ref-cache.c:217:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int refname_len = strlen(refname);
data/git-2.29.2+next.20201030/refspec.c:57:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t rlen = strlen(++rhs);
data/git-2.29.2+next.20201030/refspec.c:64:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	llen = (rhs ? (rhs - lhs - 1) : strlen(lhs));
data/git-2.29.2+next.20201030/remote.c:143:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(name);
data/git-2.29.2+next.20201030/remote.c:221:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	rewrite->instead_of[rewrite->instead_of_nr].len = strlen(instead_of);
data/git-2.29.2+next.20201030/remote.c:458:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			current_branch = make_branch(head_ref, strlen(head_ref));
data/git-2.29.2+next.20201030/remote.c:668:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ksuffixlen = strlen(kstar + 1);
data/git-2.29.2+next.20201030/remote.c:669:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	namelen = strlen(name);
data/git-2.29.2+next.20201030/remote.c:856:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = strlen(name);
data/git-2.29.2+next.20201030/remote.c:874:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = st_add3(sizeof(struct ref), strlen(ref->name), 1);
data/git-2.29.2+next.20201030/remote.c:941:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int patlen = strlen(pattern);
data/git-2.29.2+next.20201030/remote.c:949:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int namelen = strlen(name);
data/git-2.29.2+next.20201030/remote.c:1664:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (dwim_ref(ret->merge_name[i], strlen(ret->merge_name[i]),
data/git-2.29.2+next.20201030/remote.c:1680:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		ret = make_branch(name, strlen(name));
data/git-2.29.2+next.20201030/rerere.c:298:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ferr_write(s, strlen(s), fp, err);
data/git-2.29.2+next.20201030/rerere.c:968:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(path);
data/git-2.29.2+next.20201030/rerere.c:1127:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				    strlen(it->string), 0, NULL, 0))
data/git-2.29.2+next.20201030/resolve-undo.c:67:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(data) + 1;
data/git-2.29.2+next.20201030/revision.c:700:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(path);
data/git-2.29.2+next.20201030/revision.c:1844:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		revs->diffopt.prefix_length = strlen(prefix);
data/git-2.29.2+next.20201030/revision.c:3682:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	person += strlen(what);
data/git-2.29.2+next.20201030/revision.c:3773:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				     (char *)message, strlen(message));
data/git-2.29.2+next.20201030/revision.c:4212:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (!strlen(mark))
data/git-2.29.2+next.20201030/run-command.c:152:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		n = read(fd, buf, 2);
data/git-2.29.2+next.20201030/run-command.c:271:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strcspn(argv[0], "|&;<>()$`\\\"' \t\n*?[#~=%") != strlen(argv[0])) {
data/git-2.29.2+next.20201030/sequencer.c:1015:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(sign_off_header) <= eol - i &&
data/git-2.29.2+next.20201030/sequencer.c:1443:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (split_ident_line(&id, author, (int)strlen(author)) < 0) {
data/git-2.29.2+next.20201030/sequencer.c:1475:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (split_ident_line(&id, author, strlen(author)) < 0) {
data/git-2.29.2+next.20201030/sequencer.c:1728:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (write_message(body, strlen(body),
data/git-2.29.2+next.20201030/sequencer.c:1762:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strbuf_add_commented_lines(&buf, body, strlen(body));
data/git-2.29.2+next.20201030/sequencer.c:3125:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (write_message(hex, strlen(hex), rebase_path_stopped_sha(), 1) < 0)
data/git-2.29.2+next.20201030/sequencer.c:3152:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		res |= write_message(subject, strlen(subject), buf.buf, 1);
data/git-2.29.2+next.20201030/sequencer.c:3169:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return write_message(p, strlen(p), rebase_path_amend(), 1);
data/git-2.29.2+next.20201030/sequencer.c:3383:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (write_message(hex, strlen(hex),
data/git-2.29.2+next.20201030/sequencer.c:3399:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    get_oid(ref_name.buf + strlen("refs/rewritten/"), &oid)) {
data/git-2.29.2+next.20201030/sequencer.c:3464:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strbuf_splice(buf, 0, strlen("refs/rewritten/"), "", 0);
data/git-2.29.2+next.20201030/sequencer.c:3565:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(body);
data/git-2.29.2+next.20201030/sequencer.c:4425:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				    write_message(p, strlen(p), path, 0)) {
data/git-2.29.2+next.20201030/sequencer.c:4558:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (!strlen(name))
data/git-2.29.2+next.20201030/sequencer.c:4666:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				append_newlines, strlen(append_newlines));
data/git-2.29.2+next.20201030/sequencer.c:4742:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			size_t i = strlen(p) + 1;
data/git-2.29.2+next.20201030/sequencer.c:4908:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			strbuf_addstr(&label, p1 + strlen(" from "));
data/git-2.29.2+next.20201030/sequencer.c:5121:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t command_len = strlen(commands->items[i].string);
data/git-2.29.2+next.20201030/sequencer.c:5128:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		base_items[i].arg_offset = base_offset + strlen("exec ");
data/git-2.29.2+next.20201030/sequencer.c:5129:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		base_items[i].arg_len = command_len - strlen("exec ");
data/git-2.29.2+next.20201030/setup.c:39:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	wtlen = strlen(work_tree);
data/git-2.29.2+next.20201030/setup.c:40:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(path);
data/git-2.29.2+next.20201030/setup.c:103:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		sanitized = xmallocz(strlen(path));
data/git-2.29.2+next.20201030/setup.c:141:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len = prefix ? strlen(prefix) : 0;
data/git-2.29.2+next.20201030/setup.c:811:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (PATH_MAX - 40 < strlen(gitdirenv))
data/git-2.29.2+next.20201030/sh-i18n--envsubst.c:296:11:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  int c = getc (stdin);
data/git-2.29.2+next.20201030/sha1-file.c:1236:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int bytes = strlen(buffer) + 1;
data/git-2.29.2+next.20201030/sha1-file.c:1695:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		ref_length = strlen(ref_type);
data/git-2.29.2+next.20201030/sha1-file.c:1955:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	hdrlen = strlen(type) + MAX_HEADER_LEN;
data/git-2.29.2+next.20201030/sha1-file.c:2302:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		namelen = strlen(de->d_name);
data/git-2.29.2+next.20201030/sha1-file.c:2447:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	total_read = stream->total_out - strlen(hdr) - 1;
data/git-2.29.2+next.20201030/sha1-name.c:516:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (init_object_disambiguation(r, prefix, strlen(prefix), &ds) < 0)
data/git-2.29.2+next.20201030/sha1-name.c:768:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int suffix_len = strlen(suffix[i]);
data/git-2.29.2+next.20201030/sha1-name.c:912:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				len = strlen(str);
data/git-2.29.2+next.20201030/sha1-name.c:993:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		namelen = strlen(name);
data/git-2.29.2+next.20201030/sha1-name.c:1226:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				   strlen(path));
data/git-2.29.2+next.20201030/sha1-name.c:1525:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		namelen = strlen(name);
data/git-2.29.2+next.20201030/sha1-name.c:1569:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len = strlen(name);
data/git-2.29.2+next.20201030/sha1-name.c:1731:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	unsigned namelen = strlen(filename);
data/git-2.29.2+next.20201030/sha1-name.c:1788:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			   startup_info->prefix ? strlen(startup_info->prefix) : 0,
data/git-2.29.2+next.20201030/sha1-name.c:1800:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int namelen = strlen(name);
data/git-2.29.2+next.20201030/sha1-name.c:1849:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			namelen = strlen(cp);
data/git-2.29.2+next.20201030/shell.c:165:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int len = strlen(cmd->name);
data/git-2.29.2+next.20201030/sideband.c:88:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int len = strlen(p->keyword);
data/git-2.29.2+next.20201030/sideband.c:203:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			maybe_colorize_sideband(scratch, b, strlen(b));
data/git-2.29.2+next.20201030/strbuf.c:461:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	for (; e->placeholder && (len = strlen(e->placeholder)); e++) {
data/git-2.29.2+next.20201030/strbuf.c:486:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t i, len = strlen(src);
data/git-2.29.2+next.20201030/strbuf.c:597:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			strbuf_setlen(sb, strlen(sb->buf));
data/git-2.29.2+next.20201030/strbuf.c:838:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	strbuf_add_urlencode(sb, s, strlen(s), allow_unencoded_fn);
data/git-2.29.2+next.20201030/strbuf.c:957:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(string);
data/git-2.29.2+next.20201030/strbuf.c:969:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(string);
data/git-2.29.2+next.20201030/strbuf.c:1149:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	strbuf_setlen(&dst, strlen(dst.buf));
data/git-2.29.2+next.20201030/strbuf.h:256:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	strbuf_insert(sb, pos, s, strlen(s));
data/git-2.29.2+next.20201030/strbuf.h:304:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	strbuf_add(sb, s, strlen(s));
data/git-2.29.2+next.20201030/strbuf.h:597:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return strbuf_split_buf(str, strlen(str), terminator, max);
data/git-2.29.2+next.20201030/streaming.c:28:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	read_istream_fn read;
data/git-2.29.2+next.20201030/streaming.c:109:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	return st->vtbl->read(st, buf, sz);
data/git-2.29.2+next.20201030/streaming.c:358:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	st->u.loose.hdr_used = strlen(st->u.loose.hdr) + 1;
data/git-2.29.2+next.20201030/submodule.c:38:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int pos = index_name_pos(istate, GITMODULES_FILE, strlen(GITMODULES_FILE));
data/git-2.29.2+next.20201030/submodule.c:43:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (ce_namelen(ce) == strlen(GITMODULES_FILE) &&
data/git-2.29.2+next.20201030/submodule.c:80:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int pos = index_name_pos(istate, GITMODULES_FILE, strlen(GITMODULES_FILE));
data/git-2.29.2+next.20201030/submodule.c:273:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		ret = match_pathspec(repo->index, &ps, path, strlen(path), 0, NULL, 1);
data/git-2.29.2+next.20201030/submodule.c:312:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	prefixlen = strlen(prefix);
data/git-2.29.2+next.20201030/submodule.c:1700:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (buf.len < strlen("T XY SSSS"))
data/git-2.29.2+next.20201030/submodule.c:2013:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = strlen(git_dir), suffix_len = strlen(submodule_name);
data/git-2.29.2+next.20201030/submodule.c:2013:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = strlen(git_dir), suffix_len = strlen(submodule_name);
data/git-2.29.2+next.20201030/submodule.c:2221:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int cwd_len = strlen(cwd);
data/git-2.29.2+next.20201030/submodule.c:2230:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		super_sub_len = strlen(super_sub);
data/git-2.29.2+next.20201030/t/helper/test-bloom.c:12:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		fill_bloom_key(data, strlen(data), &key, &settings);
data/git-2.29.2+next.20201030/t/helper/test-bloom.c:64:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		hashed = murmur3_seeded(0, argv[2], strlen(argv[2]));
data/git-2.29.2+next.20201030/t/helper/test-hashmap.c:16:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return e->key + strlen(e->key) + 1;
data/git-2.29.2+next.20201030/t/helper/test-hashmap.c:40:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t klen = strlen(key);
data/git-2.29.2+next.20201030/t/helper/test-hashmap.c:41:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t vlen = strlen(value);
data/git-2.29.2+next.20201030/t/helper/test-index-version.c:10:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (read(0, &hdr, sizeof(hdr)) != sizeof(hdr))
data/git-2.29.2+next.20201030/t/helper/test-json-writer.c:432:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(buf);
data/git-2.29.2+next.20201030/t/helper/test-parse-options.c:34:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	*(int *)opt->value = strlen(arg);
data/git-2.29.2+next.20201030/t/helper/test-path-utils.c:297:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		char *buf = xmallocz(strlen(argv[2]));
data/git-2.29.2+next.20201030/t/helper/test-path-utils.c:355:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int prefix_len = strlen(prefix);
data/git-2.29.2+next.20201030/t/helper/test-path-utils.c:386:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			puts(strlen(rel) > 0 ? rel : "(empty)");
data/git-2.29.2+next.20201030/t/helper/test-path-utils.c:434:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			ssize_t count = read(fd, buffer, sizeof(buffer));
data/git-2.29.2+next.20201030/t/helper/test-pkt-line.c:93:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	send_sideband(1, 2, part1, strlen(part1), LARGE_PACKET_MAX);
data/git-2.29.2+next.20201030/t/helper/test-pkt-line.c:94:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	packet_write(1, primary, strlen(primary));
data/git-2.29.2+next.20201030/t/helper/test-pkt-line.c:95:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	send_sideband(1, 2, part2, strlen(part2), LARGE_PACKET_MAX);
data/git-2.29.2+next.20201030/t/helper/test-proc-receive.c:44:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			linelen = strlen(reader->line);
data/git-2.29.2+next.20201030/t/helper/test-read-cache.c:26:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			pos = index_name_pos(&the_index, name, strlen(name));
data/git-2.29.2+next.20201030/t/helper/test-run-command.c:290:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			k += strlen(out.buf + k) + 1;
data/git-2.29.2+next.20201030/t/helper/test-run-command.c:322:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		fwrite(argv[1], strlen(argv[1]), 1, stdout);
data/git-2.29.2+next.20201030/t/t4256/1/mailinfo.c:228:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ap += strlen(name);
data/git-2.29.2+next.20201030/t/t4256/1/mailinfo.c:351:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len = strlen(hdr);
data/git-2.29.2+next.20201030/t/t4256/1/mailinfo.c:362:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (len != strlen(SAMPLE))
data/git-2.29.2+next.20201030/t/t4256/1/mailinfo.c:369:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return !memcmp(SAMPLE + (cp - line), cp, strlen(SAMPLE) - (cp - line));
data/git-2.29.2+next.20201030/t/t4256/1/mailinfo.c:457:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	strbuf_attach(line, out, strlen(out), strlen(out));
data/git-2.29.2+next.20201030/t/t4256/1/mailinfo.c:457:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	strbuf_attach(line, out, strlen(out), strlen(out));
data/git-2.29.2+next.20201030/t/t4256/1/mailinfo.c:555:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int len = strlen(header[i]);
data/git-2.29.2+next.20201030/t/t4256/1/mailinfo.c:570:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen("Content-Type: ");
data/git-2.29.2+next.20201030/t/t4256/1/mailinfo.c:579:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen("Content-Transfer-Encoding: ");
data/git-2.29.2+next.20201030/t/t4256/1/mailinfo.c:587:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen("Message-Id: ");
data/git-2.29.2+next.20201030/t/t4256/1/mailinfo.c:902:10:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		peek = fgetc(in);
data/git-2.29.2+next.20201030/t/t4256/1/mailinfo.c:1105:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			len = strlen(sp);
data/git-2.29.2+next.20201030/t/t4256/1/mailinfo.c:1170:10:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		peek = fgetc(mi->input);
data/git-2.29.2+next.20201030/tag.c:83:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			warnlen = strlen(warn);
data/git-2.29.2+next.20201030/trace.c:47:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	else if (strlen(trace) == 1 && isdigit(*trace))
data/git-2.29.2+next.20201030/trace.c:221:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (perf_indent >= strlen(space))
data/git-2.29.2+next.20201030/trace2/tr2_cfg.c:31:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	tr2_cfg_patterns = strbuf_split_buf(envvar, strlen(envvar), ',', -1);
data/git-2.29.2+next.20201030/trace2/tr2_cfg.c:70:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	tr2_cfg_env_vars = strbuf_split_buf(varlist, strlen(varlist), ',', -1);
data/git-2.29.2+next.20201030/trace2/tr2_dst.c:264:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    strlen(path) >= sizeof(((struct sockaddr_un *)0)->sun_path)) {
data/git-2.29.2+next.20201030/trace2/tr2_dst.c:334:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(tgt_value) == 1 && isdigit(*tgt_value)) {
data/git-2.29.2+next.20201030/trace2/tr2_sid.c:47:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		algo->update_fn(&ctx, hostname, strlen(hostname));
data/git-2.29.2+next.20201030/trailer.c:86:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	a_len = token_len_without_separator(a->token, strlen(a->token));
data/git-2.29.2+next.20201030/trailer.c:87:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	b_len = token_len_without_separator(b->token, strlen(b->token));
data/git-2.29.2+next.20201030/trailer.c:115:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strbuf_splice(sb, ptr - sb->buf, strlen(a), b, strlen(b));
data/git-2.29.2+next.20201030/trailer.c:115:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strbuf_splice(sb, ptr - sb->buf, strlen(a), b, strlen(b));
data/git-2.29.2+next.20201030/trailer.c:138:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	for (i = strlen(s) - 1; i >= 0; i--)
data/git-2.29.2+next.20201030/trailer.c:169:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if ((!opts->trim_empty || strlen(item->value) > 0) &&
data/git-2.29.2+next.20201030/trailer.c:1082:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		patch_start = strlen(str);
data/git-2.29.2+next.20201030/trailer.c:1096:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			strbuf_attach(&sb, *last, strlen(*last), strlen(*last));
data/git-2.29.2+next.20201030/trailer.c:1096:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			strbuf_attach(&sb, *last, strlen(*last), strlen(*last));
data/git-2.29.2+next.20201030/transport-helper.c:90:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (write_in_full(fd, str, strlen(str)) < 0)
data/git-2.29.2+next.20201030/transport-helper.c:1153:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(attr);
data/git-2.29.2+next.20201030/transport.c:1461:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	anon_len = strlen(++anon_part);
data/git-2.29.2+next.20201030/tree-walk.c:45:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(path) + 1;
data/git-2.29.2+next.20201030/tree-walk.c:172:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t pathlen = strlen(base);
data/git-2.29.2+next.20201030/tree-walk.c:531:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int namelen = strlen(name);
data/git-2.29.2+next.20201030/tree.c:26:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(pathname);
data/git-2.29.2+next.20201030/unix-socket.c:41:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int size = strlen(path) + 1;
data/git-2.29.2+next.20201030/unix-socket.c:56:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size = strlen(path) + 1;
data/git-2.29.2+next.20201030/unpack-trees.c:322:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int pos = index_name_pos(index, GITMODULES_FILE, strlen(GITMODULES_FILE));
data/git-2.29.2+next.20201030/upload-pack.c:981:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (expand_ref(the_repository, arg, strlen(arg), &oid, &ref) != 1)
data/git-2.29.2+next.20201030/url.c:72:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return url_decode_mem(url, strlen(url));
data/git-2.29.2+next.20201030/url.c:92:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return url_decode_internal(&encoded, strlen(encoded), NULL, &out, 0);
data/git-2.29.2+next.20201030/urlmatch.c:146:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t url_len = strlen(url);
data/git-2.29.2+next.20201030/urlmatch.c:465:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ((strlen(url) == url_prefix_len) || (url[url_prefix_len] == '/'))
data/git-2.29.2+next.20201030/usage.c:13:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t prefix_len = strlen(prefix);
data/git-2.29.2+next.20201030/userdiff.c:331:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len = strlen(name);
data/git-2.29.2+next.20201030/utf8.c:215:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(string);
data/git-2.29.2+next.20201030/utf8.c:367:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		subst_len = strlen(subst);
data/git-2.29.2+next.20201030/utf8.c:757:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return is_hfs_dot_generic(path, needle, strlen(needle));
data/git-2.29.2+next.20201030/utf8.c:784:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (len < strlen(utf8_bom) ||
data/git-2.29.2+next.20201030/utf8.c:785:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    memcmp(*text, utf8_bom, strlen(utf8_bom)))
data/git-2.29.2+next.20201030/utf8.c:787:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	*text += strlen(utf8_bom);
data/git-2.29.2+next.20201030/utf8.c:794:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int slen = strlen(s);
data/git-2.29.2+next.20201030/utf8.h:45:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return reencode_string_len(in, strlen(in),
data/git-2.29.2+next.20201030/versioncmp.c:82:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int start, suffix_len = strlen(suffix);
data/git-2.29.2+next.20201030/worktree.c:165:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	suffixlen = strlen(suffix);
data/git-2.29.2+next.20201030/worktree.c:171:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int		 pathlen = strlen(path);
data/git-2.29.2+next.20201030/worktree.c:458:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	strbuf_setlen(&sb, sb.len - strlen("config"));
data/git-2.29.2+next.20201030/wrapper.c:234:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		nr = read(fd, buf, len);
data/git-2.29.2+next.20201030/wrapper.c:433:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(filename_template) != strlen(origtemplate))
data/git-2.29.2+next.20201030/wrapper.c:433:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(filename_template) != strlen(origtemplate))
data/git-2.29.2+next.20201030/wrapper.c:464:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(pattern);
data/git-2.29.2+next.20201030/wt-status.c:334:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		label_width += strlen(" ");
data/git-2.29.2+next.20201030/wt-status.c:368:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		label_width += strlen(" ");
data/git-2.29.2+next.20201030/wt-status.c:512:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	pos = index_name_pos(istate, path, strlen(path));
data/git-2.29.2+next.20201030/wt-status.c:1021:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	strbuf_add_commented_lines(buf, explanation, strlen(explanation));
data/git-2.29.2+next.20201030/wt-status.c:1548:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	target += strlen(" to ");
data/git-2.29.2+next.20201030/wt-status.c:2298:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	pos = index_name_pos(istate, it->string, strlen(it->string));
data/git-2.29.2+next.20201030/xdiff/xemit.c:34:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	long size, psize = strlen(pre);
data/git-2.29.2+next.20201030/xdiff/xmerge.c:202:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int marker1_size = (name1 ? strlen(name1) + 1 : 0);
data/git-2.29.2+next.20201030/xdiff/xmerge.c:203:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int marker2_size = (name2 ? strlen(name2) + 1 : 0);
data/git-2.29.2+next.20201030/xdiff/xmerge.c:204:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int marker3_size = (name3 ? strlen(name3) + 1 : 0);
data/git-2.29.2+next.20201030/xdiff/xpatience.c:81:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (!strncmp(line, xpp->anchors[i], strlen(xpp->anchors[i])))
data/git-2.29.2+next.20201030/xdiff/xutils.c:50:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		mb[2].size = strlen(mb[2].ptr);

ANALYSIS SUMMARY:

Hits = 2413
Lines analyzed = 322445 in approximately 8.42 seconds (38294 lines/second)
Physical Source Lines of Code (SLOC) = 236631
Hits@level = [0] 1310 [1] 828 [2] 1075 [3] 252 [4] 243 [5]  15
Hits@level+ = [0+] 3723 [1+] 2413 [2+] 1585 [3+] 510 [4+] 258 [5+]  15
Hits/KSLOC@level+ = [0+] 15.7334 [1+] 10.1973 [2+] 6.69819 [3+] 2.15525 [4+] 1.09031 [5+] 0.0633898
Dot directories skipped = 2 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.