Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/infernal-1.1.3/rmark/rmark-create.c
Examining data/infernal-1.1.3/rmark/rmark-rocplot.c
Examining data/infernal-1.1.3/src/cmscan.c
Examining data/infernal-1.1.3/src/cmsearch.c
Examining data/infernal-1.1.3/src/cmstat.c
Examining data/infernal-1.1.3/src/cm_p7_modelconfig_trunc.c
Examining data/infernal-1.1.3/src/cm_trunc.c
Examining data/infernal-1.1.3/src/cmsim.c
Examining data/infernal-1.1.3/src/cp9-test.c
Examining data/infernal-1.1.3/src/cp9.c
Examining data/infernal-1.1.3/src/cp9_dp.c
Examining data/infernal-1.1.3/src/cp9_modelmaker.c
Examining data/infernal-1.1.3/src/cp9_mx.c
Examining data/infernal-1.1.3/src/cp9_trace.c
Examining data/infernal-1.1.3/src/display.c
Examining data/infernal-1.1.3/src/errors.c
Examining data/infernal-1.1.3/src/eweight.c
Examining data/infernal-1.1.3/src/hmmband.c
Examining data/infernal-1.1.3/src/hmmband.h
Examining data/infernal-1.1.3/src/infernal.h
Examining data/infernal-1.1.3/src/itest_brute.c
Examining data/infernal-1.1.3/src/cmbuild.c
Examining data/infernal-1.1.3/src/cmcalibrate.c
Examining data/infernal-1.1.3/src/cmconvert.c
Examining data/infernal-1.1.3/src/cmemit.c
Examining data/infernal-1.1.3/src/cmfetch.c
Examining data/infernal-1.1.3/src/cmpress.c
Examining data/infernal-1.1.3/src/cmalign.c
Examining data/infernal-1.1.3/src/cm_p7_domaindef.c
Examining data/infernal-1.1.3/src/cm_p7_modelmaker.c
Examining data/infernal-1.1.3/src/cm_parsetree.c
Examining data/infernal-1.1.3/src/cm_pipeline.c
Examining data/infernal-1.1.3/src/cm_qdband.c
Examining data/infernal-1.1.3/src/cm_submodel.c
Examining data/infernal-1.1.3/src/logsum.c
Examining data/infernal-1.1.3/src/mpisupport.c
Examining data/infernal-1.1.3/src/prior.c
Examining data/infernal-1.1.3/src/prior.h
Examining data/infernal-1.1.3/src/rnamat.c
Examining data/infernal-1.1.3/src/rnamat.h
Examining data/infernal-1.1.3/src/sub_cm-test.c
Examining data/infernal-1.1.3/src/stats.c
Examining data/infernal-1.1.3/src/stats.h
Examining data/infernal-1.1.3/src/impl_sse/cm_optimized.c
Examining data/infernal-1.1.3/src/impl_sse/sse_cmsearch.c
Examining data/infernal-1.1.3/src/impl_sse/sse_util.c
Examining data/infernal-1.1.3/src/impl_sse/impl_sse.h
Examining data/infernal-1.1.3/src/impl_sse/sse_cm_dpsearch.c
Examining data/infernal-1.1.3/src/impl_sse/sse_cm_dpsmall.c
Examining data/infernal-1.1.3/src/impl_sse/sse_cmcons_hitmx.c
Examining data/infernal-1.1.3/src/impl_sse/sse_cmcons_mscyk.c
Examining data/infernal-1.1.3/src/trcyk.c
Examining data/infernal-1.1.3/src/truncyk.c
Examining data/infernal-1.1.3/src/truncyk_check.c
Examining data/infernal-1.1.3/src/alphabet.c
Examining data/infernal-1.1.3/src/bandcyk-montecarlo-test.c
Examining data/infernal-1.1.3/src/bandcyk-truncation-test.c
Examining data/infernal-1.1.3/src/cm.c
Examining data/infernal-1.1.3/src/cm_alidisplay.c
Examining data/infernal-1.1.3/src/cm_alndata.c
Examining data/infernal-1.1.3/src/cm_dispatch.h
Examining data/infernal-1.1.3/src/cm_dpalign.c
Examining data/infernal-1.1.3/src/cm_dpalign_trunc.c
Examining data/infernal-1.1.3/src/cm_dpsearch.c
Examining data/infernal-1.1.3/src/cm_dpsearch_trunc.c
Examining data/infernal-1.1.3/src/cm_dpsmall.c
Examining data/infernal-1.1.3/src/cm_file.c
Examining data/infernal-1.1.3/src/cm_modelconfig.c
Examining data/infernal-1.1.3/src/cm_mx.c
Examining data/infernal-1.1.3/src/cm_p7_band.c
Examining data/infernal-1.1.3/src/cm_modelmaker.c
Examining data/infernal-1.1.3/src/cm_tophits.c
Examining data/infernal-1.1.3/easel/esl_bitfield.c
Examining data/infernal-1.1.3/easel/esl_bitfield.h
Examining data/infernal-1.1.3/easel/esl_buffer.c
Examining data/infernal-1.1.3/easel/esl_buffer.h
Examining data/infernal-1.1.3/easel/esl_cluster.c
Examining data/infernal-1.1.3/easel/esl_cluster.h
Examining data/infernal-1.1.3/easel/esl_composition.c
Examining data/infernal-1.1.3/easel/esl_composition.h
Examining data/infernal-1.1.3/easel/esl_cpu.c
Examining data/infernal-1.1.3/easel/esl_cpu.h
Examining data/infernal-1.1.3/easel/esl_dirichlet.c
Examining data/infernal-1.1.3/easel/esl_dirichlet.h
Examining data/infernal-1.1.3/easel/esl_distance.c
Examining data/infernal-1.1.3/easel/esl_distance.h
Examining data/infernal-1.1.3/easel/esl_dmatrix.c
Examining data/infernal-1.1.3/easel/esl_dmatrix.h
Examining data/infernal-1.1.3/easel/esl_dsqdata.c
Examining data/infernal-1.1.3/easel/esl_dsqdata.h
Examining data/infernal-1.1.3/easel/esl_exponential.c
Examining data/infernal-1.1.3/easel/esl_exponential.h
Examining data/infernal-1.1.3/easel/esl_fileparser.c
Examining data/infernal-1.1.3/easel/esl_fileparser.h
Examining data/infernal-1.1.3/easel/esl_gamma.c
Examining data/infernal-1.1.3/easel/esl_gamma.h
Examining data/infernal-1.1.3/easel/esl_gencode.c
Examining data/infernal-1.1.3/easel/esl_gencode.h
Examining data/infernal-1.1.3/easel/esl_getopts.c
Examining data/infernal-1.1.3/easel/esl_getopts.h
Examining data/infernal-1.1.3/easel/esl_gev.c
Examining data/infernal-1.1.3/easel/esl_gev.h
Examining data/infernal-1.1.3/easel/esl_graph.c
Examining data/infernal-1.1.3/easel/esl_graph.h
Examining data/infernal-1.1.3/easel/esl_gumbel.c
Examining data/infernal-1.1.3/easel/esl_gumbel.h
Examining data/infernal-1.1.3/easel/esl_heap.c
Examining data/infernal-1.1.3/easel/esl_heap.h
Examining data/infernal-1.1.3/easel/esl_histogram.c
Examining data/infernal-1.1.3/easel/esl_histogram.h
Examining data/infernal-1.1.3/easel/esl_hmm.c
Examining data/infernal-1.1.3/easel/esl_hmm.h
Examining data/infernal-1.1.3/easel/esl_huffman.c
Examining data/infernal-1.1.3/easel/esl_huffman.h
Examining data/infernal-1.1.3/easel/esl_hyperexp.c
Examining data/infernal-1.1.3/easel/esl_hyperexp.h
Examining data/infernal-1.1.3/easel/esl_json.c
Examining data/infernal-1.1.3/easel/esl_json.h
Examining data/infernal-1.1.3/easel/esl_keyhash.c
Examining data/infernal-1.1.3/easel/esl_keyhash.h
Examining data/infernal-1.1.3/easel/esl_matrixops.c
Examining data/infernal-1.1.3/easel/esl_matrixops.h
Examining data/infernal-1.1.3/easel/esl_mem.c
Examining data/infernal-1.1.3/easel/esl_mem.h
Examining data/infernal-1.1.3/easel/esl_minimizer.c
Examining data/infernal-1.1.3/easel/esl_minimizer.h
Examining data/infernal-1.1.3/easel/esl_mixdchlet.c
Examining data/infernal-1.1.3/easel/esl_mixdchlet.h
Examining data/infernal-1.1.3/easel/esl_mixgev.c
Examining data/infernal-1.1.3/easel/esl_mixgev.h
Examining data/infernal-1.1.3/easel/esl_mpi.c
Examining data/infernal-1.1.3/easel/esl_mpi.h
Examining data/infernal-1.1.3/easel/esl_msa.c
Examining data/infernal-1.1.3/easel/esl_msa.h
Examining data/infernal-1.1.3/easel/esl_msacluster.c
Examining data/infernal-1.1.3/easel/esl_msacluster.h
Examining data/infernal-1.1.3/easel/esl_msafile.c
Examining data/infernal-1.1.3/easel/esl_msafile.h
Examining data/infernal-1.1.3/easel/esl_msafile2.c
Examining data/infernal-1.1.3/easel/esl_msafile2.h
Examining data/infernal-1.1.3/easel/esl_msafile_a2m.c
Examining data/infernal-1.1.3/easel/esl_msafile_a2m.h
Examining data/infernal-1.1.3/easel/esl_msafile_afa.c
Examining data/infernal-1.1.3/easel/esl_msafile_afa.h
Examining data/infernal-1.1.3/easel/esl_msafile_clustal.c
Examining data/infernal-1.1.3/easel/esl_msafile_clustal.h
Examining data/infernal-1.1.3/easel/esl_msafile_phylip.c
Examining data/infernal-1.1.3/easel/esl_msafile_phylip.h
Examining data/infernal-1.1.3/easel/esl_msafile_psiblast.c
Examining data/infernal-1.1.3/easel/esl_msafile_psiblast.h
Examining data/infernal-1.1.3/easel/esl_msafile_selex.c
Examining data/infernal-1.1.3/easel/esl_msafile_selex.h
Examining data/infernal-1.1.3/easel/esl_msafile_stockholm.c
Examining data/infernal-1.1.3/easel/esl_msafile_stockholm.h
Examining data/infernal-1.1.3/easel/esl_msashuffle.c
Examining data/infernal-1.1.3/easel/esl_msashuffle.h
Examining data/infernal-1.1.3/easel/esl_msaweight.c
Examining data/infernal-1.1.3/easel/esl_msaweight.h
Examining data/infernal-1.1.3/easel/esl_neon.c
Examining data/infernal-1.1.3/easel/esl_neon.h
Examining data/infernal-1.1.3/easel/esl_normal.c
Examining data/infernal-1.1.3/easel/esl_normal.h
Examining data/infernal-1.1.3/easel/esl_paml.c
Examining data/infernal-1.1.3/easel/esl_paml.h
Examining data/infernal-1.1.3/easel/esl_quicksort.c
Examining data/infernal-1.1.3/easel/esl_quicksort.h
Examining data/infernal-1.1.3/easel/esl_rand64.c
Examining data/infernal-1.1.3/easel/esl_rand64.h
Examining data/infernal-1.1.3/easel/esl_random.c
Examining data/infernal-1.1.3/easel/esl_random.h
Examining data/infernal-1.1.3/easel/esl_randomseq.c
Examining data/infernal-1.1.3/easel/esl_randomseq.h
Examining data/infernal-1.1.3/easel/esl_ratematrix.c
Examining data/infernal-1.1.3/easel/esl_ratematrix.h
Examining data/infernal-1.1.3/easel/esl_recorder.c
Examining data/infernal-1.1.3/easel/esl_recorder.h
Examining data/infernal-1.1.3/easel/esl_red_black.c
Examining data/infernal-1.1.3/easel/esl_red_black.h
Examining data/infernal-1.1.3/easel/esl_regexp.c
Examining data/infernal-1.1.3/easel/esl_regexp.h
Examining data/infernal-1.1.3/easel/esl_rootfinder.c
Examining data/infernal-1.1.3/easel/esl_rootfinder.h
Examining data/infernal-1.1.3/easel/esl_scorematrix.c
Examining data/infernal-1.1.3/easel/esl_scorematrix.h
Examining data/infernal-1.1.3/easel/esl_sq.c
Examining data/infernal-1.1.3/easel/esl_sq.h
Examining data/infernal-1.1.3/easel/esl_sqio.c
Examining data/infernal-1.1.3/easel/esl_sqio.h
Examining data/infernal-1.1.3/easel/esl_sqio_ascii.c
Examining data/infernal-1.1.3/easel/esl_sqio_ascii.h
Examining data/infernal-1.1.3/easel/esl_sqio_ncbi.c
Examining data/infernal-1.1.3/easel/esl_sqio_ncbi.h
Examining data/infernal-1.1.3/easel/esl_sse.c
Examining data/infernal-1.1.3/easel/esl_sse.h
Examining data/infernal-1.1.3/easel/esl_ssi.c
Examining data/infernal-1.1.3/easel/esl_ssi.h
Examining data/infernal-1.1.3/easel/esl_stack.c
Examining data/infernal-1.1.3/easel/esl_stack.h
Examining data/infernal-1.1.3/easel/esl_stats.c
Examining data/infernal-1.1.3/easel/esl_stats.h
Examining data/infernal-1.1.3/easel/esl_stopwatch.c
Examining data/infernal-1.1.3/easel/esl_stopwatch.h
Examining data/infernal-1.1.3/easel/esl_stretchexp.c
Examining data/infernal-1.1.3/easel/esl_stretchexp.h
Examining data/infernal-1.1.3/easel/esl_subcmd.c
Examining data/infernal-1.1.3/easel/esl_subcmd.h
Examining data/infernal-1.1.3/easel/esl_swat.c
Examining data/infernal-1.1.3/easel/esl_threads.c
Examining data/infernal-1.1.3/easel/esl_threads.h
Examining data/infernal-1.1.3/easel/esl_tree.c
Examining data/infernal-1.1.3/easel/esl_tree.h
Examining data/infernal-1.1.3/easel/esl_varint.c
Examining data/infernal-1.1.3/easel/esl_varint.h
Examining data/infernal-1.1.3/easel/esl_vectorops.c
Examining data/infernal-1.1.3/easel/esl_vectorops.h
Examining data/infernal-1.1.3/easel/esl_vmx.c
Examining data/infernal-1.1.3/easel/esl_vmx.h
Examining data/infernal-1.1.3/easel/esl_weibull.c
Examining data/infernal-1.1.3/easel/esl_weibull.h
Examining data/infernal-1.1.3/easel/esl_workqueue.c
Examining data/infernal-1.1.3/easel/esl_workqueue.h
Examining data/infernal-1.1.3/easel/esl_wuss.c
Examining data/infernal-1.1.3/easel/esl_wuss.h
Examining data/infernal-1.1.3/easel/interface_gsl.c
Examining data/infernal-1.1.3/easel/interface_gsl.h
Examining data/infernal-1.1.3/easel/interface_lapack.c
Examining data/infernal-1.1.3/easel/interface_lapack.h
Examining data/infernal-1.1.3/easel/miniapps/cmd_alistat.c
Examining data/infernal-1.1.3/easel/miniapps/cmd_downsample.c
Examining data/infernal-1.1.3/easel/miniapps/cmd_filter.c
Examining data/infernal-1.1.3/easel/miniapps/easel.c
Examining data/infernal-1.1.3/easel/miniapps/esl-afetch.c
Examining data/infernal-1.1.3/easel/miniapps/esl-alimanip.c
Examining data/infernal-1.1.3/easel/miniapps/esl-alimap.c
Examining data/infernal-1.1.3/easel/miniapps/esl-alimask.c
Examining data/infernal-1.1.3/easel/miniapps/esl-alimerge.c
Examining data/infernal-1.1.3/easel/miniapps/esl-alipid.c
Examining data/infernal-1.1.3/easel/miniapps/esl-alirev.c
Examining data/infernal-1.1.3/easel/miniapps/esl-alistat.c
Examining data/infernal-1.1.3/easel/miniapps/esl-compalign.c
Examining data/infernal-1.1.3/easel/miniapps/esl-compstruct.c
Examining data/infernal-1.1.3/easel/miniapps/esl-construct.c
Examining data/infernal-1.1.3/easel/miniapps/esl-histplot.c
Examining data/infernal-1.1.3/easel/miniapps/esl-mask.c
Examining data/infernal-1.1.3/easel/miniapps/esl-mixdchlet.c
Examining data/infernal-1.1.3/easel/miniapps/esl-reformat.c
Examining data/infernal-1.1.3/easel/miniapps/esl-selectn.c
Examining data/infernal-1.1.3/easel/miniapps/esl-seqrange.c
Examining data/infernal-1.1.3/easel/miniapps/esl-seqstat.c
Examining data/infernal-1.1.3/easel/miniapps/esl-sfetch.c
Examining data/infernal-1.1.3/easel/miniapps/esl-shuffle.c
Examining data/infernal-1.1.3/easel/miniapps/esl-ssdraw.c
Examining data/infernal-1.1.3/easel/miniapps/esl-translate.c
Examining data/infernal-1.1.3/easel/miniapps/esl-weight.c
Examining data/infernal-1.1.3/easel/easel.c
Examining data/infernal-1.1.3/easel/easel.h
Examining data/infernal-1.1.3/easel/esl_alloc.c
Examining data/infernal-1.1.3/easel/esl_alloc.h
Examining data/infernal-1.1.3/easel/esl_alphabet.c
Examining data/infernal-1.1.3/easel/esl_alphabet.h
Examining data/infernal-1.1.3/easel/esl_arr2.c
Examining data/infernal-1.1.3/easel/esl_arr2.h
Examining data/infernal-1.1.3/easel/esl_arr3.c
Examining data/infernal-1.1.3/easel/esl_arr3.h
Examining data/infernal-1.1.3/easel/esl_avx.c
Examining data/infernal-1.1.3/easel/esl_avx.h
Examining data/infernal-1.1.3/easel/esl_avx512.c
Examining data/infernal-1.1.3/easel/esl_avx512.h
Examining data/infernal-1.1.3/hmmer/libdivsufsort/divsufsort.c
Examining data/infernal-1.1.3/hmmer/profmark/rocplot.c
Examining data/infernal-1.1.3/hmmer/profmark/create-profmark.c
Examining data/infernal-1.1.3/hmmer/src/generic_fwdback_rescaled.c
Examining data/infernal-1.1.3/hmmer/src/generic_msv.c
Examining data/infernal-1.1.3/hmmer/src/generic_null2.c
Examining data/infernal-1.1.3/hmmer/src/generic_optacc.c
Examining data/infernal-1.1.3/hmmer/src/generic_stotrace.c
Examining data/infernal-1.1.3/hmmer/src/generic_viterbi.c
Examining data/infernal-1.1.3/hmmer/src/generic_vtrace.c
Examining data/infernal-1.1.3/hmmer/src/h2_io.c
Examining data/infernal-1.1.3/hmmer/src/heatmap.c
Examining data/infernal-1.1.3/hmmer/src/hmmalign.c
Examining data/infernal-1.1.3/hmmer/src/hmmbuild.c
Examining data/infernal-1.1.3/hmmer/src/hmmc2.c
Examining data/infernal-1.1.3/hmmer/src/hmmconvert.c
Examining data/infernal-1.1.3/hmmer/src/hmmd_search_status.c
Examining data/infernal-1.1.3/hmmer/src/hmmdmstr.c
Examining data/infernal-1.1.3/hmmer/src/hmmdmstr_shard.c
Examining data/infernal-1.1.3/hmmer/src/hmmdutils.c
Examining data/infernal-1.1.3/hmmer/src/hmmdwrkr.c
Examining data/infernal-1.1.3/hmmer/src/hmmdwrkr_shard.c
Examining data/infernal-1.1.3/hmmer/src/hmmemit.c
Examining data/infernal-1.1.3/hmmer/src/hmmer.c
Examining data/infernal-1.1.3/hmmer/src/hmmer.h
Examining data/infernal-1.1.3/hmmer/src/hmmerfm-exactmatch.c
Examining data/infernal-1.1.3/hmmer/src/hmmfetch.c
Examining data/infernal-1.1.3/hmmer/src/hmmlogo.c
Examining data/infernal-1.1.3/hmmer/src/hmmpgmd.c
Examining data/infernal-1.1.3/hmmer/src/hmmpgmd.h
Examining data/infernal-1.1.3/hmmer/src/hmmpgmd2msa.c
Examining data/infernal-1.1.3/hmmer/src/hmmpgmd_shard.c
Examining data/infernal-1.1.3/hmmer/src/hmmpgmd_shard.h
Examining data/infernal-1.1.3/hmmer/src/hmmpress.c
Examining data/infernal-1.1.3/hmmer/src/hmmscan.c
Examining data/infernal-1.1.3/hmmer/src/hmmsearch.c
Examining data/infernal-1.1.3/hmmer/src/hmmsim.c
Examining data/infernal-1.1.3/hmmer/src/hmmstat.c
Examining data/infernal-1.1.3/hmmer/src/itest_brute.c
Examining data/infernal-1.1.3/hmmer/src/jackhmmer.c
Examining data/infernal-1.1.3/hmmer/src/logsum.c
Examining data/infernal-1.1.3/hmmer/src/makehmmerdb.c
Examining data/infernal-1.1.3/hmmer/src/modelconfig.c
Examining data/infernal-1.1.3/hmmer/src/modelstats.c
Examining data/infernal-1.1.3/hmmer/src/mpisupport.c
Examining data/infernal-1.1.3/hmmer/src/nhmmer.c
Examining data/infernal-1.1.3/hmmer/src/nhmmscan.c
Examining data/infernal-1.1.3/hmmer/src/p7_alidisplay.c
Examining data/infernal-1.1.3/hmmer/src/p7_bg.c
Examining data/infernal-1.1.3/hmmer/src/p7_domain.c
Examining data/infernal-1.1.3/hmmer/src/p7_domaindef.c
Examining data/infernal-1.1.3/hmmer/src/p7_gbands.c
Examining data/infernal-1.1.3/hmmer/src/p7_gbands.h
Examining data/infernal-1.1.3/hmmer/src/p7_gmx.c
Examining data/infernal-1.1.3/hmmer/src/p7_gmxb.c
Examining data/infernal-1.1.3/hmmer/src/impl_sse/p7_omx.c
Examining data/infernal-1.1.3/hmmer/src/impl_sse/p7_oprofile.c
Examining data/infernal-1.1.3/hmmer/src/impl_sse/ssvfilter.c
Examining data/infernal-1.1.3/hmmer/src/impl_sse/stotrace.c
Examining data/infernal-1.1.3/hmmer/src/impl_sse/vitfilter.c
Examining data/infernal-1.1.3/hmmer/src/impl_sse/vitscore.c
Examining data/infernal-1.1.3/hmmer/src/impl_sse/decoding.c
Examining data/infernal-1.1.3/hmmer/src/impl_sse/fwdback.c
Examining data/infernal-1.1.3/hmmer/src/impl_sse/impl_sse.h
Examining data/infernal-1.1.3/hmmer/src/impl_sse/io.c
Examining data/infernal-1.1.3/hmmer/src/impl_sse/mpi.c
Examining data/infernal-1.1.3/hmmer/src/impl_sse/msvfilter.c
Examining data/infernal-1.1.3/hmmer/src/impl_sse/null2.c
Examining data/infernal-1.1.3/hmmer/src/impl_sse/optacc.c
Examining data/infernal-1.1.3/hmmer/src/impl_vmx/decoding.c
Examining data/infernal-1.1.3/hmmer/src/impl_vmx/fwdback.c
Examining data/infernal-1.1.3/hmmer/src/impl_vmx/impl_vmx.h
Examining data/infernal-1.1.3/hmmer/src/impl_vmx/io.c
Examining data/infernal-1.1.3/hmmer/src/impl_vmx/mpi.c
Examining data/infernal-1.1.3/hmmer/src/impl_vmx/msvfilter.c
Examining data/infernal-1.1.3/hmmer/src/impl_vmx/null2.c
Examining data/infernal-1.1.3/hmmer/src/impl_vmx/optacc.c
Examining data/infernal-1.1.3/hmmer/src/impl_vmx/p7_omx.c
Examining data/infernal-1.1.3/hmmer/src/impl_vmx/p7_oprofile.c
Examining data/infernal-1.1.3/hmmer/src/impl_vmx/stotrace.c
Examining data/infernal-1.1.3/hmmer/src/impl_vmx/vitfilter.c
Examining data/infernal-1.1.3/hmmer/src/impl_vmx/vitscore.c
Examining data/infernal-1.1.3/hmmer/src/p7_gmxb.h
Examining data/infernal-1.1.3/hmmer/src/p7_gmxchk.c
Examining data/infernal-1.1.3/hmmer/src/p7_gmxchk.h
Examining data/infernal-1.1.3/hmmer/src/p7_hit.c
Examining data/infernal-1.1.3/hmmer/src/p7_hmm.c
Examining data/infernal-1.1.3/hmmer/src/p7_hmmcache.c
Examining data/infernal-1.1.3/hmmer/src/p7_hmmcache.h
Examining data/infernal-1.1.3/hmmer/src/p7_hmmd_search_stats.c
Examining data/infernal-1.1.3/hmmer/src/p7_hmmfile.c
Examining data/infernal-1.1.3/hmmer/src/p7_hmmwindow.c
Examining data/infernal-1.1.3/hmmer/src/p7_null3.c
Examining data/infernal-1.1.3/hmmer/src/p7_pipeline.c
Examining data/infernal-1.1.3/hmmer/src/p7_prior.c
Examining data/infernal-1.1.3/hmmer/src/p7_profile.c
Examining data/infernal-1.1.3/hmmer/src/p7_scoredata.c
Examining data/infernal-1.1.3/hmmer/src/p7_spensemble.c
Examining data/infernal-1.1.3/hmmer/src/p7_trace.c
Examining data/infernal-1.1.3/hmmer/src/phmmer.c
Examining data/infernal-1.1.3/hmmer/src/seqmodel.c
Examining data/infernal-1.1.3/hmmer/src/tracealign.c
Examining data/infernal-1.1.3/hmmer/src/alimask.c
Examining data/infernal-1.1.3/hmmer/src/build.c
Examining data/infernal-1.1.3/hmmer/src/cachedb.c
Examining data/infernal-1.1.3/hmmer/src/cachedb.h
Examining data/infernal-1.1.3/hmmer/src/cachedb_shard.c
Examining data/infernal-1.1.3/hmmer/src/cachedb_shard.h
Examining data/infernal-1.1.3/hmmer/src/emit.c
Examining data/infernal-1.1.3/hmmer/src/errors.c
Examining data/infernal-1.1.3/hmmer/src/evalues.c
Examining data/infernal-1.1.3/hmmer/src/eweight.c
Examining data/infernal-1.1.3/hmmer/src/fm_alphabet.c
Examining data/infernal-1.1.3/hmmer/src/fm_general.c
Examining data/infernal-1.1.3/hmmer/src/fm_sse.c
Examining data/infernal-1.1.3/hmmer/src/fm_ssv.c
Examining data/infernal-1.1.3/hmmer/src/generic_decoding.c
Examining data/infernal-1.1.3/hmmer/src/generic_fwdback.c
Examining data/infernal-1.1.3/hmmer/src/generic_fwdback_banded.c
Examining data/infernal-1.1.3/hmmer/src/generic_fwdback_chk.c
Examining data/infernal-1.1.3/hmmer/src/p7_builder.c
Examining data/infernal-1.1.3/hmmer/src/p7_tophits.c

FINAL RESULTS:

data/infernal-1.1.3/easel/easel.c:2490:7:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
  if (chmod(tmpfile, mode) != 0) esl_fatal(msg);
data/infernal-1.1.3/easel/easel.c:76:16:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	  if (errbuf) vsnprintf(errbuf, eslERRBUFSIZE, format, ap);
data/infernal-1.1.3/easel/easel.c:151:4:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	  vfprintf(stderr, format, argp);
data/infernal-1.1.3/easel/easel.c:303:7:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      vfprintf(stderr, format, argp);
data/infernal-1.1.3/easel/easel.c:756:12:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      if ( vfprintf(fp, format, argp) < 0 ) ESL_EXCEPTION_SYS(eslEWRITE, "write failed");
data/infernal-1.1.3/easel/easel.c:796:12:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      if ( vprintf(format, argp) < 0 ) ESL_EXCEPTION_SYS(eslEWRITE, "write failed");
data/infernal-1.1.3/easel/easel.c:836:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(new, s);
data/infernal-1.1.3/easel/easel.c:1235:13:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  if ((n2 = vsnprintf(s, n1+1, format, *ap)) >= n1) 
data/infernal-1.1.3/easel/easel.c:1238:11:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      if (vsnprintf(s, n2+1, format, ap2) == -1) ESL_XEXCEPTION(eslESYS, "vsnprintf() failed");
data/infernal-1.1.3/easel/easel.c:1655:26:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  if (lastslash == NULL) strcpy(tail, path);
data/infernal-1.1.3/easel/easel.c:1656:26:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  else                   strcpy(tail, lastslash+1);
data/infernal-1.1.3/easel/easel.c:1750:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(path, file);
data/infernal-1.1.3/easel/easel.c:1752:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(path, file); 
data/infernal-1.1.3/easel/easel.c:1754:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(path, "%s%s", dir, file);
data/infernal-1.1.3/easel/easel.c:1756:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(path, "%s%c%s", dir, eslDIRSLASH, file);	
data/infernal-1.1.3/easel/easel.c:1812:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(new+nf+1, sfx);
data/infernal-1.1.3/easel/easel.c:1888:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(path, "%s%c%s", s, eslDIRSLASH, fname); /* // won't hurt */
data/infernal-1.1.3/easel/easel.h:246:26:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define ESL_DPRINTF1(x)  printf x
data/infernal-1.1.3/easel/easel.h:253:26:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define ESL_DPRINTF2(x)  printf x
data/infernal-1.1.3/easel/easel.h:260:26:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define ESL_DPRINTF3(x)  printf x
data/infernal-1.1.3/easel/esl_alphabet.c:136:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(a->sym, alphabet);
data/infernal-1.1.3/easel/esl_buffer.c:342:17:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  if ((bf->fp = popen(cmd, "r")) == NULL) 
data/infernal-1.1.3/easel/esl_buffer.c:2372:7:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  if (system(cmd) != 0) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_distance.c:1481:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(as[1], as[0]);
data/infernal-1.1.3/easel/esl_dsqdata.c:200:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  if ( sprintf(dd->basename, "%s.dsqi", basename) <= 0)   ESL_XEXCEPTION_SYS(eslESYS, "sprintf() failure");
data/infernal-1.1.3/easel/esl_dsqdata.c:203:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  if ( sprintf(dd->basename, "%s.dsqm", basename) <= 0)   ESL_XEXCEPTION_SYS(eslESYS, "sprintf() failure");
data/infernal-1.1.3/easel/esl_dsqdata.c:206:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  if ( sprintf(dd->basename, "%s.dsqs", basename) <= 0)   ESL_XEXCEPTION_SYS(eslESYS, "sprintf() failure");
data/infernal-1.1.3/easel/esl_dsqdata.c:209:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(dd->basename, basename);
data/infernal-1.1.3/easel/esl_dsqdata.c:636:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(outfile, "%s.dsqm", basename);
data/infernal-1.1.3/easel/esl_dsqdata.c:638:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(outfile, "%s.dsqs", basename);
data/infernal-1.1.3/easel/esl_gencode.c:292:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(gcode->desc, esl_transl_tables[t].desc);
data/infernal-1.1.3/easel/esl_getopts.c:746:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(cmdline, "%s ", g->argv[0]);
data/infernal-1.1.3/easel/esl_getopts.c:757:37:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	if (g->opt[i].type == eslARG_NONE) sprintf(cmdline + ntot, "%s ",    g->opt[i].name);
data/infernal-1.1.3/easel/esl_getopts.c:758:37:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	else                               sprintf(cmdline + ntot, "%s %s ", g->opt[i].name, g->val[i]);
data/infernal-1.1.3/easel/esl_getopts.c:768:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(cmdline + ntot, "%s ", g->argv[j]);
data/infernal-1.1.3/easel/esl_getopts.c:1231:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  strcpy(g->val[opti], optarg);
data/infernal-1.1.3/easel/esl_histogram.c:956:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(buffer, "<%5.1f %6llu %6s|", x+h->w, (unsigned long long) lowcount, "-");
data/infernal-1.1.3/easel/esl_histogram.c:967:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(buffer, ">%5.1f %6llu %6s|", x, (unsigned long long) highcount, "-");
data/infernal-1.1.3/easel/esl_histogram.c:984:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(buffer, "%6.1f %6llu %6s|", x, (unsigned long long) h->obs[i], "-");
data/infernal-1.1.3/easel/esl_histogram.c:991:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(buffer, "%6.1f %6.2e %6s|",   x, (double) h->obs[i], "-");
data/infernal-1.1.3/easel/esl_json.c:1284:12:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      if ( sprintf(sj, "{ \"a\" : %s }", s)       < 0)      esl_fatal(msg);
data/infernal-1.1.3/easel/esl_msa.c:269:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(new_msa->aseq[i], msa->aseq[i]);
data/infernal-1.1.3/easel/esl_msa.c:2315:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  strcpy(new_msa->aseq[nidx], msa->aseq[oidx]);
data/infernal-1.1.3/easel/esl_msafile2.c:213:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(cmd, "gzip -dc %s", filename);
data/infernal-1.1.3/easel/esl_msafile2.c:214:21:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      if ((afp->f = popen(cmd, "r")) == NULL) { status = eslENOTFOUND; goto ERROR; }
data/infernal-1.1.3/easel/esl_msafile_phylip.c:505:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  if (fprintf(fp, " %d %" PRId64, msa->nseq, msa->alen) < 0) ESL_XEXCEPTION_SYS(eslEWRITE, "interleaved phylip write failed");
data/infernal-1.1.3/easel/esl_msashuffle.c:60:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  strcpy(shuf->aseq[i], msa->aseq[i]);
data/infernal-1.1.3/easel/esl_msashuffle.c:441:16:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  if (xs != x) strcpy(xs, x);
data/infernal-1.1.3/easel/esl_msashuffle.c:442:16:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  if (ys != y) strcpy(ys, y);
data/infernal-1.1.3/easel/esl_randomseq.c:226:22:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  if (shuffled != s) strcpy(shuffled, s);
data/infernal-1.1.3/easel/esl_randomseq.c:298:26:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      if (s != shuffled) strcpy(shuffled, s);
data/infernal-1.1.3/easel/esl_randomseq.c:498:22:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  if (shuffled != s) strcpy(shuffled, s);
data/infernal-1.1.3/easel/esl_randomseq.c:579:22:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  if (shuffled != s) strcpy(shuffled, s);
data/infernal-1.1.3/easel/esl_randomseq.c:698:26:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      if (s != markoved) strcpy(markoved, s);
data/infernal-1.1.3/easel/esl_randomseq.c:1584:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(s, s2);
data/infernal-1.1.3/easel/esl_randomseq.c:1600:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(s, s2);
data/infernal-1.1.3/easel/esl_randomseq.c:1616:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(s, s2);
data/infernal-1.1.3/easel/esl_randomseq.c:1632:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(s, s2);
data/infernal-1.1.3/easel/esl_randomseq.c:1712:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(s, s2);
data/infernal-1.1.3/easel/esl_randomseq.c:1739:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(s, s2);
data/infernal-1.1.3/easel/esl_recorder.c:999:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(tmpfile, template);
data/infernal-1.1.3/easel/esl_regexp.c:1537:10:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		(void) strcat(buf, p);
data/infernal-1.1.3/easel/esl_sq.c:302:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(dst->seq, src->seq);
data/infernal-1.1.3/easel/esl_sq.c:303:28:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      if (src->ss != NULL) strcpy(dst->ss, src->ss);
data/infernal-1.1.3/easel/esl_sq.c:305:26:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	if (src->xr[x] != NULL) strcpy(dst->xr[x], src->xr[x]);
data/infernal-1.1.3/easel/esl_sq.c:311:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(dst->ss+1, src->ss);
data/infernal-1.1.3/easel/esl_sq.c:314:30:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  if (src->xr[x] != NULL) { strcpy(dst->xr[x]+1, src->xr[x]); dst->xr[x][0] = '\0'; }
data/infernal-1.1.3/easel/esl_sq.c:320:28:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      if (src->ss != NULL) strcpy(dst->ss, src->ss+1);
data/infernal-1.1.3/easel/esl_sq.c:322:26:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	if (src->xr[x] != NULL) strcpy(dst->xr[x], src->xr[x]+1);
data/infernal-1.1.3/easel/esl_sq.c:330:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(dst->ss+1, src->ss+1);
data/infernal-1.1.3/easel/esl_sq.c:334:28:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	if (src->xr[x] != NULL) { strcpy(dst->xr[x]+1, src->xr[x]+1); dst->xr[x][0] = '\0'; }
data/infernal-1.1.3/easel/esl_sq.c:339:33:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    if (src->xr_tag[x] != NULL) strcpy(dst->xr_tag[x], src->xr_tag[x]);
data/infernal-1.1.3/easel/esl_sq.c:788:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(sq->ss+1, ss);
data/infernal-1.1.3/easel/esl_sq.c:1061:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(sq->name, name);
data/infernal-1.1.3/easel/esl_sq.c:1099:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(sq->acc, acc);
data/infernal-1.1.3/easel/esl_sq.c:1139:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(sq->desc, desc);
data/infernal-1.1.3/easel/esl_sq.c:1177:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(sq->source, source);
data/infernal-1.1.3/easel/esl_sq.c:1215:12:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  if ((n = vsnprintf(sq->name, sq->nalloc, name, argp)) >= sq->nalloc)
data/infernal-1.1.3/easel/esl_sq.c:1219:7:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      vsnprintf(sq->name, sq->nalloc, name, argp2);
data/infernal-1.1.3/easel/esl_sq.c:1257:12:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  if ((n = vsnprintf(sq->acc, sq->aalloc, acc, argp)) >= sq->aalloc)
data/infernal-1.1.3/easel/esl_sq.c:1261:7:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      vsnprintf(sq->acc, sq->aalloc, acc, argp2);
data/infernal-1.1.3/easel/esl_sq.c:1301:12:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  if ((n = vsnprintf(sq->desc, sq->dalloc, desc, argp)) >= sq->dalloc)
data/infernal-1.1.3/easel/esl_sq.c:1305:7:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      vsnprintf(sq->desc, sq->dalloc, desc, argp2);
data/infernal-1.1.3/easel/esl_sq.c:1344:12:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  if ((n = vsnprintf(sq->source, sq->srcalloc, source, argp)) >= sq->srcalloc)
data/infernal-1.1.3/easel/esl_sq.c:1348:7:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      vsnprintf(sq->source, sq->srcalloc, source, argp2);
data/infernal-1.1.3/easel/esl_sq.c:1394:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(sq->desc + dlen, desc);
data/infernal-1.1.3/easel/esl_sq.c:1797:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(sq->seq, msa->aseq[which]);
data/infernal-1.1.3/easel/esl_sq.c:1800:22:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	else                strcpy(sq->ss, ss);
data/infernal-1.1.3/easel/esl_sq.c:1817:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  strcpy(sq->ss+1, ss);
data/infernal-1.1.3/easel/esl_sq.c:1819:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	else  { strcpy(sq->ss+1, ss); sq->ss[0] = '\0'; }
data/infernal-1.1.3/easel/esl_sq.c:1825:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(sq->xr[x]+1, xr[x]);
data/infernal-1.1.3/easel/esl_sq.c:1926:29:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    else                   strcpy(sq->xr[x], xr[x]);
data/infernal-1.1.3/easel/esl_sq.c:1931:33:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    else                       strcpy(sq->xr_tag[x], xr_tag[x]);
data/infernal-1.1.3/easel/esl_sq.c:1951:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(sq->xr[x]+1, xr[x]);
data/infernal-1.1.3/easel/esl_sq.c:1955:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(sq->xr[x]+1, xr[x]); 
data/infernal-1.1.3/easel/esl_sq.c:1962:34:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    else                        strcpy(sq->xr_tag[x], xr_tag[x]);
data/infernal-1.1.3/easel/esl_sq.c:2233:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(sq->name, name);
data/infernal-1.1.3/easel/esl_sq.c:2247:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(sq->desc, desc);
data/infernal-1.1.3/easel/esl_sq.c:2261:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(sq->acc, acc);
data/infernal-1.1.3/easel/esl_sq.c:2314:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(sq2->seq, seq);
data/infernal-1.1.3/easel/esl_sq.c:2438:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(sq2->ss+1, ss);   sq2->ss[0] = '\0';
data/infernal-1.1.3/easel/esl_sq.c:2709:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(sq2->seq, testseq);
data/infernal-1.1.3/easel/esl_sq.c:2772:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(sq2->ss+1, ss); 
data/infernal-1.1.3/easel/esl_sq.h:161:97:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
extern int     esl_sq_FormatName     (ESL_SQ *sq, const char *name,   ...) ESL_ATTRIBUTE_FORMAT(printf, 2, 3);
data/infernal-1.1.3/easel/esl_sq.h:162:97:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
extern int     esl_sq_FormatAccession(ESL_SQ *sq, const char *acc,    ...) ESL_ATTRIBUTE_FORMAT(printf, 2, 3);
data/infernal-1.1.3/easel/esl_sq.h:163:97:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
extern int     esl_sq_FormatDesc     (ESL_SQ *sq, const char *desc,   ...) ESL_ATTRIBUTE_FORMAT(printf, 2, 3);
data/infernal-1.1.3/easel/esl_sq.h:164:97:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
extern int     esl_sq_FormatSource   (ESL_SQ *sq, const char *source, ...) ESL_ATTRIBUTE_FORMAT(printf, 2, 3);
data/infernal-1.1.3/easel/esl_sqio.c:167:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(sqfp->filename, filename);
data/infernal-1.1.3/easel/esl_sqio.c:191:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(list + 2, s1);
data/infernal-1.1.3/easel/esl_sqio.c:199:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(path, s1);
data/infernal-1.1.3/easel/esl_sqio.c:201:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(path+n+1, filename);
data/infernal-1.1.3/easel/esl_sqio.c:1180:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(cache->filename, seqfile);
data/infernal-1.1.3/easel/esl_sqio.c:1209:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(c->name, sq->name);
data/infernal-1.1.3/easel/esl_sqio.c:1216:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(c->acc, sq->acc);
data/infernal-1.1.3/easel/esl_sqio.c:1223:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(c->desc, sq->desc);
data/infernal-1.1.3/easel/esl_sqio.c:1401:24:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  else                 strcpy(msa->aseq[0], sq->seq);
data/infernal-1.1.3/easel/esl_sqio.c:1851:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(ssifile, "%s.ssi", tmpfile);
data/infernal-1.1.3/easel/esl_sqio_ascii.c:221:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(cmd, "gzip -dc %s", filename);
data/infernal-1.1.3/easel/esl_sqio_ascii.c:222:21:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
        ascii->fp = popen(cmd, "r");
data/infernal-1.1.3/easel/esl_sqio_ascii.c:759:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
           strcpy(ascii->errbuf, ascii->afp->errmsg); /* errbufs same size! */
data/infernal-1.1.3/easel/esl_sqio_ascii.c:854:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          strcpy(ascii->errbuf, ascii->afp->errmsg); /* errbufs same size! */
data/infernal-1.1.3/easel/esl_sqio_ascii.c:957:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          strcpy(ascii->errbuf, ascii->afp->errmsg); /* errbufs same size! */
data/infernal-1.1.3/easel/esl_sqio_ascii.c:1136:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(ascii->errbuf, ascii->afp->errmsg); /* errbufs same size! */
data/infernal-1.1.3/easel/esl_sqio_ncbi.c:268:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(name, filename);
data/infernal-1.1.3/easel/esl_sqio_ncbi.c:337:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(name, filename);
data/infernal-1.1.3/easel/esl_sqio_ncbi.c:350:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(dbname, filename);
data/infernal-1.1.3/easel/esl_sqio_ncbi.c:426:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(ncbi->vols[vol].name, dbptr);
data/infernal-1.1.3/easel/esl_ssi.c:1093:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(cmd, "env LC_ALL=POSIX sort -o %s %s\n", ns->ptmpfile, ns->ptmpfile);
data/infernal-1.1.3/easel/esl_ssi.c:1094:11:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      if (system(cmd) != 0)                              ESL_XFAIL(eslESYS, ns->errbuf, "external sort of primary keys failed");
data/infernal-1.1.3/easel/esl_ssi.c:1099:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(cmd, "env LC_ALL=POSIX sort -o %s %s\n", ns->stmpfile, ns->stmpfile);
data/infernal-1.1.3/easel/esl_ssi.c:1100:11:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      if (system(cmd) != 0)                              ESL_XFAIL(eslESYS, ns->errbuf, "external sort of secondary keys failed");
data/infernal-1.1.3/easel/miniapps/esl-afetch.c:30:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, format, argp);
data/infernal-1.1.3/easel/miniapps/esl-alistat.c:265:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	  printf("%-6d %-20s %10s %7d %7" PRId64 " %12" PRId64, 
data/infernal-1.1.3/easel/miniapps/esl-mask.c:26:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, format, argp);
data/infernal-1.1.3/easel/miniapps/esl-selectn.c:32:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, format, argp);
data/infernal-1.1.3/easel/miniapps/esl-seqrange.c:28:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, format, argp);
data/infernal-1.1.3/easel/miniapps/esl-seqstat.c:53:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, format, argp);
data/infernal-1.1.3/easel/miniapps/esl-seqstat.c:173:6:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	    printf("%-30s %6" PRId64, sq->name, sq->L);
data/infernal-1.1.3/easel/miniapps/esl-sfetch.c:31:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, format, argp);
data/infernal-1.1.3/easel/miniapps/esl-shuffle.c:77:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, format, argp);
data/infernal-1.1.3/easel/miniapps/esl-ssdraw.c:2889:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(ps->modelname, curstr);
data/infernal-1.1.3/easel/miniapps/esl-ssdraw.c:3086:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(newstr, curstr);
data/infernal-1.1.3/easel/miniapps/esl-weight.c:43:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, format, argp);
data/infernal-1.1.3/hmmer/profmark/create-profmark.c:126:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, format, argp);
data/infernal-1.1.3/hmmer/profmark/rocplot.c:121:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, format, argp);
data/infernal-1.1.3/hmmer/src/cachedb.c:121:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(cache->id, ptr);
data/infernal-1.1.3/hmmer/src/cachedb.c:194:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(hdr_ptr, buffer);
data/infernal-1.1.3/hmmer/src/cachedb_shard.c:129:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(cache->id, ptr);
data/infernal-1.1.3/hmmer/src/cachedb_shard.c:207:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(hdr_ptr, buffer);
data/infernal-1.1.3/hmmer/src/cachedb_shard.c:406:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(cache->id, ptr);
data/infernal-1.1.3/hmmer/src/cachedb_shard.c:506:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(hdr_ptr, buffer);
data/infernal-1.1.3/hmmer/src/errors.c:32:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, format, argp);
data/infernal-1.1.3/hmmer/src/errors.c:50:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, format, argp);
data/infernal-1.1.3/hmmer/src/generic_fwdback_rescaled.c:308:31:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  if (hmm->flags & p7H_RF)    strcpy(gm->rf,        hmm->rf);
data/infernal-1.1.3/hmmer/src/generic_fwdback_rescaled.c:309:31:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  if (hmm->flags & p7H_MMASK) strcpy(gm->mm,        hmm->mm);
data/infernal-1.1.3/hmmer/src/generic_fwdback_rescaled.c:310:31:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  if (hmm->flags & p7H_CONS)  strcpy(gm->consensus, hmm->consensus); /* must be present, actually, so the flag test is just for symmetry w/ other optional HMM fields */
data/infernal-1.1.3/hmmer/src/generic_fwdback_rescaled.c:311:31:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  if (hmm->flags & p7H_CS)    strcpy(gm->cs,        hmm->cs);
data/infernal-1.1.3/hmmer/src/hmmalign.c:52:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stdout, format, argp);
data/infernal-1.1.3/hmmer/src/hmmbuild.c:361:44:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
apply_fixed_gap_params(P7_HMM *hmm, double popen, double pextend){
data/infernal-1.1.3/hmmer/src/hmmbuild.c:365:10:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
     if (popen != -1) {
data/infernal-1.1.3/hmmer/src/hmmbuild.c:366:39:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
        hmm->t[k][p7H_MM] = 1.0 - 2 * popen;
data/infernal-1.1.3/hmmer/src/hmmbuild.c:367:29:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
        hmm->t[k][p7H_MI] = popen;
data/infernal-1.1.3/hmmer/src/hmmbuild.c:368:29:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
        hmm->t[k][p7H_MD] = popen;
data/infernal-1.1.3/hmmer/src/hmmbuild.c:381:7:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  if (popen != -1) {
data/infernal-1.1.3/hmmer/src/hmmbuild.c:382:36:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    hmm->t[hmm->M][p7H_MM] = 1.0 - popen;
data/infernal-1.1.3/hmmer/src/hmmbuild.c:504:20:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  double           popen;
data/infernal-1.1.3/hmmer/src/hmmbuild.c:595:133:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
        if (esl_opt_IsOn(go, "--mxfile")) status = p7_builder_SetScoreSystem (info[i].bld, esl_opt_GetString(go, "--mxfile"), NULL, popen, pextend, info[i].bg);
data/infernal-1.1.3/hmmer/src/hmmbuild.c:596:133:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
        else                              status = p7_builder_LoadScoreSystem(info[i].bld, mx,                                      popen, pextend, info[i].bg);
data/infernal-1.1.3/hmmer/src/hmmbuild.c:599:69:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
        if (esl_opt_IsUsed(go, "--popen") )  info[i].bld->popen   = popen;
data/infernal-1.1.3/hmmer/src/hmmbuild.c:891:7:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  if (vfprintf(stderr, format, argp) < 0) exit(eslEWRITE);
data/infernal-1.1.3/hmmer/src/hmmbuild.c:962:69:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        if ((status = esl_sq_FetchFromMSA(msa, 0, &sq)) != eslOK) { strcpy(errmsg, bld->errbuf); goto ERROR; }
data/infernal-1.1.3/hmmer/src/hmmbuild.c:963:90:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        if ((status = p7_SingleBuilder(bld, sq, bg, &hmm, NULL, NULL, NULL)) != eslOK) { strcpy(errmsg, bld->errbuf); goto ERROR; }
data/infernal-1.1.3/hmmer/src/hmmbuild.c:968:98:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        if ((status = p7_Builder(bld, msa, bg, &hmm, NULL, NULL, NULL, postmsa_ptr)) != eslOK) { strcpy(errmsg, bld->errbuf); goto ERROR; }
data/infernal-1.1.3/hmmer/src/hmmbuild.c:1048:24:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
        if (info->bld->popen != -1 || info->bld->pextend != -1) {
data/infernal-1.1.3/hmmer/src/hmmbuild.c:1049:50:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
          apply_fixed_gap_params(hmm, info->bld->popen, info->bld->pextend);
data/infernal-1.1.3/hmmer/src/hmmbuild.c:1243:24:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
        if (info->bld->popen != -1 || info->bld->pextend != -1) {
data/infernal-1.1.3/hmmer/src/hmmbuild.c:1244:56:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
          apply_fixed_gap_params(item->hmm, info->bld->popen, info->bld->pextend);
data/infernal-1.1.3/hmmer/src/hmmc2.c:237:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(serv_ip, argv[i+1]);
data/infernal-1.1.3/hmmer/src/hmmc2.c:310:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(seq, buffer);
data/infernal-1.1.3/hmmer/src/hmmdmstr.c:140:16:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  s.msg_size = vsnprintf(ebuf, sizeof(ebuf), format, ap) +1; /* +1 because we send the \0 */
data/infernal-1.1.3/hmmer/src/hmmdmstr.c:1038:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(parms->ip_addr, data->ip_addr);
data/infernal-1.1.3/hmmer/src/hmmdmstr.c:1323:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(parms->ip_addr, data->ip_addr);
data/infernal-1.1.3/hmmer/src/hmmdmstr.c:1707:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(p, parent->seq_db->name);
data/infernal-1.1.3/hmmer/src/hmmdmstr.c:1719:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(p, parent->hmm_db->name);
data/infernal-1.1.3/hmmer/src/hmmdmstr_shard.c:160:16:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  s.msg_size = vsnprintf(ebuf, sizeof(ebuf), format, ap) +1; /* +1 because we send the \0 */
data/infernal-1.1.3/hmmer/src/hmmdmstr_shard.c:1077:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(parms->ip_addr, data->ip_addr);
data/infernal-1.1.3/hmmer/src/hmmdmstr_shard.c:1362:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(parms->ip_addr, data->ip_addr);
data/infernal-1.1.3/hmmer/src/hmmdmstr_shard.c:1747:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(p, parent->seq_db->name);
data/infernal-1.1.3/hmmer/src/hmmdmstr_shard.c:1761:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(p, parent->hmm_db->name);
data/infernal-1.1.3/hmmer/src/hmmdutils.c:177:3:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vprintf(format, ap);
data/infernal-1.1.3/hmmer/src/hmmemit.c:131:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stdout, format, argp);
data/infernal-1.1.3/hmmer/src/hmmer.h:1302:24:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  double               popen;         	 /* gap open probability                                   */
data/infernal-1.1.3/hmmer/src/hmmer.h:1507:108:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
extern int         p7_builder_LoadScoreSystem(P7_BUILDER *bld, const char *matrix,                  double popen, double pextend, P7_BG *bg);
data/infernal-1.1.3/hmmer/src/hmmer.h:1508:108:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
extern int         p7_builder_SetScoreSystem (P7_BUILDER *bld, const char *mxfile, const char *env, double popen, double pextend, P7_BG *bg);
data/infernal-1.1.3/hmmer/src/hmmer.h:1770:43:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		       ESL_DMATRIX *P, float *f, double popen, double pextend,
data/infernal-1.1.3/hmmer/src/hmmfetch.c:30:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, format, argp);
data/infernal-1.1.3/hmmer/src/hmmscan.c:582:9:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  len = vsnprintf(str, sizeof(str), format, argp);
data/infernal-1.1.3/hmmer/src/hmmsearch.c:667:9:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  len = vsnprintf(str, sizeof(str), format, argp);
data/infernal-1.1.3/hmmer/src/hmmsim.c:452:61:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	      if      (status == eslEOD)       { xstatus = status; sprintf(errbuf, "read failed, HMM file %s may be truncated?", cfg->hmmfile); }
data/infernal-1.1.3/hmmer/src/hmmsim.c:453:61:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	      else if (status == eslEFORMAT)   { xstatus = status; sprintf(errbuf, "bad file format in HMM file %s",             cfg->hmmfile); }
data/infernal-1.1.3/hmmer/src/hmmsim.c:454:61:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	      else if (status == eslEINCOMPAT) { xstatus = status; sprintf(errbuf, "HMM file %s contains different alphabets",   cfg->hmmfile); }
data/infernal-1.1.3/hmmer/src/hmmsim.c:455:61:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	      else if (status != eslEOF)       { xstatus = status; sprintf(errbuf, "Unexpected error in reading HMMs from %s",   cfg->hmmfile); }
data/infernal-1.1.3/hmmer/src/impl_sse/p7_oprofile.c:1038:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(om->rf,        gm->rf);
data/infernal-1.1.3/hmmer/src/impl_sse/p7_oprofile.c:1039:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(om->mm,        gm->mm);
data/infernal-1.1.3/hmmer/src/impl_sse/p7_oprofile.c:1040:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(om->cs,        gm->cs);
data/infernal-1.1.3/hmmer/src/impl_sse/p7_oprofile.c:1041:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(om->consensus, gm->consensus);
data/infernal-1.1.3/hmmer/src/impl_vmx/p7_oprofile.c:953:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(om->rf,        gm->rf);
data/infernal-1.1.3/hmmer/src/impl_vmx/p7_oprofile.c:954:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(om->mm,        gm->mm);
data/infernal-1.1.3/hmmer/src/impl_vmx/p7_oprofile.c:955:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(om->cs,        gm->cs);
data/infernal-1.1.3/hmmer/src/impl_vmx/p7_oprofile.c:956:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(om->consensus, gm->consensus);
data/infernal-1.1.3/hmmer/src/jackhmmer.c:844:9:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  len = vsnprintf(str, sizeof(str), format, argp);
data/infernal-1.1.3/hmmer/src/makehmmerdb.c:652:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          else  strcpy(meta->seq_data[numseqs].name, block->list[i].name );
data/infernal-1.1.3/hmmer/src/makehmmerdb.c:654:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          else  strcpy(meta->seq_data[numseqs].acc, block->list[i].acc );
data/infernal-1.1.3/hmmer/src/makehmmerdb.c:656:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          else  strcpy(meta->seq_data[numseqs].source, block->list[i].source );
data/infernal-1.1.3/hmmer/src/makehmmerdb.c:658:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          else  strcpy(meta->seq_data[numseqs].desc, block->list[i].desc );
data/infernal-1.1.3/hmmer/src/modelconfig.c:77:31:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  if (hmm->flags & p7H_RF)    strcpy(gm->rf,        hmm->rf);
data/infernal-1.1.3/hmmer/src/modelconfig.c:78:31:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  if (hmm->flags & p7H_MMASK) strcpy(gm->mm,        hmm->mm);
data/infernal-1.1.3/hmmer/src/modelconfig.c:79:31:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  if (hmm->flags & p7H_CONS)  strcpy(gm->consensus, hmm->consensus); /* must be present, actually, so the flag test is just for symmetry w/ other optional HMM fields */
data/infernal-1.1.3/hmmer/src/modelconfig.c:80:31:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  if (hmm->flags & p7H_CS)    strcpy(gm->cs,        hmm->cs);
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:169:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(ad->hmmname, om->name);
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:170:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  if (om->acc  != NULL) strcpy(ad->hmmacc,  om->acc);  else ad->hmmacc[0]  = 0;
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:171:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  if (om->desc != NULL) strcpy(ad->hmmdesc, om->desc); else ad->hmmdesc[0] = 0;
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:173:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(ad->sqname,  sq->name);
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:174:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(ad->sqacc,   sq->acc);
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:175:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(ad->sqdesc,  sq->desc);
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:604:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy((char *) ptr, obj->rfline);
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:610:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy((char *) ptr, obj->mmline);
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:616:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy((char *) ptr, obj->csline);
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:621:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy((char *) ptr, obj->model);
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:625:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy((char *) ptr, obj->mline);
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:630:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy((char *) ptr, obj->aseq);
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:636:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy((char *) ptr, obj->ntseq);
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:642:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy((char *) ptr, obj->ppline);
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:647:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy((char *) ptr, obj->hmmname);
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:651:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy((char *) ptr, obj->hmmacc);
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:655:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy((char *) ptr, obj->hmmdesc);
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:659:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy((char *) ptr, obj->sqname);
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:663:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy((char *) ptr, obj->sqacc);
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:667:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy((char *) ptr, obj->sqdesc);
data/infernal-1.1.3/hmmer/src/p7_builder.c:196:72:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
p7_builder_LoadScoreSystem(P7_BUILDER *bld, const char *matrix, double popen, double pextend, P7_BG *bg)
data/infernal-1.1.3/hmmer/src/p7_builder.c:228:18:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  bld->popen   = popen;
data/infernal-1.1.3/hmmer/src/p7_builder.c:283:88:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
p7_builder_SetScoreSystem(P7_BUILDER *bld, const char *mxfile, const char *env, double popen, double pextend, P7_BG *bg)
data/infernal-1.1.3/hmmer/src/p7_builder.c:327:18:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  bld->popen   = popen;
data/infernal-1.1.3/hmmer/src/p7_builder.c:506:85:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  if ((status = p7_Seqmodel(bld->abc, sq->dsq, sq->n, sq->name, bld->Q, bg->f, bld->popen, bld->pextend, &hmm)) != eslOK) goto ERROR;
data/infernal-1.1.3/hmmer/src/p7_hit.c:326:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy((char *) ptr, obj->name);
data/infernal-1.1.3/hmmer/src/p7_hit.c:331:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy((char *) ptr, obj->acc);
data/infernal-1.1.3/hmmer/src/p7_hit.c:337:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy((char *) ptr, obj->desc);
data/infernal-1.1.3/hmmer/src/p7_hit.c:521:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(ret_obj->name, (char *) ptr);
data/infernal-1.1.3/hmmer/src/p7_hit.c:534:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(ret_obj->acc, (char *) ptr);
data/infernal-1.1.3/hmmer/src/p7_hit.c:551:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(ret_obj->desc, (char *) ptr);
data/infernal-1.1.3/hmmer/src/p7_hmm.c:416:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(hmm->name, name);
data/infernal-1.1.3/hmmer/src/p7_hmm.c:454:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(hmm->acc, acc);
data/infernal-1.1.3/hmmer/src/p7_hmm.c:487:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(hmm->desc, desc);
data/infernal-1.1.3/hmmer/src/p7_hmm.c:532:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(hmm->comlog, argv[i]);
data/infernal-1.1.3/hmmer/src/p7_hmm.c:535:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(hmm->comlog, argv[argc-1]);
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:323:19:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    if ((hfp->f = popen(cmd, "r")) == NULL)                             ESL_XFAIL(eslENOTFOUND, errbuf, "gzip -dc %s failed; gzip not installed or not in PATH?", filename);
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:789:54:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  if      (format == p7_HMMFILE_3f)  { if ((offset = sprintf(ret_hmm, "HMMER3/f [%s | %s]\n",  HMMER_VERSION, HMMER_DATE))                              < 0) return eslEWRITE; }
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:790:54:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  else if (format == p7_HMMFILE_3e)  { if ((offset = sprintf(ret_hmm, "HMMER3/e [%s | %s; reverse compatibility mode]\n", HMMER_VERSION, HMMER_DATE))   < 0) return eslEWRITE; }
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:791:54:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  else if (format == p7_HMMFILE_3d)  { if ((offset = sprintf(ret_hmm, "HMMER3/d [%s | %s; reverse compatibility mode]\n", HMMER_VERSION, HMMER_DATE))   < 0) return eslEWRITE; }
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:792:54:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  else if (format == p7_HMMFILE_3c)  { if ((offset = sprintf(ret_hmm, "HMMER3/c [%s | %s; reverse compatibility mode]\n", HMMER_VERSION, HMMER_DATE))    < 0) return eslEWRITE; }
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:793:54:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  else if (format == p7_HMMFILE_3b)  { if ((offset = sprintf(ret_hmm, "HMMER3/b [%s | %s; reverse compatibility mode]\n", HMMER_VERSION, HMMER_DATE))    < 0) return eslEWRITE; }
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:794:54:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  else if (format == p7_HMMFILE_3a)  { if ((offset = sprintf(ret_hmm, "HMMER3/a [%s | %s; reverse compatibility mode]\n", HMMER_VERSION, HMMER_DATE))    < 0) return eslEWRITE; }
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:798:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  if ((offset = sprintf(ret_hmm + coffset, "NAME  %s\n", hmm->name))                              < 0) return eslEWRITE;
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:802:18:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    if((offset = sprintf(ret_hmm + coffset, "ACC   %s\n", hmm->acc))                              < 0) return eslEWRITE;
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:807:19:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    if ((offset = sprintf(ret_hmm + coffset, "DESC  %s\n", hmm->desc))                            < 0) return eslEWRITE;
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:819:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  if ((offset = sprintf(ret_hmm + coffset, "ALPH  %s\n", esl_abc_DecodeType(hmm->abc->type)))     < 0) return eslEWRITE;
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:822:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  if ((offset = sprintf(ret_hmm+coffset, "RF    %s\n", (hmm->flags & p7H_RF)    ? "yes" : "no"))  < 0) return eslEWRITE;
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:826:19:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    if ((offset = sprintf(ret_hmm+coffset, "MM    %s\n", (hmm->flags & p7H_MMASK) ? "yes" : "no"))  < 0) return eslEWRITE;
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:831:18:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    if((offset = sprintf(ret_hmm+coffset, "CONS  %s\n", (hmm->flags & p7H_CONS)  ? "yes" : "no")) < 0) return eslEWRITE;
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:835:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  if ((offset = sprintf(ret_hmm+coffset, "CS    %s\n", (hmm->flags & p7H_CS)    ? "yes" : "no"))  < 0) return eslEWRITE;
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:838:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  if ((offset = sprintf(ret_hmm+coffset, "MAP   %s\n", (hmm->flags & p7H_MAP)   ? "yes" : "no"))  < 0) return eslEWRITE;
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:842:20:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      if((offset = sprintf(ret_hmm + coffset, "DATE  %s\n", hmm->ctime))                          < 0) return eslEWRITE;
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:915:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  if ((offset = sprintf(ret_hmm + coffset, "        %8s %8s %8s %8s %8s %8s %8s\n",
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:966:21:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      if ((offset = sprintf(ret_hmm + coffset, " %6s", "-"))         < 0) return eslEWRITE;
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:2116:21:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      if ((offset = sprintf(*ret_str + *coffset, "%s [%d] ", pfx, nline++)) < 0) return eslEWRITE;
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:2124:21:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      if ((offset = sprintf(*ret_str + *coffset, "%s [%d] %s\n", pfx, nline++, sptr)) < 0) return eslEWRITE;
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:2165:28:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  if      (p == 0.0) { if (sprintf(*str+offset, " %*s",   fieldwidth, "*")      < 0) return( eslEWRITE ); }
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:2383:33:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  if (format < p7_HMMFILE_3e) { strcpy(new->consensus, hmm->consensus); }
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:2397:33:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  if (format < p7_HMMFILE_3e) { strcpy(new->consensus, hmm->consensus); }
data/infernal-1.1.3/hmmer/src/p7_profile.c:176:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(dst->rf,        src->rf);         /* RF is optional: if it's not set, *rf=0, and strcpy still works fine */
data/infernal-1.1.3/hmmer/src/p7_profile.c:177:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(dst->mm,        src->mm);         /* MM is also optional annotation */
data/infernal-1.1.3/hmmer/src/p7_profile.c:178:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(dst->cs,        src->cs);         /* CS is also optional annotation */
data/infernal-1.1.3/hmmer/src/p7_profile.c:179:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(dst->consensus, src->consensus);  /* consensus though is always present on a valid profile */
data/infernal-1.1.3/hmmer/src/phmmer.c:726:9:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  len = vsnprintf(str, sizeof(str), format, argp);
data/infernal-1.1.3/hmmer/src/seqmodel.c:49:39:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	    ESL_DMATRIX *Q, float *f, double popen, double pextend,
data/infernal-1.1.3/hmmer/src/seqmodel.c:67:37:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      hmm->t[k][p7H_MM] = 1.0 - 2 * popen;
data/infernal-1.1.3/hmmer/src/seqmodel.c:68:27:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      hmm->t[k][p7H_MI] = popen;
data/infernal-1.1.3/hmmer/src/seqmodel.c:69:27:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      hmm->t[k][p7H_MD] = popen;
data/infernal-1.1.3/hmmer/src/seqmodel.c:79:29:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  hmm->t[M][p7H_MM] = 1.0 - popen;
data/infernal-1.1.3/hmmer/src/seqmodel.c:205:63:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      p7_Seqmodel(abc, qsq->dsq, qsq->n, qsq->name, Q, bg->f, popen, pextend, &hmm);
data/infernal-1.1.3/hmmer/src/seqmodel.c:253:52:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  if ( p7_builder_LoadScoreSystem(bld, "BLOSUM62", popen, pextend, bg)                   != eslOK) esl_fatal(msg); 
data/infernal-1.1.3/hmmer/src/seqmodel.c:254:63:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  if ( p7_Seqmodel(abc, dsq, L, "aatest", bld->Q, bg->f, bld->popen, bld->pextend, &hmm) != eslOK) esl_fatal(msg);
data/infernal-1.1.3/rmark/rmark-create.c:148:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, format, argp);
data/infernal-1.1.3/rmark/rmark-rocplot.c:149:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, format, argp);
data/infernal-1.1.3/src/cm.c:2595:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(cm->name, name);
data/infernal-1.1.3/src/cm.c:2633:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(cm->acc, acc);
data/infernal-1.1.3/src/cm.c:2666:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(cm->desc, desc);
data/infernal-1.1.3/src/cm.c:2793:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(cm->comlog, argv[i]);
data/infernal-1.1.3/src/cm.c:2796:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(cm->comlog, argv[argc-1]);
data/infernal-1.1.3/src/cm.c:2801:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(cm->comlog, seedstr);
data/infernal-1.1.3/src/cm_alidisplay.c:289:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(ad->cmname, cm->name);
data/infernal-1.1.3/src/cm_alidisplay.c:290:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  if (cm->acc  != NULL) strcpy(ad->cmacc,  cm->acc);  else ad->cmacc[0]  = 0;
data/infernal-1.1.3/src/cm_alidisplay.c:291:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  if (cm->desc != NULL) strcpy(ad->cmdesc, cm->desc); else ad->cmdesc[0] = 0;
data/infernal-1.1.3/src/cm_alidisplay.c:292:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(ad->sqname,  sq->name);
data/infernal-1.1.3/src/cm_alidisplay.c:293:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(ad->sqacc,   sq->acc);
data/infernal-1.1.3/src/cm_alidisplay.c:294:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(ad->sqdesc,  sq->desc);
data/infernal-1.1.3/src/cm_alidisplay.c:297:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(ad->aseq_el,   tmpmsa->aseq[0]);
data/infernal-1.1.3/src/cm_alidisplay.c:298:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(ad->rfline_el, tmpmsa->rf);
data/infernal-1.1.3/src/cm_alidisplay.c:299:20:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  if(adata->ppstr) strcpy(ad->ppline_el, tmpmsa->pp[0]);
data/infernal-1.1.3/src/cm_alidisplay.c:328:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(ad->aseq+pos,  "<[%*s]*", wtrunc_R-4, "0");
data/infernal-1.1.3/src/cm_alidisplay.c:585:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(ad->aseq+pos,  "*[%*s]>", wtrunc_L-4, "0");
data/infernal-1.1.3/src/cm_alidisplay.c:740:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(ad->cmname, cm->name);
data/infernal-1.1.3/src/cm_alidisplay.c:741:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  if (cm->acc  != NULL) strcpy(ad->cmacc,  cm->acc);  else ad->cmacc[0]  = 0;
data/infernal-1.1.3/src/cm_alidisplay.c:742:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  if (cm->desc != NULL) strcpy(ad->cmdesc, cm->desc); else ad->cmdesc[0] = 0;
data/infernal-1.1.3/src/cm_alidisplay.c:743:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(ad->sqname,  sq->name);
data/infernal-1.1.3/src/cm_alidisplay.c:744:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(ad->sqacc,   sq->acc);
data/infernal-1.1.3/src/cm_alidisplay.c:745:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(ad->sqdesc,  sq->desc);
data/infernal-1.1.3/src/cm_alidisplay.c:748:20:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  if(p7ad->rfline) strcpy(ad->rfline,  p7ad->rfline);
data/infernal-1.1.3/src/cm_alidisplay.c:749:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(ad->csline,  p7ad->csline);
data/infernal-1.1.3/src/cm_alidisplay.c:750:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(ad->model,   p7ad->model);
data/infernal-1.1.3/src/cm_alidisplay.c:751:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(ad->mline,   p7ad->mline);
data/infernal-1.1.3/src/cm_alidisplay.c:752:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(ad->aseq,    p7ad->aseq);
data/infernal-1.1.3/src/cm_alidisplay.c:753:20:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  if(p7ad->ppline) strcpy(ad->ppline,  p7ad->ppline);
data/infernal-1.1.3/src/cm_file.c:304:22:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      if ((cmfp->f = popen(cmd, "r")) == NULL)                             ESL_XFAIL(eslENOTFOUND, errbuf, "gzip -dc %s failed; gzip not installed or not in PATH?", filename);
data/infernal-1.1.3/src/cm_p7_modelmaker.c:190:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(cm->mlp7->rf, cm->rf);
data/infernal-1.1.3/src/cm_parsetree.c:1172:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(msa->au, "Infernal %s", INFERNAL_VERSION);
data/infernal-1.1.3/src/cm_tophits.c:2468:9:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
        sprintf(any_oidxstr, "%" PRId64, ao);
data/infernal-1.1.3/src/cm_tophits.c:2487:9:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
        sprintf(win_oidxstr, "%" PRId64, wo);
data/infernal-1.1.3/src/cmalign.c:1332:9:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  len = vsnprintf(str, sizeof(str), format, argp);
data/infernal-1.1.3/src/cmbuild.c:2090:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      { strcpy(errbuf, cfg->fp7_bld->errbuf); return status; }
data/infernal-1.1.3/src/cmbuild.c:2100:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(fhmm->rf, cm->rf);
data/infernal-1.1.3/src/cmbuild.c:2106:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(fhmm->cs+1, cm->cmcons->cstr); /* careful: off-by-one */
data/infernal-1.1.3/src/cmcalibrate.c:1321:9:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  len = vsnprintf(str, sizeof(str), format, argp);
data/infernal-1.1.3/src/cmcalibrate.c:1496:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(cfg->tmpfile, cfg->cmfile);
data/infernal-1.1.3/src/cmemit.c:365:28:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      if(cm->name != NULL) sprintf(name, "%s-sample%d", cm->name, i+offset);
data/infernal-1.1.3/src/cmemit.c:515:23:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	if(cm->name != NULL) sprintf(name, "%s-sample%d", cm->name, i+offset);
data/infernal-1.1.3/src/cmemit.c:539:23:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	if(cm->name != NULL) sprintf(name, "%s-sample%d", cm->name, i+offset);
data/infernal-1.1.3/src/cmfetch.c:33:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, format, argp);
data/infernal-1.1.3/src/cmscan.c:2711:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(dest_sq->name, src_sq->name);
data/infernal-1.1.3/src/cmscan.c:2719:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(dest_sq->desc, src_sq->desc);
data/infernal-1.1.3/src/cmscan.c:2727:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(dest_sq->acc, src_sq->acc);
data/infernal-1.1.3/src/cmscan.c:2906:9:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  len = vsnprintf(str, sizeof(str), format, argp);
data/infernal-1.1.3/src/cmsearch.c:2240:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(tmp_filename, (*dbfp_ptr)->filename);
data/infernal-1.1.3/src/cmsearch.c:2262:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(tmp_filename, (*dbfp_ptr)->filename);
data/infernal-1.1.3/src/cmsearch.c:2503:9:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  len = vsnprintf(str, sizeof(str), format, argp);
data/infernal-1.1.3/src/cp9_trace.c:1269:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(msa->au, "Infernal %s", INFERNAL_VERSION);
data/infernal-1.1.3/src/errors.c:43:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, format, argp);
data/infernal-1.1.3/src/errors.c:62:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, format, argp);
data/infernal-1.1.3/easel/easel.c:1878:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if ((s = getenv(env)) == NULL) return eslENOTFOUND;
data/infernal-1.1.3/easel/easel.c:1986:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      tmpdir = getenv("TMPDIR");
data/infernal-1.1.3/easel/easel.c:1987:36:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      if (tmpdir == NULL) tmpdir = getenv("TMP");
data/infernal-1.1.3/easel/esl_getopts.c:477:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	(optarg = getenv(g->opt[i].envvar)) != NULL)
data/infernal-1.1.3/easel/esl_sqio.c:189:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      if ((s1 = getenv(env)) == NULL) { status = eslENOTFOUND; goto ERROR; }
data/infernal-1.1.3/hmmer/src/p7_hmmd_search_stats.c:518:3:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  srand(time(0)); // reseed randomness
data/infernal-1.1.3/hmmer/src/p7_tophits.c:2004:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (getenv("SOURCE_DATE_EPOCH") != NULL) {
data/infernal-1.1.3/src/cm.c:2852:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char *sde = getenv("SOURCE_DATE_EPOCH");
data/infernal-1.1.3/src/cm_tophits.c:2783:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (getenv("SOURCE_DATE_EPOCH") != NULL) {
data/infernal-1.1.3/easel/easel.c:898:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((*dest)+len1, src, len2);
data/infernal-1.1.3/easel/easel.c:1609:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(filename, "r"))) { fclose(fp); return TRUE; }
data/infernal-1.1.3/easel/easel.c:1889:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((fp = fopen(path, "r")) != NULL) break;      
data/infernal-1.1.3/easel/easel.c:1993:13:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
  if ((fd = mkstemp(path)) <  0)        ESL_XEXCEPTION(eslESYS, "mkstemp() failed.");
data/infernal-1.1.3/easel/easel.c:2070:13:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
  if ((fd = mkstemp(basename6X)) <  0)  return eslFAIL;
data/infernal-1.1.3/easel/easel.c:2472:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  tmpfile[32] = "esltmpXXXXXX";
data/infernal-1.1.3/easel/easel.c:2472:9:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  char  tmpfile[32] = "esltmpXXXXXX";
data/infernal-1.1.3/easel/easel.c:2480:25:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if (esl_tmpfile_named(tmpfile, &fp) != eslOK) esl_fatal(msg);
data/infernal-1.1.3/easel/easel.c:2484:24:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if (! esl_FileExists(tmpfile)) esl_fatal(msg);
data/infernal-1.1.3/easel/easel.c:2488:12:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if (stat(tmpfile, &st)   != 0) esl_fatal(msg);
data/infernal-1.1.3/easel/easel.c:2490:13:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if (chmod(tmpfile, mode) != 0) esl_fatal(msg);
data/infernal-1.1.3/easel/easel.c:2491:22:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if (esl_FileExists(tmpfile))   esl_fatal(msg);
data/infernal-1.1.3/easel/easel.c:2494:10:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  remove(tmpfile);
data/infernal-1.1.3/easel/easel.c:2495:22:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if (esl_FileExists(tmpfile))   esl_fatal(msg);
data/infernal-1.1.3/easel/easel.c:2502:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  tmpfile[32]  = "esltmpXXXXXX";
data/infernal-1.1.3/easel/easel.c:2502:9:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  char  tmpfile[32]  = "esltmpXXXXXX";
data/infernal-1.1.3/easel/easel.c:2504:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  buf[256];
data/infernal-1.1.3/easel/easel.c:2506:25:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if (esl_tmpfile_named(tmpfile, &fp) != eslOK) esl_fatal(msg);
data/infernal-1.1.3/easel/easel.c:2509:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(tmpfile, "r"))   == NULL)  esl_fatal(msg);
data/infernal-1.1.3/easel/easel.c:2509:19:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if ((fp = fopen(tmpfile, "r"))   == NULL)  esl_fatal(msg);
data/infernal-1.1.3/easel/easel.c:2513:10:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  remove(tmpfile);
data/infernal-1.1.3/easel/easel.c:2604:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  tmpfile1[32]  = "esltmpXXXXXX"; /* a transient, secure tmpfile: 6 X's are important */
data/infernal-1.1.3/easel/easel.c:2605:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  tmpfile2[32]  = "esltmpXXXXXX"; /* a named tmpfile                                  */
data/infernal-1.1.3/easel/easel.c:2607:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  buf[256];
data/infernal-1.1.3/easel/easel.c:2624:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fp = fopen(tmpfile2, "r");
data/infernal-1.1.3/easel/esl_alphabet.c:792:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dcopy, dsq, sizeof(ESL_DSQ) * (L+2));
data/infernal-1.1.3/easel/esl_alphabet.c:833:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(new, dsq, sizeof(ESL_DSQ) * (L+2));
data/infernal-1.1.3/easel/esl_buffer.c:205:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((bf->fp = fopen(filename, "rb")) == NULL) 
data/infernal-1.1.3/easel/esl_buffer.c:1080:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p, bf->mem+bf->pos, nc);
data/infernal-1.1.3/easel/esl_buffer.c:1146:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(s, bf->mem+bf->pos, nc);
data/infernal-1.1.3/easel/esl_buffer.c:1343:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(tok, bf->mem+bf->pos, nc);
data/infernal-1.1.3/easel/esl_buffer.c:1426:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(tok, bf->mem+bf->pos, nc);
data/infernal-1.1.3/easel/esl_buffer.c:1502:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(p, bf->mem+bf->pos, nbytes);
data/infernal-1.1.3/easel/esl_buffer.c:1955:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE       *fp = fopen(filename, "rb");
data/infernal-1.1.3/easel/esl_buffer.c:1976:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE       *fp = fopen(filename, "rb");
data/infernal-1.1.3/easel/esl_buffer.c:1995:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE       *fp   = fopen(filename, "rb");
data/infernal-1.1.3/easel/esl_buffer.c:2023:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fd = open(filename, O_RDONLY);
data/infernal-1.1.3/easel/esl_buffer.c:2043:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fd = open(filename, O_RDONLY);
data/infernal-1.1.3/easel/esl_buffer.c:2057:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE     *fp    = fopen(filename, "rb");
data/infernal-1.1.3/easel/esl_buffer.c:2074:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *fp  = fopen(filename, "rb");
data/infernal-1.1.3/easel/esl_buffer.c:2091:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *fp  = fopen(filename, "rb");
data/infernal-1.1.3/easel/esl_buffer.c:2116:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *fp  = fopen(filename, "rb");
data/infernal-1.1.3/easel/esl_buffer.c:2199:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((bf->fp = fopen(filename, "rb"))           == NULL)  esl_fatal(msg);
data/infernal-1.1.3/easel/esl_buffer.c:2230:48:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
create_testfile_lines(ESL_RANDOMNESS *r, char *tmpfile, int nlines)
data/infernal-1.1.3/easel/esl_buffer.c:2244:25:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if (esl_tmpfile_named(tmpfile, &fp) != eslOK) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_buffer.c:2311:29:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
utest_SetOffset(const char *tmpfile, int nlines_expected)
data/infernal-1.1.3/easel/esl_buffer.c:2325:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char        gzipfile[32];
data/infernal-1.1.3/easel/esl_buffer.c:2326:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char        cmd[256];     
data/infernal-1.1.3/easel/esl_buffer.c:2331:23:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if (esl_buffer_Open(tmpfile, NULL, &bf)  != eslOK) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_buffer.c:2354:24:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if ( esl_buffer_Open(tmpfile, NULL, &bf)   != eslOK) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_buffer.c:2370:37:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  snprintf(gzipfile,   32, "%s.gz", tmpfile);
data/infernal-1.1.3/easel/esl_buffer.c:2371:59:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  snprintf(cmd,       256, "gzip -c %s 2>/dev/null > %s", tmpfile, gzipfile);
data/infernal-1.1.3/easel/esl_buffer.c:2376:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( (fp = fopen(tmpfile, "r"))            == NULL) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_buffer.c:2376:20:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if ( (fp = fopen(tmpfile, "r"))            == NULL) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_buffer.c:2406:25:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if (buffer_OpenFileAs(tmpfile, eslBUFFER_FILE, &bf) != eslOK) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_buffer.c:2430:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char       line[8192];
data/infernal-1.1.3/easel/esl_buffer.c:2677:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char        tmpfile[32] = "esltmpXXXXXX";
data/infernal-1.1.3/easel/esl_buffer.c:2677:15:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  char        tmpfile[32] = "esltmpXXXXXX";
data/infernal-1.1.3/easel/esl_buffer.c:2685:25:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if (esl_tmpfile_named(tmpfile, &fp) != eslOK) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_buffer.c:2690:28:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if (esl_buffer_OpenFile (tmpfile, &bf)   != eslOK) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_buffer.c:2700:10:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  remove(tmpfile);
data/infernal-1.1.3/easel/esl_buffer.c:2705:28:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
utest_OpenFile(const char *tmpfile, int nlines)
data/infernal-1.1.3/easel/esl_buffer.c:2715:30:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
utest_OpenStream(const char *tmpfile, int nlines)
data/infernal-1.1.3/easel/esl_buffer.c:2727:28:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
utest_OpenPipe(const char *tmpfile, int nlines)
data/infernal-1.1.3/easel/esl_buffer.c:2736:27:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if (esl_buffer_OpenPipe(tmpfile,           badcmd,  &bf) != eslFAIL      || bf == NULL) esl_fatal(msg); else esl_buffer_Close(bf);
data/infernal-1.1.3/easel/esl_buffer.c:2817:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            tmpfile[32] = "esltmpXXXXXX";
data/infernal-1.1.3/easel/esl_buffer.c:2817:19:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  char            tmpfile[32] = "esltmpXXXXXX";
data/infernal-1.1.3/easel/esl_buffer.c:2823:28:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  create_testfile_lines(r, tmpfile, nlines);    
data/infernal-1.1.3/easel/esl_buffer.c:2824:69:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if (be_verbose) printf("created file %s; rng seed %" PRIu32 "\n", tmpfile, esl_randomness_GetSeed(r));
data/infernal-1.1.3/easel/esl_buffer.c:2826:20:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  utest_OpenFile  (tmpfile, nlines);
data/infernal-1.1.3/easel/esl_buffer.c:2827:20:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  utest_OpenStream(tmpfile, nlines);
data/infernal-1.1.3/easel/esl_buffer.c:2828:20:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  utest_OpenPipe  (tmpfile, nlines);
data/infernal-1.1.3/easel/esl_buffer.c:2830:20:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  utest_SetOffset (tmpfile, nlines);
data/infernal-1.1.3/easel/esl_buffer.c:2841:37:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	case 0:  if (esl_buffer_OpenFile  (tmpfile,                    &bf) != eslOK) esl_fatal(msg);  break;
data/infernal-1.1.3/easel/esl_buffer.c:2842:37:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	case 1:  if (    buffer_OpenFileAs(tmpfile, eslBUFFER_ALLFILE, &bf) != eslOK) esl_fatal(msg);  break;
data/infernal-1.1.3/easel/esl_buffer.c:2843:37:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	case 2:  if (    buffer_OpenFileAs(tmpfile, eslBUFFER_MMAP,    &bf) != eslOK) esl_fatal(msg);  break;
data/infernal-1.1.3/easel/esl_buffer.c:2844:37:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	case 3:  if (    buffer_OpenFileAs(tmpfile, eslBUFFER_FILE,    &bf) != eslOK) esl_fatal(msg);  break;
data/infernal-1.1.3/easel/esl_buffer.c:2846:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	  if ((fp = fopen(tmpfile, "rb"))    == NULL)  esl_fatal(msg);
data/infernal-1.1.3/easel/esl_buffer.c:2846:20:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	  if ((fp = fopen(tmpfile, "rb"))    == NULL)  esl_fatal(msg);
data/infernal-1.1.3/easel/esl_buffer.c:2850:28:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	  if (esl_buffer_OpenPipe(tmpfile, cmdfmt, &bf) != eslOK) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_buffer.c:2853:28:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	  if (esl_buffer_OpenFile(tmpfile, &bftmp) != eslOK) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_buffer.c:2884:10:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  remove(tmpfile);
data/infernal-1.1.3/easel/esl_buffer.c:3035:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char        tmpfile[32] = "esltmpXXXXXX";
data/infernal-1.1.3/easel/esl_buffer.c:3035:15:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  char        tmpfile[32] = "esltmpXXXXXX";
data/infernal-1.1.3/easel/esl_buffer.c:3038:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char        buf[256];
data/infernal-1.1.3/easel/esl_buffer.c:3044:21:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  esl_tmpfile_named(tmpfile, &fp);
data/infernal-1.1.3/easel/esl_buffer.c:3049:28:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  status = esl_buffer_Open(tmpfile, NULL, &bf);
data/infernal-1.1.3/easel/esl_buffer.h:38:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char     errmsg[eslERRBUFSIZE]; /* error message storage                                 */
data/infernal-1.1.3/easel/esl_dmatrix.c:180:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dest->mx[0], src->mx[0], src->ncells * sizeof(double));
data/infernal-1.1.3/easel/esl_dsqdata.c:164:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char         buf[4096];
data/infernal-1.1.3/easel/esl_dsqdata.c:201:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (( dd->ifp = fopen(dd->basename, "rb"))   == NULL)   ESL_XFAIL(eslENOTFOUND, dd->errbuf, "Failed to find or open index file %s\n", dd->basename);
data/infernal-1.1.3/easel/esl_dsqdata.c:204:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (( dd->mfp = fopen(dd->basename, "rb"))   == NULL)   ESL_XFAIL(eslENOTFOUND, dd->errbuf, "Failed to find or open metadata file %s\n", dd->basename);
data/infernal-1.1.3/easel/esl_dsqdata.c:207:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (( dd->sfp = fopen(dd->basename, "rb"))   == NULL)   ESL_XFAIL(eslENOTFOUND, dd->errbuf, "Failed to find or open sequence file %s\n", dd->basename);
data/infernal-1.1.3/easel/esl_dsqdata.c:210:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (( dd->stubfp = fopen(dd->basename, "r")) == NULL)   ESL_XFAIL(eslENOTFOUND, dd->errbuf, "Failed to find or open stub file %s\n", dd->basename);
data/infernal-1.1.3/easel/esl_dsqdata.c:635:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((    ifp = fopen(outfile, "wb"))             == NULL)  ESL_XFAIL(eslEWRITE, errbuf, "failed to open dsqdata index file %s for writing", outfile);
data/infernal-1.1.3/easel/esl_dsqdata.c:637:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((    mfp = fopen(outfile, "wb"))             == NULL)  ESL_XFAIL(eslEWRITE, errbuf, "failed to open dsqdata metadata file %s for writing", outfile);
data/infernal-1.1.3/easel/esl_dsqdata.c:639:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((    sfp = fopen(outfile, "wb"))             == NULL)  ESL_XFAIL(eslEWRITE, errbuf, "failed to open dsqdata sequence file %s for writing", outfile);
data/infernal-1.1.3/easel/esl_dsqdata.c:640:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (( stubfp = fopen(basename, "w"))             == NULL)  ESL_XFAIL(eslEWRITE, errbuf, "failed to open dsqdata stub file %s for writing", basename);
data/infernal-1.1.3/easel/esl_dsqdata.c:1544:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char               tmpfile[16]   = "esltmpXXXXXX";
data/infernal-1.1.3/easel/esl_dsqdata.c:1544:22:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  char               tmpfile[16]   = "esltmpXXXXXX";
data/infernal-1.1.3/easel/esl_dsqdata.c:1545:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char               basename[32];
data/infernal-1.1.3/easel/esl_dsqdata.c:1561:36:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if (( status = esl_tmpfile_named(tmpfile, &tmpfp)) != eslOK) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_dsqdata.c:1574:46:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if (( status = esl_sqfile_OpenDigital(abc, tmpfile, eslSQFILE_FASTA, NULL, &sqfp)) != eslOK) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_dsqdata.c:1575:50:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if ((          snprintf(basename, 32, "%s-db", tmpfile))                           <= 0)     esl_fatal(msg);
data/infernal-1.1.3/easel/esl_dsqdata.c:1598:10:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  remove(tmpfile);
data/infernal-1.1.3/easel/esl_dsqdata.c:1600:40:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  snprintf(basename, 32, "%s-db.dsqi", tmpfile); remove(basename);
data/infernal-1.1.3/easel/esl_dsqdata.c:1601:40:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  snprintf(basename, 32, "%s-db.dsqm", tmpfile); remove(basename);
data/infernal-1.1.3/easel/esl_dsqdata.c:1602:40:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  snprintf(basename, 32, "%s-db.dsqs", tmpfile); remove(basename);
data/infernal-1.1.3/easel/esl_dsqdata.c:1692:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/easel/esl_dsqdata.h:129:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char errbuf[eslERRBUFSIZE];   // User-directed error message in case of a failed open or read.
data/infernal-1.1.3/easel/esl_exponential.c:564:63:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      else if (strcmp(argv[opti], "-n")  == 0) n            = atoi(argv[++opti]);
data/infernal-1.1.3/easel/esl_exponential.c:586:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((pfp = fopen(plotfile, "w")) == NULL) esl_fatal("Failed to open plotfile");
data/infernal-1.1.3/easel/esl_fileparser.c:67:23:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  else if ((efp->fp = fopen(filename, "r")) != NULL) { 
data/infernal-1.1.3/easel/esl_fileparser.c:236:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      { sprintf(efp->errbuf, "esl_strtok() failed"); return tokcode;}
data/infernal-1.1.3/easel/esl_fileparser.c:355:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(efp->buf, prefix, plen);
data/infernal-1.1.3/easel/esl_fileparser.c:546:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(efp->buf, efp->mem_buffer + efp->mem_pos, len);
data/infernal-1.1.3/easel/esl_fileparser.c:553:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      { sprintf(efp->errbuf, "esl_fgets() failed"); return status;}
data/infernal-1.1.3/easel/esl_fileparser.c:583:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp  = fopen(filename, "r"))      == NULL)  esl_fatal("File open failed");
data/infernal-1.1.3/easel/esl_fileparser.c:613:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            expect[32];
data/infernal-1.1.3/easel/esl_fileparser.c:624:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	  sprintf(expect, "token%d", ntok);
data/infernal-1.1.3/easel/esl_fileparser.c:686:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  tmpfile[32] = "esltmpXXXXXX";
data/infernal-1.1.3/easel/esl_fileparser.c:686:9:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  char  tmpfile[32] = "esltmpXXXXXX";
data/infernal-1.1.3/easel/esl_fileparser.c:699:25:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if (esl_tmpfile_named(tmpfile, &fp) != eslOK) esl_fatal("File open failed");
data/infernal-1.1.3/easel/esl_fileparser.c:706:18:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  utest_GetToken(tmpfile);
data/infernal-1.1.3/easel/esl_fileparser.c:707:24:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  utest_GetTokenOnLine(tmpfile);
data/infernal-1.1.3/easel/esl_fileparser.c:710:10:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  remove(tmpfile);
data/infernal-1.1.3/easel/esl_fileparser.h:19:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  errbuf[eslERRBUFSIZE];  /* for holding error diagnostics                   */
data/infernal-1.1.3/easel/esl_gamma.c:704:63:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      else if (strcmp(argv[opti], "-n")  == 0) n            = atoi(argv[++opti]);
data/infernal-1.1.3/easel/esl_gamma.c:727:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((pfp = fopen(plotfile, "w")) == NULL) esl_fatal("Failed to open plotfile");
data/infernal-1.1.3/easel/esl_gencode.c:417:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  aas[65];
data/infernal-1.1.3/easel/esl_gencode.c:418:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  mline[65];
data/infernal-1.1.3/easel/esl_gencode.c:419:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  base1[65];
data/infernal-1.1.3/easel/esl_gencode.c:420:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  base2[65];
data/infernal-1.1.3/easel/esl_gencode.c:421:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  base3[65];
data/infernal-1.1.3/easel/esl_gencode.c:1038:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmpfile[16]       = "esltmpXXXXXX";
data/infernal-1.1.3/easel/esl_gencode.c:1038:8:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  char tmpfile[16]       = "esltmpXXXXXX";
data/infernal-1.1.3/easel/esl_gencode.c:1050:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(tmpfile, "esltmpXXXXXX");
data/infernal-1.1.3/easel/esl_gencode.c:1050:14:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      strcpy(tmpfile, "esltmpXXXXXX");
data/infernal-1.1.3/easel/esl_gencode.c:1054:30:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      if ( esl_tmpfile_named(tmpfile, &ofp)                        != eslOK) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_gencode.c:1058:32:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      if ( esl_fileparser_Open(tmpfile, /*envvar=*/NULL, &efp)     != eslOK) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_gencode.c:1065:14:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      remove(tmpfile);  
data/infernal-1.1.3/easel/esl_gencode.c:1119:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char codon[4];
data/infernal-1.1.3/easel/esl_gencode.h:16:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char    desc[128];         // Description, or "".                ... ditto 
data/infernal-1.1.3/easel/esl_getopts.c:920:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  return atoi(g->val[opti]);
data/infernal-1.1.3/easel/esl_getopts.c:1678:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  n = atoi(arg);
data/infernal-1.1.3/easel/esl_getopts.c:1683:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    lower = atoi(lp);
data/infernal-1.1.3/easel/esl_getopts.c:1688:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    upper = atoi(up);
data/infernal-1.1.3/easel/esl_getopts.c:1934:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char         file1[32] = "esltmpXXXXXX";
data/infernal-1.1.3/easel/esl_getopts.c:1935:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char         file2[32] = "esltmpXXXXXX";
data/infernal-1.1.3/easel/esl_getopts.c:1972:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((f1 = fopen(file1, "r")) == NULL) esl_fatal("getopts fopen() 1 failed");
data/infernal-1.1.3/easel/esl_getopts.c:1973:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((f2 = fopen(file2, "r")) == NULL) esl_fatal("getopts fopen() 2 failed");
data/infernal-1.1.3/easel/esl_getopts.h:70:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  errbuf[eslERRBUFSIZE];	/* buffer for reporting user error     */
data/infernal-1.1.3/easel/esl_gev.c:660:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    do_test[atoi(argv[i])] = 1;
data/infernal-1.1.3/easel/esl_gev.c:664:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen("stats.1", "w")) == NULL) abort();
data/infernal-1.1.3/easel/esl_gev.c:679:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen("stats.2", "w")) == NULL) abort();
data/infernal-1.1.3/easel/esl_gev.c:700:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen("stats.3", "w")) == NULL) abort();
data/infernal-1.1.3/easel/esl_gev.c:715:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen("stats.4", "w")) == NULL) abort();
data/infernal-1.1.3/easel/esl_gev.c:736:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen("stats.5", "w")) == NULL) abort();
data/infernal-1.1.3/easel/esl_gev.c:751:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen("stats.6", "w")) == NULL) abort();
data/infernal-1.1.3/easel/esl_gev.c:773:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen("stats.7", "w")) == NULL) abort();  
data/infernal-1.1.3/easel/esl_gev.c:781:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen("stats.8", "w")) == NULL) abort();  
data/infernal-1.1.3/easel/esl_gev.c:789:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen("stats.9", "w")) == NULL) abort();  
data/infernal-1.1.3/easel/esl_gev.c:797:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen("stats.10", "w")) == NULL) abort();  
data/infernal-1.1.3/easel/esl_heap.c:268:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/easel/esl_histogram.c:883:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char     buffer[81];		  /* output line buffer */
data/infernal-1.1.3/easel/esl_histogram.c:982:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(buffer, "%6.1f %6llu %6d|", x, (unsigned long long) h->obs[i], (int) h->expect[i]);
data/infernal-1.1.3/easel/esl_histogram.c:989:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(buffer, "%6.1f %6.2e %6.2e|", x, (double) h->obs[i], h->expect[i]);
data/infernal-1.1.3/easel/esl_histogram.c:1731:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	  outfp = fopen(ascfile, "w");
data/infernal-1.1.3/easel/esl_histogram.c:1737:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	  outfp = fopen(plotfile, "w");
data/infernal-1.1.3/easel/esl_histogram.c:1743:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	  outfp = fopen(survfile, "w");
data/infernal-1.1.3/easel/esl_histogram.c:1749:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	  outfp = fopen(qqfile, "w");
data/infernal-1.1.3/easel/esl_hmm.c:87:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(dup->t[k],  hmm->t[k],  sizeof(float) * (hmm->M+1));
data/infernal-1.1.3/easel/esl_hmm.c:88:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(dup->e[k],  hmm->e[k],  sizeof(float) * (hmm->abc->K));
data/infernal-1.1.3/easel/esl_hmm.c:92:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(dup->eo[x], hmm->eo[x], sizeof(float) * (hmm->M));
data/infernal-1.1.3/easel/esl_hmm.c:94:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dup->pi, hmm->pi, sizeof(float) * (hmm->M+1));
data/infernal-1.1.3/easel/esl_huffman.c:1041:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE     *fp = fopen(argv[1], "r");
data/infernal-1.1.3/easel/esl_hyperexp.c:572:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  nc = atoi(tok);
data/infernal-1.1.3/easel/esl_hyperexp.c:574:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(e->errbuf, "Expected # of components K >= 1 as first token");
data/infernal-1.1.3/easel/esl_hyperexp.c:592:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(e->errbuf, "Expected a mixture coefficient q[k], 0<=q[k]<=1");
data/infernal-1.1.3/easel/esl_hyperexp.c:596:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(e->errbuf, "Expected a lambda parameter, lambda>0");
data/infernal-1.1.3/easel/esl_hyperexp.c:602:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(e->errbuf, "Expected mixture coefficients to sum to 1");
data/infernal-1.1.3/easel/esl_hyperexp.c:641:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(filename, "r")) == NULL) 
data/infernal-1.1.3/easel/esl_hyperexp.c:1174:63:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      else if (strcmp(argv[opti], "-n")  == 0) n            = atoi(argv[++opti]);
data/infernal-1.1.3/easel/esl_hyperexp.c:1211:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((pfp = fopen(plotfile, "w")) == NULL) 
data/infernal-1.1.3/easel/esl_json.c:1145:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char        errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/easel/esl_json.c:1219:79:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  struct tests_s { char *json;               float trueval; float rtol; float atol; int status; }
data/infernal-1.1.3/easel/esl_json.c:1254:81:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      } else if (esl_FCompareNew(tests[i].trueval, val, tests[i].rtol, tests[i].atol) != eslOK) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_json.c:1269:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char        s[32];                                 // randomly generated decimal string rep of a float
data/infernal-1.1.3/easel/esl_json.c:1270:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char        sj[64];                                // JSON string constructed from <s>, e.g.  { "a" = 42.0 }
data/infernal-1.1.3/easel/esl_keyhash.c:104:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(nw->smem, kh->smem, sizeof(char) * kh->sn);
data/infernal-1.1.3/easel/esl_keyhash.c:542:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            buf[256];
data/infernal-1.1.3/easel/esl_keyhash.c:550:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(file1, "r")) == NULL)
data/infernal-1.1.3/easel/esl_keyhash.c:565:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(file2, "r")) == NULL)
data/infernal-1.1.3/easel/esl_keyhash.c:905:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char         buf[256];
data/infernal-1.1.3/easel/esl_keyhash.c:911:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(argv[1], "r")) == NULL) esl_fatal("couldn't open %s\n", argv[1]);
data/infernal-1.1.3/easel/esl_keyhash.c:924:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(argv[2], "r")) == NULL) esl_fatal("couldn't open %s\n", argv[1]);
data/infernal-1.1.3/easel/esl_mem.c:714:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(s, p, n);
data/infernal-1.1.3/easel/esl_mem.c:737:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dest, p, n);
data/infernal-1.1.3/easel/esl_mem.c:759:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  fixedbuf[128];
data/infernal-1.1.3/easel/esl_mem.c:765:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(fixedbuf, p, sizeof(char) * n);
data/infernal-1.1.3/easel/esl_mem.c:773:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(bigbuf, p, sizeof(char) * n);
data/infernal-1.1.3/easel/esl_mem.c:800:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  fixedbuf[128];
data/infernal-1.1.3/easel/esl_mem.c:806:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(fixedbuf, p, sizeof(char) * n);
data/infernal-1.1.3/easel/esl_mem.c:814:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(bigbuf, p, sizeof(char) * n);
data/infernal-1.1.3/easel/esl_mem.c:1122:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char    s[32];                                    // random generated string representation of a float. Max len of slen+'.'+flen+'e'+"-xx" = 18.
data/infernal-1.1.3/easel/esl_mixdchlet.c:472:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  K = atoi(tok);
data/infernal-1.1.3/easel/esl_mixdchlet.c:476:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  Q = atoi(tok);
data/infernal-1.1.3/easel/esl_mixdchlet.c:719:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            tmpfile[16] = "esltmpXXXXXX";
data/infernal-1.1.3/easel/esl_mixdchlet.c:719:19:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  char            tmpfile[16] = "esltmpXXXXXX";
data/infernal-1.1.3/easel/esl_mixdchlet.c:736:25:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if (esl_tmpfile_named(tmpfile, &fp) != eslOK) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_mixdchlet.c:741:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(tmpfile, "r")) == NULL)        esl_fatal(msg);
data/infernal-1.1.3/easel/esl_mixdchlet.c:741:19:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if ((fp = fopen(tmpfile, "r")) == NULL)        esl_fatal(msg);
data/infernal-1.1.3/easel/esl_mixdchlet.c:751:10:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  remove(tmpfile);
data/infernal-1.1.3/easel/esl_mixgev.c:746:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fp = fopen("data.out", "w");
data/infernal-1.1.3/easel/esl_msa.c:273:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(new_msa->ax[i], msa->ax[i], (msa->alen+2) * sizeof(ESL_DSQ));
data/infernal-1.1.3/easel/esl_msa.c:877:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char errbuf2[eslERRBUFSIZE];
data/infernal-1.1.3/easel/esl_msa.c:1700:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(msa->gs[tagidx][sqidx]+n1+1, value, n2);
data/infernal-1.1.3/easel/esl_msa.c:2312:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy(new_msa->ax[nidx], msa->ax[oidx], sizeof(ESL_DSQ) * (msa->alen+2));
data/infernal-1.1.3/easel/esl_msa.c:3628:23:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
utest_MinimGaps(char *tmpfile)
data/infernal-1.1.3/easel/esl_msa.c:3635:30:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if (esl_msafile_Open(NULL, tmpfile, NULL, eslMSAFILE_STOCKHOLM, NULL, &mfp) != eslOK) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_msa.c:3645:30:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if (esl_msafile_Open(&abc, tmpfile, NULL, eslMSAFILE_STOCKHOLM, NULL, &mfp) != eslOK) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_msa.c:3659:20:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
utest_NoGaps(char *tmpfile)
data/infernal-1.1.3/easel/esl_msa.c:3666:30:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if (esl_msafile_Open(NULL, tmpfile, NULL, eslMSAFILE_STOCKHOLM, NULL, &mfp) != eslOK) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_msa.c:3677:30:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if (esl_msafile_Open(&abc, tmpfile, NULL, eslMSAFILE_STOCKHOLM, NULL, &mfp) != eslOK) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_msa.c:3741:24:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
utest_SymConvert(char *tmpfile)
data/infernal-1.1.3/easel/esl_msa.c:3748:30:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if (esl_msafile_Open(NULL, tmpfile, NULL, eslMSAFILE_STOCKHOLM, NULL, &mfp) != eslOK) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_msa.c:3770:30:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if (esl_msafile_Open(&abc, tmpfile, NULL, eslMSAFILE_STOCKHOLM, NULL, &mfp) != eslOK) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_msa.c:3790:33:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
utest_ZeroLengthMSA(const char *tmpfile)
data/infernal-1.1.3/easel/esl_msa.c:3801:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/easel/esl_msa.c:3804:30:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if (esl_msafile_Open(NULL, tmpfile, NULL, eslMSAFILE_STOCKHOLM, NULL, &mfp) != eslOK) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_msa.c:3828:30:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if (esl_msafile_Open(&abc, tmpfile, NULL, eslMSAFILE_STOCKHOLM, NULL, &mfp) != eslOK) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_msa.c:3912:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            tmpfile[16]  = "esltmpXXXXXX"; /* tmpfile template */
data/infernal-1.1.3/easel/esl_msa.c:3912:19:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  char            tmpfile[16]  = "esltmpXXXXXX"; /* tmpfile template */
data/infernal-1.1.3/easel/esl_msa.c:3924:25:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if (esl_tmpfile_named(tmpfile, &fp) != eslOK) esl_fatal("failed to create tmpfile");
data/infernal-1.1.3/easel/esl_msa.c:3930:30:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if (esl_msafile_Open(NULL, tmpfile, NULL, eslMSAFILE_STOCKHOLM, NULL, &mfp) != eslOK) esl_fatal("Failed to open MSA tmp file");
data/infernal-1.1.3/easel/esl_msa.c:3941:19:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  utest_MinimGaps(tmpfile);
data/infernal-1.1.3/easel/esl_msa.c:3942:16:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  utest_NoGaps(tmpfile);
data/infernal-1.1.3/easel/esl_msa.c:3944:20:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  utest_SymConvert(tmpfile);
data/infernal-1.1.3/easel/esl_msa.c:3945:23:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  utest_ZeroLengthMSA(tmpfile);	
data/infernal-1.1.3/easel/esl_msa.c:3951:30:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if (esl_msafile_Open(&abc, tmpfile, NULL, eslMSAFILE_STOCKHOLM, NULL, &mfp) != eslOK)  esl_fatal("MSA digital open failed");
data/infernal-1.1.3/easel/esl_msa.c:3956:23:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  utest_Digitize(abc, tmpfile);
data/infernal-1.1.3/easel/esl_msa.c:3957:22:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  utest_Textize(abc, tmpfile);
data/infernal-1.1.3/easel/esl_msa.c:3965:10:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  remove(tmpfile);
data/infernal-1.1.3/easel/esl_msafile.c:1281:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          tmpfile1[32] = "esltmpXXXXXX";
data/infernal-1.1.3/easel/esl_msafile.c:1282:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          tmpfile2[32] = "esltmpXXXXXX";
data/infernal-1.1.3/easel/esl_msafile.c:1283:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          tmpfile3[32] = "esltmpXXXXXX";
data/infernal-1.1.3/easel/esl_msafile.h:70:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char                 errmsg[eslERRBUFSIZE];   /* user-directed message for normal errors     */
data/infernal-1.1.3/easel/esl_msafile2.c:225:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((afp->f = fopen(filename, "r")) != NULL)
data/infernal-1.1.3/easel/esl_msafile2.c:1372:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          tmpfile[16] = "esltmpXXXXXX";
data/infernal-1.1.3/easel/esl_msafile2.c:1372:17:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  char          tmpfile[16] = "esltmpXXXXXX";
data/infernal-1.1.3/easel/esl_msafile2.c:1379:25:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if (esl_tmpfile_named(tmpfile, &fp)         != eslOK) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_msafile2.c:1401:30:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if (esl_msafile_Open(NULL, tmpfile, NULL, eslMSAFILE_PFAM, NULL, &afp) != eslOK) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_msafile2.c:1409:10:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  remove(tmpfile);
data/infernal-1.1.3/easel/esl_msafile2.c:1445:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char         tmpfile[16] = "esltmpXXXXXX";
data/infernal-1.1.3/easel/esl_msafile2.c:1445:16:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  char         tmpfile[16] = "esltmpXXXXXX";
data/infernal-1.1.3/easel/esl_msafile2.c:1447:25:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if (esl_tmpfile_named(tmpfile, &fp) != eslOK) esl_fatal("failed to create tmpfile");
data/infernal-1.1.3/easel/esl_msafile2.c:1451:22:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  utest_ReadInfoPfam(tmpfile);
data/infernal-1.1.3/easel/esl_msafile2.c:1452:25:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  utest_RegurgitatePfam(tmpfile);
data/infernal-1.1.3/easel/esl_msafile2.c:1454:10:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  remove(tmpfile);
data/infernal-1.1.3/easel/esl_msafile2.h:34:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  errbuf[eslERRBUFSIZE];  /* buffer for holding parse error info       */
data/infernal-1.1.3/easel/esl_msafile_a2m.c:695:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char                 tmpfile1[32] = "esltmpXXXXXX";   
data/infernal-1.1.3/easel/esl_msafile_a2m.c:696:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char                 tmpfile2[32] = "esltmpXXXXXX";
data/infernal-1.1.3/easel/esl_msafile_a2m.c:786:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          a2mfile2[32] = "esltmpa2m2XXXXXX";
data/infernal-1.1.3/easel/esl_msafile_a2m.c:787:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          stkfile2[32] = "esltmpstk2XXXXXX";
data/infernal-1.1.3/easel/esl_msafile_a2m.c:835:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          a2mfile2[32] = "esltmpa2m2XXXXXX";
data/infernal-1.1.3/easel/esl_msafile_a2m.c:836:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          stkfile2[32] = "esltmpstk2XXXXXX";
data/infernal-1.1.3/easel/esl_msafile_a2m.c:876:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          a2mfile[32] = "esltmpXXXXXX";
data/infernal-1.1.3/easel/esl_msafile_a2m.c:944:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            a2mfile[32]  = "esltmpa2mXXXXXX";
data/infernal-1.1.3/easel/esl_msafile_a2m.c:945:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            stkfile[32]  = "esltmpstkXXXXXX";
data/infernal-1.1.3/easel/esl_msafile_a2m.c:949:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            tmpfile[32];
data/infernal-1.1.3/easel/esl_msafile_a2m.c:949:19:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  char            tmpfile[32];
data/infernal-1.1.3/easel/esl_msafile_a2m.c:970:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(tmpfile, "esltmpXXXXXX");   
data/infernal-1.1.3/easel/esl_msafile_a2m.c:970:14:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      strcpy(tmpfile, "esltmpXXXXXX");   
data/infernal-1.1.3/easel/esl_msafile_a2m.c:971:29:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      if (esl_tmpfile_named(tmpfile, &ofp) != eslOK) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_msafile_a2m.c:977:22:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      utest_goodfile(tmpfile, testnumber, expected_alphatype, expected_nseq, expected_alen);
data/infernal-1.1.3/easel/esl_msafile_a2m.c:978:14:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      remove(tmpfile);
data/infernal-1.1.3/easel/esl_msafile_afa.c:280:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char    buf[61];
data/infernal-1.1.3/easel/esl_msafile_afa.c:351:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char                 tmpfile1[32] = "esltmpXXXXXX";
data/infernal-1.1.3/easel/esl_msafile_afa.c:352:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char                 tmpfile2[32] = "esltmpXXXXXX";
data/infernal-1.1.3/easel/esl_msafile_afa.c:442:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          afafile2[32] = "esltmpafa2XXXXXX";
data/infernal-1.1.3/easel/esl_msafile_afa.c:443:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          stkfile2[32] = "esltmpstk2XXXXXX";
data/infernal-1.1.3/easel/esl_msafile_afa.c:491:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          afafile2[32] = "esltmpafa2XXXXXX";
data/infernal-1.1.3/easel/esl_msafile_afa.c:492:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          stkfile2[32] = "esltmpstk2XXXXXX";
data/infernal-1.1.3/easel/esl_msafile_afa.c:562:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            afafile[32] = "esltmpafaXXXXXX";
data/infernal-1.1.3/easel/esl_msafile_afa.c:563:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            stkfile[32] = "esltmpstkXXXXXX";
data/infernal-1.1.3/easel/esl_msafile_afa.c:567:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            tmpfile[32];
data/infernal-1.1.3/easel/esl_msafile_afa.c:567:19:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  char            tmpfile[32];
data/infernal-1.1.3/easel/esl_msafile_afa.c:586:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(tmpfile, "esltmpXXXXXX"); 
data/infernal-1.1.3/easel/esl_msafile_afa.c:586:14:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      strcpy(tmpfile, "esltmpXXXXXX"); 
data/infernal-1.1.3/easel/esl_msafile_afa.c:587:29:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      if (esl_tmpfile_named(tmpfile, &ofp) != eslOK) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_msafile_afa.c:592:22:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      utest_goodfile(tmpfile, testnumber, expected_alphatype, expected_nseq, expected_alen);
data/infernal-1.1.3/easel/esl_msafile_afa.c:593:14:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      remove(tmpfile);
data/infernal-1.1.3/easel/esl_msafile_clustal.c:684:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char                 tmpfile1[32] = "esltmpXXXXXX";
data/infernal-1.1.3/easel/esl_msafile_clustal.c:685:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char                 tmpfile2[32] = "esltmpXXXXXX";
data/infernal-1.1.3/easel/esl_msafile_clustal.c:775:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          alnfile2[32] = "esltmpaln2XXXXXX";
data/infernal-1.1.3/easel/esl_msafile_clustal.c:776:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          stkfile2[32] = "esltmpstk2XXXXXX";
data/infernal-1.1.3/easel/esl_msafile_clustal.c:824:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          alnfile2[32] = "esltmpaln2XXXXXX";
data/infernal-1.1.3/easel/esl_msafile_clustal.c:825:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          stkfile2[32] = "esltmpstk2XXXXXX";
data/infernal-1.1.3/easel/esl_msafile_clustal.c:895:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            alnfile[32] = "esltmpalnXXXXXX";
data/infernal-1.1.3/easel/esl_msafile_clustal.c:896:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            stkfile[32] = "esltmpstkXXXXXX";
data/infernal-1.1.3/easel/esl_msafile_clustal.c:900:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            tmpfile[32];
data/infernal-1.1.3/easel/esl_msafile_clustal.c:900:19:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  char            tmpfile[32];
data/infernal-1.1.3/easel/esl_msafile_clustal.c:919:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(tmpfile, "esltmpXXXXXX"); 
data/infernal-1.1.3/easel/esl_msafile_clustal.c:919:14:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      strcpy(tmpfile, "esltmpXXXXXX"); 
data/infernal-1.1.3/easel/esl_msafile_clustal.c:920:29:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      if (esl_tmpfile_named(tmpfile, &ofp) != eslOK) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_msafile_clustal.c:927:22:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      utest_goodfile(tmpfile, testnumber, expected_format, expected_alphatype, expected_nseq, expected_alen);
data/infernal-1.1.3/easel/esl_msafile_clustal.c:928:14:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      remove(tmpfile);
data/infernal-1.1.3/easel/esl_msafile_phylip.c:1323:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg,   "alignment length disagrees");
data/infernal-1.1.3/easel/esl_msafile_phylip.c:1336:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg,   "first field isn't an integer");
data/infernal-1.1.3/easel/esl_msafile_phylip.c:1349:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg,   "second field isn't an integer");
data/infernal-1.1.3/easel/esl_msafile_phylip.c:1362:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg,   "only one field found");
data/infernal-1.1.3/easel/esl_msafile_phylip.c:1374:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg,   "no alignment data");
data/infernal-1.1.3/easel/esl_msafile_phylip.c:1387:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg,   "line too short");
data/infernal-1.1.3/easel/esl_msafile_phylip.c:1400:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg,   "invalid character(s) in sequence name");
data/infernal-1.1.3/easel/esl_msafile_phylip.c:1413:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg,   "one or more invalid sequence characters");
data/infernal-1.1.3/easel/esl_msafile_phylip.c:1426:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg,   "number of residues on line differs from previous seqs");
data/infernal-1.1.3/easel/esl_msafile_phylip.c:1442:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg,   "unexpected number of sequences in block");
data/infernal-1.1.3/easel/esl_msafile_phylip.c:1459:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg,   "alignment length disagrees with header");
data/infernal-1.1.3/easel/esl_msafile_phylip.c:1496:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char                 tmpfile1[32] = "esltmpXXXXXX";
data/infernal-1.1.3/easel/esl_msafile_phylip.c:1497:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char                 tmpfile2[32] = "esltmpXXXXXX";
data/infernal-1.1.3/easel/esl_msafile_phylip.c:1603:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  tmpfile[32];
data/infernal-1.1.3/easel/esl_msafile_phylip.c:1603:9:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  char  tmpfile[32];
data/infernal-1.1.3/easel/esl_msafile_phylip.c:1617:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(tmpfile, "esltmpXXXXXX");
data/infernal-1.1.3/easel/esl_msafile_phylip.c:1617:10:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  strcpy(tmpfile, "esltmpXXXXXX");
data/infernal-1.1.3/easel/esl_msafile_phylip.c:1618:25:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if (esl_tmpfile_named(tmpfile, &ofp) != eslOK) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_msafile_phylip.c:1624:30:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if (esl_msafile_Open(&abc, tmpfile, /*env=*/NULL, eslMSAFILE_UNKNOWN, /*fmtd=*/NULL, &afp) != eslOK) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_msafile_phylip.c:1637:10:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  remove(tmpfile);
data/infernal-1.1.3/easel/esl_msafile_phylip.c:1683:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            tmpfile[32];
data/infernal-1.1.3/easel/esl_msafile_phylip.c:1683:19:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  char            tmpfile[32];
data/infernal-1.1.3/easel/esl_msafile_phylip.c:1690:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            expected_errmsg[eslERRBUFSIZE];
data/infernal-1.1.3/easel/esl_msafile_phylip.c:1695:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(tmpfile, "esltmpXXXXXX"); 
data/infernal-1.1.3/easel/esl_msafile_phylip.c:1695:14:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      strcpy(tmpfile, "esltmpXXXXXX"); 
data/infernal-1.1.3/easel/esl_msafile_phylip.c:1696:29:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      if (esl_tmpfile_named(tmpfile, &ofp) != eslOK) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_msafile_phylip.c:1707:22:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      utest_goodfile(tmpfile, testnumber, expected_format, expected_alphatype, expected_nseq, expected_alen);
data/infernal-1.1.3/easel/esl_msafile_phylip.c:1708:14:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      remove(tmpfile);
data/infernal-1.1.3/easel/esl_msafile_phylip.c:1714:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(tmpfile, "esltmpXXXXXX"); 
data/infernal-1.1.3/easel/esl_msafile_phylip.c:1714:14:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      strcpy(tmpfile, "esltmpXXXXXX"); 
data/infernal-1.1.3/easel/esl_msafile_phylip.c:1715:29:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      if (esl_tmpfile_named(tmpfile, &ofp) != eslOK) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_msafile_phylip.c:1732:21:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      utest_badfile(tmpfile, testnumber, expected_alphatype, expected_errstatus, expected_linenumber, expected_errmsg);
data/infernal-1.1.3/easel/esl_msafile_phylip.c:1733:14:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      remove(tmpfile);
data/infernal-1.1.3/easel/esl_msafile_phylip.c:1739:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(tmpfile, "esltmpXXXXXX"); 
data/infernal-1.1.3/easel/esl_msafile_phylip.c:1739:14:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      strcpy(tmpfile, "esltmpXXXXXX"); 
data/infernal-1.1.3/easel/esl_msafile_phylip.c:1740:29:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      if (esl_tmpfile_named(tmpfile, &ofp) != eslOK) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_msafile_phylip.c:1747:23:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      utest_ambigfile(tmpfile, testnumber);
data/infernal-1.1.3/easel/esl_msafile_phylip.c:1748:14:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      remove(tmpfile);
data/infernal-1.1.3/easel/esl_msafile_psiblast.c:444:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char                 tmpfile1[32] = "esltmpXXXXXX";
data/infernal-1.1.3/easel/esl_msafile_psiblast.c:445:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char                 tmpfile2[32] = "esltmpXXXXXX";
data/infernal-1.1.3/easel/esl_msafile_psiblast.c:530:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          pbfile2[32]  = "esltmppb2XXXXXX";
data/infernal-1.1.3/easel/esl_msafile_psiblast.c:531:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          stkfile2[32] = "esltmpstk2XXXXXX";
data/infernal-1.1.3/easel/esl_msafile_psiblast.c:579:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          pbfile2[32]  = "esltmppb2XXXXXX";
data/infernal-1.1.3/easel/esl_msafile_psiblast.c:580:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          stkfile2[32] = "esltmpstk2XXXXXX";
data/infernal-1.1.3/easel/esl_msafile_psiblast.c:650:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            pbfile[32]   = "esltmppbXXXXXX";
data/infernal-1.1.3/easel/esl_msafile_psiblast.c:651:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            stkfile[32]  = "esltmpstkXXXXXX";
data/infernal-1.1.3/easel/esl_msafile_psiblast.c:655:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            tmpfile[32];
data/infernal-1.1.3/easel/esl_msafile_psiblast.c:655:19:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  char            tmpfile[32];
data/infernal-1.1.3/easel/esl_msafile_psiblast.c:673:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(tmpfile, "esltmpXXXXXX"); 
data/infernal-1.1.3/easel/esl_msafile_psiblast.c:673:14:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      strcpy(tmpfile, "esltmpXXXXXX"); 
data/infernal-1.1.3/easel/esl_msafile_psiblast.c:674:29:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      if (esl_tmpfile_named(tmpfile, &ofp) != eslOK) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_msafile_psiblast.c:680:22:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      utest_goodfile(tmpfile, testnumber, expected_alphatype, expected_nseq, expected_alen);
data/infernal-1.1.3/easel/esl_msafile_psiblast.c:681:14:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      remove(tmpfile);
data/infernal-1.1.3/easel/esl_msafile_selex.c:721:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  if (ntext) memcpy(p+msa->alen+nleft, b->line[idx]+b->lpos[idx], sizeof(char)*ntext);
data/infernal-1.1.3/easel/esl_msafile_selex.c:869:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char                 tmpfile1[32] = "esltmpXXXXXX";
data/infernal-1.1.3/easel/esl_msafile_selex.c:870:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char                 tmpfile2[32] = "esltmpXXXXXX";
data/infernal-1.1.3/easel/esl_msafile_selex.c:957:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          slxfile2[32]  = "esltmpslx2XXXXXX";
data/infernal-1.1.3/easel/esl_msafile_selex.c:958:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          stkfile2[32]  = "esltmpstk2XXXXXX";
data/infernal-1.1.3/easel/esl_msafile_selex.c:1006:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          slxfile2[32]  = "esltmpslx2XXXXXX";
data/infernal-1.1.3/easel/esl_msafile_selex.c:1007:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          stkfile2[32]  = "esltmpstk2XXXXXX";
data/infernal-1.1.3/easel/esl_msafile_selex.c:1077:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            slxfile[32]  = "esltmpslxXXXXXX";
data/infernal-1.1.3/easel/esl_msafile_selex.c:1078:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            stkfile[32]  = "esltmpstkXXXXXX";
data/infernal-1.1.3/easel/esl_msafile_selex.c:1082:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            tmpfile[32];
data/infernal-1.1.3/easel/esl_msafile_selex.c:1082:19:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  char            tmpfile[32];
data/infernal-1.1.3/easel/esl_msafile_selex.c:1100:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(tmpfile, "esltmpXXXXXX"); 
data/infernal-1.1.3/easel/esl_msafile_selex.c:1100:14:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      strcpy(tmpfile, "esltmpXXXXXX"); 
data/infernal-1.1.3/easel/esl_msafile_selex.c:1101:29:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      if (esl_tmpfile_named(tmpfile, &ofp) != eslOK) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_msafile_selex.c:1109:22:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      utest_goodfile(tmpfile, testnumber, expected_alphatype, expected_nseq, expected_alen);
data/infernal-1.1.3/easel/esl_msafile_selex.c:1110:14:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      remove(tmpfile);
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1416:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "missing Stockholm header");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1431:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "number of seqs in block did not match number in earlier block(s)");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1446:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "number of seqs in block did not match number annotated by #=GS lines");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1458:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "missing // terminator after MSA");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1470:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "no alignment data followed Stockholm header");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1485:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "#=GF line is missing <tag>, annotation");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1497:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "faux #=GF line");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1509:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "No name found on #=GF ID line");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1521:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "#=GF ID line should have only one name (no whitespace allowed)");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1533:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "No accession found on #=GF AC line");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1545:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "#=GF AC line should have only one accession (no whitespace allowed)");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1557:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "Expected a real number for GA1 value on #=GF GA line");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1569:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "Expected a real number for GA2 value on #=GF GA line");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1581:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "No GA threshold value found on #=GF GA line");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1593:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "Expected a real number for NC1 value on #=GF NC line");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1605:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "Expected a real number for NC2 value on #=GF NC line");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1617:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "No NC threshold value found on #=GF NC line");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1629:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "Expected a real number for TC1 value on #=GF TC line");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1641:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "Expected a real number for TC2 value on #=GF TC line");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1653:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "No TC threshold value found on #=GF TC line");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1665:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "#=GS line missing <seqname>, <tag>, annotation");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1677:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "#=GS line missing <tag>, annotation");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1689:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "faux #=GS line");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1701:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "no weight value found on #=GS <seqname> WT line");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1714:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "sequence has more than one #=GS <seqname> WT line");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1726:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "#=GS <seqname> WT line should have only one field, the weight");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1738:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "value on #=GS <seqname> WT line isn't a real number");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1750:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "no accession found on #=GS <seqname> AC line");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1763:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "sequence has more than one #=GS <seqname> AC accession line");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1775:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "#=GS <seqname> AC line should have only one field, the accession");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1788:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "sequence has more than one #=GS <seqname> DE accession line");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1800:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "#=GC line missing <tag>, annotation");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1812:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "faux #=GC line");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1824:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "#=GC line missing annotation");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1841:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "unexpected #=GC SS_cons");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1858:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "unexpected #=GC SA_cons");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1875:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "unexpected #=GC PP_cons");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1892:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "unexpected #=GC RF");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1909:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "unexpected #=GC line");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1923:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "more than one #=GC SS_cons line in block");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1937:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "more than one #=GC SA_cons line in block");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1951:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "more than one #=GC PP_cons line in block");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1965:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "more than one #=GC RF line in block");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1979:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "more than one #=GC XX line in block");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1992:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "unexpected # of aligned annotation in #=GC XX line");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:2005:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "#=GR line missing <seqname>, <tag>, annotation");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:2018:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "#=GR line missing <tag>, annotation");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:2031:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "faux #=GR line");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:2044:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "#=GR line missing annotation");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:2061:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "unexpected #=GR <seqname> SS");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:2078:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "unexpected #=GR <seqname> SA");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:2095:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "unexpected #=GR <seqname> PP");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:2112:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "unexpected #=GR line");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:2129:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "unexpected seqname seq2; expected seq1 from prev blocks");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:2143:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "more than one #=GR seq1 SS line in block");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:2157:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "more than one #=GR seq1 PP line in block");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:2171:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "more than one #=GR seq1 SA line in block");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:2185:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "more than one #=GR seq1 XX line in block");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:2198:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "unexpected # of aligned annotation in #=GR seq2 XX line");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:2210:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "sequence line with no sequence");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:2226:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "more lines than expected; earlier blocks had fewer");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:2243:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "unexpected seq line; earlier block(s) in different order");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:2260:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "unexpected seq name seq3; expected seq2 from prev block order");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:2272:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "invalid sequence character(s) on line");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:2284:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(errmsg, "unexpected number of aligned residues parsed on line");
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:2295:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char                 tmpfile1[32] = "esltmpXXXXXX";
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:2296:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char                 tmpfile2[32] = "esltmpXXXXXX";
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:2384:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char   tmpfile1[32] = "esltmpXXXXXX";
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:2385:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char   tmpfile2[32] = "esltmpXXXXXX";
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:2478:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            tmpfile[32];
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:2478:19:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  char            tmpfile[32];
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:2485:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            expected_errmsg[eslERRBUFSIZE];
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:2499:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(tmpfile, "esltmpXXXXXX"); 
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:2499:14:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      strcpy(tmpfile, "esltmpXXXXXX"); 
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:2500:29:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      if (esl_tmpfile_named(tmpfile, &ofp) != eslOK) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:2505:22:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      utest_goodfile(tmpfile, testnumber, expected_alphatype, expected_nseq, expected_alen);
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:2506:14:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      remove(tmpfile);
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:2512:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(tmpfile, "esltmpXXXXXX"); 
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:2512:14:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      strcpy(tmpfile, "esltmpXXXXXX"); 
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:2513:29:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      if (esl_tmpfile_named(tmpfile, &ofp) != eslOK) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:2584:24:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      utest_bad_format(tmpfile, testnumber, expected_linenumber, expected_errmsg);
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:2585:14:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      remove(tmpfile);
data/infernal-1.1.3/easel/esl_msashuffle.c:84:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy(shuf->ax[i], msa->ax[i], (msa->alen + 2) * sizeof(ESL_DSQ));
data/infernal-1.1.3/easel/esl_paml.c:147:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(filename, "r")) == NULL) esl_fatal("open failed");
data/infernal-1.1.3/easel/esl_rand64.c:773:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (( fp = fopen(bitfile, "w")) == NULL)
data/infernal-1.1.3/easel/esl_random.c:1027:12:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      i += sprintf(s+i, "%d", exponent);
data/infernal-1.1.3/easel/esl_random.c:1362:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(bitfile, "w")) == NULL) 
data/infernal-1.1.3/easel/esl_randomseq.c:106:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  c[127];
data/infernal-1.1.3/easel/esl_randomseq.c:285:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char   Z[26];           /* connectivity in last edge graph Z */ 
data/infernal-1.1.3/easel/esl_randomseq.c:967:28:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      if (dsq != shuffled) memcpy(shuffled, dsq, sizeof(ESL_DSQ) * (L+2));
data/infernal-1.1.3/easel/esl_randomseq.c:1296:28:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      if (dsq != markoved) memcpy(markoved, dsq, sizeof(ESL_DSQ) * (L+2));
data/infernal-1.1.3/easel/esl_ratematrix.c:634:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/easel/esl_ratematrix.c:687:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/easel/esl_recorder.c:648:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(filename, "r")) == NULL) esl_fatal("no such file %s\n", filename);
data/infernal-1.1.3/easel/esl_recorder.c:658:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(filename, "r")) == NULL) esl_fatal("no such file %s\n", filename);
data/infernal-1.1.3/easel/esl_recorder.c:683:46:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
generate_testfile(ESL_RANDOMNESS *rng, char *tmpfile, int *is_data, int nlines)
data/infernal-1.1.3/easel/esl_recorder.c:691:25:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if (esl_tmpfile_named(tmpfile, &fp) != eslOK) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_recorder.c:705:19:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
utest_basic(char *tmpfile, int N)
data/infernal-1.1.3/easel/esl_recorder.c:713:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(tmpfile, "r"))        == NULL) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_recorder.c:713:19:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if ((fp = fopen(tmpfile, "r"))        == NULL) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_recorder.c:718:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      if (atoi(buf+1) != i)                      esl_fatal(msg);
data/infernal-1.1.3/easel/esl_recorder.c:728:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      if (atoi(buf+1) != i)                      esl_fatal(msg);
data/infernal-1.1.3/easel/esl_recorder.c:738:18:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
utest_grow(char *tmpfile, int N)
data/infernal-1.1.3/easel/esl_recorder.c:746:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(tmpfile, "r"))        == NULL) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_recorder.c:746:19:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if ((fp = fopen(tmpfile, "r"))        == NULL) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_recorder.c:751:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      if (atoi(buf+1) != i)                      esl_fatal(msg);
data/infernal-1.1.3/easel/esl_recorder.c:763:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      if (atoi(buf+1) != i)                      esl_fatal(msg);
data/infernal-1.1.3/easel/esl_recorder.c:772:19:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
utest_grow2(char *tmpfile, int N)
data/infernal-1.1.3/easel/esl_recorder.c:782:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(tmpfile, "r"))        == NULL) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_recorder.c:782:19:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if ((fp = fopen(tmpfile, "r"))        == NULL) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_recorder.c:787:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      if (atoi(buf+1) != i)                      esl_fatal(msg);
data/infernal-1.1.3/easel/esl_recorder.c:795:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  if (atoi(buf+1) != 4)                          esl_fatal(msg);
data/infernal-1.1.3/easel/esl_recorder.c:803:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      if (atoi(buf+1) != i)                      esl_fatal(msg);
data/infernal-1.1.3/easel/esl_recorder.c:812:20:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
utest_shrink(char *tmpfile, int N)
data/infernal-1.1.3/easel/esl_recorder.c:820:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(tmpfile, "r"))        == NULL) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_recorder.c:820:19:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if ((fp = fopen(tmpfile, "r"))        == NULL) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_recorder.c:825:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      if (atoi(buf+1) != i)                     esl_fatal(msg);
data/infernal-1.1.3/easel/esl_recorder.c:836:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      if (atoi(buf+1) != i)                     esl_fatal(msg);
data/infernal-1.1.3/easel/esl_recorder.c:845:40:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
utest_block(ESL_RANDOMNESS *rng, char *tmpfile, int *is_data, int N)
data/infernal-1.1.3/easel/esl_recorder.c:863:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(tmpfile, "r"))           == NULL) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_recorder.c:863:19:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if ((fp = fopen(tmpfile, "r"))           == NULL) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_recorder.c:877:6:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if (atoi(buf+1)                 != linenumber) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_recorder.c:888:6:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if (atoi(buf+1)                 != linenumber) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_recorder.c:901:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	  if (atoi(block[i]+1) != from+i) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_recorder.c:985:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            template[13]= "esltmpXXXXXX";
data/infernal-1.1.3/easel/esl_recorder.c:986:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            tmpfile[13];
data/infernal-1.1.3/easel/esl_recorder.c:986:19:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  char            tmpfile[13];
data/infernal-1.1.3/easel/esl_recorder.c:999:14:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      strcpy(tmpfile, template);
data/infernal-1.1.3/easel/esl_recorder.c:1000:30:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      generate_testfile(rng, tmpfile, is_data, N);
data/infernal-1.1.3/easel/esl_recorder.c:1002:20:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      utest_basic (tmpfile, N);
data/infernal-1.1.3/easel/esl_recorder.c:1003:20:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      utest_grow  (tmpfile, N);
data/infernal-1.1.3/easel/esl_recorder.c:1004:20:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      utest_grow2 (tmpfile, N);
data/infernal-1.1.3/easel/esl_recorder.c:1005:20:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      utest_shrink(tmpfile, N);
data/infernal-1.1.3/easel/esl_recorder.c:1006:25:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      utest_block (rng, tmpfile, is_data, N);
data/infernal-1.1.3/easel/esl_recorder.c:1008:14:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      remove(tmpfile);
data/infernal-1.1.3/easel/esl_recorder.c:1085:24:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE         *fp   = fopen(argv[1], "r");
data/infernal-1.1.3/easel/esl_regexp.c:370:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char        tok1[32];
data/infernal-1.1.3/easel/esl_regexp.c:371:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char        tok2[32];
data/infernal-1.1.3/easel/esl_regexp.c:378:16:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  *ret_start = atol(tok1);
data/infernal-1.1.3/easel/esl_regexp.c:379:40:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  *ret_end   = (tok2[0] == '\0') ? 0 : atol(tok2);
data/infernal-1.1.3/easel/esl_regexp.c:538:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char regdummy[3];	/* NOTHING, 0 next ptr */
data/infernal-1.1.3/easel/esl_regexp.c:1467:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buf[50];
data/infernal-1.1.3/easel/esl_regexp.c:1511:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(buf+strlen(buf), "OPEN%d", OP(op)-OPEN);
data/infernal-1.1.3/easel/esl_regexp.c:1523:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(buf+strlen(buf), "CLOSE%d", OP(op)-CLOSE);
data/infernal-1.1.3/easel/esl_regexp.c:1759:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char        buf[256];
data/infernal-1.1.3/easel/esl_regexp.c:1812:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  ntok    = atoi(argv[3]);
data/infernal-1.1.3/easel/esl_regexp.c:1847:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char        buf[64];
data/infernal-1.1.3/easel/esl_regexp.h:27:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *startp[ESL_REGEXP_NSUB]; /* ptrs to starts of submatches on target string */
data/infernal-1.1.3/easel/esl_regexp.h:28:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *endp[ESL_REGEXP_NSUB];   /* ptrs to 1 char after ends of submatches */
data/infernal-1.1.3/easel/esl_regexp.h:33:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char program[1];	         /* Unwarranted chumminess with compiler. */  
data/infernal-1.1.3/easel/esl_scorematrix.c:827:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(S->outorder, "ARNDCQEGHILKMFPSTWYVBZX*"); 
data/infernal-1.1.3/easel/esl_scorematrix.c:847:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(S->outorder, "ACGTRYMKSWHBVDN");
data/infernal-1.1.3/easel/esl_scorematrix.c:1112:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	  S->s[map[row]][map[col]] = atoi(tok);
data/infernal-1.1.3/easel/esl_scorematrix.c:1835:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ( (ofp = fopen(mfile, "w")) == NULL) esl_fatal("failed to open %s for writing scorematrix", mfile);
data/infernal-1.1.3/easel/esl_scorematrix.c:1837:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(S0->outorder, "ARNDCQEGHILKMFPSTWYV");
data/infernal-1.1.3/easel/esl_scorematrix.c:1853:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ( (ofp = fopen(yfile, "w")) == NULL) esl_fatal("failed to open XY file %s for writing\n", yfile);
data/infernal-1.1.3/easel/esl_scorematrix.c:1987:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmpfile[16]     = "esltmpXXXXXX";
data/infernal-1.1.3/easel/esl_scorematrix.c:1987:8:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  char tmpfile[16]     = "esltmpXXXXXX";
data/infernal-1.1.3/easel/esl_scorematrix.c:1992:25:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if (esl_tmpfile_named(tmpfile, &fp)  != eslOK) esl_fatal("failed to open tmp file");
data/infernal-1.1.3/easel/esl_scorematrix.c:1996:27:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if (esl_fileparser_Open(tmpfile, NULL, &efp) != eslOK) esl_fatal("failed to open tmpfile containing BLOSUM62 matrix");
data/infernal-1.1.3/easel/esl_scorematrix.c:2000:10:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  remove(tmpfile); 
data/infernal-1.1.3/easel/esl_sq.c:2494:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char                 tmpfile[32];
data/infernal-1.1.3/easel/esl_sq.c:2494:24:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  char                 tmpfile[32];
data/infernal-1.1.3/easel/esl_sq.c:2505:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(tmpfile, "esltmpXXXXXX"); 
data/infernal-1.1.3/easel/esl_sq.c:2505:10:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  strcpy(tmpfile, "esltmpXXXXXX"); 
data/infernal-1.1.3/easel/esl_sq.c:2506:25:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if (esl_tmpfile_named(tmpfile, &ofp) != eslOK) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_sq.c:2511:26:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  esl_msafile_Open(&abc, tmpfile, NULL, eslMSAFILE_STOCKHOLM, NULL, &afp1);  
data/infernal-1.1.3/easel/esl_sq.c:2534:26:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  esl_msafile_Open(NULL, tmpfile, NULL, eslMSAFILE_STOCKHOLM, NULL, &afp2);  
data/infernal-1.1.3/easel/esl_sq.c:2557:10:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  remove(tmpfile);
data/infernal-1.1.3/easel/esl_sqio.c:1235:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(res_ptr + 1, sq->dsq + 1, sq->n + 1);
data/infernal-1.1.3/easel/esl_sqio.c:1597:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int   fd   = open(filename, O_RDONLY);
data/infernal-1.1.3/easel/esl_sqio.c:1619:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *fp   = fopen(filename, "r");
data/infernal-1.1.3/easel/esl_sqio.c:1643:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *fp   = fopen(filename, "r");
data/infernal-1.1.3/easel/esl_sqio.c:1670:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int   fd   = open(filename, O_RDONLY);
data/infernal-1.1.3/easel/esl_sqio.c:1712:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char     ascii[128];
data/infernal-1.1.3/easel/esl_sqio.c:1788:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[61];
data/infernal-1.1.3/easel/esl_sqio.c:1817:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[64];
data/infernal-1.1.3/easel/esl_sqio.c:1839:47:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
make_ssi_index(ESL_ALPHABET *abc, const char *tmpfile, int format, char *ssifile, int mode)
data/infernal-1.1.3/easel/esl_sqio.c:1851:30:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  sprintf(ssifile, "%s.ssi", tmpfile);
data/infernal-1.1.3/easel/esl_sqio.c:1853:30:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if (esl_newssi_AddFile(ns, tmpfile, format, &fh)              != eslOK) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_sqio.c:1854:35:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if (esl_sqfile_OpenDigital(abc, tmpfile, format, NULL, &sqfp) != eslOK) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_sqio.c:2095:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char        tmpfile[32] = "esltmpXXXXXX";
data/infernal-1.1.3/easel/esl_sqio.c:2095:15:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  char        tmpfile[32] = "esltmpXXXXXX";
data/infernal-1.1.3/easel/esl_sqio.c:2105:25:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if (esl_tmpfile_named(tmpfile, &fp) != eslOK) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_sqio.c:2111:35:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if (esl_sqfile_OpenDigital(abc, tmpfile, format, NULL, &sqfp)           != eslOK)  esl_fatal(msg);
data/infernal-1.1.3/easel/esl_sqio.c:2127:10:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  remove(tmpfile);
data/infernal-1.1.3/easel/esl_sqio.c:2149:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char        tmpfile[32];
data/infernal-1.1.3/easel/esl_sqio.c:2149:15:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  char        tmpfile[32];
data/infernal-1.1.3/easel/esl_sqio.c:2157:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(tmpfile, "esltmpXXXXXX");
data/infernal-1.1.3/easel/esl_sqio.c:2157:14:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      strcpy(tmpfile, "esltmpXXXXXX");
data/infernal-1.1.3/easel/esl_sqio.c:2158:29:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      if (esl_tmpfile_named(tmpfile, &fp)                      != eslOK) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_sqio.c:2162:27:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      if (esl_sqfile_Open(tmpfile, eslSQFILE_FASTA, NULL, &sqfp) != eslOK) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_sqio.c:2169:14:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      remove(tmpfile);
data/infernal-1.1.3/easel/esl_sqio.c:2221:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            tmpfile[32];
data/infernal-1.1.3/easel/esl_sqio.c:2221:19:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  char            tmpfile[32];
data/infernal-1.1.3/easel/esl_sqio.c:2222:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            ssifile[32];
data/infernal-1.1.3/easel/esl_sqio.c:2235:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(tmpfile, "esltmpXXXXXX");
data/infernal-1.1.3/easel/esl_sqio.c:2235:14:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      strcpy(tmpfile, "esltmpXXXXXX");
data/infernal-1.1.3/easel/esl_sqio.c:2236:29:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      if (esl_tmpfile_named(tmpfile, &fp) != eslOK) esl_fatal("failed to make tmpfile");
data/infernal-1.1.3/easel/esl_sqio.c:2250:27:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      make_ssi_index(abc, tmpfile, eslSQFILE_FASTA, ssifile, mode);
data/infernal-1.1.3/easel/esl_sqio.c:2252:41:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      utest_read        (abc, sqarr, N, tmpfile, eslSQFILE_FASTA, mode);
data/infernal-1.1.3/easel/esl_sqio.c:2253:41:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      utest_read_info   (abc, sqarr, N, tmpfile, eslSQFILE_FASTA, mode);
data/infernal-1.1.3/easel/esl_sqio.c:2254:41:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      utest_read_window (abc, sqarr, N, tmpfile, eslSQFILE_FASTA, mode);
data/infernal-1.1.3/easel/esl_sqio.c:2255:44:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      utest_fetch_subseq(r, abc, sqarr, N, tmpfile, ssifile, eslSQFILE_FASTA);
data/infernal-1.1.3/easel/esl_sqio.c:2257:14:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      remove(tmpfile);
data/infernal-1.1.3/easel/esl_sqio_ascii.c:202:24:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((ascii->fp = fopen(filename, "r")) == NULL) {
data/infernal-1.1.3/easel/esl_sqio_ascii.c:1192:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
       memcpy(sq->seq, tmpsq->seq + sq->start - 1, sizeof(char) * sq->n);
data/infernal-1.1.3/easel/esl_sqio_ascii.c:1195:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(sq->ss, tmpsq->ss + sq->start - 1, sizeof(char) * sq->n);
data/infernal-1.1.3/easel/esl_sqio_ascii.c:1201:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
     memcpy(sq->dsq + 1, tmpsq->dsq + sq->start, sizeof(ESL_DSQ) * sq->n);
data/infernal-1.1.3/easel/esl_sqio_ascii.c:1204:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
       memcpy(sq->ss + 1, tmpsq->ss + sq->start, sizeof(char) * sq->n);
data/infernal-1.1.3/easel/esl_sqio_ascii.c:2136:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ascii->buf + ascii->nc, ascii->mem + ascii->mpos, n);
data/infernal-1.1.3/easel/esl_sqio_ascii.c:2150:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ascii->buf + ascii->nc, ascii->mem + ascii->mpos, n);
data/infernal-1.1.3/easel/esl_sqio_ascii.c:3136:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char     buf[61];
data/infernal-1.1.3/easel/esl_sqio_ascii.h:29:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  errbuf[eslERRBUFSIZE];/* parse error mesg.  Size must match msa.h */
data/infernal-1.1.3/easel/esl_sqio_ncbi.c:239:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&ncbi->total_res, info+1, sizeof(uint64_t)); 
data/infernal-1.1.3/easel/esl_sqio_ncbi.c:271:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(name+len, ".Xin");
data/infernal-1.1.3/easel/esl_sqio_ncbi.c:273:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((ncbi->fppin = fopen(name, "rb")) == NULL) {
data/infernal-1.1.3/easel/esl_sqio_ncbi.c:277:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(name+len, ".Xhr");
data/infernal-1.1.3/easel/esl_sqio_ncbi.c:279:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((ncbi->fpphr = fopen(name, "rb")) == NULL) {
data/infernal-1.1.3/easel/esl_sqio_ncbi.c:283:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(name+len, ".Xsq");
data/infernal-1.1.3/easel/esl_sqio_ncbi.c:285:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((ncbi->fppsq = fopen(name, "rb")) == NULL) {
data/infernal-1.1.3/easel/esl_sqio_ncbi.c:326:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char        buffer[80];
data/infernal-1.1.3/easel/esl_sqio_ncbi.c:340:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(name+len, ".Xal");
data/infernal-1.1.3/easel/esl_sqio_ncbi.c:342:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(name, "r")) == NULL) {
data/infernal-1.1.3/easel/esl_sqio_ncbi.c:1422:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(name+len, ".Xin");
data/infernal-1.1.3/easel/esl_sqio_ncbi.c:1424:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((ncbi->fppin = fopen(name, "rb")) == NULL) {
data/infernal-1.1.3/easel/esl_sqio_ncbi.c:1428:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(name+len, ".Xhr");
data/infernal-1.1.3/easel/esl_sqio_ncbi.c:1430:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((ncbi->fpphr = fopen(name, "rb")) == NULL) {
data/infernal-1.1.3/easel/esl_sqio_ncbi.c:1434:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(name+len, ".Xsq");
data/infernal-1.1.3/easel/esl_sqio_ncbi.c:1436:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((ncbi->fppsq = fopen(name, "rb")) == NULL) {
data/infernal-1.1.3/easel/esl_sqio_ncbi.c:2565:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char id[32];
data/infernal-1.1.3/easel/esl_sqio_ncbi.c:2566:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(id, "%d", ncbi->int_id);
data/infernal-1.1.3/easel/esl_sqio_ncbi.h:44:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char       errbuf[eslERRBUFSIZE];/* parse error mesg.  Size must match msa.h */
data/infernal-1.1.3/easel/esl_ssi.c:72:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((ssi->fp = fopen(filename, "rb")) == NULL) goto ERROR; 
data/infernal-1.1.3/easel/esl_ssi.c:670:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((ns->ssifp = fopen(ssifile, "w")) == NULL)  { status = eslENOTFOUND; goto ERROR; }
data/infernal-1.1.3/easel/esl_ssi.c:1080:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char cmd[1024];
data/infernal-1.1.3/easel/esl_ssi.c:1095:23:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((ns->ptmp = fopen(ns->ptmpfile, "r")) == NULL) ESL_XFAIL(eslESYS, ns->errbuf, "failed to reopen primary key tmp file after sort");
data/infernal-1.1.3/easel/esl_ssi.c:1101:23:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((ns->stmp = fopen(ns->stmpfile, "r")) == NULL) ESL_XFAIL(eslESYS, ns->errbuf, "failed to reopen secondary key tmp file after sort");
data/infernal-1.1.3/easel/esl_ssi.c:1347:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((ns->ptmp = fopen(ns->ptmpfile, "w")) == NULL) ESL_XFAIL(eslENOTFOUND, ns->errbuf, "Failed to open primary key tmpfile for external sort");
data/infernal-1.1.3/easel/esl_ssi.c:1348:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((ns->stmp = fopen(ns->stmpfile, "w")) == NULL) ESL_XFAIL(eslENOTFOUND, ns->errbuf, "Failed to open secondary key tmpfile for external sort");
data/infernal-1.1.3/easel/esl_ssi.c:1419:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  pkey->fnum = (uint16_t) atoi(tok);
data/infernal-1.1.3/easel/esl_ssi.c:1842:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(td->seqname[i], "DUP");  // Allocated space is guaranteed to be enough,
data/infernal-1.1.3/easel/esl_ssi.c:1843:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(td->seqname[j], "DUP");  //   because the original name was "seq%d-file%d"
data/infernal-1.1.3/easel/esl_ssi.c:1845:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(td->seqdesc[i], "DUP");
data/infernal-1.1.3/easel/esl_ssi.c:1846:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(td->seqdesc[j], "DUP");
data/infernal-1.1.3/easel/esl_ssi.c:1891:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char         query[32];            //   name of sequence to retrieve
data/infernal-1.1.3/easel/esl_ssi.c:1942:42:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          if (esl_rnd_Roll(rng, 2) == 0) sprintf(query, "seq%d-file%d",  i, j);  // by primary key
data/infernal-1.1.3/easel/esl_ssi.c:1943:42:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          else                           sprintf(query, "desc%d-file%d", i, j);  // by secondary key
data/infernal-1.1.3/easel/esl_ssi.c:2065:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(fafile, "r"))              == NULL)  esl_fatal("failed to open %s", fafile);
data/infernal-1.1.3/easel/esl_ssi.c:2125:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(fafile, "r"))     == NULL)  esl_fatal("failed to open %s", fafile);
data/infernal-1.1.3/easel/esl_ssi.h:102:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char        errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/easel/esl_stopwatch.c:162:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(buf, "%02d:%02d:%02d.%02d", h,m,s,hs);
data/infernal-1.1.3/easel/esl_stopwatch.c:164:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(buf, "%02d:%02d:%02d", h,m,s);
data/infernal-1.1.3/easel/esl_stopwatch.c:193:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[128];	/* (safely holds up to 10^14 years; I'll be dead by then) */
data/infernal-1.1.3/easel/esl_stretchexp.c:565:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((pfp = fopen(plotfile, "w")) == NULL) 
data/infernal-1.1.3/easel/esl_tree.c:144:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char      tmpfile[16] = "esltmpXXXXXX";
data/infernal-1.1.3/easel/esl_tree.c:144:13:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  char      tmpfile[16] = "esltmpXXXXXX";
data/infernal-1.1.3/easel/esl_tree.c:148:19:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if (esl_tmpfile(tmpfile, &fp)         != eslOK) goto ERROR;
data/infernal-1.1.3/easel/esl_tree.c:1179:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char       buf[4096];		/* 4K input buffer */
data/infernal-1.1.3/easel/esl_tree.c:2025:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char   tmpfile[32] = "esltmpXXXXXX";
data/infernal-1.1.3/easel/esl_tree.c:2025:10:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  char   tmpfile[32] = "esltmpXXXXXX";
data/infernal-1.1.3/easel/esl_tree.c:2029:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/easel/esl_tree.c:2031:19:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if (esl_tmpfile(tmpfile, &fp)            != eslOK) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_tree.c:2176:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char         errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/easel/esl_tree.c:2179:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(argv[1], "r"))           == NULL) esl_fatal("Failed to open %s", argv[1]);
data/infernal-1.1.3/easel/esl_weibull.c:612:26:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (plotfile && (pfp = fopen(plotfile, "w")) == NULL) ESL_EXCEPTION(eslFAIL, "Failed to open plotfile");
data/infernal-1.1.3/easel/miniapps/cmd_alistat.c:73:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (( fp = fopen(msafile, "r")) == NULL)  esl_fatal("Failed to open %s as a file\n", msafile);
data/infernal-1.1.3/easel/miniapps/cmd_filter.c:93:58:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ofp = (esl_opt_GetString (go, "-o") == NULL ? stdout : fopen(esl_opt_GetString(go, "-o"), "w"));
data/infernal-1.1.3/easel/miniapps/esl-afetch.c:127:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((ofp = fopen(esl_opt_GetArg(go, 2), "w")) == NULL)
data/infernal-1.1.3/easel/miniapps/esl-afetch.c:132:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((ofp = fopen(esl_opt_GetString(go, "-o"), "w")) == NULL)
data/infernal-1.1.3/easel/miniapps/esl-alimanip.c:149:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/easel/miniapps/esl-alimanip.c:335:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((ofp = fopen(esl_opt_GetString(go, "-o"), "w")) == NULL) 
data/infernal-1.1.3/easel/miniapps/esl-alimanip.c:361:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((treefp = fopen(esl_opt_GetString(go, "--tree"), "w")) == NULL) 
data/infernal-1.1.3/easel/miniapps/esl-alimanip.c:365:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((mxfp = fopen(esl_opt_GetString(go, "--c-mx"), "w")) == NULL) 
data/infernal-1.1.3/easel/miniapps/esl-alimap.c:71:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          errbuf[eslERRBUFSIZE*4];
data/infernal-1.1.3/easel/miniapps/esl-alimap.c:139:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((subfp = fopen(esl_opt_GetString(go, "--submap"), "w")) == NULL) 
data/infernal-1.1.3/easel/miniapps/esl-alimap.c:586:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(esl_opt_GetString(go, "--mask-a2a"), "w")) == NULL) 
data/infernal-1.1.3/easel/miniapps/esl-alimap.c:607:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(esl_opt_GetString(go, "--mask-a2rf"), "w")) == NULL) 
data/infernal-1.1.3/easel/miniapps/esl-alimap.c:633:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(esl_opt_GetString(go, "--mask-rf2a"), "w")) == NULL) 
data/infernal-1.1.3/easel/miniapps/esl-alimap.c:657:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(esl_opt_GetString(go, "--mask-rf2rf"), "w")) == NULL) 
data/infernal-1.1.3/easel/miniapps/esl-alimask.c:95:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          errbuf[eslERRBUFSIZE];         /* buffer for error messages */
data/infernal-1.1.3/easel/miniapps/esl-alimask.c:282:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((ofp = fopen(esl_opt_GetString(go, "-o"), "w")) == NULL) 
data/infernal-1.1.3/easel/miniapps/esl-alimask.c:1152:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((ofp = fopen(filename, "w")) == NULL) ESL_FAIL(eslFAIL, errbuf, "Failed to open output file %s\n", filename);
data/infernal-1.1.3/easel/miniapps/esl-alimask.c:1185:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char        tok1[32];
data/infernal-1.1.3/easel/miniapps/esl-alimask.c:1186:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char        tok2[32];
data/infernal-1.1.3/easel/miniapps/esl-alimask.c:1194:11:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  start = atol(tok1);
data/infernal-1.1.3/easel/miniapps/esl-alimask.c:1200:11:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    end = atol(tok2);
data/infernal-1.1.3/easel/miniapps/esl-alimerge.c:123:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          errbuf[eslERRBUFSIZE];         /* buffer for error messages */
data/infernal-1.1.3/easel/miniapps/esl-alimerge.c:194:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((ofp = fopen(esl_opt_GetString(go, "-o"), "w")) == NULL) 
data/infernal-1.1.3/easel/miniapps/esl-alistat.c:89:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char        errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/easel/miniapps/esl-alistat.c:186:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((listfp = fopen(esl_opt_GetString(go, "--list"), "w")) == NULL) 
data/infernal-1.1.3/easel/miniapps/esl-alistat.c:190:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((icinfofp = fopen(esl_opt_GetString(go, "--icinfo"), "w")) == NULL) 
data/infernal-1.1.3/easel/miniapps/esl-alistat.c:194:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((rinfofp = fopen(esl_opt_GetString(go, "--rinfo"), "w")) == NULL) 
data/infernal-1.1.3/easel/miniapps/esl-alistat.c:198:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((pcinfofp = fopen(esl_opt_GetString(go, "--pcinfo"), "w")) == NULL) 
data/infernal-1.1.3/easel/miniapps/esl-alistat.c:202:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((psinfofp = fopen(esl_opt_GetString(go, "--psinfo"), "w")) == NULL) 
data/infernal-1.1.3/easel/miniapps/esl-alistat.c:206:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((iinfofp = fopen(esl_opt_GetString(go, "--iinfo"), "w")) == NULL) 
data/infernal-1.1.3/easel/miniapps/esl-alistat.c:210:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((cinfofp = fopen(esl_opt_GetString(go, "--cinfo"), "w")) == NULL) 
data/infernal-1.1.3/easel/miniapps/esl-alistat.c:214:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((bpinfofp = fopen(esl_opt_GetString(go, "--bpinfo"), "w")) == NULL) 
data/infernal-1.1.3/easel/miniapps/esl-alistat.c:730:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ppstring[12] = "0123456789*.";
data/infernal-1.1.3/easel/miniapps/esl-alistat.c:802:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ppstring[12] = "0123456789*.";
data/infernal-1.1.3/easel/miniapps/esl-compalign.c:105:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ppchars[11] = "0123456789*";
data/infernal-1.1.3/easel/miniapps/esl-compalign.c:109:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/easel/miniapps/esl-compalign.c:167:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((dfp = fopen(esl_opt_GetString(go, "--c2dfile"), "w")) == NULL) esl_fatal("Failed to open --c2dfile output file %s\n", esl_opt_GetString(go, "--c2dfile"));
data/infernal-1.1.3/easel/miniapps/esl-compalign.c:197:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ks, ka->ax[i], (ka->alen+2) * sizeof(ESL_DSQ));
data/infernal-1.1.3/easel/miniapps/esl-compalign.c:201:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ts, ta->ax[i], (ta->alen+2) * sizeof(ESL_DSQ));
data/infernal-1.1.3/easel/miniapps/esl-construct.c:185:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((ofp = fopen(esl_opt_GetString(go, "-o"), "w")) == NULL) 
data/infernal-1.1.3/easel/miniapps/esl-construct.c:189:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((lfp = fopen(esl_opt_GetString(go, "-l"), "w")) == NULL) 
data/infernal-1.1.3/easel/miniapps/esl-histplot.c:138:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    ifp = fopen(datafile, "rb");
data/infernal-1.1.3/easel/miniapps/esl-histplot.c:144:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    ofp = fopen(outfile, "w");
data/infernal-1.1.3/easel/miniapps/esl-mask.c:132:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((ofp = fopen(esl_opt_GetString(go, "-o"), "w")) == NULL)
data/infernal-1.1.3/easel/miniapps/esl-mixdchlet.c:139:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (( ofp = fopen(outfile, "w"))             == NULL)   esl_fatal("failed to open %s for writing", outfile);
data/infernal-1.1.3/easel/miniapps/esl-reformat.c:106:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char   errbuf[eslERRBUFSIZE]; /* for error messages                        */
data/infernal-1.1.3/easel/miniapps/esl-reformat.c:177:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  else if ((ofp = fopen(outfile, "w")) == NULL)
data/infernal-1.1.3/easel/miniapps/esl-reformat.c:323:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char    timestamp[32];
data/infernal-1.1.3/easel/miniapps/esl-reformat.c:338:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        if ((mapfp = fopen(mapfile, "w")) == NULL)
data/infernal-1.1.3/easel/miniapps/esl-reformat.c:520:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char       ac_tmpfile[16] = "esltmpXXXXXX";
data/infernal-1.1.3/easel/miniapps/esl-reformat.c:529:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char       de_tmpfile[16] = "esltmpXXXXXX";
data/infernal-1.1.3/easel/miniapps/esl-reformat.c:541:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char       aseqbuf[61];
data/infernal-1.1.3/easel/miniapps/esl-selectn.c:71:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  m        = atoi(esl_opt_GetArg(go, 1));
data/infernal-1.1.3/easel/miniapps/esl-selectn.c:80:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(filename, "r")) == NULL) esl_fatal("Failed to open file %s\n", filename);
data/infernal-1.1.3/easel/miniapps/esl-seqrange.c:79:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  procidx = atoi(esl_opt_GetArg(go, 2));
data/infernal-1.1.3/easel/miniapps/esl-seqrange.c:80:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  nproc   = atoi(esl_opt_GetArg(go, 3));
data/infernal-1.1.3/easel/miniapps/esl-sfetch.c:129:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((ofp = fopen(esl_opt_GetArg(go, 2), "w")) == NULL)
data/infernal-1.1.3/easel/miniapps/esl-sfetch.c:134:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((ofp = fopen(esl_opt_GetString(go, "-o"), "w")) == NULL)
data/infernal-1.1.3/easel/miniapps/esl-sfetch.c:439:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      start = atoi(s);
data/infernal-1.1.3/easel/miniapps/esl-sfetch.c:445:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      end   = atoi(s);
data/infernal-1.1.3/easel/miniapps/esl-shuffle.c:359:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((ofp = fopen(esl_opt_GetString(go, "-o"), "w")) == NULL)
data/infernal-1.1.3/easel/miniapps/esl-ssdraw.c:591:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            errbuf[ERRBUFSIZE];   /* for printing error messages */
data/infernal-1.1.3/easel/miniapps/esl-ssdraw.c:997:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if((tabfp = fopen(esl_opt_GetString(go, "--tabfile"), "w")) == NULL) esl_fatal("Failed to open output file %s\n", esl_opt_GetString(go, "--tabfile"));
data/infernal-1.1.3/easel/miniapps/esl-ssdraw.c:1116:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((ofp = fopen(outfile, "w")) == NULL)
data/infernal-1.1.3/easel/miniapps/esl-ssdraw.c:1677:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(text[1], "as the least ambiguous nt that represents >= %0.2f", esl_opt_GetReal(go, "--athresh"));
data/infernal-1.1.3/easel/miniapps/esl-ssdraw.c:1689:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(text[2], "Capitalized nts occur in >= %0.2f fraction of sequences", esl_opt_GetReal(go, "--cthresh"));
data/infernal-1.1.3/easel/miniapps/esl-ssdraw.c:2934:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  ps->leg_posn = atoi(tok);
data/infernal-1.1.3/easel/miniapps/esl-ssdraw.c:2940:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  ps->leg_cellsize = atoi(tok);
data/infernal-1.1.3/easel/miniapps/esl-ssdraw.c:6562:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      if(rflen != atoi(tok)) {
data/infernal-1.1.3/easel/miniapps/esl-ssdraw.c:6563:118:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	esl_fatal("Error reading insert file, read consensus length of %d on line %d of file %s, but expected length %d\n", atoi(tok), efp->linenumber, ifile, rflen);
data/infernal-1.1.3/easel/miniapps/esl-ssdraw.c:6578:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	seqlen = atoi(tok);
data/infernal-1.1.3/easel/miniapps/esl-ssdraw.c:6581:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	spos = atoi(tok);
data/infernal-1.1.3/easel/miniapps/esl-ssdraw.c:6585:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	epos = atoi(tok);
data/infernal-1.1.3/easel/miniapps/esl-ssdraw.c:6593:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	  rfpos = atoi(tok);
data/infernal-1.1.3/easel/miniapps/esl-ssdraw.c:6598:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	  uapos = atoi(tok);
data/infernal-1.1.3/easel/miniapps/esl-ssdraw.c:6603:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	  nins = atoi(tok);
data/infernal-1.1.3/easel/miniapps/esl-weight.c:87:58:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ofp = (esl_opt_GetString (go, "-o") == NULL ? stdout : fopen(esl_opt_GetString(go, "-o"), "w"));
data/infernal-1.1.3/hmmer/profmark/create-profmark.c:158:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          outfile[256];	/* name of an output file          */
data/infernal-1.1.3/hmmer/profmark/create-profmark.c:200:24:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((cfg.out_msafp = fopen(outfile, "w"))      == NULL) esl_fatal("Failed to open MSA output file %s\n", outfile);
data/infernal-1.1.3/hmmer/profmark/create-profmark.c:202:24:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((cfg.out_seqfp = fopen(outfile, "w"))      == NULL) esl_fatal("Failed to open FASTA output file %s\n", outfile);
data/infernal-1.1.3/hmmer/profmark/create-profmark.c:204:24:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((cfg.possummfp = fopen(outfile, "w"))      == NULL) esl_fatal("Failed to open pos test set summary file %s\n", outfile);
data/infernal-1.1.3/hmmer/profmark/create-profmark.c:206:24:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((cfg.negsummfp = fopen(outfile, "w"))      == NULL) esl_fatal("Failed to open neg test set summary file %s\n", outfile);
data/infernal-1.1.3/hmmer/profmark/create-profmark.c:208:24:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((cfg.tblfp     = fopen(outfile, "w"))      == NULL) esl_fatal("Failed to open benchmark table file %s\n", outfile);
data/infernal-1.1.3/hmmer/profmark/create-profmark.c:211:24:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((cfg.pidfp   = fopen(outfile, "w"))        == NULL) esl_fatal("Failed to open %%id table file %s\n", outfile);
data/infernal-1.1.3/hmmer/profmark/create-profmark.c:531:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(sq->dsq+i+1,     domain1->dsq+1, sizeof(ESL_DSQ) * d1n);
data/infernal-1.1.3/hmmer/profmark/create-profmark.c:536:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy(sq->dsq+j+d1n+1, domain2->dsq+1, sizeof(ESL_DSQ) * d2n);
data/infernal-1.1.3/hmmer/profmark/create-profmark.c:672:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dsq, sq->dsq+1, sizeof(ESL_DSQ) * L);
data/infernal-1.1.3/hmmer/src/alimask.c:343:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    postmsafp = fopen(postmsafile, "w");
data/infernal-1.1.3/hmmer/src/alimask.c:349:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      ofp = fopen(esl_opt_GetString(go, "-o"), "w");
data/infernal-1.1.3/hmmer/src/build.c:266:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/build.c:413:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          msafile[16]  = "p7tmpXXXXXX"; /* tmpfile name template */
data/infernal-1.1.3/hmmer/src/build.c:455:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          msafile[16]  = "p7tmpXXXXXX"; /* tmpfile name template */
data/infernal-1.1.3/hmmer/src/cachedb.c:55:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char               buffer[512];
data/infernal-1.1.3/hmmer/src/cachedb.c:151:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(buffer, "000000001");
data/infernal-1.1.3/hmmer/src/cachedb.c:189:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(res_ptr, sq->dsq, sq->n + 1);
data/infernal-1.1.3/hmmer/src/cachedb.c:371:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            buffer[10];
data/infernal-1.1.3/hmmer/src/cachedb.c:405:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((ofp = fopen(esl_opt_GetString(go, "-o"), "w")) == NULL) {
data/infernal-1.1.3/hmmer/src/cachedb.c:459:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(info->dsq, sq->dsq, sq->n+2);
data/infernal-1.1.3/hmmer/src/cachedb.c:495:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(buffer, "000000001");
data/infernal-1.1.3/hmmer/src/cachedb.c:501:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[80];
data/infernal-1.1.3/hmmer/src/cachedb_shard.c:62:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char               buffer[512];
data/infernal-1.1.3/hmmer/src/cachedb_shard.c:161:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(buffer, "000000001");
data/infernal-1.1.3/hmmer/src/cachedb_shard.c:333:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char               buffer[512];
data/infernal-1.1.3/hmmer/src/cachedb_shard.c:436:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(buffer, "000000001");
data/infernal-1.1.3/hmmer/src/cachedb_shard.c:495:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(res_ptr, sq->dsq, sq->n + 1);
data/infernal-1.1.3/hmmer/src/cachedb_shard.c:715:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            buffer[10];
data/infernal-1.1.3/hmmer/src/cachedb_shard.c:749:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((ofp = fopen(esl_opt_GetString(go, "-o"), "w")) == NULL) {
data/infernal-1.1.3/hmmer/src/cachedb_shard.c:803:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(info->dsq, sq->dsq, sq->n+2);
data/infernal-1.1.3/hmmer/src/cachedb_shard.c:839:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(buffer, "000000001");
data/infernal-1.1.3/hmmer/src/cachedb_shard.c:845:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[80];
data/infernal-1.1.3/hmmer/src/emit.c:556:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/fm_sse.c:40:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str[144];
data/infernal-1.1.3/hmmer/src/fm_sse.c:50:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str[144];
data/infernal-1.1.3/hmmer/src/generic_fwdback.c:551:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/generic_fwdback.c:665:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/generic_fwdback_chk.c:662:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/generic_msv.c:441:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/generic_optacc.c:545:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/generic_stotrace.c:307:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char      errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/generic_stotrace.c:459:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/generic_viterbi.c:506:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char      errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/generic_viterbi.c:584:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/generic_viterbi.c:654:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/generic_vtrace.c:209:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/hmmalign.c:100:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/hmmalign.c:133:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((ofp = fopen(outfile, "w")) == NULL)
data/infernal-1.1.3/hmmer/src/hmmbuild.c:526:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  cfg->hmmfp = fopen(cfg->hmmfile, "w");
data/infernal-1.1.3/hmmer/src/hmmbuild.c:531:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      cfg->ofp = fopen(esl_opt_GetString(go, "-o"), "w");
data/infernal-1.1.3/hmmer/src/hmmbuild.c:538:24:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      cfg->postmsafp = fopen(cfg->postmsafile, "w");
data/infernal-1.1.3/hmmer/src/hmmbuild.c:697:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char        errmsg[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/hmmbuild.c:723:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  cfg->hmmfp = fopen(cfg->hmmfile, "w");
data/infernal-1.1.3/hmmer/src/hmmbuild.c:728:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      cfg->ofp = fopen(esl_opt_GetString(go, "-o"), "w");
data/infernal-1.1.3/hmmer/src/hmmbuild.c:735:24:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      cfg->postmsafp = fopen(cfg->postmsafile, "w");
data/infernal-1.1.3/hmmer/src/hmmbuild.c:916:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          errmsg[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/hmmbuild.c:1023:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char        errmsg[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/hmmbuild.c:1078:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char        errmsg[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/hmmc2.c:184:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char             opts[MAX_READ_LEN];
data/infernal-1.1.3/hmmer/src/hmmc2.c:190:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char             buffer[MAX_READ_LEN];
data/infernal-1.1.3/hmmer/src/hmmc2.c:205:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char                 serv_ip[64];
data/infernal-1.1.3/hmmer/src/hmmc2.c:214:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(serv_ip, "127.0.0.1");
data/infernal-1.1.3/hmmer/src/hmmc2.c:229:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      serv_port = atoi(argv[i+1]);
data/infernal-1.1.3/hmmer/src/hmmconvert.c:42:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char           errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/hmmd_search_status.c:79:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ptr, &network_32bit, sizeof(int32_t));
data/infernal-1.1.3/hmmer/src/hmmd_search_status.c:84:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ptr, &network_64bit, sizeof(int64_t));
data/infernal-1.1.3/hmmer/src/hmmd_search_status.c:122:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_32bit, ptr, sizeof(uint32_t)); // Grab the bytes out of the buffer
data/infernal-1.1.3/hmmer/src/hmmd_search_status.c:127:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_64bit, ptr, sizeof(uint64_t)); // Grab the bytes out of the buffer
data/infernal-1.1.3/hmmer/src/hmmdmstr.c:60:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            ip_addr[64];
data/infernal-1.1.3/hmmer/src/hmmdmstr.c:94:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char                  ip_addr[64];
data/infernal-1.1.3/hmmer/src/hmmdmstr.c:133:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  ebuf[512];
data/infernal-1.1.3/hmmer/src/hmmdmstr.c:523:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char                errbuf[eslERRBUFSIZE]; 
data/infernal-1.1.3/hmmer/src/hmmdmstr.c:1002:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char           timestamp[32];
data/infernal-1.1.3/hmmer/src/hmmdmstr.c:1059:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char               opt_str[MAX_BUFFER];
data/infernal-1.1.3/hmmer/src/hmmdmstr.c:1080:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char               timestamp[32];
data/infernal-1.1.3/hmmer/src/hmmdmstr.c:1262:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ptr, opt_str, cmd->srch.opts_length);
data/infernal-1.1.3/hmmer/src/hmmdmstr.c:1270:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ptr, seq->name, n);
data/infernal-1.1.3/hmmer/src/hmmdmstr.c:1274:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ptr, seq->desc, n);
data/infernal-1.1.3/hmmer/src/hmmdmstr.c:1278:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ptr, seq->dsq, n);
data/infernal-1.1.3/hmmer/src/hmmdmstr.c:1285:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ptr, hmm, n);
data/infernal-1.1.3/hmmer/src/hmmdmstr.c:1289:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ptr, *hmm->t, n);
data/infernal-1.1.3/hmmer/src/hmmdmstr.c:1293:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ptr, *hmm->mat, n);
data/infernal-1.1.3/hmmer/src/hmmdmstr.c:1295:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ptr, *hmm->ins, n);
data/infernal-1.1.3/hmmer/src/hmmdmstr.c:1298:50:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    if (hmm->name) { n = strlen(hmm->name) + 1;  memcpy(ptr, hmm->name, n);  ptr += n; }
data/infernal-1.1.3/hmmer/src/hmmdmstr.c:1299:50:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    if (hmm->acc)  { n = strlen(hmm->acc)  + 1;  memcpy(ptr, hmm->acc, n);   ptr += n; }
data/infernal-1.1.3/hmmer/src/hmmdmstr.c:1300:50:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    if (hmm->desc) { n = strlen(hmm->desc) + 1;  memcpy(ptr, hmm->desc, n);  ptr += n; }
data/infernal-1.1.3/hmmer/src/hmmdmstr.c:1303:35:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    if (hmm->flags & p7H_RF)    { memcpy(ptr, hmm->rf,        n); ptr += n; }
data/infernal-1.1.3/hmmer/src/hmmdmstr.c:1304:35:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    if (hmm->flags & p7H_MMASK) { memcpy(ptr, hmm->mm,        n); ptr += n; }
data/infernal-1.1.3/hmmer/src/hmmdmstr.c:1305:35:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    if (hmm->flags & p7H_CONS)  { memcpy(ptr, hmm->consensus, n); ptr += n; }
data/infernal-1.1.3/hmmer/src/hmmdmstr.c:1306:35:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    if (hmm->flags & p7H_CS)    { memcpy(ptr, hmm->cs,        n); ptr += n; }
data/infernal-1.1.3/hmmer/src/hmmdmstr.c:1307:35:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    if (hmm->flags & p7H_CA)    { memcpy(ptr, hmm->ca,        n); ptr += n; }
data/infernal-1.1.3/hmmer/src/hmmdmstr.c:1311:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(ptr, hmm->map, n);
data/infernal-1.1.3/hmmer/src/hmmdmstr.c:1539:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&cmd, worker->cmd, n);
data/infernal-1.1.3/hmmer/src/hmmdmstr_shard.c:63:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            ip_addr[64];
data/infernal-1.1.3/hmmer/src/hmmdmstr_shard.c:100:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char                  ip_addr[64];
data/infernal-1.1.3/hmmer/src/hmmdmstr_shard.c:153:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  ebuf[512];
data/infernal-1.1.3/hmmer/src/hmmdmstr_shard.c:556:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char                errbuf[eslERRBUFSIZE]; 
data/infernal-1.1.3/hmmer/src/hmmdmstr_shard.c:1041:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char           timestamp[32];
data/infernal-1.1.3/hmmer/src/hmmdmstr_shard.c:1098:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char               opt_str[MAX_BUFFER];
data/infernal-1.1.3/hmmer/src/hmmdmstr_shard.c:1119:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char               timestamp[32];
data/infernal-1.1.3/hmmer/src/hmmdmstr_shard.c:1301:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ptr, opt_str, cmd->srch.opts_length);
data/infernal-1.1.3/hmmer/src/hmmdmstr_shard.c:1309:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ptr, seq->name, n);
data/infernal-1.1.3/hmmer/src/hmmdmstr_shard.c:1313:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ptr, seq->desc, n);
data/infernal-1.1.3/hmmer/src/hmmdmstr_shard.c:1317:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ptr, seq->dsq, n);
data/infernal-1.1.3/hmmer/src/hmmdmstr_shard.c:1324:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ptr, hmm, n);
data/infernal-1.1.3/hmmer/src/hmmdmstr_shard.c:1328:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ptr, *hmm->t, n);
data/infernal-1.1.3/hmmer/src/hmmdmstr_shard.c:1332:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ptr, *hmm->mat, n);
data/infernal-1.1.3/hmmer/src/hmmdmstr_shard.c:1334:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ptr, *hmm->ins, n);
data/infernal-1.1.3/hmmer/src/hmmdmstr_shard.c:1337:50:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    if (hmm->name) { n = strlen(hmm->name) + 1;  memcpy(ptr, hmm->name, n);  ptr += n; }
data/infernal-1.1.3/hmmer/src/hmmdmstr_shard.c:1338:50:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    if (hmm->acc)  { n = strlen(hmm->acc)  + 1;  memcpy(ptr, hmm->acc, n);   ptr += n; }
data/infernal-1.1.3/hmmer/src/hmmdmstr_shard.c:1339:50:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    if (hmm->desc) { n = strlen(hmm->desc) + 1;  memcpy(ptr, hmm->desc, n);  ptr += n; }
data/infernal-1.1.3/hmmer/src/hmmdmstr_shard.c:1342:35:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    if (hmm->flags & p7H_RF)    { memcpy(ptr, hmm->rf,        n); ptr += n; }
data/infernal-1.1.3/hmmer/src/hmmdmstr_shard.c:1343:35:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    if (hmm->flags & p7H_MMASK) { memcpy(ptr, hmm->mm,        n); ptr += n; }
data/infernal-1.1.3/hmmer/src/hmmdmstr_shard.c:1344:35:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    if (hmm->flags & p7H_CONS)  { memcpy(ptr, hmm->consensus, n); ptr += n; }
data/infernal-1.1.3/hmmer/src/hmmdmstr_shard.c:1345:35:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    if (hmm->flags & p7H_CS)    { memcpy(ptr, hmm->cs,        n); ptr += n; }
data/infernal-1.1.3/hmmer/src/hmmdmstr_shard.c:1346:35:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    if (hmm->flags & p7H_CA)    { memcpy(ptr, hmm->ca,        n); ptr += n; }
data/infernal-1.1.3/hmmer/src/hmmdmstr_shard.c:1350:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(ptr, hmm->map, n);
data/infernal-1.1.3/hmmer/src/hmmdmstr_shard.c:1579:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&cmd, worker->cmd, n);
data/infernal-1.1.3/hmmer/src/hmmdwrkr.c:99:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf1[16];
data/infernal-1.1.3/hmmer/src/hmmdwrkr.c:106:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(buf1, "%02d:%02d.%02d", m,s,hs);
data/infernal-1.1.3/hmmer/src/hmmdwrkr.c:210:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char             timestamp[32];
data/infernal-1.1.3/hmmer/src/hmmdwrkr.c:400:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&thmm, p, sizeof(P7_HMM));
data/infernal-1.1.3/hmmer/src/hmmdwrkr.c:420:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(*hmm->t, p, n);     p += n;
data/infernal-1.1.3/hmmer/src/hmmdwrkr.c:423:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(*hmm->mat, p, n);   p += n;
data/infernal-1.1.3/hmmer/src/hmmdwrkr.c:424:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(*hmm->ins, p, n);   p += n;
data/infernal-1.1.3/hmmer/src/hmmdwrkr.c:431:35:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    if (hmm->flags & p7H_RF)    { memcpy(hmm->rf,        p, n); p += n; }
data/infernal-1.1.3/hmmer/src/hmmdwrkr.c:432:35:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    if (hmm->flags & p7H_MMASK) { memcpy(hmm->mm,        p, n); p += n; }
data/infernal-1.1.3/hmmer/src/hmmdwrkr.c:433:35:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    if (hmm->flags & p7H_CONS)  { memcpy(hmm->consensus, p, n); p += n; }
data/infernal-1.1.3/hmmer/src/hmmdwrkr.c:434:35:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    if (hmm->flags & p7H_CS)    { memcpy(hmm->cs,        p, n); p += n; }
data/infernal-1.1.3/hmmer/src/hmmdwrkr.c:435:35:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    if (hmm->flags & p7H_CA)    { memcpy(hmm->ca,        p, n); p += n; }
data/infernal-1.1.3/hmmer/src/hmmdwrkr.c:438:34:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    if (hmm->flags & p7H_MAP) {  memcpy(hmm->map,       p, n); p += n; }
data/infernal-1.1.3/hmmer/src/hmmdwrkr_shard.c:116:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf1[16];
data/infernal-1.1.3/hmmer/src/hmmdwrkr_shard.c:123:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(buf1, "%02d:%02d.%02d", m,s,hs);
data/infernal-1.1.3/hmmer/src/hmmdwrkr_shard.c:228:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char             timestamp[32];
data/infernal-1.1.3/hmmer/src/hmmdwrkr_shard.c:427:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&thmm, p, sizeof(P7_HMM));
data/infernal-1.1.3/hmmer/src/hmmdwrkr_shard.c:447:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(*hmm->t, p, n);     p += n;
data/infernal-1.1.3/hmmer/src/hmmdwrkr_shard.c:450:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(*hmm->mat, p, n);   p += n;
data/infernal-1.1.3/hmmer/src/hmmdwrkr_shard.c:451:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(*hmm->ins, p, n);   p += n;
data/infernal-1.1.3/hmmer/src/hmmdwrkr_shard.c:458:35:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    if (hmm->flags & p7H_RF)    { memcpy(hmm->rf,        p, n); p += n; }
data/infernal-1.1.3/hmmer/src/hmmdwrkr_shard.c:459:35:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    if (hmm->flags & p7H_MMASK) { memcpy(hmm->mm,        p, n); p += n; }
data/infernal-1.1.3/hmmer/src/hmmdwrkr_shard.c:460:35:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    if (hmm->flags & p7H_CONS)  { memcpy(hmm->consensus, p, n); p += n; }
data/infernal-1.1.3/hmmer/src/hmmdwrkr_shard.c:461:35:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    if (hmm->flags & p7H_CS)    { memcpy(hmm->cs,        p, n); p += n; }
data/infernal-1.1.3/hmmer/src/hmmdwrkr_shard.c:462:35:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    if (hmm->flags & p7H_CA)    { memcpy(hmm->ca,        p, n); p += n; }
data/infernal-1.1.3/hmmer/src/hmmdwrkr_shard.c:465:34:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    if (hmm->flags & p7H_MAP) {  memcpy(hmm->map,       p, n); p += n; }
data/infernal-1.1.3/hmmer/src/hmmemit.c:74:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char             errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/hmmemit.c:85:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((ofp = fopen(esl_opt_GetString(go, "-o"), "w")) == NULL) esl_fatal("Failed to open output file %s", esl_opt_GetString(go, "-o"));
data/infernal-1.1.3/hmmer/src/hmmer.h:434:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/hmmer.h:1250:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/hmmer.h:1309:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char errbuf[eslERRBUFSIZE];            /* informative message on model construction failure      */
data/infernal-1.1.3/hmmer/src/hmmer.h:1521:74:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
extern int p7_domain_Compare(P7_DOMAIN *first, P7_DOMAIN *second, double atol, double rtol);
data/infernal-1.1.3/hmmer/src/hmmer.h:1553:65:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
extern int p7_hit_Compare(P7_HIT *first, P7_HIT *second, double atol, double rtol);
data/infernal-1.1.3/hmmer/src/hmmerfm-exactmatch.c:75:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char retbuf[30];
data/infernal-1.1.3/hmmer/src/hmmerfm-exactmatch.c:261:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      out = fopen(outname,"w");
data/infernal-1.1.3/hmmer/src/hmmerfm-exactmatch.c:269:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if((fp_fm = fopen(fname_fm, "rb")) == NULL)
data/infernal-1.1.3/hmmer/src/hmmerfm-exactmatch.c:313:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fp = fopen(fname_queries,"r");
data/infernal-1.1.3/hmmer/src/hmmfetch.c:75:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/hmmfetch.c:129:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((ofp = fopen(keyname, "w")) == NULL)	p7_Fail("Failed to open output file %s\n", keyname);
data/infernal-1.1.3/hmmer/src/hmmfetch.c:133:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((ofp = fopen(esl_opt_GetString(go, "-o"), "w")) == NULL)
data/infernal-1.1.3/hmmer/src/hmmlogo.c:188:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char   errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/hmmpgmd.c:84:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE   *fp       = fopen(pid_file, "w");
data/infernal-1.1.3/hmmer/src/hmmpgmd.c:104:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((fp = fopen(CONF_FILE, "r")) == NULL) 
data/infernal-1.1.3/hmmer/src/hmmpgmd.h:59:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char        data[1];              /* search data                              */
data/infernal-1.1.3/hmmer/src/hmmpgmd.h:64:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char        sid[MAX_INIT_DESC];   /* unique id for sequence database          */
data/infernal-1.1.3/hmmer/src/hmmpgmd.h:65:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char        hid[MAX_INIT_DESC];   /* unique id for hmm database               */
data/infernal-1.1.3/hmmer/src/hmmpgmd.h:72:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char        data[1];              /* string data                              */
data/infernal-1.1.3/hmmer/src/hmmpgmd.h:77:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char        ip_addr[1];           /* ip address                               */
data/infernal-1.1.3/hmmer/src/hmmpgmd.h:114:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char           ip_addr[64];
data/infernal-1.1.3/hmmer/src/hmmpgmd2msa.c:330:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy( th.unsrt, hits, sizeof(P7_HIT) * stats->nhits);
data/infernal-1.1.3/hmmer/src/hmmpgmd2msa.c:398:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(ad2->mem, p, ad->memsize);
data/infernal-1.1.3/hmmer/src/hmmpgmd_shard.c:85:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE   *fp       = fopen(pid_file, "w");
data/infernal-1.1.3/hmmer/src/hmmpgmd_shard.c:105:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((fp = fopen(CONF_FILE, "r")) == NULL) 
data/infernal-1.1.3/hmmer/src/hmmpgmd_shard.h:9:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char        sid[MAX_INIT_DESC];   /* unique id for sequence database          */
data/infernal-1.1.3/hmmer/src/hmmpgmd_shard.h:10:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char        hid[MAX_INIT_DESC];   /* unique id for hmm database               */
data/infernal-1.1.3/hmmer/src/hmmpgmd_shard.h:19:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char        data[1];              /* string data                              */
data/infernal-1.1.3/hmmer/src/hmmpgmd_shard.h:41:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char           ip_addr[64];
data/infernal-1.1.3/hmmer/src/hmmpress.c:58:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/hmmpress.c:153:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/hmmpress.c:181:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((dbf->mfp = fopen(dbf->mfile, "wb")) == NULL)  ESL_XFAIL(eslEWRITE, errbuf, "Failed to open binary HMM file %s for writing",        dbf->mfile);
data/infernal-1.1.3/hmmer/src/hmmpress.c:182:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((dbf->ffp = fopen(dbf->ffile, "wb")) == NULL)  ESL_XFAIL(eslEWRITE, errbuf, "Failed to open binary MSV filter file %s for writing", dbf->ffile); 
data/infernal-1.1.3/hmmer/src/hmmpress.c:183:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((dbf->pfp = fopen(dbf->pfile, "wb")) == NULL)  ESL_XFAIL(eslEWRITE, errbuf, "Failed to open binary profile file %s for writing",    dbf->pfile); 
data/infernal-1.1.3/hmmer/src/hmmscan.c:347:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char             errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/hmmscan.c:384:58:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (esl_opt_IsOn(go, "-o"))          { if ((ofp      = fopen(esl_opt_GetString(go, "-o"),          "w")) == NULL)  esl_fatal("Failed to open output file %s for writing\n",                 esl_opt_GetString(go, "-o")); }
data/infernal-1.1.3/hmmer/src/hmmscan.c:385:58:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (esl_opt_IsOn(go, "--tblout"))    { if ((tblfp    = fopen(esl_opt_GetString(go, "--tblout"),    "w")) == NULL)  esl_fatal("Failed to open tabular per-seq output file %s for writing\n", esl_opt_GetString(go, "--tblout")); }
data/infernal-1.1.3/hmmer/src/hmmscan.c:386:58:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (esl_opt_IsOn(go, "--domtblout")) { if ((domtblfp = fopen(esl_opt_GetString(go, "--domtblout"), "w")) == NULL)  esl_fatal("Failed to open tabular per-dom output file %s for writing\n", esl_opt_GetString(go, "--domtblout")); }
data/infernal-1.1.3/hmmer/src/hmmscan.c:387:59:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (esl_opt_IsOn(go, "--pfamtblout")){ if ((pfamtblfp = fopen(esl_opt_GetString(go, "--pfamtblout"), "w")) == NULL)  esl_fatal("Failed to open pfam-style tabular output file %s for writing\n", esl_opt_GetString(go, "--pfamtblout")); }
data/infernal-1.1.3/hmmer/src/hmmscan.c:576:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char     str[512];
data/infernal-1.1.3/hmmer/src/hmmscan.c:746:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char             errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/hmmscan.c:782:54:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (esl_opt_IsOn(go, "-o")          && (ofp      = fopen(esl_opt_GetString(go, "-o"),          "w")) == NULL)
data/infernal-1.1.3/hmmer/src/hmmscan.c:784:54:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (esl_opt_IsOn(go, "--tblout")    && (tblfp    = fopen(esl_opt_GetString(go, "--tblout"),    "w")) == NULL)
data/infernal-1.1.3/hmmer/src/hmmscan.c:786:54:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (esl_opt_IsOn(go, "--domtblout") && (domtblfp = fopen(esl_opt_GetString(go, "--domtblout"), "w")) == NULL)  
data/infernal-1.1.3/hmmer/src/hmmscan.c:788:56:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (esl_opt_IsOn(go, "--pfamtblout") && (pfamtblfp = fopen(esl_opt_GetString(go, "--pfamtblout"), "w")) == NULL)
data/infernal-1.1.3/hmmer/src/hmmscan.c:1012:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char             errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/hmmsearch.c:379:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char             errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/hmmsearch.c:415:58:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (esl_opt_IsOn(go, "-o"))          { if ((ofp      = fopen(esl_opt_GetString(go, "-o"), "w")) == NULL) p7_Fail("Failed to open output file %s for writing\n",    esl_opt_GetString(go, "-o")); }
data/infernal-1.1.3/hmmer/src/hmmsearch.c:416:58:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (esl_opt_IsOn(go, "-A"))          { if ((afp      = fopen(esl_opt_GetString(go, "-A"), "w")) == NULL) p7_Fail("Failed to open alignment file %s for writing\n", esl_opt_GetString(go, "-A")); }
data/infernal-1.1.3/hmmer/src/hmmsearch.c:417:58:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (esl_opt_IsOn(go, "--tblout"))    { if ((tblfp    = fopen(esl_opt_GetString(go, "--tblout"),    "w")) == NULL)  esl_fatal("Failed to open tabular per-seq output file %s for writing\n", esl_opt_GetString(go, "--tblout")); }
data/infernal-1.1.3/hmmer/src/hmmsearch.c:418:58:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (esl_opt_IsOn(go, "--domtblout")) { if ((domtblfp = fopen(esl_opt_GetString(go, "--domtblout"), "w")) == NULL)  esl_fatal("Failed to open tabular per-dom output file %s for writing\n", esl_opt_GetString(go, "--domtblout")); }
data/infernal-1.1.3/hmmer/src/hmmsearch.c:419:59:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (esl_opt_IsOn(go, "--pfamtblout")){ if ((pfamtblfp = fopen(esl_opt_GetString(go, "--pfamtblout"), "w")) == NULL)  esl_fatal("Failed to open pfam-style tabular output file %s for writing\n", esl_opt_GetString(go, "--pfamtblout")); }
data/infernal-1.1.3/hmmer/src/hmmsearch.c:661:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char     str[512];
data/infernal-1.1.3/hmmer/src/hmmsearch.c:834:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char             errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/hmmsearch.c:870:40:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (esl_opt_IsOn(go, "-o") && (ofp = fopen(esl_opt_GetString(go, "-o"), "w")) == NULL)
data/infernal-1.1.3/hmmer/src/hmmsearch.c:873:40:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (esl_opt_IsOn(go, "-A") && (afp = fopen(esl_opt_GetString(go, "-A"), "w")) == NULL) 
data/infernal-1.1.3/hmmer/src/hmmsearch.c:876:48:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (esl_opt_IsOn(go, "--tblout") && (tblfp = fopen(esl_opt_GetString(go, "--tblout"), "w")) == NULL)
data/infernal-1.1.3/hmmer/src/hmmsearch.c:879:54:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (esl_opt_IsOn(go, "--domtblout") && (domtblfp = fopen(esl_opt_GetString(go, "--domtblout"), "w")) == NULL)
data/infernal-1.1.3/hmmer/src/hmmsearch.c:882:56:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (esl_opt_IsOn(go, "--pfamtblout") && (pfamtblfp = fopen(esl_opt_GetString(go, "--pfamtblout"), "w")) == NULL)
data/infernal-1.1.3/hmmer/src/hmmsearch.c:1152:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char             errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/hmmsim.c:308:23:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((cfg->ofp = fopen(filename, "w")) == NULL) 
data/infernal-1.1.3/hmmer/src/hmmsim.c:316:26:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((cfg->survfp = fopen(filename, "w")) == NULL) 
data/infernal-1.1.3/hmmer/src/hmmsim.c:323:23:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((cfg->efp = fopen(filename, "w")) == NULL) 
data/infernal-1.1.3/hmmer/src/hmmsim.c:330:23:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((cfg->ffp = fopen(filename, "w")) == NULL) 
data/infernal-1.1.3/hmmer/src/hmmsim.c:337:23:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((cfg->xfp = fopen(filename, "w")) == NULL) 
data/infernal-1.1.3/hmmer/src/hmmsim.c:344:24:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((cfg->alfp = fopen(filename, "w")) == NULL) 
data/infernal-1.1.3/hmmer/src/hmmsim.c:361:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char        errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/hmmsim.c:427:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char             errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/hmmsim.c:545:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/hmmsim.c:729:26:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  if (status == eslEMEM) sprintf(errbuf, "allocation failure");
data/infernal-1.1.3/hmmer/src/hmmstat.c:37:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char             errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/impl_sse/io.c:749:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((msvfp = fopen(msvfile, "r")) == NULL) p7_Fail("Failed to open MSV file %s for reading.\n", msvfile);
data/infernal-1.1.3/hmmer/src/impl_sse/io.c:788:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char         tmpfile[16] = "esltmpXXXXXX";
data/infernal-1.1.3/hmmer/src/impl_sse/io.c:788:16:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  char         tmpfile[16] = "esltmpXXXXXX";
data/infernal-1.1.3/hmmer/src/impl_sse/io.c:801:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char         errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/impl_sse/io.c:806:26:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if ( esl_tmpfile_named(tmpfile, &fp)          != eslOK) esl_fatal(msg);
data/infernal-1.1.3/hmmer/src/impl_sse/io.c:807:40:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if ( esl_sprintf(&mfile,   "%s.h3m", tmpfile) != eslOK) esl_fatal(msg);
data/infernal-1.1.3/hmmer/src/impl_sse/io.c:808:40:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if ( esl_sprintf(&ffile,   "%s.h3f", tmpfile) != eslOK) esl_fatal(msg);
data/infernal-1.1.3/hmmer/src/impl_sse/io.c:809:40:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if ( esl_sprintf(&pfile,   "%s.h3p", tmpfile) != eslOK) esl_fatal(msg);
data/infernal-1.1.3/hmmer/src/impl_sse/io.c:810:40:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if ( esl_sprintf(&ssifile, "%s.h3i", tmpfile) != eslOK) esl_fatal(msg);
data/infernal-1.1.3/hmmer/src/impl_sse/io.c:813:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (( mfp = fopen(mfile, "wb"))               == NULL)  esl_fatal(msg);
data/infernal-1.1.3/hmmer/src/impl_sse/io.c:814:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (( ffp = fopen(ffile, "wb"))               == NULL)  esl_fatal(msg);
data/infernal-1.1.3/hmmer/src/impl_sse/io.c:815:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (( pfp = fopen(pfile, "wb"))               == NULL)  esl_fatal(msg);
data/infernal-1.1.3/hmmer/src/impl_sse/io.c:829:33:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if ( esl_newssi_AddFile(nssi, tmpfile, 0, &fh)                           != eslOK) esl_fatal(msg);
data/infernal-1.1.3/hmmer/src/impl_sse/io.c:840:25:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if ( p7_hmmfile_OpenE(tmpfile, NULL, &hfp, NULL)  != eslOK) esl_fatal(msg);
data/infernal-1.1.3/hmmer/src/impl_sse/io.c:854:10:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  remove(tmpfile);
data/infernal-1.1.3/hmmer/src/impl_sse/io.c:972:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char           errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/impl_sse/io.c:981:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((ffp = fopen(fname, "wb")) == NULL) p7_Fail("failed to open %s\n", fname);
data/infernal-1.1.3/hmmer/src/impl_sse/io.c:982:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((pfp = fopen(pname, "wb")) == NULL) p7_Fail("failed to open %s\n", pname);
data/infernal-1.1.3/hmmer/src/impl_sse/mpi.c:684:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/impl_sse/null2.c:60:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pp->dpf[0], pp->dpf[1], sizeof(__m128) * 3 * Q);
data/infernal-1.1.3/hmmer/src/impl_sse/optacc.c:875:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/impl_sse/p7_oprofile.c:311:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(om2->rbv[0], om1->rbv[0], sizeof(__m128i) * nqb  * abc->Kp);
data/infernal-1.1.3/hmmer/src/impl_sse/p7_oprofile.c:312:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(om2->sbv[0], om1->sbv[0], sizeof(__m128i) * nqs  * abc->Kp);
data/infernal-1.1.3/hmmer/src/impl_sse/p7_oprofile.c:313:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(om2->rwv[0], om1->rwv[0], sizeof(__m128i) * nqw  * abc->Kp);
data/infernal-1.1.3/hmmer/src/impl_sse/p7_oprofile.c:314:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(om2->rfv[0], om1->rfv[0], sizeof(__m128i) * nqf  * abc->Kp);
data/infernal-1.1.3/hmmer/src/impl_sse/p7_oprofile.c:369:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(om2->rf,        om1->rf,        size);
data/infernal-1.1.3/hmmer/src/impl_sse/p7_oprofile.c:370:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(om2->mm,        om1->mm,        size);
data/infernal-1.1.3/hmmer/src/impl_sse/p7_oprofile.c:371:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(om2->cs,        om1->cs,        size);
data/infernal-1.1.3/hmmer/src/impl_sse/p7_oprofile.c:372:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(om2->consensus, om1->consensus, size);
data/infernal-1.1.3/hmmer/src/impl_sse/p7_oprofile.c:409:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(om2, om1, sizeof(P7_OPROFILE));
data/infernal-1.1.3/hmmer/src/impl_sse/p7_oprofile.c:2121:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/impl_sse/stotrace.c:418:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char      errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/impl_sse/stotrace.c:586:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/impl_vmx/io.c:744:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((msvfp = fopen(msvfile, "r")) == NULL) p7_Fail("Failed to open MSV file %s for reading.\n", msvfile);
data/infernal-1.1.3/hmmer/src/impl_vmx/io.c:783:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char         tmpfile[16] = "esltmpXXXXXX";
data/infernal-1.1.3/hmmer/src/impl_vmx/io.c:783:16:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  char         tmpfile[16] = "esltmpXXXXXX";
data/infernal-1.1.3/hmmer/src/impl_vmx/io.c:796:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char         errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/impl_vmx/io.c:801:26:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if ( esl_tmpfile_named(tmpfile, &fp)          != eslOK) esl_fatal(msg);
data/infernal-1.1.3/hmmer/src/impl_vmx/io.c:802:40:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if ( esl_sprintf(&mfile,   "%s.h3m", tmpfile) != eslOK) esl_fatal(msg);
data/infernal-1.1.3/hmmer/src/impl_vmx/io.c:803:40:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if ( esl_sprintf(&ffile,   "%s.h3f", tmpfile) != eslOK) esl_fatal(msg);
data/infernal-1.1.3/hmmer/src/impl_vmx/io.c:804:40:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if ( esl_sprintf(&pfile,   "%s.h3p", tmpfile) != eslOK) esl_fatal(msg);
data/infernal-1.1.3/hmmer/src/impl_vmx/io.c:805:40:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if ( esl_sprintf(&ssifile, "%s.h3i", tmpfile) != eslOK) esl_fatal(msg);
data/infernal-1.1.3/hmmer/src/impl_vmx/io.c:808:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (( mfp = fopen(mfile, "wb"))               == NULL)  esl_fatal(msg);
data/infernal-1.1.3/hmmer/src/impl_vmx/io.c:809:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (( ffp = fopen(ffile, "wb"))               == NULL)  esl_fatal(msg);
data/infernal-1.1.3/hmmer/src/impl_vmx/io.c:810:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (( pfp = fopen(pfile, "wb"))               == NULL)  esl_fatal(msg);
data/infernal-1.1.3/hmmer/src/impl_vmx/io.c:824:33:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if ( esl_newssi_AddFile(nssi, tmpfile, 0, &fh)                           != eslOK) esl_fatal(msg);
data/infernal-1.1.3/hmmer/src/impl_vmx/io.c:835:25:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if ( p7_hmmfile_OpenE(tmpfile, NULL, &hfp, NULL)  != eslOK) esl_fatal(msg);
data/infernal-1.1.3/hmmer/src/impl_vmx/io.c:849:10:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  remove(tmpfile);
data/infernal-1.1.3/hmmer/src/impl_vmx/io.c:967:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char           errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/impl_vmx/io.c:976:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((ffp = fopen(fname, "wb")) == NULL) p7_Fail("failed to open %s\n", fname);
data/infernal-1.1.3/hmmer/src/impl_vmx/io.c:977:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((pfp = fopen(pname, "wb")) == NULL) p7_Fail("failed to open %s\n", pname);
data/infernal-1.1.3/hmmer/src/impl_vmx/mpi.c:685:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/impl_vmx/null2.c:65:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pp->dpf[0], pp->dpf[1], sizeof(vector float) * 3 * Q);
data/infernal-1.1.3/hmmer/src/impl_vmx/optacc.c:884:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/impl_vmx/p7_oprofile.c:291:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(om2->rbv[0], om1->rbv[0], sizeof(vector unsigned char) * nqb  * abc->Kp);
data/infernal-1.1.3/hmmer/src/impl_vmx/p7_oprofile.c:292:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(om2->rwv[0], om1->rwv[0], sizeof(vector signed short)  * nqw  * abc->Kp);
data/infernal-1.1.3/hmmer/src/impl_vmx/p7_oprofile.c:293:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(om2->rfv[0], om1->rfv[0], sizeof(vector float)         * nqf  * abc->Kp);
data/infernal-1.1.3/hmmer/src/impl_vmx/p7_oprofile.c:347:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(om2->rf,        om1->rf,        size);
data/infernal-1.1.3/hmmer/src/impl_vmx/p7_oprofile.c:348:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(om2->mm,        om1->mm,        size);
data/infernal-1.1.3/hmmer/src/impl_vmx/p7_oprofile.c:349:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(om2->cs,        om1->cs,        size);
data/infernal-1.1.3/hmmer/src/impl_vmx/p7_oprofile.c:350:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(om2->consensus, om1->consensus, size);
data/infernal-1.1.3/hmmer/src/impl_vmx/p7_oprofile.c:387:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(om2, om1, sizeof(P7_OPROFILE));
data/infernal-1.1.3/hmmer/src/impl_vmx/p7_oprofile.c:2050:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/impl_vmx/stotrace.c:426:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char      errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/impl_vmx/stotrace.c:587:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/itest_brute.c:134:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	    FILE *ofp = fopen(hmmfile, "w");
data/infernal-1.1.3/hmmer/src/jackhmmer.c:499:54:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (esl_opt_IsOn(go, "-o")          && (ofp      = fopen(esl_opt_GetString(go, "-o"),          "w")) == NULL)  
data/infernal-1.1.3/hmmer/src/jackhmmer.c:501:55:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (esl_opt_IsOn(go, "-A")          &&  (afp      = fopen(esl_opt_GetString(go, "-A"),          "w")) == NULL)  
data/infernal-1.1.3/hmmer/src/jackhmmer.c:503:54:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (esl_opt_IsOn(go, "--tblout")    && (tblfp    = fopen(esl_opt_GetString(go, "--tblout"),    "w")) == NULL)  
data/infernal-1.1.3/hmmer/src/jackhmmer.c:505:54:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (esl_opt_IsOn(go, "--domtblout") && (domtblfp = fopen(esl_opt_GetString(go, "--domtblout"), "w")) == NULL)  
data/infernal-1.1.3/hmmer/src/jackhmmer.c:838:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char     str[512];
data/infernal-1.1.3/hmmer/src/jackhmmer.c:1050:54:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (esl_opt_IsOn(go, "-o")          && (ofp      = fopen(esl_opt_GetString(go, "-o"),          "w")) == NULL)  
data/infernal-1.1.3/hmmer/src/jackhmmer.c:1052:55:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (esl_opt_IsOn(go, "-A")          &&  (afp      = fopen(esl_opt_GetString(go, "-A"),          "w")) == NULL)  
data/infernal-1.1.3/hmmer/src/jackhmmer.c:1054:54:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (esl_opt_IsOn(go, "--tblout")    && (tblfp    = fopen(esl_opt_GetString(go, "--tblout"),    "w")) == NULL)  
data/infernal-1.1.3/hmmer/src/jackhmmer.c:1056:54:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (esl_opt_IsOn(go, "--domtblout") && (domtblfp = fopen(esl_opt_GetString(go, "--domtblout"), "w")) == NULL)  
data/infernal-1.1.3/hmmer/src/jackhmmer.c:1567:32:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (nquery == 1) { if ((fp = fopen(filename, "w")) == NULL) p7_Fail("Failed to open HMM checkpoint file %s for writing\n", filename); }
data/infernal-1.1.3/hmmer/src/jackhmmer.c:1568:32:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  else             { if ((fp = fopen(filename, "a")) == NULL) p7_Fail("Failed to open HMM checkpoint file %s for append\n",  filename); }
data/infernal-1.1.3/hmmer/src/jackhmmer.c:1590:32:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (nquery == 1) { if ((fp = fopen(filename, "w")) == NULL) p7_Fail("Failed to open MSA checkpoint file %s for writing\n", filename); }
data/infernal-1.1.3/hmmer/src/jackhmmer.c:1591:32:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  else             { if ((fp = fopen(filename, "a")) == NULL) p7_Fail("Failed to open MSA checkpoint file %s for append\n",  filename); }
data/infernal-1.1.3/hmmer/src/makehmmerdb.c:362:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp_filename[16] = "fmtmpXXXXXX";
data/infernal-1.1.3/hmmer/src/makehmmerdb.c:725:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if((fp = fopen(fname_out, "wb")) == NULL)
data/infernal-1.1.3/hmmer/src/modelconfig.c:448:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char             errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/modelconfig.c:574:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(kpsfile, "w")) == NULL) esl_fatal("Failed to open output postscript file %s", kpsfile);
data/infernal-1.1.3/hmmer/src/modelconfig.c:579:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(ipsfile, "w")) == NULL) esl_fatal("Failed to open output postscript file %s", ipsfile);
data/infernal-1.1.3/hmmer/src/mpisupport.c:1620:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            errmsg[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/mpisupport.c:1666:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/nhmmer.c:516:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char   errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/nhmmer.c:720:23:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if((fm_meta->fp = fopen(cfg->dbfile, "rb")) == NULL)
data/infernal-1.1.3/hmmer/src/nhmmer.c:746:62:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (esl_opt_IsOn(go, "-o"))              { if ((ofp      = fopen(esl_opt_GetString(go, "-o"), "w")) == NULL) p7_Fail("Failed to open output file %s for writing\n",    esl_opt_GetString(go, "-o")); }
data/infernal-1.1.3/hmmer/src/nhmmer.c:747:62:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (esl_opt_IsOn(go, "-A"))              { if ((afp      = fopen(esl_opt_GetString(go, "-A"), "w")) == NULL) p7_Fail("Failed to open alignment file %s for writing\n", esl_opt_GetString(go, "-A")); }
data/infernal-1.1.3/hmmer/src/nhmmer.c:748:62:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (esl_opt_IsOn(go, "--tblout"))        { if ((tblfp    = fopen(esl_opt_GetString(go, "--tblout"),    "w")) == NULL)  esl_fatal("Failed to open tabular output file %s for writing\n", esl_opt_GetString(go, "--tblout")); }
data/infernal-1.1.3/hmmer/src/nhmmer.c:749:66:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (esl_opt_IsOn(go, "--dfamtblout"))    { if ((dfamtblfp    = fopen(esl_opt_GetString(go, "--dfamtblout"),"w"))   == NULL)  esl_fatal("Failed to open tabular dfam output file %s for writing\n", esl_opt_GetString(go, "--dfamtblout")); }
data/infernal-1.1.3/hmmer/src/nhmmer.c:750:66:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (esl_opt_IsOn(go, "--aliscoresout"))  { if ((aliscoresfp  = fopen(esl_opt_GetString(go, "--aliscoresout"),"w")) == NULL)  esl_fatal("Failed to open alignment scores output file %s for writing\n", esl_opt_GetString(go, "--aliscoresout")); }
data/infernal-1.1.3/hmmer/src/nhmmer.c:755:30:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((hmmoutfp        = fopen(hmmfile,"w")) == NULL)        esl_fatal("Failed to open hmm output file %s for writing\n", hmmfile);
data/infernal-1.1.3/hmmer/src/nhmmscan.c:333:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char             errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/nhmmscan.c:381:58:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (esl_opt_IsOn(go, "-o"))          { if ((ofp      = fopen(esl_opt_GetString(go, "-o"),          "w")) == NULL)  esl_fatal("Failed to open output file %s for writing\n",                 esl_opt_GetString(go, "-o")); }
data/infernal-1.1.3/hmmer/src/nhmmscan.c:382:58:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (esl_opt_IsOn(go, "--tblout"))    { if ((tblfp    = fopen(esl_opt_GetString(go, "--tblout"),    "w")) == NULL)  esl_fatal("Failed to open tabular per-seq output file %s for writing\n", esl_opt_GetString(go, "--tblfp")); }
data/infernal-1.1.3/hmmer/src/nhmmscan.c:383:66:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (esl_opt_IsOn(go, "--dfamtblout"))    { if ((dfamtblfp    = fopen(esl_opt_GetString(go, "--dfamtblout"),"w"))    == NULL)  esl_fatal("Failed to open tabular dfam output file %s for writing\n", esl_opt_GetString(go, "--dfamtblout")); }
data/infernal-1.1.3/hmmer/src/nhmmscan.c:384:66:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (esl_opt_IsOn(go, "--aliscoresout"))  { if ((aliscoresfp  = fopen(esl_opt_GetString(go, "--aliscoresout"),"w")) == NULL)  esl_fatal("Failed to open alignment scores output file %s for writing\n", esl_opt_GetString(go, "--aliscoresout")); }
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:340:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(ad2->mem, ad->mem, ad->memsize);
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:557:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ptr, &network_32bit, sizeof(uint32_t)); // Write size of the serialized object into the buffer
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:562:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ptr, &network_32bit, sizeof(uint32_t));
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:567:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ptr, &network_32bit, sizeof(uint32_t));
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:572:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ptr, &network_32bit, sizeof(uint32_t));
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:577:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ptr, &network_32bit, sizeof(uint32_t));
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:582:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ptr, &network_64bit, sizeof(int64_t));
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:587:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ptr, &network_64bit, sizeof(int64_t));
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:592:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ptr, &network_64bit, sizeof(int64_t));
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:596:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ptr, &presence_flags, sizeof(uint8_t));
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:720:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_32bit, ptr, sizeof(uint32_t)); // Grab the bytes out of the buffer
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:735:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_32bit, ptr, sizeof(uint32_t)); // Grab the bytes out of the buffer
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:740:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_32bit, ptr, sizeof(uint32_t)); 
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:745:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_32bit, ptr, sizeof(uint32_t)); 
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:750:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_32bit, ptr, sizeof(uint32_t)); 
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:755:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_64bit, ptr, sizeof(uint64_t)); 
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:760:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_64bit, ptr, sizeof(uint64_t)); 
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:765:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_64bit, ptr, sizeof(uint64_t)); 
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:774:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ret_obj->mem, ptr, (obj_size - SER_BASE_SIZE)); 
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:927:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  if (ad->rfline) { memcpy(ad->mem+pos, ad->rfline, ad->N+1); free(ad->rfline); ad->rfline = ad->mem+pos;  pos += ad->N+1; }
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:928:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  if (ad->mmline) { memcpy(ad->mem+pos, ad->mmline, ad->N+1); free(ad->mmline); ad->mmline = ad->mem+pos;  pos += ad->N+1; }
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:929:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  if (ad->csline) { memcpy(ad->mem+pos, ad->csline, ad->N+1); free(ad->csline); ad->csline = ad->mem+pos;  pos += ad->N+1; }
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:930:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ad->mem+pos, ad->model,  ad->N+1); free(ad->model); ad->model = ad->mem+pos; pos += ad->N+1; 
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:931:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ad->mem+pos, ad->mline,  ad->N+1); free(ad->mline); ad->mline = ad->mem+pos; pos += ad->N+1; 
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:932:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ad->mem+pos, ad->aseq,   ad->N+1); free(ad->aseq);  ad->aseq  = ad->mem+pos; pos += ad->N+1; 
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:933:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  if (ad->ntseq)  { memcpy(ad->mem+pos, ad->ntseq, (3*ad->N)+1); free(ad->ntseq);  ad->ntseq  = ad->mem+pos; pos += (3*ad->N)+1; } 
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:934:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  if (ad->ppline) { memcpy(ad->mem+pos, ad->ppline, ad->N+1); free(ad->ppline); ad->ppline = ad->mem+pos;  pos += ad->N+1; }
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:935:33:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  n = 1 + strlen(ad->hmmname);  memcpy(ad->mem + pos, ad->hmmname, n); free(ad->hmmname); ad->hmmname = ad->mem+pos; pos += n;
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:936:33:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  n = 1 + strlen(ad->hmmacc);   memcpy(ad->mem + pos, ad->hmmacc,  n); free(ad->hmmacc);  ad->hmmacc  = ad->mem+pos; pos += n;
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:937:33:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  n = 1 + strlen(ad->hmmdesc);  memcpy(ad->mem + pos, ad->hmmdesc, n); free(ad->hmmdesc); ad->hmmdesc = ad->mem+pos; pos += n;
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:938:33:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  n = 1 + strlen(ad->sqname);   memcpy(ad->mem + pos, ad->sqname,  n); free(ad->sqname);  ad->sqname  = ad->mem+pos; pos += n;
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:939:33:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  n = 1 + strlen(ad->sqacc);    memcpy(ad->mem + pos, ad->sqacc,   n); free(ad->sqacc);   ad->sqacc   = ad->mem+pos; pos += n;
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:940:33:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  n = 1 + strlen(ad->sqdesc);   memcpy(ad->mem + pos, ad->sqdesc,  n); free(ad->sqdesc);  ad->sqdesc  = ad->mem+pos; pos += n;
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:976:68:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  if (ad->rfline) { ESL_ALLOC(ad->rfline, sizeof(char) * ad->N+1); memcpy(ad->rfline, ad->mem+pos, ad->N+1); pos += ad->N+1; }
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:977:68:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  if (ad->mmline) { ESL_ALLOC(ad->mmline, sizeof(char) * ad->N+1); memcpy(ad->mmline, ad->mem+pos, ad->N+1); pos += ad->N+1; }
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:978:68:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  if (ad->csline) { ESL_ALLOC(ad->csline, sizeof(char) * ad->N+1); memcpy(ad->csline, ad->mem+pos, ad->N+1); pos += ad->N+1; }
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:979:49:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  ESL_ALLOC(ad->model, sizeof(char) * ad->N+1); memcpy(ad->model, ad->mem+pos, ad->N+1); pos += ad->N+1; 
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:980:49:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  ESL_ALLOC(ad->mline, sizeof(char) * ad->N+1); memcpy(ad->mline, ad->mem+pos, ad->N+1); pos += ad->N+1; 
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:981:49:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  ESL_ALLOC(ad->aseq,  sizeof(char) * ad->N+1); memcpy(ad->aseq,  ad->mem+pos, ad->N+1); pos += ad->N+1; 
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:982:72:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  if (ad->ntseq)  { ESL_ALLOC(ad->ntseq,  sizeof(char) * (3*ad->N)+1); memcpy(ad->ntseq,  ad->mem+pos, (3*ad->N)+1); pos += (3*ad->N)+1; }
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:983:68:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  if (ad->ppline) { ESL_ALLOC(ad->ppline, sizeof(char) * ad->N+1); memcpy(ad->ppline, ad->mem+pos, ad->N+1); pos += ad->N+1; }
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:984:76:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  n = 1 + strlen(ad->mem+pos);  ESL_ALLOC(ad->hmmname,  sizeof(char) * n); memcpy(ad->hmmname,  ad->mem+pos, n); pos += n;
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:985:76:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  n = 1 + strlen(ad->mem+pos);  ESL_ALLOC(ad->hmmacc,   sizeof(char) * n); memcpy(ad->hmmacc,   ad->mem+pos, n); pos += n;
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:986:76:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  n = 1 + strlen(ad->mem+pos);  ESL_ALLOC(ad->hmmdesc,  sizeof(char) * n); memcpy(ad->hmmdesc,  ad->mem+pos, n); pos += n;
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:987:76:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  n = 1 + strlen(ad->mem+pos);  ESL_ALLOC(ad->sqname,   sizeof(char) * n); memcpy(ad->sqname,   ad->mem+pos, n); pos += n;
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:988:76:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  n = 1 + strlen(ad->mem+pos);  ESL_ALLOC(ad->sqacc,    sizeof(char) * n); memcpy(ad->sqacc,    ad->mem+pos, n); pos += n;
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:989:76:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  n = 1 + strlen(ad->mem+pos);  ESL_ALLOC(ad->sqdesc,   sizeof(char) * n); memcpy(ad->sqdesc,   ad->mem+pos, n); pos += n;
data/infernal-1.1.3/hmmer/src/p7_bg.c:135:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dup->f, bg->f, sizeof(float) * bg->abc->K);
data/infernal-1.1.3/hmmer/src/p7_bg.c:563:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          tmpfile[32] = "esltmpXXXXXX";
data/infernal-1.1.3/hmmer/src/p7_bg.c:563:17:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  char          tmpfile[32] = "esltmpXXXXXX";
data/infernal-1.1.3/hmmer/src/p7_bg.c:577:25:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if (esl_tmpfile_named(tmpfile, &fp) != eslOK) esl_fatal(msg);
data/infernal-1.1.3/hmmer/src/p7_bg.c:582:19:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if ( p7_bg_Read(tmpfile, bg, NULL)                 != eslOK) esl_fatal(msg);
data/infernal-1.1.3/hmmer/src/p7_bg.c:588:10:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  remove(tmpfile);
data/infernal-1.1.3/hmmer/src/p7_bg.c:739:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/p7_domain.c:156:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ptr, &network_32bit, sizeof(int32_t));
data/infernal-1.1.3/hmmer/src/p7_domain.c:161:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ptr, &network_64bit, sizeof(int64_t));
data/infernal-1.1.3/hmmer/src/p7_domain.c:166:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ptr, &network_64bit, sizeof(int64_t));
data/infernal-1.1.3/hmmer/src/p7_domain.c:171:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ptr, &network_64bit, sizeof(int64_t));
data/infernal-1.1.3/hmmer/src/p7_domain.c:176:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ptr, &network_64bit, sizeof(int64_t));
data/infernal-1.1.3/hmmer/src/p7_domain.c:181:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ptr, &network_64bit, sizeof(int64_t));
data/infernal-1.1.3/hmmer/src/p7_domain.c:186:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ptr, &network_64bit, sizeof(int64_t));
data/infernal-1.1.3/hmmer/src/p7_domain.c:193:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((void *) ptr, (void *) &network_32bit, sizeof(obj->envsc));
data/infernal-1.1.3/hmmer/src/p7_domain.c:198:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((void *) ptr, (void *) &network_32bit, sizeof(obj->domcorrection));
data/infernal-1.1.3/hmmer/src/p7_domain.c:203:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((void *) ptr, (void *) &network_32bit, sizeof(obj->dombias));
data/infernal-1.1.3/hmmer/src/p7_domain.c:208:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((void *) ptr, (void *) &network_32bit, sizeof(obj->oasc));
data/infernal-1.1.3/hmmer/src/p7_domain.c:213:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((void *) ptr, (void *) &network_32bit, sizeof(obj->bitscore));
data/infernal-1.1.3/hmmer/src/p7_domain.c:218:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((void *) ptr, (void *) &network_64bit, sizeof(obj->lnP));
data/infernal-1.1.3/hmmer/src/p7_domain.c:223:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ptr, &network_32bit, sizeof(int32_t));
data/infernal-1.1.3/hmmer/src/p7_domain.c:228:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ptr, &network_32bit, sizeof(int32_t));
data/infernal-1.1.3/hmmer/src/p7_domain.c:234:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ptr, &network_32bit, sizeof(int32_t));
data/infernal-1.1.3/hmmer/src/p7_domain.c:241:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ptr, &network_32bit, sizeof(int32_t));
data/infernal-1.1.3/hmmer/src/p7_domain.c:246:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(ptr, &network_32bit, sizeof(int32_t));
data/infernal-1.1.3/hmmer/src/p7_domain.c:304:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_32bit, ptr, sizeof(uint32_t)); // Grab the bytes out of the buffer
data/infernal-1.1.3/hmmer/src/p7_domain.c:309:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_64bit, ptr, sizeof(uint64_t)); 
data/infernal-1.1.3/hmmer/src/p7_domain.c:314:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_64bit, ptr, sizeof(uint64_t)); 
data/infernal-1.1.3/hmmer/src/p7_domain.c:319:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_64bit, ptr, sizeof(uint64_t)); 
data/infernal-1.1.3/hmmer/src/p7_domain.c:324:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_64bit, ptr, sizeof(uint64_t)); 
data/infernal-1.1.3/hmmer/src/p7_domain.c:329:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_64bit, ptr, sizeof(uint64_t)); 
data/infernal-1.1.3/hmmer/src/p7_domain.c:334:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_64bit, ptr, sizeof(uint64_t)); 
data/infernal-1.1.3/hmmer/src/p7_domain.c:339:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_32bit, ptr, sizeof(uint32_t)); // Grab the bytes out of the buffer
data/infernal-1.1.3/hmmer/src/p7_domain.c:345:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_32bit, ptr, sizeof(uint32_t)); // Grab the bytes out of the buffer
data/infernal-1.1.3/hmmer/src/p7_domain.c:351:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_32bit, ptr, sizeof(uint32_t)); // Grab the bytes out of the buffer
data/infernal-1.1.3/hmmer/src/p7_domain.c:357:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_32bit, ptr, sizeof(uint32_t)); // Grab the bytes out of the buffer
data/infernal-1.1.3/hmmer/src/p7_domain.c:363:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_32bit, ptr, sizeof(uint32_t)); // Grab the bytes out of the buffer
data/infernal-1.1.3/hmmer/src/p7_domain.c:369:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_64bit, ptr, sizeof(uint64_t)); // Grab the bytes out of the buffer
data/infernal-1.1.3/hmmer/src/p7_domain.c:375:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_32bit, ptr, sizeof(uint32_t)); 
data/infernal-1.1.3/hmmer/src/p7_domain.c:380:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_32bit, ptr, sizeof(uint32_t)); 
data/infernal-1.1.3/hmmer/src/p7_domain.c:385:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_32bit, ptr, sizeof(uint32_t)); 
data/infernal-1.1.3/hmmer/src/p7_domain.c:396:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&network_32bit, ptr, sizeof(uint32_t)); // Grab the bytes out of the buffer
data/infernal-1.1.3/hmmer/src/p7_domain.c:506:74:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
extern int p7_domain_Compare(P7_DOMAIN *first, P7_DOMAIN *second, double atol, double rtol){
data/infernal-1.1.3/hmmer/src/p7_domain.c:526:59:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  if(esl_FCompareNew(first->envsc, second->envsc, (float) atol, (float) rtol) != eslOK){
data/infernal-1.1.3/hmmer/src/p7_domain.c:529:74:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
 if(esl_FCompareNew(first->domcorrection, second->domcorrection, (float) atol, (float) rtol) != eslOK){
data/infernal-1.1.3/hmmer/src/p7_domain.c:532:62:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
 if(esl_FCompareNew(first->dombias, second->dombias, (float) atol, (float) rtol) != eslOK){
data/infernal-1.1.3/hmmer/src/p7_domain.c:535:57:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  if(esl_FCompareNew(first->oasc, second->oasc, (float) atol, (float) rtol) != eslOK){
data/infernal-1.1.3/hmmer/src/p7_domain.c:538:65:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  if(esl_FCompareNew(first->bitscore, second->bitscore, (float) atol, (float) rtol) != eslOK){
data/infernal-1.1.3/hmmer/src/p7_domain.c:541:46:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
 if(esl_DCompareNew(first->lnP, second->lnP, atol, rtol) != eslOK){
data/infernal-1.1.3/hmmer/src/p7_domain.c:567:85:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    if(esl_FCompareNew(first->scores_per_pos[i], second->scores_per_pos[i], (float) atol, (float) rtol) != eslOK){
data/infernal-1.1.3/hmmer/src/p7_domaindef.c:672:20:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      if (d != d2) memcpy(ddef->sp->sigc + d, ddef->sp->sigc + d2, sizeof(struct p7_spcoord_s));
data/infernal-1.1.3/hmmer/src/p7_domaindef.c:1099:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((ofp = fopen(ofile, "w")) == NULL) p7_Fail("Failed to open output file %s\n", ofile);
data/infernal-1.1.3/hmmer/src/p7_hit.c:217:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ptr, &network_32bit, sizeof(int32_t));
data/infernal-1.1.3/hmmer/src/p7_hit.c:222:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ptr, &network_32bit, sizeof(int32_t));
data/infernal-1.1.3/hmmer/src/p7_hit.c:227:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((void *) ptr, (void *) &network_64bit, sizeof(obj->sortkey));
data/infernal-1.1.3/hmmer/src/p7_hit.c:232:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((void *) ptr, (void *) &network_32bit, sizeof(obj->score));
data/infernal-1.1.3/hmmer/src/p7_hit.c:237:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((void *) ptr, (void *) &network_32bit, sizeof(obj->pre_score));
data/infernal-1.1.3/hmmer/src/p7_hit.c:242:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((void *) ptr, (void *) &network_32bit, sizeof(obj->sum_score));
data/infernal-1.1.3/hmmer/src/p7_hit.c:247:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((void *) ptr, (void *) &network_64bit, sizeof(obj->lnP));
data/infernal-1.1.3/hmmer/src/p7_hit.c:252:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((void *) ptr, (void *) &network_64bit, sizeof(obj->pre_lnP));
data/infernal-1.1.3/hmmer/src/p7_hit.c:257:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((void *) ptr, (void *) &network_64bit, sizeof(obj->sum_lnP));
data/infernal-1.1.3/hmmer/src/p7_hit.c:262:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((void *) ptr, (void *) &network_32bit, sizeof(obj->nexpected));
data/infernal-1.1.3/hmmer/src/p7_hit.c:267:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ptr, &network_32bit, sizeof(int32_t));
data/infernal-1.1.3/hmmer/src/p7_hit.c:272:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ptr, &network_32bit, sizeof(int32_t));
data/infernal-1.1.3/hmmer/src/p7_hit.c:277:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ptr, &network_32bit, sizeof(int32_t));
data/infernal-1.1.3/hmmer/src/p7_hit.c:282:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ptr, &network_32bit, sizeof(int32_t));
data/infernal-1.1.3/hmmer/src/p7_hit.c:287:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ptr, &network_32bit, sizeof(int32_t));
data/infernal-1.1.3/hmmer/src/p7_hit.c:292:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ptr, &network_32bit, sizeof(int32_t));
data/infernal-1.1.3/hmmer/src/p7_hit.c:297:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ptr, &network_32bit, sizeof(int32_t));
data/infernal-1.1.3/hmmer/src/p7_hit.c:302:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ptr, &network_32bit, sizeof(int32_t));
data/infernal-1.1.3/hmmer/src/p7_hit.c:307:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ptr, &network_32bit, sizeof(int32_t));
data/infernal-1.1.3/hmmer/src/p7_hit.c:312:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ptr, &network_64bit, sizeof(int64_t));
data/infernal-1.1.3/hmmer/src/p7_hit.c:317:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ptr, &network_64bit, sizeof(int64_t));
data/infernal-1.1.3/hmmer/src/p7_hit.c:321:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ptr, &presence_flags, 1);
data/infernal-1.1.3/hmmer/src/p7_hit.c:397:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_32bit, ptr, sizeof(uint32_t)); // Grab the bytes out of the buffer
data/infernal-1.1.3/hmmer/src/p7_hit.c:402:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_32bit, ptr, sizeof(uint32_t)); // Grab the bytes out of the buffer
data/infernal-1.1.3/hmmer/src/p7_hit.c:407:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_64bit, ptr, sizeof(double)); // Grab the bytes out of the buffer
data/infernal-1.1.3/hmmer/src/p7_hit.c:413:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_32bit, ptr, sizeof(float)); // Grab the bytes out of the buffer
data/infernal-1.1.3/hmmer/src/p7_hit.c:419:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_32bit, ptr, sizeof(float)); // Grab the bytes out of the buffer
data/infernal-1.1.3/hmmer/src/p7_hit.c:425:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_32bit, ptr, sizeof(float)); // Grab the bytes out of the buffer
data/infernal-1.1.3/hmmer/src/p7_hit.c:431:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_64bit, ptr, sizeof(double)); // Grab the bytes out of the buffer
data/infernal-1.1.3/hmmer/src/p7_hit.c:437:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_64bit, ptr, sizeof(double)); // Grab the bytes out of the buffer
data/infernal-1.1.3/hmmer/src/p7_hit.c:443:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_64bit, ptr, sizeof(double)); // Grab the bytes out of the buffer
data/infernal-1.1.3/hmmer/src/p7_hit.c:449:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_32bit, ptr, sizeof(float)); // Grab the bytes out of the buffer
data/infernal-1.1.3/hmmer/src/p7_hit.c:455:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_32bit, ptr, sizeof(uint32_t)); // Grab the bytes out of the buffer
data/infernal-1.1.3/hmmer/src/p7_hit.c:460:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_32bit, ptr, sizeof(uint32_t)); // Grab the bytes out of the buffer
data/infernal-1.1.3/hmmer/src/p7_hit.c:465:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_32bit, ptr, sizeof(uint32_t)); // Grab the bytes out of the buffer
data/infernal-1.1.3/hmmer/src/p7_hit.c:470:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_32bit, ptr, sizeof(uint32_t)); // Grab the bytes out of the buffer
data/infernal-1.1.3/hmmer/src/p7_hit.c:475:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_32bit, ptr, sizeof(uint32_t)); // Grab the bytes out of the buffer
data/infernal-1.1.3/hmmer/src/p7_hit.c:480:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_32bit, ptr, sizeof(uint32_t)); // Grab the bytes out of the buffer
data/infernal-1.1.3/hmmer/src/p7_hit.c:485:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_32bit, ptr, sizeof(uint32_t)); // Grab the bytes out of the buffer
data/infernal-1.1.3/hmmer/src/p7_hit.c:490:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_32bit, ptr, sizeof(uint32_t)); // Grab the bytes out of the buffer
data/infernal-1.1.3/hmmer/src/p7_hit.c:495:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_32bit, ptr, sizeof(uint32_t)); // Grab the bytes out of the buffer
data/infernal-1.1.3/hmmer/src/p7_hit.c:500:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_64bit, ptr, sizeof(uint64_t)); // Grab the bytes out of the buffer
data/infernal-1.1.3/hmmer/src/p7_hit.c:505:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_64bit, ptr, sizeof(uint64_t)); // Grab the bytes out of the buffer
data/infernal-1.1.3/hmmer/src/p7_hit.c:510:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&presence_flags, ptr, 1); // Grab the bytes out of the buffer
data/infernal-1.1.3/hmmer/src/p7_hit.c:709:65:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
extern int p7_hit_Compare(P7_HIT *first, P7_HIT *second, double atol, double rtol){
data/infernal-1.1.3/hmmer/src/p7_hit.c:738:55:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  if(esl_DCompareNew(first->sortkey, second->sortkey, atol, rtol) != eslOK){
data/infernal-1.1.3/hmmer/src/p7_hit.c:742:59:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  if(esl_FCompareNew(first->score, second->score, (float) atol, (float) rtol) != eslOK){
data/infernal-1.1.3/hmmer/src/p7_hit.c:746:67:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  if(esl_FCompareNew(first->pre_score, second->pre_score, (float) atol, (float) rtol) != eslOK){
data/infernal-1.1.3/hmmer/src/p7_hit.c:750:67:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  if(esl_FCompareNew(first->sum_score, second->sum_score, (float) atol, (float) rtol) != eslOK){
data/infernal-1.1.3/hmmer/src/p7_hit.c:754:47:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  if(esl_DCompareNew(first->lnP, second->lnP, atol, rtol) != eslOK){
data/infernal-1.1.3/hmmer/src/p7_hit.c:758:54:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
 if(esl_DCompareNew(first->pre_lnP, second->pre_lnP, atol, rtol) != eslOK){
data/infernal-1.1.3/hmmer/src/p7_hit.c:762:54:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
 if(esl_DCompareNew(first->sum_lnP, second->sum_lnP, atol, rtol) != eslOK){
data/infernal-1.1.3/hmmer/src/p7_hit.c:815:63:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    if(p7_domain_Compare(&(first->dcl[i]), &(second->dcl[i]), atol, rtol) != eslOK){
data/infernal-1.1.3/hmmer/src/p7_hmmcache.c:197:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char           errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/p7_hmmd_search_stats.c:92:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((void *) ptr, (void *) &network_64bit, sizeof(obj->elapsed));  //Use memcpy here because it does the right thing with unaligned copies
data/infernal-1.1.3/hmmer/src/p7_hmmd_search_stats.c:98:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((void *) ptr, (void *) &network_64bit, sizeof(obj->user));
data/infernal-1.1.3/hmmer/src/p7_hmmd_search_stats.c:104:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((void *) ptr, (void *) &network_64bit, sizeof(obj->sys));  
data/infernal-1.1.3/hmmer/src/p7_hmmd_search_stats.c:110:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((void *) ptr, (void *) &network_64bit, sizeof(obj->Z));
data/infernal-1.1.3/hmmer/src/p7_hmmd_search_stats.c:116:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((void *) ptr, (void *) &network_64bit, sizeof(obj->domZ));  
data/infernal-1.1.3/hmmer/src/p7_hmmd_search_stats.c:157:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((void *) ptr, (void *) &network_64bit, sizeof(obj->nmodels));
data/infernal-1.1.3/hmmer/src/p7_hmmd_search_stats.c:162:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((void *) ptr, (void *) &network_64bit, sizeof(obj->nseqs));
data/infernal-1.1.3/hmmer/src/p7_hmmd_search_stats.c:167:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((void *) ptr, (void *) &network_64bit, sizeof(obj->n_past_msv));
data/infernal-1.1.3/hmmer/src/p7_hmmd_search_stats.c:172:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((void *) ptr, (void *) &network_64bit, sizeof(obj->n_past_bias));
data/infernal-1.1.3/hmmer/src/p7_hmmd_search_stats.c:177:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((void *) ptr, (void *) &network_64bit, sizeof(obj->n_past_vit));
data/infernal-1.1.3/hmmer/src/p7_hmmd_search_stats.c:182:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((void *) ptr, (void *) &network_64bit, sizeof(obj->n_past_fwd));
data/infernal-1.1.3/hmmer/src/p7_hmmd_search_stats.c:187:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((void *) ptr, (void *) &network_64bit, sizeof(obj->nhits));
data/infernal-1.1.3/hmmer/src/p7_hmmd_search_stats.c:192:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((void *) ptr, (void *) &network_64bit, sizeof(obj->nreported));
data/infernal-1.1.3/hmmer/src/p7_hmmd_search_stats.c:197:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((void *) ptr, (void *) &network_64bit, sizeof(obj->nincluded));  
data/infernal-1.1.3/hmmer/src/p7_hmmd_search_stats.c:202:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy((void *) ptr, (void *) &network_64bit, sizeof(uint64_t));  
data/infernal-1.1.3/hmmer/src/p7_hmmd_search_stats.c:208:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy((void *) ptr, (void *) &network_64bit, sizeof(uint64_t));  
data/infernal-1.1.3/hmmer/src/p7_hmmd_search_stats.c:256:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_64bit, ptr, sizeof(uint64_t)); // Grab the bytes out of the buffer
data/infernal-1.1.3/hmmer/src/p7_hmmd_search_stats.c:262:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_64bit, ptr, sizeof(uint64_t)); // Grab the bytes out of the buffer
data/infernal-1.1.3/hmmer/src/p7_hmmd_search_stats.c:268:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_64bit, ptr, sizeof(uint64_t)); // Grab the bytes out of the buffer
data/infernal-1.1.3/hmmer/src/p7_hmmd_search_stats.c:274:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_64bit, ptr, sizeof(uint64_t)); // Grab the bytes out of the buffer
data/infernal-1.1.3/hmmer/src/p7_hmmd_search_stats.c:280:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_64bit, ptr, sizeof(uint64_t)); // Grab the bytes out of the buffer
data/infernal-1.1.3/hmmer/src/p7_hmmd_search_stats.c:319:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_64bit, ptr, sizeof(uint64_t)); // Grab the bytes out of the buffer
data/infernal-1.1.3/hmmer/src/p7_hmmd_search_stats.c:324:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_64bit, ptr, sizeof(uint64_t)); // Grab the bytes out of the buffer
data/infernal-1.1.3/hmmer/src/p7_hmmd_search_stats.c:329:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_64bit, ptr, sizeof(uint64_t)); // Grab the bytes out of the buffer
data/infernal-1.1.3/hmmer/src/p7_hmmd_search_stats.c:334:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_64bit, ptr, sizeof(uint64_t)); // Grab the bytes out of the buffer
data/infernal-1.1.3/hmmer/src/p7_hmmd_search_stats.c:339:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_64bit, ptr, sizeof(uint64_t)); // Grab the bytes out of the buffer
data/infernal-1.1.3/hmmer/src/p7_hmmd_search_stats.c:344:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_64bit, ptr, sizeof(uint64_t)); // Grab the bytes out of the buffer
data/infernal-1.1.3/hmmer/src/p7_hmmd_search_stats.c:349:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_64bit, ptr, sizeof(uint64_t)); // Grab the bytes out of the buffer
data/infernal-1.1.3/hmmer/src/p7_hmmd_search_stats.c:354:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_64bit, ptr, sizeof(uint64_t)); // Grab the bytes out of the buffer
data/infernal-1.1.3/hmmer/src/p7_hmmd_search_stats.c:359:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_64bit, ptr, sizeof(uint64_t)); // Grab the bytes out of the buffer
data/infernal-1.1.3/hmmer/src/p7_hmmd_search_stats.c:364:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&network_64bit, ptr, sizeof(uint64_t));
data/infernal-1.1.3/hmmer/src/p7_hmmd_search_stats.c:382:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&network_64bit, ptr, sizeof(uint64_t));
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:285:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  union { char c[4]; uint32_t n; } magic;
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:339:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((hfp->f = fopen(filename, "r")) != NULL) {
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:367:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((tmpfp = fopen(dbfile, "rb")) != NULL)
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:403:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((hfp->ffp = fopen(dbfile, "rb")) == NULL) ESL_XFAIL(eslENOTFOUND, errbuf, "Opened %s, a pressed HMM file; but no .h3f file found", hfp->fname);
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:406:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((hfp->pfp = fopen(dbfile, "rb")) == NULL) ESL_XFAIL(eslENOTFOUND, errbuf, "Opened %s, a pressed HMM file; but no .h3p file found", hfp->fname);
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:710:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buff[100];
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:726:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  size += 7 + sprintf(buff, "%d", hmm->M);                                                                  /*LENG tag, we determine size of field later */
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:727:65:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  size += ((format >= p7_HMMFILE_3c && hmm->max_length) ?  7  + sprintf(buff, "%d", hmm->max_length) : 0);  /*MAXL line, later formats only, optional */
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:745:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    size += ((sprintf(buff, "%d", n) + 8) * n); /*length of all the COM tags*/
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:749:34:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  size += (hmm->nseq  > 0 ? 7  + sprintf(buff, "%d", hmm->nseq) : 0);                                      /* NSEQ line */
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:750:39:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  size += (hmm->eff_nseq  >= 0 ? 7  + sprintf(buff, "%f", hmm->eff_nseq) : 0);                              /* EFFN line */
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:751:42:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  size += (hmm->flags & p7H_CHKSUM ? 7 + sprintf(buff, "%u", hmm->checksum) : 0);                           /*CKSUM line */
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:754:40:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  size += ((hmm->flags & p7H_GA) ? 8 + sprintf(buff, "%.2f", hmm->cutoff[p7_GA1])+sprintf(buff, "%.2f", hmm->cutoff[p7_GA2]) : 0);
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:754:83:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  size += ((hmm->flags & p7H_GA) ? 8 + sprintf(buff, "%.2f", hmm->cutoff[p7_GA1])+sprintf(buff, "%.2f", hmm->cutoff[p7_GA2]) : 0);
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:755:40:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  size += ((hmm->flags & p7H_TC) ? 8 + sprintf(buff, "%.2f", hmm->cutoff[p7_TC1])+sprintf(buff, "%.2f", hmm->cutoff[p7_TC2]) : 0);
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:755:83:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  size += ((hmm->flags & p7H_TC) ? 8 + sprintf(buff, "%.2f", hmm->cutoff[p7_TC1])+sprintf(buff, "%.2f", hmm->cutoff[p7_TC2]) : 0);
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:756:40:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  size += ((hmm->flags & p7H_NC) ? 8 + sprintf(buff, "%.2f", hmm->cutoff[p7_NC1])+sprintf(buff, "%.2f", hmm->cutoff[p7_NC2]) : 0);
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:756:83:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  size += ((hmm->flags & p7H_NC) ? 8 + sprintf(buff, "%.2f", hmm->cutoff[p7_NC1])+sprintf(buff, "%.2f", hmm->cutoff[p7_NC2]) : 0);
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:760:50:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
             ((format == p7_HMMFILE_3a) ? ( 75 + sprintf(buff, "%f", hmm->evparam[p7_MLAMBDA]) +
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:761:50:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                                                 sprintf(buff, "%f", hmm->evparam[p7_MMU])     +
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:762:50:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                                                 sprintf(buff, "%f", hmm->evparam[p7_FTAU])) :
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:763:50:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                                          ( 75 + sprintf(buff, "%8.4f", hmm->evparam[p7_MMU])  + sprintf(buff, "%8.5f", hmm->evparam[p7_MLAMBDA]) +
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:763:98:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                                          ( 75 + sprintf(buff, "%8.4f", hmm->evparam[p7_MMU])  + sprintf(buff, "%8.5f", hmm->evparam[p7_MLAMBDA]) +
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:764:50:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                                                 sprintf(buff, "%8.4f", hmm->evparam[p7_VMU])  + sprintf(buff, "%8.5f", hmm->evparam[p7_VLAMBDA]) +
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:764:98:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                                                 sprintf(buff, "%8.4f", hmm->evparam[p7_VMU])  + sprintf(buff, "%8.5f", hmm->evparam[p7_VLAMBDA]) +
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:765:50:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                                                 sprintf(buff, "%8.4f", hmm->evparam[p7_FTAU]) + sprintf(buff, "%8.5f", hmm->evparam[p7_FLAMBDA])))
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:765:98:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                                                 sprintf(buff, "%8.4f", hmm->evparam[p7_FTAU]) + sprintf(buff, "%8.5f", hmm->evparam[p7_FLAMBDA])))
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:811:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  if ((offset = sprintf(ret_hmm + coffset, "LENG  %d\n", hmm->M))                                 < 0) return eslEWRITE;
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:815:18:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    if((offset = sprintf(ret_hmm + coffset, "MAXL  %d\n", hmm->max_length))                       < 0) return eslEWRITE;
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:851:18:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    if((offset = sprintf(ret_hmm + coffset, "NSEQ  %d\n", hmm->nseq))                            < 0) return eslEWRITE;
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:856:18:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    if((offset = sprintf(ret_hmm + coffset, "EFFN  %f\n", hmm->eff_nseq))                        < 0) return eslEWRITE;
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:861:19:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    if ((offset = sprintf  (ret_hmm + coffset, "CKSUM %u\n", hmm->checksum))                     < 0) return eslEWRITE;
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:868:19:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    if(( offset = sprintf(ret_hmm + coffset , "GA    %.2f %.2f\n", hmm->cutoff[p7_GA1], hmm->cutoff[p7_GA2])) < 0) return eslEWRITE;
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:873:20:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
     if(( offset = sprintf(ret_hmm + coffset , "TC    %.2f %.2f\n", hmm->cutoff[p7_TC1], hmm->cutoff[p7_TC2])) < 0) return eslEWRITE;
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:878:20:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
     if(( offset = sprintf(ret_hmm + coffset , "NC    %.2f %.2f\n", hmm->cutoff[p7_NC1], hmm->cutoff[p7_NC2])) < 0) return eslEWRITE;
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:886:20:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      if ((offset =sprintf(ret_hmm + coffset, "STATS LOCAL     VLAMBDA %f\n", hmm->evparam[p7_MLAMBDA]))                               < 0) return eslEWRITE;
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:888:20:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      if ((offset =sprintf(ret_hmm + coffset, "STATS LOCAL         VMU %f\n", hmm->evparam[p7_MMU]))                                   < 0) return eslEWRITE;
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:890:20:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      if ((offset =sprintf(ret_hmm + coffset, "STATS LOCAL        FTAU %f\n", hmm->evparam[p7_FTAU]))                                  < 0) return eslEWRITE;
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:893:20:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      if ((offset =sprintf(ret_hmm + coffset, "STATS LOCAL MSV      %8.4f %8.5f\n", hmm->evparam[p7_MMU],  hmm->evparam[p7_MLAMBDA]))  < 0) return eslEWRITE;
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:895:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      if ((offset = sprintf(ret_hmm + coffset, "STATS LOCAL VITERBI  %8.4f %8.5f\n", hmm->evparam[p7_VMU],  hmm->evparam[p7_VLAMBDA])) < 0) return eslEWRITE;
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:897:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      if ((offset = sprintf(ret_hmm + coffset, "STATS LOCAL FORWARD  %8.4f %8.5f\n", hmm->evparam[p7_FTAU], hmm->evparam[p7_FLAMBDA])) < 0) return eslEWRITE;
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:905:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  if ((offset = sprintf(ret_hmm + coffset, "HMM     "))                         < 0) return eslEWRITE;
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:909:19:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    if ((offset = sprintf(ret_hmm + coffset, "     %c   ", hmm->abc->sym[x]))   < 0) return eslEWRITE;
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:920:19:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    if ((offset = sprintf(ret_hmm + coffset, "  COMPO ")) < 0) return eslEWRITE;
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:931:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  if ((offset = sprintf(ret_hmm + coffset, "        "))                         < 0) return eslEWRITE;
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:941:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  if ((offset = sprintf(ret_hmm + coffset, "        "))                         < 0) return eslEWRITE;
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:954:19:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    if ((offset = sprintf(ret_hmm + coffset, " %6d ",  k))                    < 0) return eslEWRITE;
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:963:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      if ((offset = sprintf(ret_hmm + coffset, " %6d", hmm->map[k]))          < 0) return eslEWRITE;
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:971:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      if ((offset = sprintf(ret_hmm + coffset, " %c",  (hmm->flags & p7H_CONS)  ? hmm->consensus[k] : '-')) < 0) return eslEWRITE;
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:975:19:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    if ((offset = sprintf(ret_hmm + coffset, " %c",    (hmm->flags & p7H_RF)    ? hmm->rf[k]        : '-')) < 0) return eslEWRITE;
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:979:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      if ((offset = sprintf(ret_hmm + coffset, " %c",  (hmm->flags & p7H_MMASK) ? hmm->mm[k]        : '-')) < 0) return eslEWRITE;
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:983:19:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    if ((offset = sprintf(ret_hmm + coffset, " %c\n",  (hmm->flags & p7H_CS)    ? hmm->cs[k]        : '-')) < 0) return eslEWRITE;
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:987:19:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    if ((offset = sprintf(ret_hmm + coffset, "        ")) < 0) return eslEWRITE;
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:996:19:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    if ((offset = sprintf(ret_hmm + coffset, "\n        ")) < 0) return eslEWRITE;
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:1007:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  if (sprintf(ret_hmm + coffset, "//\n") < 0) return eslEWRITE;
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:1358:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if ((hmm->M = atoi(tok1))                                            == 0)     ESL_XFAIL(status,    hfp->errbuf, "Invalid model length %s on LENG line", tok1);
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:1363:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if ((hmm->max_length = atoi(tok1))                                   == 0)     ESL_XFAIL(status,    hfp->errbuf, "Invalid max length %s on MAXL line", tok1);
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:1432:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if ((hmm->nseq = atoi(tok1)) == 0)                                               ESL_XFAIL(eslEFORMAT, hfp->errbuf, "Invalid nseq on NSEQ line: should be integer, not %s", tok1);
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:1559:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      if (atoi(tok1) != k)                                                               ESL_XFAIL(eslEFORMAT, hfp->errbuf, "Expected match line to start with %d (of %d); saw %s", k, hmm->M, tok1);
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:1567:47:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      if (hmm->flags & p7H_MAP) hmm->map[k] = atoi(tok1);
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:1817:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  if ((hmm->M = atoi(tok1))                                            == 0)     ESL_XFAIL(status,    hfp->errbuf, "Invalid model length %s on LENG line", tok1);
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:1876:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  if ((hmm->nseq = atoi(tok1)) == 0 && strcmp(tok1, "0") != 0)                     ESL_XFAIL(eslEFORMAT, hfp->errbuf, "Invalid nseq on NSEQ line: should be integer, not %s", tok1);
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:1941:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      if (atoi(tok1) != k)                                                               ESL_XFAIL(eslEFORMAT, hfp->errbuf, "Expected match line to start with %d (of %d); saw %s", k, hmm->M, tok1);
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:1950:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  hmm->map[k] = atoi(tok1);
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:2166:28:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  else if (p == 1.0) { if (sprintf(*str+offset, " %*.5f", fieldwidth, 0.0)      < 0) return( eslEWRITE ); }
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:2167:28:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  else               { if (sprintf(*str+offset, " %*.5f", fieldwidth, -logf(p)) < 0) return( eslEWRITE ); }
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:2243:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  return ((*s == '*') ? 0. : null * exp( atoi(s) * 0.00069314718));
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:2293:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char           errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:2361:19:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
utest_io_30(char *tmpfile, int format, P7_HMM *hmm)
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:2370:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(tmpfile, "w"))              == NULL)  esl_fatal(msg);
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:2370:19:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if ((fp = fopen(tmpfile, "w"))              == NULL)  esl_fatal(msg);
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:2375:24:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if (p7_hmmfile_OpenE(tmpfile, NULL, &hfp, NULL) != eslOK)  esl_fatal(msg);
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:2392:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(tmpfile, "w"))                  == NULL)   esl_fatal(msg);
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:2392:19:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if ((fp = fopen(tmpfile, "w"))                  == NULL)   esl_fatal(msg);
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:2395:24:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if (p7_hmmfile_OpenE(tmpfile, NULL, &hfp, NULL) != eslOK)  esl_fatal(msg);
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:2413:24:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
utest_io_current(char *tmpfile, P7_HMM *hmm)
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:2419:15:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  utest_io_30(tmpfile, -1, hmm);
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:2426:19:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
utest_io_3a(char *tmpfile, P7_HMM *hmm)
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:2442:15:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  utest_io_30(tmpfile, p7_HMMFILE_3a, hmm);
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:2478:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmpfile[32]     = "tmp-hmmerXXXXXX";
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:2478:8:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  char tmpfile[32]     = "tmp-hmmerXXXXXX";
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:2484:26:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if ((esl_tmpfile_named(tmpfile, &fp))        != eslOK) esl_fatal("failed to create tmp file");
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:2489:20:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  utest_io_current(tmpfile, hmm);
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:2490:20:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  utest_io_3a     (tmpfile, hmm);
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:2495:20:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  utest_io_current(tmpfile, hmm);
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:2496:20:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  utest_io_3a     (tmpfile, hmm);
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:2502:10:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  remove(tmpfile);
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:2543:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/p7_scoredata.c:241:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(new->ssv_scores, src->ssv_scores, (src->M + 1) * Kp * sizeof(uint8_t)  );
data/infernal-1.1.3/hmmer/src/p7_scoredata.c:244:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(new->ssv_scores_f, src->ssv_scores_f, (src->M + 1) * Kp * sizeof(float)  );
data/infernal-1.1.3/hmmer/src/p7_scoredata.c:250:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
     memcpy(new->prefix_lengths, src->prefix_lengths, (src->M+1) * sizeof(float));
data/infernal-1.1.3/hmmer/src/p7_scoredata.c:254:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
     memcpy(new->suffix_lengths, src->suffix_lengths, (src->M+1) * sizeof(float));
data/infernal-1.1.3/hmmer/src/p7_scoredata.c:258:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
     memcpy(new->fwd_scores, src->fwd_scores, (src->M+1) * sizeof(float));
data/infernal-1.1.3/hmmer/src/p7_scoredata.c:266:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
       memcpy(new->opt_ext_fwd[i], src->opt_ext_fwd[i], 10 * sizeof(float));
data/infernal-1.1.3/hmmer/src/p7_scoredata.c:273:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
       memcpy(new->opt_ext_rev[i], src->opt_ext_rev[i], 10 * sizeof(float));
data/infernal-1.1.3/hmmer/src/p7_scoredata.c:280:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
       memcpy(new->fwd_transitions[i], src->fwd_transitions[i], (src->M+1) * sizeof(float));
data/infernal-1.1.3/hmmer/src/p7_tophits.c:447:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(new2, h2->unsrt, sizeof(P7_HIT) * h2->N);
data/infernal-1.1.3/hmmer/src/p7_tophits.c:502:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer [13];
data/infernal-1.1.3/hmmer/src/p7_tophits.c:506:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      n = sprintf (buffer, "%" PRId64 "", h->unsrt[i].dcl[0].iali);
data/infernal-1.1.3/hmmer/src/p7_tophits.c:508:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      n = sprintf (buffer, "%" PRId64 "", h->unsrt[i].dcl[0].jali);
data/infernal-1.1.3/hmmer/src/p7_tophits.c:1982:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char   timestamp[32];
data/infernal-1.1.3/hmmer/src/p7_tophits.c:1983:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char   modestamp[16];
data/infernal-1.1.3/hmmer/src/p7_tophits.c:1991:26:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    case p7_SEARCH_SEQS: strcpy(modestamp, "SEARCH"); break;
data/infernal-1.1.3/hmmer/src/p7_tophits.c:1992:26:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    case p7_SCAN_MODELS: strcpy(modestamp, "SCAN");   break;
data/infernal-1.1.3/hmmer/src/phmmer.c:451:58:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (esl_opt_IsOn(go, "-o"))          { if ((ofp      = fopen(esl_opt_GetString(go, "-o"),          "w")) == NULL)  p7_Fail("Failed to open output file %s for writing\n",                 esl_opt_GetString(go, "-o")); } 
data/infernal-1.1.3/hmmer/src/phmmer.c:452:58:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (esl_opt_IsOn(go, "-A"))          { if ((afp      = fopen(esl_opt_GetString(go, "-A"),          "w")) == NULL)  p7_Fail("Failed to open alignment output file %s for writing\n",       esl_opt_GetString(go, "-A")); } 
data/infernal-1.1.3/hmmer/src/phmmer.c:453:58:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (esl_opt_IsOn(go, "--tblout"))    { if ((tblfp    = fopen(esl_opt_GetString(go, "--tblout"),    "w")) == NULL)  p7_Fail("Failed to open tabular per-seq output file %s for writing\n", esl_opt_GetString(go, "--tblfp")); }
data/infernal-1.1.3/hmmer/src/phmmer.c:454:58:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (esl_opt_IsOn(go, "--domtblout")) { if ((domtblfp = fopen(esl_opt_GetString(go, "--domtblout"), "w")) == NULL)  p7_Fail("Failed to open tabular per-dom output file %s for writing\n", esl_opt_GetString(go, "--domtblfp")); }
data/infernal-1.1.3/hmmer/src/phmmer.c:455:59:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (esl_opt_IsOn(go, "--pfamtblout")){ if ((pfamtblfp = fopen(esl_opt_GetString(go, "--pfamtblout"), "w")) == NULL)  esl_fatal("Failed to open pfam-style tabular output file %s for writing\n", esl_opt_GetString(go, "--pfamtblout")); }
data/infernal-1.1.3/hmmer/src/phmmer.c:720:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char     str[512];
data/infernal-1.1.3/hmmer/src/phmmer.c:943:54:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (esl_opt_IsOn(go, "-o")          && (ofp      = fopen(esl_opt_GetString(go, "-o"),          "w")) == NULL)  
data/infernal-1.1.3/hmmer/src/phmmer.c:945:54:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (esl_opt_IsOn(go, "-A")          && (afp      = fopen(esl_opt_GetString(go, "-A"),          "w")) == NULL)  
data/infernal-1.1.3/hmmer/src/phmmer.c:947:54:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (esl_opt_IsOn(go, "--tblout")    && (tblfp    = fopen(esl_opt_GetString(go, "--tblout"),    "w")) == NULL)
data/infernal-1.1.3/hmmer/src/phmmer.c:949:54:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (esl_opt_IsOn(go, "--domtblout") && (domtblfp = fopen(esl_opt_GetString(go, "--domtblout"), "w")) == NULL)
data/infernal-1.1.3/hmmer/src/phmmer.c:951:56:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (esl_opt_IsOn(go, "--pfamtblout") && (pfamtblfp = fopen(esl_opt_GetString(go, "--pfamtblout"), "w")) == NULL)
data/infernal-1.1.3/hmmer/src/seqmodel.c:158:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/seqmodel.c:199:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((hmmfp = fopen(hmmfile, "w")) == NULL) esl_fatal("Failed to open output HMM file %s", hmmfile);
data/infernal-1.1.3/hmmer/src/seqmodel.c:249:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/tracealign.c:1151:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/hmmer/src/tracealign.c:1203:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((ofp = fopen(outfile, "w")) == NULL)
data/infernal-1.1.3/rmark/rmark-create.c:184:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          outfile[256];	/* name of an output file          */
data/infernal-1.1.3/rmark/rmark-create.c:251:24:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((cfg.out_msafp = fopen(outfile, "w"))      == NULL)  esl_fatal("Failed to open MSA output file %s\n", outfile);
data/infernal-1.1.3/rmark/rmark-create.c:253:24:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((cfg.out_bmkfp = fopen(outfile, "w"))      == NULL)  esl_fatal("Failed to open FASTA output file %s\n", outfile);
data/infernal-1.1.3/rmark/rmark-create.c:255:24:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((cfg.out_posfp = fopen(outfile, "w"))      == NULL)  esl_fatal("Failed to open positive FASTA output file %s\n", outfile);
data/infernal-1.1.3/rmark/rmark-create.c:257:24:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((cfg.possummfp = fopen(outfile, "w"))      == NULL)  esl_fatal("Failed to open pos test set summary file %s\n", outfile);
data/infernal-1.1.3/rmark/rmark-create.c:259:25:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((cfg.ppossummfp = fopen(outfile, "w"))      == NULL) esl_fatal("Failed to open pos-only test set summary file %s\n", outfile);
data/infernal-1.1.3/rmark/rmark-create.c:261:24:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((cfg.tblfp     = fopen(outfile, "w"))      == NULL)  esl_fatal("Failed to open benchmark table file %s\n", outfile);
data/infernal-1.1.3/rmark/rmark-create.c:264:26:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((cfg.negsummfp = fopen(outfile, "w"))      == NULL) esl_fatal("Failed to open neg test set summary file %s\n", outfile);
data/infernal-1.1.3/rmark/rmark-create.c:268:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if((cfg.nseqfp = fopen(esl_opt_GetString(go, "--nfile"), "w")) == NULL) esl_fatal("Failed to open negative sequence file %s\n", esl_opt_GetString(go, "--nfile"));
data/infernal-1.1.3/rmark/rmark-create.c:272:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if((cfg.tfp = fopen(esl_opt_GetString(go, "--tfile"), "w")) == NULL) esl_fatal("Failed to open alignment file %s\n", esl_opt_GetString(go, "--tfile"));
data/infernal-1.1.3/rmark/rmark-create.c:1140:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(negsq->dsq + negsq->n + 1, tmpdsq+1, sizeof(ESL_DSQ) * chunkL);
data/infernal-1.1.3/rmark/rmark-create.c:1158:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(bmksq->dsq+bmk_p, negsq->dsq+neg_p, sizeof(ESL_DSQ) * (negseqs_p[i][q] - neg_p + 1));
data/infernal-1.1.3/rmark/rmark-create.c:1171:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(bmksq->dsq+bmk_p, posseqs[j]->dsq+1, sizeof(ESL_DSQ) * posseqs[j]->n);
data/infernal-1.1.3/rmark/rmark-create.c:1185:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(bmksq->dsq+bmk_p, negsq->dsq+neg_p, sizeof(ESL_DSQ) * (negsq->n - neg_p + 1));
data/infernal-1.1.3/rmark/rmark-create.c:1300:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(sq->dsq+1, dbsq->dsq+start, sizeof(ESL_DSQ) * L);
data/infernal-1.1.3/rmark/rmark-create.c:1324:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dsq, sq->dsq+1, sizeof(ESL_DSQ) * L);
data/infernal-1.1.3/rmark/rmark-create.c:1374:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  type = atoi(tok);
data/infernal-1.1.3/rmark/rmark-create.c:1381:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  nstates = atoi(tok);
data/infernal-1.1.3/src/bandcyk-montecarlo-test.c:68:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            errbuf[eslERRBUFSIZE]; /* for error messages */
data/infernal-1.1.3/src/bandcyk-truncation-test.c:64:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int      Z1     = atoi(esl_opt_GetArg(go, 2));
data/infernal-1.1.3/src/bandcyk-truncation-test.c:65:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int      Z2     = atoi(esl_opt_GetArg(go, 3));
data/infernal-1.1.3/src/bandcyk-truncation-test.c:79:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            errbuf[eslERRBUFSIZE]; /* for error messages */
data/infernal-1.1.3/src/cm.c:594:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(nullfile, "r")) == NULL)
data/infernal-1.1.3/src/cm.c:2800:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(seedstr, " --seed %" PRIu32 " ", seed);
data/infernal-1.1.3/src/cm_alidisplay.c:327:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(ad->model+pos, "<[%*d]*", wtrunc_R-4, ntrunc_R);
data/infernal-1.1.3/src/cm_alidisplay.c:371:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(ad->model+pos, "*[%*d]*", numwidth, qinset);
data/infernal-1.1.3/src/cm_alidisplay.c:372:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(ad->aseq+pos, "*[%*d]*", numwidth, tinset);
data/infernal-1.1.3/src/cm_alidisplay.c:584:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(ad->model+pos, "*[%*d]>", wtrunc_L-4, ntrunc_L);
data/infernal-1.1.3/src/cm_alidisplay.c:762:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ad->aseq_el + n5p_skipped, p7ad->aseq, ad->N);
data/infernal-1.1.3/src/cm_alidisplay.c:768:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ad->rfline_el + n5p_skipped, p7ad->model, ad->N);
data/infernal-1.1.3/src/cm_alidisplay.c:774:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ad->ppline_el + n5p_skipped, p7ad->ppline, ad->N);
data/infernal-1.1.3/src/cm_alidisplay.c:822:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(ad2->mem, ad->mem, ad->memsize);
data/infernal-1.1.3/src/cm_alidisplay.c:1372:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(msa->aseq[0], ad->aseq_el, ad->N_el);
data/infernal-1.1.3/src/cm_dpalign.c:5879:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/src/cm_dpalign_trunc.c:9948:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char               errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/src/cm_dpsearch.c:4329:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/src/cm_dpsearch_trunc.c:3666:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/src/cm_dpsmall.c:2889:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      yoffset = ((char **) shadow[v])[j][d];
data/infernal-1.1.3/src/cm_dpsmall.c:3416:57:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      else                       free_vjd_yshadow_deck((char **) shadow[v], i, j);
data/infernal-1.1.3/src/cm_dpsmall.c:6322:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	      yoffset = ((char **) shadow[v])[j][vdp];
data/infernal-1.1.3/src/cm_dpsmall.c:7074:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      yoffset = ((char **) shadow[v])[j][dp];
data/infernal-1.1.3/src/cm_file.c:264:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  union { char c[4]; uint32_t n; } magic;
data/infernal-1.1.3/src/cm_file.c:321:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((cmfp->f = fopen(filename, "r")) != NULL) 
data/infernal-1.1.3/src/cm_file.c:354:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((tmpfp = fopen(dbfile, "rb")) != NULL) 
data/infernal-1.1.3/src/cm_file.c:388:25:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((cmfp->hfp->f = fopen(cmfp->fname, "r")) == NULL) goto ERROR; 
data/infernal-1.1.3/src/cm_file.c:429:29:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((cmfp->ffp      = fopen(dbfile, "rb")) == NULL) ESL_XFAIL(eslENOTFOUND, errbuf, "Opened %s, a pressed CM file; but no .i1f file found", cmfp->fname);
data/infernal-1.1.3/src/cm_file.c:430:29:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((cmfp->hfp->ffp = fopen(dbfile, "rb")) == NULL) ESL_XFAIL(eslENOTFOUND, errbuf, "Opened %s, a pressed CM file; but no .i1f file found", cmfp->fname);
data/infernal-1.1.3/src/cm_file.c:433:29:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((cmfp->hfp->pfp = fopen(dbfile, "rb")) == NULL) ESL_XFAIL(eslENOTFOUND, errbuf, "Opened %s, a pressed CM file; but no .i1p file found", cmfp->fname);
data/infernal-1.1.3/src/cm_file.c:1615:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if ((cm->M = atoi(tok1))                                              == 0)  	  ESL_XFAIL(status,    cmfp->errbuf, "Invalid number of states %s on STATES line", tok1);
data/infernal-1.1.3/src/cm_file.c:1620:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if ((cm->nodes = atoi(tok1))                                          == 0)  	  ESL_XFAIL(status,    cmfp->errbuf, "Invalid number of nodes %s on NODES line", tok1);
data/infernal-1.1.3/src/cm_file.c:1625:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if ((cm->clen = atoi(tok1))                                           == 0)   	  ESL_XFAIL(status,    cmfp->errbuf, "Invalid consensus length %s on CLEN line", tok1);
data/infernal-1.1.3/src/cm_file.c:1630:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if ((cm->W = atoi(tok1))                                              == 0)   	  ESL_XFAIL(status,    cmfp->errbuf, "Invalid consensus length %s on W line", tok1);
data/infernal-1.1.3/src/cm_file.c:1722:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if ((cm->nseq = atoi(tok1)) == 0)                                                 ESL_XFAIL(eslEFORMAT, cmfp->errbuf, "Invalid nseq on NSEQ line: should be integer, not %s", tok1);
data/infernal-1.1.3/src/cm_file.c:1792:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	cm->expA[exp_mode]->nrandhits = atoi(tok5);
data/infernal-1.1.3/src/cm_file.c:1864:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	  nd = atoi(tok1);     
data/infernal-1.1.3/src/cm_file.c:1884:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    tmp_map_left[nd]  = atoi(tok1);
data/infernal-1.1.3/src/cm_file.c:1885:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    tmp_map_right[nd] = atoi(tok2);
data/infernal-1.1.3/src/cm_file.c:1890:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    tmp_map_left[nd]  = atoi(tok1);
data/infernal-1.1.3/src/cm_file.c:1897:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    tmp_map_right[nd] = atoi(tok2);
data/infernal-1.1.3/src/cm_file.c:1967:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      if (atoi(tok1) != v)                                                               ESL_XFAIL(status,     cmfp->errbuf, "Invalid state index on state line: should be %d, not %s", v, tok1);
data/infernal-1.1.3/src/cm_file.c:1972:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      cm->plast[v] = atoi(tok1);
data/infernal-1.1.3/src/cm_file.c:1977:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      cm->pnum[v] = atoi(tok1);
data/infernal-1.1.3/src/cm_file.c:1982:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      cm->cfirst[v] = atoi(tok1);
data/infernal-1.1.3/src/cm_file.c:1987:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      cm->cnum[v] = atoi(tok1);
data/infernal-1.1.3/src/cm_file.c:1992:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      cm->qdbinfo->dmin2[v] = atoi(tok1);
data/infernal-1.1.3/src/cm_file.c:1997:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      cm->qdbinfo->dmin1[v] = atoi(tok1);
data/infernal-1.1.3/src/cm_file.c:2002:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      cm->qdbinfo->dmax1[v] = atoi(tok1);
data/infernal-1.1.3/src/cm_file.c:2007:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      cm->qdbinfo->dmax2[v] = atoi(tok1);
data/infernal-1.1.3/src/cm_file.c:2408:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	  M = atoi(tok);
data/infernal-1.1.3/src/cm_file.c:2414:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	  N = atoi(tok);
data/infernal-1.1.3/src/cm_file.c:2420:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	  alphabet_type = atoi(tok);
data/infernal-1.1.3/src/cm_file.c:2443:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	  cm->nseq = atoi(tok);
data/infernal-1.1.3/src/cm_file.c:2453:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	  clen = atoi(tok); /* we'll compare this to what we calculate at end of func */
data/infernal-1.1.3/src/cm_file.c:2519:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	  npartitions = atoi(tok);
data/infernal-1.1.3/src/cm_file.c:2555:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	  p = atoi(tok);
data/infernal-1.1.3/src/cm_file.c:2576:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	  cm->expA[exp_mode]->nrandhits = atoi(tok);
data/infernal-1.1.3/src/cm_file.c:2641:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	  nd = atoi(tok);
data/infernal-1.1.3/src/cm_file.c:2658:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      if (atoi(tok) != v)                                                       ESL_XFAIL(eslEFORMAT, cmfp->errbuf, "Invalid state line for cm: %s state: %d", cm->name, v);      
data/infernal-1.1.3/src/cm_file.c:2661:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      cm->plast[v] = atoi(tok);
data/infernal-1.1.3/src/cm_file.c:2664:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      cm->pnum[v] = atoi(tok);
data/infernal-1.1.3/src/cm_file.c:2667:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      cm->cfirst[v] = atoi(tok);
data/infernal-1.1.3/src/cm_file.c:2670:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      cm->cnum[v] = atoi(tok);
data/infernal-1.1.3/src/cm_file.c:2859:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if ((hmm->M = atoi(tok1))                                            == 0)     ESL_XFAIL(status,    hfp->errbuf, "Invalid model length %s on LENG line", tok1);
data/infernal-1.1.3/src/cm_file.c:2864:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if ((hmm->max_length = atoi(tok1))                                   == 0)     ESL_XFAIL(status,    hfp->errbuf, "Invalid max length %s on MAXL line", tok1);
data/infernal-1.1.3/src/cm_file.c:2933:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if ((hmm->nseq = atoi(tok1)) == 0)                                               ESL_XFAIL(eslEFORMAT, hfp->errbuf, "Invalid nseq on NSEQ line: should be integer, not %s", tok1);
data/infernal-1.1.3/src/cm_file.c:3060:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      if (atoi(tok1) != k)                                                               ESL_XFAIL(eslEFORMAT, hfp->errbuf, "Expected match line to start with %d (of %d); saw %s", k, hmm->M, tok1);
data/infernal-1.1.3/src/cm_file.c:3068:47:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      if (hmm->flags & p7H_MAP) hmm->map[k] = atoi(tok1);
data/infernal-1.1.3/src/cm_file.c:3313:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char buffer[32];
data/infernal-1.1.3/src/cm_file.c:3316:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(buffer, "%.3f", sreLOG2(p/null));
data/infernal-1.1.3/src/cm_file.c:3644:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char           errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/src/cm_file.c:3731:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/src/cm_p7_domaindef.c:427:20:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      if (d != d2) memcpy(ddef->sp->sigc + d, ddef->sp->sigc + d2, sizeof(struct p7_spcoord_s));
data/infernal-1.1.3/src/cm_pipeline.c:3018:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy((void*)(seq->dsq), subdsq, (wlen+1) * sizeof(uint8_t)); 
data/infernal-1.1.3/src/cm_pipeline.c:3865:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy((void*)(seq->dsq), subdsq, (wlen+1) * sizeof(uint8_t)); 
data/infernal-1.1.3/src/cm_pipeline.c:4417:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((void*)(dest_sq->dsq+1), src_sq->dsq+i, L * sizeof(ESL_DSQ));
data/infernal-1.1.3/src/cm_qdband.c:591:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/src/cm_qdband.c:626:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(name, "seq%d", i+1);
data/infernal-1.1.3/src/cm_submodel.c:791:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      ofp = fopen("sub.cm", "w");
data/infernal-1.1.3/src/cm_tophits.c:550:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(new2, h2->unsrt, sizeof(CM_HIT) * h2->N);
data/infernal-1.1.3/src/cm_tophits.c:1510:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(cur_rankstr, "(%d)", nprinted+1);
data/infernal-1.1.3/src/cm_tophits.c:1756:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(cur_rankstr, "(%d)", nprinted+1);
data/infernal-1.1.3/src/cm_tophits.c:2483:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(any_ofctstr1, "%6.3f", (float) nres / (float) len1);
data/infernal-1.1.3/src/cm_tophits.c:2484:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(any_ofctstr2, "%6.3f", (float) nres / (float) len2);
data/infernal-1.1.3/src/cm_tophits.c:2502:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(win_ofctstr1, "%6.3f", (float) nres / (float) len1);
data/infernal-1.1.3/src/cm_tophits.c:2503:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(win_ofctstr2, "%6.3f", (float) nres / (float) len2);
data/infernal-1.1.3/src/cm_tophits.c:2505:63:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      if     (th->hit[h]->flags & CM_HIT_IS_MARKED_OVERLAP) { sprintf(olp_str, " = "); maybe_skip = TRUE;  }
data/infernal-1.1.3/src/cm_tophits.c:2506:63:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      else if(has_overlapA[th->hit[h]->hit_idx] == TRUE)    { sprintf(olp_str, " ^ "); maybe_skip = FALSE; }
data/infernal-1.1.3/src/cm_tophits.c:2507:63:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      else                                                  { sprintf(olp_str, " * "); maybe_skip = FALSE; }
data/infernal-1.1.3/src/cm_tophits.c:2762:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char   timestamp[32];
data/infernal-1.1.3/src/cm_tophits.c:2763:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char   modestamp[16];
data/infernal-1.1.3/src/cm_tophits.c:2770:24:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  case CM_SEARCH_SEQS: strcpy(modestamp, "SEARCH"); break;
data/infernal-1.1.3/src/cm_tophits.c:2771:24:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  case CM_SCAN_MODELS: strcpy(modestamp, "SCAN");   break;
data/infernal-1.1.3/src/cm_tophits.c:3056:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/src/cm_tophits.c:3241:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/src/cmalign.c:205:129:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
static int  create_and_output_final_msa(const ESL_GETOPTS *go, const struct cfg_s *cfg, char *errbuf, CM_t *cm, int nali, char *tmpfile);
data/infernal-1.1.3/src/cmalign.c:345:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            errbuf[eslERRBUFSIZE]; /* for printing error messages */
data/infernal-1.1.3/src/cmalign.c:357:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmpfile[32] = "esltmpXXXXXX"; /* name of the tmpfile */
data/infernal-1.1.3/src/cmalign.c:357:8:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  char tmpfile[32] = "esltmpXXXXXX"; /* name of the tmpfile */
data/infernal-1.1.3/src/cmalign.c:563:39:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      if ((status = esl_tmpfile_named(tmpfile, &(cfg->tmpfp))) != eslOK) cm_Fail("Failed to open temporary output file (status %d)", status);
data/infernal-1.1.3/src/cmalign.c:604:73:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
    if((status = create_and_output_final_msa(go, cfg, errbuf, cm, nali, tmpfile)) != eslOK) cm_Fail(errbuf);
data/infernal-1.1.3/src/cmalign.c:605:12:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
    remove(tmpfile); 
data/infernal-1.1.3/src/cmalign.c:784:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/src/cmalign.c:905:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            errbuf[eslERRBUFSIZE]; /* for printing error messages */
data/infernal-1.1.3/src/cmalign.c:917:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmpfile[32] = "esltmpXXXXXX"; /* name of the tmpfile */
data/infernal-1.1.3/src/cmalign.c:917:8:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  char tmpfile[32] = "esltmpXXXXXX"; /* name of the tmpfile */
data/infernal-1.1.3/src/cmalign.c:1112:39:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      if ((status = esl_tmpfile_named(tmpfile, &(cfg->tmpfp))) != eslOK) mpi_failure("Failed to open temporary output file (status %d)", status);
data/infernal-1.1.3/src/cmalign.c:1159:73:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
    if((status = create_and_output_final_msa(go, cfg, errbuf, cm, nali, tmpfile)) != eslOK) mpi_failure(errbuf);
data/infernal-1.1.3/src/cmalign.c:1160:12:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
    remove(tmpfile); 
data/infernal-1.1.3/src/cmalign.c:1188:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            errbuf[eslERRBUFSIZE];  /* for printing error messages */
data/infernal-1.1.3/src/cmalign.c:1326:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char     str[512];
data/infernal-1.1.3/src/cmalign.c:1542:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((cfg->ofp = fopen(esl_opt_GetString(go, "-o"), "w")) == NULL)      ESL_FAIL(eslFAIL, errbuf, "Failed to open -o output file %s\n", esl_opt_GetString(go, "-o"));
data/infernal-1.1.3/src/cmalign.c:1545:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((cfg->tfp = fopen(esl_opt_GetString(go, "--tfile"), "w")) == NULL) ESL_FAIL(eslFAIL, errbuf, "Failed to open --tfile output file %s\n", esl_opt_GetString(go, "--tfile"));
data/infernal-1.1.3/src/cmalign.c:1548:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((cfg->ifp = fopen(esl_opt_GetString(go, "--ifile"), "w")) == NULL) ESL_FAIL(eslFAIL, errbuf, "Failed to open --ifile output file %s\n", esl_opt_GetString(go, "--ifile"));
data/infernal-1.1.3/src/cmalign.c:1552:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((cfg->efp = fopen(esl_opt_GetString(go, "--elfile"), "w")) == NULL) ESL_FAIL(eslFAIL, errbuf, "Failed to open --elfile output file %s\n", esl_opt_GetString(go, "--elfile"));
data/infernal-1.1.3/src/cmalign.c:1556:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((cfg->sfp = fopen(esl_opt_GetString(go, "--sfile"), "w")) == NULL) ESL_FAIL(eslFAIL, errbuf, "Failed to open --sfile output file %s\n", esl_opt_GetString(go, "--sfile"));
data/infernal-1.1.3/src/cmalign.c:1559:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((cfg->rfp = fopen(esl_opt_GetString(go, "--regress"), "w")) == NULL) ESL_FAIL(eslFAIL, errbuf, "Failed to open --regress output file %s\n", esl_opt_GetString(go, "--regress"));
data/infernal-1.1.3/src/cmalign.c:2068:117:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
create_and_output_final_msa(const ESL_GETOPTS *go, const struct cfg_s *cfg, char *errbuf, CM_t *cm, int nali, char *tmpfile) 
data/infernal-1.1.3/src/cmalign.c:2109:34:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if((status = esl_msafile2_Open(tmpfile, NULL, &afp)) != eslOK) cm_Fail("unable to open temp file %s for reading", tmpfile);
data/infernal-1.1.3/src/cmalign.c:2109:117:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if((status = esl_msafile2_Open(tmpfile, NULL, &afp)) != eslOK) cm_Fail("unable to open temp file %s for reading", tmpfile);
data/infernal-1.1.3/src/cmalign.c:2174:36:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
    if((status = esl_msafile2_Open(tmpfile, NULL, &afp)) != eslOK) cm_Fail("unable to open temp file %s for reading on second pass", tmpfile);
data/infernal-1.1.3/src/cmalign.c:2174:134:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
    if((status = esl_msafile2_Open(tmpfile, NULL, &afp)) != eslOK) cm_Fail("unable to open temp file %s for reading on second pass", tmpfile);
data/infernal-1.1.3/src/cmalign.c:2204:34:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if((status = esl_msafile2_Open(tmpfile, NULL, &afp)) != eslOK) cm_Fail("unable to open temp file %s for reading on second (or third) pass", tmpfile);
data/infernal-1.1.3/src/cmalign.c:2204:143:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if((status = esl_msafile2_Open(tmpfile, NULL, &afp)) != eslOK) cm_Fail("unable to open temp file %s for reading on second (or third) pass", tmpfile);
data/infernal-1.1.3/src/cmbuild.c:445:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char     errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/src/cmbuild.c:794:24:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   if ((cfg->cmoutfp = fopen(cfg->cmfile, "w")) == NULL) ESL_FAIL(eslFAIL, errbuf, "Failed to open CM file %s for writing", cfg->cmfile);
data/infernal-1.1.3/src/cmbuild.c:797:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
     cfg->ofp = fopen(esl_opt_GetString(go, "-o"), "w");
data/infernal-1.1.3/src/cmbuild.c:803:23:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
     cfg->postmsafp = fopen(cfg->postmsafile, "w");
data/infernal-1.1.3/src/cmbuild.c:811:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
     if ((pfp = fopen(esl_opt_GetString(go, "--prior"), "r")) == NULL) cm_Fail("Failed to open prior file %s\n", esl_opt_GetString(go, "--prior"));
data/infernal-1.1.3/src/cmbuild.c:871:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
     if ((pfp = fopen(esl_opt_GetString(go, "--p7prior"), "r")) == NULL) cm_Fail("Failed to open p7 prior file %s\n", esl_opt_GetString(go, "--p7prior"));
data/infernal-1.1.3/src/cmbuild.c:887:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
     if ((cfg->cfp = fopen(esl_opt_GetString(go, "--cfile"), "w")) == NULL) 
data/infernal-1.1.3/src/cmbuild.c:892:24:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
     if ((cfg->escfp = fopen(esl_opt_GetString(go, "--efile"), "w")) == NULL) 
data/infernal-1.1.3/src/cmbuild.c:897:24:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
     if ((cfg->tblfp = fopen(esl_opt_GetString(go, "--cmtbl"), "w")) == NULL) 
data/infernal-1.1.3/src/cmbuild.c:902:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
     if ((cfg->efp = fopen(esl_opt_GetString(go, "--emap"), "w")) == NULL) 
data/infernal-1.1.3/src/cmbuild.c:907:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
     if ((cfg->gfp = fopen(esl_opt_GetString(go, "--gtree"), "w")) == NULL) 
data/infernal-1.1.3/src/cmbuild.c:912:25:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
     if ((cfg->gtblfp = fopen(esl_opt_GetString(go, "--gtbl"), "w")) == NULL) 
data/infernal-1.1.3/src/cmbuild.c:917:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
     if ((cfg->tfp = fopen(esl_opt_GetString(go, "--tfile"), "w")) == NULL) 
data/infernal-1.1.3/src/cmbuild.c:923:29:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
       if ((cfg->refinefp = fopen(esl_opt_GetString(go, "--refine"), "w")) == NULL)
data/infernal-1.1.3/src/cmbuild.c:928:23:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
     if ((cfg->rdfp = fopen(esl_opt_GetString(go, "--rdump"), "w")) == NULL) 
data/infernal-1.1.3/src/cmbuild.c:937:25:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
       if ((cfg->cdfp = fopen(esl_opt_GetString(go, "--cdump"), "w")) == NULL)
data/infernal-1.1.3/src/cmbuild.c:942:24:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
     if ((cfg->occfp = fopen(esl_opt_GetString(go, "--occfile"), "w")) == NULL) 
data/infernal-1.1.3/src/cmbuild.c:947:27:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
     if ((cfg->cp9occfp = fopen(esl_opt_GetString(go, "--cp9occfile"), "w")) == NULL) 
data/infernal-1.1.3/src/cmbuild.c:952:27:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
     if ((cfg->fp7occfp = fopen(esl_opt_GetString(go, "--fp7occfile"), "w")) == NULL) 
data/infernal-1.1.3/src/cmbuild.c:2654:16:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    ndigits += sprintf(buffer, ".%d", (m+1));
data/infernal-1.1.3/src/cmcalibrate.c:122:22:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  char              *tmpfile;            /* tmp file we're writing to */
data/infernal-1.1.3/src/cmcalibrate.c:213:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char             errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/src/cmcalibrate.c:320:28:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
    if (esl_FileExists(cfg.tmpfile))                    cm_Fail("Ouch. Temporary file %s appeared during the run.", cfg.tmpfile);
data/infernal-1.1.3/src/cmcalibrate.c:320:121:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
    if (esl_FileExists(cfg.tmpfile))                    cm_Fail("Ouch. Temporary file %s appeared during the run.", cfg.tmpfile);
data/infernal-1.1.3/src/cmcalibrate.c:321:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((outfp = fopen(cfg.tmpfile, cfg.mode)) == NULL) cm_Fail("Ouch. Temporary file %s couldn't be opened for writing.", cfg.tmpfile); 
data/infernal-1.1.3/src/cmcalibrate.c:321:28:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
    if ((outfp = fopen(cfg.tmpfile, cfg.mode)) == NULL) cm_Fail("Ouch. Temporary file %s couldn't be opened for writing.", cfg.tmpfile); 
data/infernal-1.1.3/src/cmcalibrate.c:321:128:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
    if ((outfp = fopen(cfg.tmpfile, cfg.mode)) == NULL) cm_Fail("Ouch. Temporary file %s couldn't be opened for writing.", cfg.tmpfile); 
data/infernal-1.1.3/src/cmcalibrate.c:356:20:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
    if (rename(cfg.tmpfile, cfg.cmfile) != 0)            cm_Fail("system error during rewrite of CM file.");
data/infernal-1.1.3/src/cmcalibrate.c:358:14:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
    free(cfg.tmpfile);
data/infernal-1.1.3/src/cmcalibrate.c:399:11:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if (cfg.tmpfile != NULL) free(cfg.tmpfile);
data/infernal-1.1.3/src/cmcalibrate.c:399:37:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if (cfg.tmpfile != NULL) free(cfg.tmpfile);
data/infernal-1.1.3/src/cmcalibrate.c:437:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char     errbuf[eslERRBUFSIZE];  /* for printing error messages */
data/infernal-1.1.3/src/cmcalibrate.c:442:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char     time_buf[128];	  /* string for printing elapsed time (safely holds up to 10^14 years) */
data/infernal-1.1.3/src/cmcalibrate.c:799:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char         errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/src/cmcalibrate.c:882:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char     errbuf[eslERRBUFSIZE];  /* for printing error messages */
data/infernal-1.1.3/src/cmcalibrate.c:887:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char     time_buf[128];	  /* string for printing elapsed time (safely holds up to 10^14 years) */
data/infernal-1.1.3/src/cmcalibrate.c:1150:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char     errbuf[eslERRBUFSIZE];  /* for printing error messages */
data/infernal-1.1.3/src/cmcalibrate.c:1315:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char     str[512];
data/infernal-1.1.3/src/cmcalibrate.c:1461:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((cfg->hfp = fopen(esl_opt_GetString(go, "--hfile"), "w")) == NULL)
data/infernal-1.1.3/src/cmcalibrate.c:1465:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((cfg->sfp = fopen(esl_opt_GetString(go, "--sfile"), "w")) == NULL)
data/infernal-1.1.3/src/cmcalibrate.c:1469:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((cfg->qfp = fopen(esl_opt_GetString(go, "--qqfile"), "w")) == NULL)
data/infernal-1.1.3/src/cmcalibrate.c:1473:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((cfg->ffp = fopen(esl_opt_GetString(go, "--ffile"), "w")) == NULL)
data/infernal-1.1.3/src/cmcalibrate.c:1477:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((cfg->xfp = fopen(esl_opt_GetString(go, "--xfile"), "w")) == NULL)
data/infernal-1.1.3/src/cmcalibrate.c:1495:18:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  ESL_ALLOC(cfg->tmpfile, (sizeof(char) * (strlen(cfg->cmfile) + 5)));
data/infernal-1.1.3/src/cmcalibrate.c:1496:15:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  strcpy(cfg->tmpfile, cfg->cmfile);
data/infernal-1.1.3/src/cmcalibrate.c:1497:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(cfg->tmpfile, ".xxx");	/* could be more inventive here... */
data/infernal-1.1.3/src/cmcalibrate.c:1497:15:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  strcat(cfg->tmpfile, ".xxx");	/* could be more inventive here... */
data/infernal-1.1.3/src/cmcalibrate.c:1498:27:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if (esl_FileExists(cfg->tmpfile)) ESL_FAIL(eslFAIL, errbuf, "temporary file %s already exists; please delete it first", cfg->tmpfile);
data/infernal-1.1.3/src/cmcalibrate.c:1498:128:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if (esl_FileExists(cfg->tmpfile)) ESL_FAIL(eslFAIL, errbuf, "temporary file %s already exists; please delete it first", cfg->tmpfile);
data/infernal-1.1.3/src/cmcalibrate.c:1838:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  time_buf[128];	      /* for printing run time */
data/infernal-1.1.3/src/cmcalibrate.c:1857:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  time_buf[128];
data/infernal-1.1.3/src/cmcalibrate.c:1990:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(sq->name, "irrelevant");
data/infernal-1.1.3/src/cmconvert.c:52:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char           errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/src/cmconvert.c:68:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((ofp = fopen(esl_opt_GetString(go, "-o"), "w")) == NULL) ESL_FAIL(eslFAIL, errbuf, "Failed to open output file %s", esl_opt_GetString(go, "-o"));
data/infernal-1.1.3/src/cmemit.c:192:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((cfg->ofp = fopen(esl_opt_GetString(go, "-o"), "w")) == NULL) ESL_FAIL(eslFAIL, errbuf, "Failed to open output file %s", esl_opt_GetString(go, "-o"));
data/infernal-1.1.3/src/cmemit.c:202:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((cfg->tfp = fopen(esl_opt_GetString(go, "--tfile"), "w")) == NULL)
data/infernal-1.1.3/src/cmemit.c:225:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char     errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/src/cmemit.c:366:28:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      else                 sprintf(name, "%d-sample%d", cfg->ncm, i+offset);
data/infernal-1.1.3/src/cmemit.c:516:23:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	else                 sprintf(name, "%d-sample%d", cfg->ncm, i+offset);
data/infernal-1.1.3/src/cmemit.c:540:23:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	else                 sprintf(name, "%d-sample%d", cfg->ncm, i+offset);
data/infernal-1.1.3/src/cmfetch.c:78:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/src/cmfetch.c:140:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((ofp = fopen(esl_opt_GetArg(go, 2), "w")) == NULL)
data/infernal-1.1.3/src/cmfetch.c:145:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((ofp = fopen(esl_opt_GetString(go, "-o"), "w")) == NULL)
data/infernal-1.1.3/src/cmpress.c:66:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/src/cmpress.c:164:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/src/cmpress.c:192:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((dbf->mfp = fopen(dbf->mfile, "wb")) == NULL)  ESL_XFAIL(eslEWRITE, errbuf, "Failed to open binary CM file %s for writing",         dbf->mfile);
data/infernal-1.1.3/src/cmpress.c:193:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((dbf->ffp = fopen(dbf->ffile, "wb")) == NULL)  ESL_XFAIL(eslEWRITE, errbuf, "Failed to open binary MSV filter file %s for writing", dbf->ffile); 
data/infernal-1.1.3/src/cmpress.c:194:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((dbf->pfp = fopen(dbf->pfile, "wb")) == NULL)  ESL_XFAIL(eslEWRITE, errbuf, "Failed to open binary profile file %s for writing",    dbf->pfile); 
data/infernal-1.1.3/src/cmscan.c:451:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char             errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/src/cmscan.c:511:58:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (esl_opt_IsOn(go, "-o"))          { if ((ofp      = fopen(esl_opt_GetString(go, "-o"),          "w")) == NULL)  esl_fatal("Failed to open output file %s for writing\n",                 esl_opt_GetString(go, "-o")); }
data/infernal-1.1.3/src/cmscan.c:512:58:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (esl_opt_IsOn(go, "--tblout"))    { if ((tblfp    = fopen(esl_opt_GetString(go, "--tblout"),    "w")) == NULL)  esl_fatal("Failed to open tabular per-seq output file %s for writing\n", esl_opt_GetString(go, "--tblfp")); }
data/infernal-1.1.3/src/cmscan.c:1290:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char             errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/src/cmscan.c:1346:54:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (esl_opt_IsOn(go, "-o")          && (ofp      = fopen(esl_opt_GetString(go, "-o"),          "w")) == NULL)
data/infernal-1.1.3/src/cmscan.c:1348:54:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (esl_opt_IsOn(go, "--tblout")    && (tblfp    = fopen(esl_opt_GetString(go, "--tblout"),    "w")) == NULL)
data/infernal-1.1.3/src/cmscan.c:1685:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char             errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/src/cmscan.c:2900:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char     str[512];
data/infernal-1.1.3/src/cmsearch.c:472:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char             errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/src/cmsearch.c:488:60:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (esl_opt_IsOn(go, "-o"))           { if ((ofp       = fopen(esl_opt_GetString(go, "-o"),          "w")) == NULL) cm_Fail("Failed to open output file %s for writing\n",         esl_opt_GetString(go, "-o")); }
data/infernal-1.1.3/src/cmsearch.c:489:60:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (esl_opt_IsOn(go, "-A"))           { if ((afp       = fopen(esl_opt_GetString(go, "-A"),          "w")) == NULL) cm_Fail("Failed to open alignment file %s for writing\n", esl_opt_GetString(go, "-A")); }
data/infernal-1.1.3/src/cmsearch.c:490:60:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (esl_opt_IsOn(go, "--tblout"))     { if ((tblfp     = fopen(esl_opt_GetString(go, "--tblout"),    "w")) == NULL) cm_Fail("Failed to open tabular output file %s for writing\n", esl_opt_GetString(go, "--tblout")); }
data/infernal-1.1.3/src/cmsearch.c:1092:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char             errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/src/cmsearch.c:1116:40:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (esl_opt_IsOn(go, "-o") && (ofp = fopen(esl_opt_GetString(go, "-o"), "w")) == NULL)
data/infernal-1.1.3/src/cmsearch.c:1120:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((afp = fopen(esl_opt_GetString(go, "-A"), "w")) == NULL) 
data/infernal-1.1.3/src/cmsearch.c:1124:48:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (esl_opt_IsOn(go, "--tblout") && (tblfp = fopen(esl_opt_GetString(go, "--tblout"), "w")) == NULL)
data/infernal-1.1.3/src/cmsearch.c:1492:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char             errbuf[eslERRBUFSIZE];        /* for reporting errors */
data/infernal-1.1.3/src/cmsearch.c:2497:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char     str[512];
data/infernal-1.1.3/src/cmsim.c:214:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((cfg->ifp = fopen(esl_opt_GetString(go, "--ifile"), "w")) == NULL)
data/infernal-1.1.3/src/cmsim.c:218:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((cfg->rfp = fopen(esl_opt_GetString(go, "--rfile"), "w")) == NULL)
data/infernal-1.1.3/src/cmsim.c:245:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char     errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/src/cmsim.c:745:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dsq, sq->dsq, sizeof(ESL_DSQ) * (sq->n+2));
data/infernal-1.1.3/src/cmstat.c:72:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char             errbuf[eslERRBUFSIZE]; /* for error messages */
data/infernal-1.1.3/src/cmstat.c:240:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char errbuf[eslERRBUFSIZE]; /* for error messages */
data/infernal-1.1.3/src/cp9-test.c:63:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char               errbuf[eslERRBUFSIZE]; /* for error messages */
data/infernal-1.1.3/src/cp9_dp.c:1499:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/src/cp9_dp.c:1643:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/src/cp9_modelmaker.c:2103:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(name, "seq%d", i+1);
data/infernal-1.1.3/src/cp9_trace.c:957:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char         errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/src/display.c:217:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(ali->cseq+pos, "*[%*d]*", numwidth, qinset);
data/infernal-1.1.3/src/display.c:218:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(ali->aseq+pos, "*[%*d]*", numwidth, tinset);
data/infernal-1.1.3/src/display.c:405:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(ali->cseq+pos, "*[%*d]*", numwidth, qinset);
data/infernal-1.1.3/src/display.c:406:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(ali->aseq+pos, "*[%*d]*", numwidth, tinset);
data/infernal-1.1.3/src/display.c:1270:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(buf, "%02d:%02d:%02d.%02d", h,m,s,hs);
data/infernal-1.1.3/src/display.c:1272:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(buf, "%02d:%02d:%02d", h,m,s);
data/infernal-1.1.3/src/impl_sse/sse_cm_dpsearch.c:824:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            errbuf[cmERRBUFSIZE];
data/infernal-1.1.3/src/impl_sse/sse_cm_dpsmall.c:5319:57:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      else                       free_vjd_yshadow_deck((char **) shadow[v], i, j);
data/infernal-1.1.3/src/impl_sse/sse_cm_dpsmall.c:5756:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            errbuf[cmERRBUFSIZE];
data/infernal-1.1.3/src/impl_sse/sse_cmcons_mscyk.c:1248:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            errbuf[cmERRBUFSIZE];
data/infernal-1.1.3/src/impl_sse/sse_cmcons_mscyk.c:1449:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            errbuf[cmERRBUFSIZE];
data/infernal-1.1.3/src/impl_sse/sse_cmsearch.c:77:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/src/impl_sse/sse_cmsearch.c:200:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((S0_OFILE = fopen(strcat(fname,".s0.glbf"),"w")) == NULL) { cm_Fail("Couldn't open stage 0 glbf file for writing!"); }
data/infernal-1.1.3/src/impl_sse/sse_cmsearch.c:200:27:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    if ((S0_OFILE = fopen(strcat(fname,".s0.glbf"),"w")) == NULL) { cm_Fail("Couldn't open stage 0 glbf file for writing!"); }
data/infernal-1.1.3/src/impl_sse/sse_cmsearch.c:202:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((S1_OFILE = fopen(strcat(fname,".s1.glbf"),"w")) == NULL) { cm_Fail("Couldn't open stage 1 glbf file for writing!"); }
data/infernal-1.1.3/src/impl_sse/sse_cmsearch.c:202:27:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    if ((S1_OFILE = fopen(strcat(fname,".s1.glbf"),"w")) == NULL) { cm_Fail("Couldn't open stage 1 glbf file for writing!"); }
data/infernal-1.1.3/src/impl_sse/sse_cmsearch.c:204:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((S2_OFILE = fopen(strcat(fname,".s2.glbf"),"w")) == NULL) { cm_Fail("Couldn't open stage 2 glbf file for writing!"); }
data/infernal-1.1.3/src/impl_sse/sse_cmsearch.c:204:27:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    if ((S2_OFILE = fopen(strcat(fname,".s2.glbf"),"w")) == NULL) { cm_Fail("Couldn't open stage 2 glbf file for writing!"); }
data/infernal-1.1.3/src/impl_sse/sse_cmsearch.c:206:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((S3_OFILE = fopen(strcat(fname,".s3.glbf"),"w")) == NULL) { cm_Fail("Couldn't open stage 3 glbf file for writing!"); }
data/infernal-1.1.3/src/impl_sse/sse_cmsearch.c:206:27:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    if ((S3_OFILE = fopen(strcat(fname,".s3.glbf"),"w")) == NULL) { cm_Fail("Couldn't open stage 3 glbf file for writing!"); }
data/infernal-1.1.3/src/infernal.h:2040:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/src/infernal.h:2175:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/src/itest_brute.c:170:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/src/itest_brute.c:222:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	    FILE *ofp = fopen(cmpfile, "w");
data/infernal-1.1.3/src/prior.c:111:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  pri->tsetnum = atoi(tok);
data/infernal-1.1.3/src/rnamat.c:485:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char linebuf[256];
data/infernal-1.1.3/src/rnamat.c:486:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fullbuf[16384];
data/infernal-1.1.3/src/rnamat.c:642:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
     fp = fopen (matfile, "r");
data/infernal-1.1.3/src/rnamat.c:854:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char degen_string[13] = "XRYMKSWHBVDN\0";
data/infernal-1.1.3/src/rnamat.c:855:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char rna_string[5] =    "ACGU\0";
data/infernal-1.1.3/src/sub_cm-test.c:110:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char     errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/src/trcyk.c:39:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/src/truncyk.c:1464:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                  ((char **)  shadow[v])[j][d] = USED_EL;
data/infernal-1.1.3/src/truncyk.c:1466:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                  ((char **)L_shadow[v])[j][d] = USED_EL;
data/infernal-1.1.3/src/truncyk.c:1467:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                  ((char **)R_shadow[v])[j][d] = USED_EL;
data/infernal-1.1.3/src/truncyk.c:1475:50:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                     if ( ret_shadow != NULL ) ((char **)shadow[v])[j][d] = yoffset;
data/infernal-1.1.3/src/truncyk.c:1480:50:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                     if ( ret_shadow != NULL ) ((char **)L_shadow[v])[j][d] = yoffset;
data/infernal-1.1.3/src/truncyk.c:1486:50:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                     if ( ret_shadow != NULL ) ((char **)R_shadow[v])[j][d] = yoffset;
data/infernal-1.1.3/src/truncyk.c:1638:46:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
               if ( ret_shadow != NULL ) { ((char **)L_shadow[v])[j][1] = USED_EL; }
data/infernal-1.1.3/src/truncyk.c:1639:46:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
               if ( ret_shadow != NULL ) { ((char **)R_shadow[v])[j][1] = USED_EL; }
data/infernal-1.1.3/src/truncyk.c:1646:46:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
               if ( ret_shadow != NULL ) { ((char **)shadow[v])[j][d] = USED_EL; }
data/infernal-1.1.3/src/truncyk.c:1653:52:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                     if ( ret_shadow != NULL ) { ((char **)shadow[v])[j][d] = yoffset; }
data/infernal-1.1.3/src/truncyk.c:1659:52:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                     if ( ret_shadow != NULL ) { ((char **)L_shadow[v])[j][d] = yoffset; }
data/infernal-1.1.3/src/truncyk.c:1665:52:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                     if ( ret_shadow != NULL ) { ((char **)L_shadow[v])[j][d] = yoffset; }
data/infernal-1.1.3/src/truncyk.c:1672:52:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                     if ( ret_shadow != NULL ) { ((char **)R_shadow[v])[j][d] = yoffset; }
data/infernal-1.1.3/src/truncyk.c:1678:52:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                     if ( ret_shadow != NULL ) { ((char **)R_shadow[v])[j][d] = yoffset; }
data/infernal-1.1.3/src/truncyk.c:1734:48:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
               if ( ret_shadow   != NULL ) { ((char **)  shadow[v])[j][d] = USED_EL; }
data/infernal-1.1.3/src/truncyk.c:1735:46:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
               if ( ret_shadow != NULL ) { ((char **)L_shadow[v])[j][d] = USED_EL; }
data/infernal-1.1.3/src/truncyk.c:1743:52:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                     if ( ret_shadow != NULL ) { ((char **)shadow[v])[j][d] = yoffset; }
data/infernal-1.1.3/src/truncyk.c:1750:52:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                     if ( ret_shadow != NULL ) { ((char **)L_shadow[v])[j][d] = yoffset; }
data/infernal-1.1.3/src/truncyk.c:1764:53:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                      if ( ret_shadow != NULL ) { ((char **)R_shadow[v])[j][d] = yoffset; }
data/infernal-1.1.3/src/truncyk.c:1771:53:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                      if ( ret_shadow != NULL ) { ((char **)R_shadow[v])[j][d] = yoffset; }
data/infernal-1.1.3/src/truncyk.c:1781:52:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                     if ( ret_shadow != NULL ) { ((char **)shadow[v])[j][d] = yoffset; }
data/infernal-1.1.3/src/truncyk.c:1788:52:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                     if ( ret_shadow != NULL ) { ((char **)L_shadow[v])[j][d] = yoffset; }
data/infernal-1.1.3/src/truncyk.c:1818:52:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                     if ( ret_shadow != NULL ) { ((char **)R_shadow[v])[j][d] = yoffset; }
data/infernal-1.1.3/src/truncyk.c:1825:52:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                     if ( ret_shadow != NULL ) { ((char **)R_shadow[v])[j][d] = yoffset; }
data/infernal-1.1.3/src/truncyk.c:1883:48:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
               if ( ret_shadow   != NULL ) { ((char **)  shadow[v])[j][d] = USED_EL; }
data/infernal-1.1.3/src/truncyk.c:1884:46:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
               if ( ret_shadow != NULL ) { ((char **)R_shadow[v])[j][d] = USED_EL; }
data/infernal-1.1.3/src/truncyk.c:1892:52:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                     if ( ret_shadow != NULL ) { ((char **)shadow[v])[j][d] = yoffset; }
data/infernal-1.1.3/src/truncyk.c:1898:52:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                     if ( ret_shadow != NULL ) { ((char **)R_shadow[v])[j][d] = yoffset; }
data/infernal-1.1.3/src/truncyk.c:1912:52:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                     if ( ret_shadow != NULL ) { ((char **)L_shadow[v])[j][d] = yoffset; }
data/infernal-1.1.3/src/truncyk.c:1919:52:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                     if ( ret_shadow != NULL ) { ((char **)L_shadow[v])[j][d] = yoffset; }
data/infernal-1.1.3/src/truncyk.c:1937:52:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                     if ( ret_shadow != NULL ) { ((char **)shadow[v])[j][d] = yoffset; }
data/infernal-1.1.3/src/truncyk.c:1943:52:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                     if ( ret_shadow != NULL ) { ((char **)L_shadow[v])[j][d] = yoffset; }
data/infernal-1.1.3/src/truncyk.c:1950:52:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                     if ( ret_shadow != NULL ) { ((char **)L_shadow[v])[j][d] = yoffset; }
data/infernal-1.1.3/src/truncyk.c:1958:52:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                     if ( ret_shadow != NULL ) { ((char **)R_shadow[v])[j][d] = yoffset; }
data/infernal-1.1.3/src/truncyk.c:2063:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         if ( ret_shadow   != NULL ) { ((char **)  shadow[0])[j0][W] = USED_LOCAL_BEGIN; }
data/infernal-1.1.3/src/truncyk.c:2064:40:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         if ( ret_shadow != NULL ) { ((char **)L_shadow[0])[j0][W] = USED_LOCAL_BEGIN; }
data/infernal-1.1.3/src/truncyk.c:2065:40:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         if ( ret_shadow != NULL ) { ((char **)R_shadow[0])[j0][W] = USED_LOCAL_BEGIN; }
data/infernal-1.1.3/src/truncyk.c:3984:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            yoffset = ((char **)   shadow[v])[j][d];
data/infernal-1.1.3/src/truncyk.c:3989:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            yoffset = ((char **) L_shadow[v])[j][d];
data/infernal-1.1.3/src/truncyk.c:3994:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            yoffset = ((char **) R_shadow[v])[j][d];
data/infernal-1.1.3/src/truncyk_check.c:59:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char         errbuf[eslERRBUFSIZE];
data/infernal-1.1.3/src/truncyk_check.c:107:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((regressfp = fopen(regressfile, "w")) == NULL)
data/infernal-1.1.3/easel/easel.c:589:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len = strlen(s);
data/infernal-1.1.3/easel/easel.c:709:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen(*buf);
data/infernal-1.1.3/easel/easel.c:723:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(s);
data/infernal-1.1.3/easel/easel.c:833:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (n < 0) n = strlen(s);
data/infernal-1.1.3/easel/easel.c:888:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (ldest < 0) len1 = ((*dest == NULL) ? 0 : strlen(*dest));
data/infernal-1.1.3/easel/easel.c:891:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (lsrc < 0)  len2 = ((  src == NULL) ? 0 : strlen(src)); 
data/infernal-1.1.3/easel/easel.c:994:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (*ldest < 0) *ldest = ( (*dest) ? strlen(*dest) : 0);
data/infernal-1.1.3/easel/easel.c:995:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ( lsrc  < 0)  lsrc  = ( (*src)  ? strlen(src)   : 0);
data/infernal-1.1.3/easel/easel.c:1233:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n1 = strlen(format) * 2;	/* initial guess at string size needed */
data/infernal-1.1.3/easel/easel.c:1431:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (n < 0) n = strlen(s);
data/infernal-1.1.3/easel/easel.c:1576:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len = strlen(s[i]);
data/infernal-1.1.3/easel/easel.c:1654:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ESL_ALLOC(tail, sizeof(char) * (strlen(path)+1)); /* a little overkill */
data/infernal-1.1.3/easel/easel.c:1693:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  esl_pos_t n1 = strlen(filename) - n_ignore;
data/infernal-1.1.3/easel/easel.c:1745:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nd   = (dir  != NULL)? strlen(dir)  : 0;
data/infernal-1.1.3/easel/easel.c:1746:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nf   = strlen(file);
data/infernal-1.1.3/easel/easel.c:1807:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nf = (lastdot == NULL)? strlen(filename) : lastdot-filename;
data/infernal-1.1.3/easel/easel.c:1809:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (! new) ESL_ALLOC(new, sizeof(char) * (nf+strlen(sfx)+2)); /* '.' too */
data/infernal-1.1.3/easel/easel.c:1810:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(new, filename, nf);
data/infernal-1.1.3/easel/easel.c:1881:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  np   = strlen(fname) + strlen(s) + 2; /* upper bound on full path len */
data/infernal-1.1.3/easel/easel.c:1881:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  np   = strlen(fname) + strlen(s) + 2; /* upper bound on full path len */
data/infernal-1.1.3/easel/easel.c:1992:14:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
  old_mode = umask(077);
data/infernal-1.1.3/easel/easel.c:1994:3:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
  umask(old_mode);
data/infernal-1.1.3/easel/easel.c:2069:14:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
  old_mode = umask(077);
data/infernal-1.1.3/easel/easel.c:2071:3:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
  umask(old_mode);
data/infernal-1.1.3/easel/easel.c:2390:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  L1 = strlen(pfx);
data/infernal-1.1.3/easel/easel.c:2391:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  L2 = strlen(append);
data/infernal-1.1.3/easel/esl_alphabet.c:107:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(alphabet) != Kp) ESL_XEXCEPTION(eslEINVAL, "alphabet length != Kp");
data/infernal-1.1.3/easel/esl_alphabet.c:641:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  L = strlen(seq);
data/infernal-1.1.3/easel/esl_alphabet.c:928:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ( n < 0)  n = (   (s) ? strlen(s)            : 0);
data/infernal-1.1.3/easel/esl_alphabet.c:1808:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(a->sym) != a->Kp)   esl_fatal(msg);
data/infernal-1.1.3/easel/esl_alphabet.c:1856:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (memcmp(dsq, expect, sizeof(ESL_DSQ) * (strlen(testseq)+2)) != 0) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_alphabet.c:1888:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (memcmp(dsq, expect, sizeof(ESL_DSQ) * (strlen(testseq)+2)) != 0) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_alphabet.c:1906:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (memcmp(dsq, expect, sizeof(ESL_DSQ) * (strlen(testseq)+2)) != 0) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_alphabet.c:1936:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (memcmp(dsq, expect, sizeof(ESL_DSQ) * (strlen(testseq)+2)) != 0) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_alphabet.c:2032:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ESL_ALLOC(dsq, sizeof(ESL_DSQ) * (strlen(goodseq)+2));
data/infernal-1.1.3/easel/esl_alphabet.c:2062:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  L = strlen(goodseq);
data/infernal-1.1.3/easel/esl_alphabet.c:2117:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  L = strlen(goodseq);
data/infernal-1.1.3/easel/esl_alphabet.c:2152:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  L1 = strlen(goodseq);
data/infernal-1.1.3/easel/esl_alphabet.c:2153:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  L2 = strlen(addseq);
data/infernal-1.1.3/easel/esl_alphabet.c:2176:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  L2 = strlen(badseq);
data/infernal-1.1.3/easel/esl_alphabet.c:2421:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  L  = strlen(dnaseq);
data/infernal-1.1.3/easel/esl_arr2.c:25:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          n += sizeof(char) * (1 + strlen(s[i]));
data/infernal-1.1.3/easel/esl_arr3.c:28:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  n += sizeof(char) * (1 + strlen(s[i][j]));
data/infernal-1.1.3/easel/esl_buffer.c:149:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n = strlen(path);
data/infernal-1.1.3/easel/esl_buffer.c:433:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  bf->n       = (n == -1) ? strlen(p) : n;
data/infernal-1.1.3/easel/esl_buffer.c:2044:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (( n = read(fd, buf, filesize)) != filesize) esl_fatal("bad read()");
data/infernal-1.1.3/easel/esl_buffer.c:2650:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(tok) != n)                                       esl_fatal(msg);
data/infernal-1.1.3/easel/esl_buffer.c:2660:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(tok) != n)                                       esl_fatal(msg);
data/infernal-1.1.3/easel/esl_buffer.c:2759:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ( (status = esl_buffer_OpenMem(s, strlen(s), &bf)) != eslOK)  esl_fatal(msg);
data/infernal-1.1.3/easel/esl_buffer.c:2761:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ( n != strlen(s))                                             esl_fatal(msg);
data/infernal-1.1.3/easel/esl_buffer.c:3045:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n = strlen(s1)+1; fwrite(&n, sizeof(int), 1, fp); fwrite(s1, sizeof(char), n, fp);
data/infernal-1.1.3/easel/esl_buffer.c:3046:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n = strlen(s2)+1; fwrite(&n, sizeof(int), 1, fp); fwrite(s2, sizeof(char), n, fp);
data/infernal-1.1.3/easel/esl_distance.c:1169:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  L = strlen(as[0]);
data/infernal-1.1.3/easel/esl_distance.c:1233:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  L  = strlen(as[0]); 
data/infernal-1.1.3/easel/esl_dsqdata.c:199:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ESL_ALLOC( dd->basename, sizeof(char) * (strlen(basename) + 6)); // +5 for .dsqx; +1 for \0
data/infernal-1.1.3/easel/esl_dsqdata.c:615:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      n = strlen(sq->name); if (n > max_namelen) max_namelen = n;
data/infernal-1.1.3/easel/esl_dsqdata.c:616:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      n = strlen(sq->acc);  if (n > max_acclen)  max_acclen  = n;
data/infernal-1.1.3/easel/esl_dsqdata.c:617:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      n = strlen(sq->desc); if (n > max_desclen) max_desclen = n;
data/infernal-1.1.3/easel/esl_dsqdata.c:681:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      n = strlen(sq->name); 
data/infernal-1.1.3/easel/esl_dsqdata.c:686:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      n = strlen(sq->acc);  
data/infernal-1.1.3/easel/esl_dsqdata.c:691:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      n = strlen(sq->desc); 
data/infernal-1.1.3/easel/esl_fileparser.c:348:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  blen = strlen(efp->buf);
data/infernal-1.1.3/easel/esl_fileparser.c:648:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((efp = esl_fileparser_CreateMapped(buffer, strlen(buffer))) == NULL)  
data/infernal-1.1.3/easel/esl_gencode.c:437:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(aas, efp->buf+start, 64); 
data/infernal-1.1.3/easel/esl_gencode.c:445:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(mline, efp->buf+start, 64); 
data/infernal-1.1.3/easel/esl_gencode.c:453:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(base1, efp->buf+start, 64); 
data/infernal-1.1.3/easel/esl_gencode.c:461:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(base2, efp->buf+start, 64); 
data/infernal-1.1.3/easel/esl_gencode.c:469:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(base3, efp->buf+start, 64); 
data/infernal-1.1.3/easel/esl_getopts.c:744:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ntot = strlen(g->argv[0]) + 1;
data/infernal-1.1.3/easel/esl_getopts.c:752:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (g->opt[i].type == eslARG_NONE) n = strlen(g->opt[i].name) + 1;
data/infernal-1.1.3/easel/esl_getopts.c:753:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	else                               n = (strlen(g->opt[i].name) + strlen(g->val[i])) + 2;
data/infernal-1.1.3/easel/esl_getopts.c:753:67:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	else                               n = (strlen(g->opt[i].name) + strlen(g->val[i])) + 2;
data/infernal-1.1.3/easel/esl_getopts.c:766:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      n = strlen(g->argv[j]) + 1;
data/infernal-1.1.3/easel/esl_getopts.c:1069:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	n = strlen(go->opt[i].name);                /* "--foo"  */
data/infernal-1.1.3/easel/esl_getopts.c:1075:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  n = strlen(go->opt[i].help) + 1;     /* include " " in width */
data/infernal-1.1.3/easel/esl_getopts.c:1079:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  n += strlen(go->opt[i].defval) + 4;  /* include "  []" in width */
data/infernal-1.1.3/easel/esl_getopts.c:1083:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  n += strlen(go->opt[i].range) + 4;   /* include "  ()" in width */
data/infernal-1.1.3/easel/esl_getopts.c:1113:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	n += strlen(go->opt[i].name);
data/infernal-1.1.3/easel/esl_getopts.c:1224:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  arglen = strlen(optarg);
data/infernal-1.1.3/easel/esl_getopts.c:1301:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(optname);	/* all of optname abbrev must match against the real name */
data/infernal-1.1.3/easel/esl_getopts.c:1308:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (n == strlen(g->opt[i].name)) { nexact++; break; } /* an exact match; can stop now (xref bug #e4) */
data/infernal-1.1.3/easel/esl_getopts.c:1414:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    { n = strlen(g->argv[g->optind]); } /* and argptr == NULL from above. */
data/infernal-1.1.3/easel/esl_getopts.c:1620:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(val) > 1)
data/infernal-1.1.3/easel/esl_huffman.c:744:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int          n       = strlen(T);
data/infernal-1.1.3/easel/esl_huffman.c:785:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int    n        = strlen(T);
data/infernal-1.1.3/easel/esl_huffman.c:1030:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      n   += strlen(text+n);
data/infernal-1.1.3/easel/esl_keyhash.c:273:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (n == -1) n = strlen(key);
data/infernal-1.1.3/easel/esl_mem.c:369:82:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if      ( esl_memstrpfx_case(p+i, n-i, "infinity") ) { val = eslINFINITY; i += strlen("infinity"); m = 1; }  // check "infinity" first, before "inf"
data/infernal-1.1.3/easel/esl_mem.c:370:82:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  else if ( esl_memstrpfx_case(p+i, n-i, "inf") )      { val = eslINFINITY; i += strlen("inf");      m = 1; }
data/infernal-1.1.3/easel/esl_mem.c:371:82:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  else if ( esl_memstrpfx_case(p+i, n-i, "nan") )      { val = eslNaN;      i += strlen("nan");      m = 1; }
data/infernal-1.1.3/easel/esl_mem.c:1136:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      esl_mem_strtof(s, strlen(s), NULL, &(v2.f));
data/infernal-1.1.3/easel/esl_mem.c:1158:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n = strlen(teststring);
data/infernal-1.1.3/easel/esl_mem.c:1224:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n = strlen(p);
data/infernal-1.1.3/easel/esl_mem.c:1239:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n = strlen(p);
data/infernal-1.1.3/easel/esl_mem.c:1257:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n = strlen(p);
data/infernal-1.1.3/easel/esl_mpi.c:60:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (incount == -1 && type == MPI_CHAR) incount = strlen(inbuf) + 1;
data/infernal-1.1.3/easel/esl_mpi.c:101:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (incount == -1 && type == MPI_CHAR) incount = strlen(inbuf) + 1;
data/infernal-1.1.3/easel/esl_msa.c:461:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (msa->name)    n += sizeof(char) * (1 + strlen(msa->name));
data/infernal-1.1.3/easel/esl_msa.c:462:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (msa->desc)    n += sizeof(char) * (1 + strlen(msa->desc));
data/infernal-1.1.3/easel/esl_msa.c:463:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (msa->acc)     n += sizeof(char) * (1 + strlen(msa->acc));
data/infernal-1.1.3/easel/esl_msa.c:464:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (msa->au)      n += sizeof(char) * (1 + strlen(msa->au));
data/infernal-1.1.3/easel/esl_msa.c:1545:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (n == -1) n = strlen(p);
data/infernal-1.1.3/easel/esl_msa.c:1590:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (taglen == -1) taglen = strlen(tag);
data/infernal-1.1.3/easel/esl_msa.c:1591:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (vlen   == -1) vlen   = strlen(value);
data/infernal-1.1.3/easel/esl_msa.c:1639:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (taglen == -1) taglen = strlen(tag);
data/infernal-1.1.3/easel/esl_msa.c:1640:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (vlen   == -1) vlen   = strlen(value);
data/infernal-1.1.3/easel/esl_msa.c:1696:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      n1 = strlen(msa->gs[tagidx][sqidx]);
data/infernal-1.1.3/easel/esl_msa.c:1697:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      n2 = (vlen == -1 ? strlen(value) : vlen);
data/infernal-1.1.3/easel/esl_msa.c:2767:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((strlen(oldsyms) != strlen(newsyms)) && strlen(newsyms) != 1)
data/infernal-1.1.3/easel/esl_msa.c:2767:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((strlen(oldsyms) != strlen(newsyms)) && strlen(newsyms) != 1)
data/infernal-1.1.3/easel/esl_msa.c:2767:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((strlen(oldsyms) != strlen(newsyms)) && strlen(newsyms) != 1)
data/infernal-1.1.3/easel/esl_msa.c:2770:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  special = (strlen(newsyms) == 1 ? TRUE : FALSE);
data/infernal-1.1.3/easel/esl_msa.c:3168:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  if (strlen(msa->aseq[idx]) != msa->alen) ESL_FAIL(eslFAIL, errmsg, "seq %d: wrong length", idx);
data/infernal-1.1.3/easel/esl_msa.c:3175:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (msa->ss &&  msa->ss[idx] &&  strlen(msa->ss[idx]) != msa->alen) ESL_FAIL(eslFAIL, errmsg, "seq %d: SS wrong length", idx);
data/infernal-1.1.3/easel/esl_msa.c:3176:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (msa->sa &&  msa->sa[idx] &&  strlen(msa->sa[idx]) != msa->alen) ESL_FAIL(eslFAIL, errmsg, "seq %d: SA wrong length", idx);
data/infernal-1.1.3/easel/esl_msa.c:3177:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (msa->pp &&  msa->pp[idx] &&  strlen(msa->pp[idx]) != msa->alen) ESL_FAIL(eslFAIL, errmsg, "seq %d: PP wrong length", idx);
data/infernal-1.1.3/easel/esl_msa.c:3181:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (msa->ss_cons && strlen(msa->ss_cons) != msa->alen) ESL_FAIL(eslFAIL, errmsg, "SS_cons wrong length");
data/infernal-1.1.3/easel/esl_msa.c:3182:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (msa->sa_cons && strlen(msa->sa_cons) != msa->alen) ESL_FAIL(eslFAIL, errmsg, "SA_cons wrong length");
data/infernal-1.1.3/easel/esl_msa.c:3183:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (msa->pp_cons && strlen(msa->pp_cons) != msa->alen) ESL_FAIL(eslFAIL, errmsg, "PP_cons wrong length");
data/infernal-1.1.3/easel/esl_msa.c:3184:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (msa->rf      && strlen(msa->rf)      != msa->alen) ESL_FAIL(eslFAIL, errmsg, "RF wrong length");
data/infernal-1.1.3/easel/esl_msa.c:3185:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (msa->mm      && strlen(msa->mm   )   != msa->alen) ESL_FAIL(eslFAIL, errmsg, "MM wrong length");
data/infernal-1.1.3/easel/esl_msafile.c:1298:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ( esl_msafile_OpenMem(&abc, testmsa, strlen(testmsa), eslMSAFILE_STOCKHOLM, NULL, &afp) != eslOK) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_msafile2.c:172:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int           n       = strlen(filename);
data/infernal-1.1.3/easel/esl_msafile2.c:212:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      ESL_ALLOC(cmd, sizeof(char) * (n+1+strlen("gzip -dc ")));
data/infernal-1.1.3/easel/esl_msafile2.c:630:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for(i = 0; i < msa->ngc; i++) maxgc = ESL_MAX(maxgc, strlen(msa->gc_tag[i])); 
data/infernal-1.1.3/easel/esl_msafile2.c:639:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for(i = 0; i < msa->ngf; i++) maxgf = ESL_MAX(maxgf, strlen(msa->gf_tag[i])); 
data/infernal-1.1.3/easel/esl_msafile_afa.c:296:20:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	  if (! msa->abc) strncpy(buf, msa->aseq[i] + pos, acpl);
data/infernal-1.1.3/easel/esl_msafile_clustal.c:353:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      namelen = strlen(msa->sqname[i]);
data/infernal-1.1.3/easel/esl_msafile_clustal.c:372:20:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	  if (! msa->abc) strncpy(buf, msa->aseq[i]+apos, cpl);
data/infernal-1.1.3/easel/esl_msafile_clustal.c:375:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(buf, consline+apos, cpl);
data/infernal-1.1.3/easel/esl_msafile_phylip.c:519:8:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	      strncpy(buf, msa->aseq[idx]+apos, rpl);
data/infernal-1.1.3/easel/esl_msafile_phylip.c:634:8:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	      strncpy(buf, msa->aseq[idx]+apos, rpl);
data/infernal-1.1.3/easel/esl_msafile_selex.c:304:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    namelen    = strlen(msa->sqname[i]);
data/infernal-1.1.3/easel/esl_msafile_selex.c:318:20:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	  if (! msa->abc) strncpy(buf, msa->aseq[i]+apos, cpl);
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1209:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      gslen = strlen(msa->gs_tag[i]);
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1232:20:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	  if (! msa->abc) strncpy(buf, msa->aseq[i] + currpos, acpl);
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1237:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	    strncpy(buf, msa->ss[i] + currpos, acpl);
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1242:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	    strncpy(buf, msa->sa[i] + currpos, acpl);
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1247:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	    strncpy(buf, msa->pp[i] + currpos, acpl);
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1253:8:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	      strncpy(buf, msa->gr[j][i] + currpos, acpl);
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1260:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(buf, msa->ss_cons + currpos, acpl);
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1264:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(buf, msa->sa_cons + currpos, acpl);
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1268:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(buf, msa->pp_cons + currpos, acpl);
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1272:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(buf, msa->rf + currpos, acpl);
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1276:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(buf, msa->mm + currpos, acpl);
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:1280:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(buf, msa->gc[j] + currpos, acpl);
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:2371:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (esl_msafile_OpenMem(byp_abc, buf, strlen(buf), fmt, NULL, &afp) != eslOK) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:2421:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (esl_msafile_OpenMem(byp_abc, buf, strlen(buf), fmt, NULL, &afp) != expected_status) esl_fatal(msg);
data/infernal-1.1.3/easel/esl_msafile_stockholm.c:2432:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (esl_msafile_OpenMem(byp_abc, buf, strlen(buf), fmt, NULL, &afp) != eslOK)      esl_fatal(msg);
data/infernal-1.1.3/easel/esl_msashuffle.c:448:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  L = strlen(x);
data/infernal-1.1.3/easel/esl_msashuffle.c:449:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(y) != L) ESL_XEXCEPTION(eslEINVAL, "sequences of different lengths in qrna shuffle");
data/infernal-1.1.3/easel/esl_randomseq.c:225:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  L = strlen(s);
data/infernal-1.1.3/easel/esl_randomseq.c:290:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen(s);
data/infernal-1.1.3/easel/esl_randomseq.c:491:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int   L = strlen(s);
data/infernal-1.1.3/easel/esl_randomseq.c:540:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  L = strlen(s);
data/infernal-1.1.3/easel/esl_randomseq.c:578:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  L = strlen(s);
data/infernal-1.1.3/easel/esl_randomseq.c:631:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  L = strlen(s);
data/infernal-1.1.3/easel/esl_randomseq.c:690:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  L = strlen(s);
data/infernal-1.1.3/easel/esl_randomseq.c:1687:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  K = strlen(alphabet);
data/infernal-1.1.3/easel/esl_randomseq.c:1981:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int     L         = strlen(testseq);
data/infernal-1.1.3/easel/esl_randomseq.c:2047:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int             K        = strlen(alphabet);
data/infernal-1.1.3/easel/esl_regexp.c:240:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(s, machine->ndfa->startp[elem], len);
data/infernal-1.1.3/easel/esl_regexp.c:282:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(buffer, machine->ndfa->startp[elem], len);
data/infernal-1.1.3/easel/esl_regexp.c:643:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				if (OP(scan) == EXACTLY && strlen(OPERAND(scan)) >= len) {
data/infernal-1.1.3/easel/esl_regexp.c:645:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					len = strlen(OPERAND(scan));
data/infernal-1.1.3/easel/esl_regexp.c:1243:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			len = strlen(opnd);
data/infernal-1.1.3/easel/esl_regexp.c:1373:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	        *ret_count = strlen(ep->reginput);
data/infernal-1.1.3/easel/esl_regexp.c:1469:9:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
	(void) strcpy(buf, ":");
data/infernal-1.1.3/easel/esl_regexp.c:1511:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		sprintf(buf+strlen(buf), "OPEN%d", OP(op)-OPEN);
data/infernal-1.1.3/easel/esl_regexp.c:1523:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		sprintf(buf+strlen(buf), "CLOSE%d", OP(op)-CLOSE);
data/infernal-1.1.3/easel/esl_regexp.c:1583:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			(void) strncpy(dst, prog->startp[no], len);
data/infernal-1.1.3/easel/esl_scorematrix.c:859:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  S->nc = strlen(S->outorder);
data/infernal-1.1.3/easel/esl_scorematrix.c:894:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(S->outorder, S->abc_r->sym, S->K);  
data/infernal-1.1.3/easel/esl_scorematrix.c:945:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(S->outorder, S->abc_r->sym, S->abc_r->K);
data/infernal-1.1.3/easel/esl_sq.c:96:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int64_t  n  = strlen(seq);
data/infernal-1.1.3/easel/esl_sq.c:104:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(ss) != n) ESL_XEXCEPTION(eslEINVAL, "ss, seq lengths mismatch");
data/infernal-1.1.3/easel/esl_sq.c:785:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(ss) != sq->n) ESL_XEXCEPTION(eslEINVAL, "ss, seq lengths mismatch");
data/infernal-1.1.3/easel/esl_sq.c:1055:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n = strlen(name);
data/infernal-1.1.3/easel/esl_sq.c:1093:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n = strlen(acc);
data/infernal-1.1.3/easel/esl_sq.c:1133:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n = strlen(desc);
data/infernal-1.1.3/easel/esl_sq.c:1171:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n = strlen(source);
data/infernal-1.1.3/easel/esl_sq.c:1381:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int   dlen   = (sq->desc == NULL ? 0 : strlen(sq->desc));
data/infernal-1.1.3/easel/esl_sq.c:1382:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int   newlen = (desc     == NULL ? 0 : strlen(desc));
data/infernal-1.1.3/easel/esl_sq.c:1815:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  ESL_ALLOC(sq->ss, sizeof(char) * (strlen(ss)+2));
data/infernal-1.1.3/easel/esl_sq.c:1823:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ESL_ALLOC(sq->xr[x], sizeof(char) * (strlen(xr[x])+2));
data/infernal-1.1.3/easel/esl_sq.c:2231:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      n = strlen(name)+1;
data/infernal-1.1.3/easel/esl_sq.c:2245:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      n = strlen(desc)+1;
data/infernal-1.1.3/easel/esl_sq.c:2259:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      n = strlen(acc)+1;
data/infernal-1.1.3/easel/esl_sq.c:2302:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int64_t n    = strlen(seq);
data/infernal-1.1.3/easel/esl_sq.c:2423:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int64_t       n    = strlen(seq);
data/infernal-1.1.3/easel/esl_sq.c:2698:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int         n       = strlen(testseq);
data/infernal-1.1.3/easel/esl_sq.c:2749:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int           n       = strlen(testseq);
data/infernal-1.1.3/easel/esl_sqio.c:166:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ESL_ALLOC(sqfp->filename, sizeof(char) * (strlen(filename) + 1));
data/infernal-1.1.3/easel/esl_sqio.c:190:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      ESL_ALLOC(list, sizeof(char) * (strlen(s1) + 1));
data/infernal-1.1.3/easel/esl_sqio.c:193:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      ESL_ALLOC(path, sizeof(char) * (strlen(filename) + strlen(list) + 3));
data/infernal-1.1.3/easel/esl_sqio.c:193:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      ESL_ALLOC(path, sizeof(char) * (strlen(filename) + strlen(list) + 3));
data/infernal-1.1.3/easel/esl_sqio.c:198:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	n = strlen(s1);
data/infernal-1.1.3/easel/esl_sqio.c:358:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  return sqfp->read(sqfp, sq);
data/infernal-1.1.3/easel/esl_sqio.c:1140:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(sq->name);
data/infernal-1.1.3/easel/esl_sqio.c:1144:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(sq->acc);
data/infernal-1.1.3/easel/esl_sqio.c:1148:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(sq->desc);
data/infernal-1.1.3/easel/esl_sqio.c:1179:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ESL_ALLOC(cache->filename, strlen(seqfile) + 1);
data/infernal-1.1.3/easel/esl_sqio.c:1210:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      hdr_ptr += strlen(sq->name) + 1;
data/infernal-1.1.3/easel/esl_sqio.c:1217:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      hdr_ptr += strlen(sq->acc) + 1;
data/infernal-1.1.3/easel/esl_sqio.c:1224:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      hdr_ptr += strlen(sq->desc) + 1;
data/infernal-1.1.3/easel/esl_sqio.c:1604:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      while ( (n = read(fd, buf, bufsize)) > 0)
data/infernal-1.1.3/easel/esl_sqio.c:2317:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  status = esl_sqio_Parse(test, strlen(test), sq, format);
data/infernal-1.1.3/easel/esl_sqio.c:2354:91:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    printf("%-40s length: %8ld   desclen: %lu\n", sq->name, (long) sq->L, (unsigned long) strlen(sq->desc));
data/infernal-1.1.3/easel/esl_sqio.h:55:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  int   (*read)            (struct esl_sqio_s *sqfp, ESL_SQ *sq);
data/infernal-1.1.3/easel/esl_sqio_ascii.c:215:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      n = strlen(filename);
data/infernal-1.1.3/easel/esl_sqio_ascii.c:220:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        ESL_ALLOC(cmd, sizeof(char) * (n+1+strlen("gzip -dc ")));
data/infernal-1.1.3/easel/esl_sqio_ascii.c:373:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int   n         = strlen(sqfp->filename);
data/infernal-1.1.3/easel/esl_sqio_ascii.c:3151:28:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      else                 strncpy(buf, sq->seq+pos, 60);
data/infernal-1.1.3/easel/esl_sqio_ncbi.c:266:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen(filename);
data/infernal-1.1.3/easel/esl_sqio_ncbi.c:335:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen(filename);
data/infernal-1.1.3/easel/esl_sqio_ncbi.c:425:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ESL_ALLOC(ncbi->vols[vol].name, sizeof(char) * strlen(dbptr) + 5);
data/infernal-1.1.3/easel/esl_sqio_ncbi.c:539:3:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  fgetc(ncbi->fppsq);
data/infernal-1.1.3/easel/esl_sqio_ncbi.c:1417:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len  = strlen(name);
data/infernal-1.1.3/easel/esl_sqio_ncbi.c:1460:3:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  fgetc(ncbi->fppsq);
data/infernal-1.1.3/easel/esl_sqio_ncbi.c:2164:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for (x = 0; x < strlen(ncbisym); ++x) {
data/infernal-1.1.3/easel/esl_sqio_ncbi.c:2165:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for (y = 0; y < strlen(abc->sym); ++y) {
data/infernal-1.1.3/easel/esl_sqio_ncbi.c:2173:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (y >= strlen(abc->sym)) return eslEFORMAT;
data/infernal-1.1.3/easel/esl_sqio_ncbi.c:2212:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for (x = 0; x < strlen(ncbisym); ++x) {
data/infernal-1.1.3/easel/esl_sqio_ncbi.c:2213:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for (y = 0; y < strlen(abc->sym); ++y) {
data/infernal-1.1.3/easel/esl_sqio_ncbi.c:2221:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (y >= strlen(abc->sym)) return eslEFORMAT;
data/infernal-1.1.3/easel/esl_ssi.c:727:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n = strlen(filename);
data/infernal-1.1.3/easel/esl_ssi.c:861:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n = strlen(key)+1;
data/infernal-1.1.3/easel/esl_ssi.c:940:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n = strlen(alias)+1;
data/infernal-1.1.3/easel/esl_ssi.c:1088:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(ns->ptmpfile) > 256 || strlen(ns->ptmpfile) > 256) 
data/infernal-1.1.3/easel/esl_ssi.c:1088:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(ns->ptmpfile) > 256 || strlen(ns->ptmpfile) > 256) 
data/infernal-1.1.3/easel/esl_ssi.c:1134:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(fk, ns->filenames[i], ns->flen);
data/infernal-1.1.3/easel/esl_ssi.c:1148:25:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant character.
      if (ns->nprimary) strncpy(pk, "", ns->plen);
data/infernal-1.1.3/easel/esl_ssi.c:1154:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	  strncpy(pk, pkey.key, ns->plen);   // strncpy() pads w/ nulls, and we count on that behavior.
data/infernal-1.1.3/easel/esl_ssi.c:1166:25:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant character.
      if (ns->nprimary) strncpy(pk, "", ns->plen);
data/infernal-1.1.3/easel/esl_ssi.c:1170:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	  strncpy(pk, ns->pkeys[i].key, ns->plen);
data/infernal-1.1.3/easel/esl_ssi.c:1186:27:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant character.
      if (ns->nsecondary) strncpy(sk, "", ns->slen);
data/infernal-1.1.3/easel/esl_ssi.c:1192:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	  strncpy(sk, skey.key,  ns->slen);  // slen > 0 if there are any secondary keys.
data/infernal-1.1.3/easel/esl_ssi.c:1193:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	  strncpy(pk, skey.pkey, ns->plen);
data/infernal-1.1.3/easel/esl_ssi.c:1203:27:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant character.
      if (ns->nsecondary) strncpy(sk, "", ns->slen);
data/infernal-1.1.3/easel/esl_ssi.c:1207:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	  strncpy(sk, ns->skeys[i].key,  ns->slen);
data/infernal-1.1.3/easel/esl_ssi.c:1208:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	  strncpy(pk, ns->skeys[i].pkey, ns->plen);
data/infernal-1.1.3/easel/esl_stack.c:861:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int        n   = strlen(str);
data/infernal-1.1.3/easel/esl_stack.c:973:7:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
      usleep(esl_rnd_Roll(r, 100)+1); /* 1..100 usec delay */
data/infernal-1.1.3/easel/esl_stack.c:989:7:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
      usleep(esl_rnd_Roll(r, 100)+1); /* 1..100 usec delay */
data/infernal-1.1.3/easel/esl_wuss.c:648:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n = strlen(oldss);
data/infernal-1.1.3/easel/esl_wuss.c:803:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen(ss);
data/infernal-1.1.3/easel/miniapps/cmd_downsample.c:39:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  status = esl_mem_strtoi64(Marg, strlen(Marg), 10, &nc, &M);
data/infernal-1.1.3/easel/miniapps/cmd_downsample.c:40:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (status != eslOK || nc != strlen(Marg)) esl_fatal("First argument is an integer: number of data elements to take from <infile>");
data/infernal-1.1.3/easel/miniapps/esl-alimanip.c:770:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if(amask_len != (int) strlen(amask)) { ESL_FAIL(eslEINVAL, errbuf, "write_rf_given_alen(), passed in mask len (%d) is not equal to actual mask length (%d)\n", amask_len, (int) strlen(amask)); }
data/infernal-1.1.3/easel/miniapps/esl-alimanip.c:770:179:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if(amask_len != (int) strlen(amask)) { ESL_FAIL(eslEINVAL, errbuf, "write_rf_given_alen(), passed in mask len (%d) is not equal to actual mask length (%d)\n", amask_len, (int) strlen(amask)); }
data/infernal-1.1.3/easel/miniapps/esl-alimanip.c:811:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if(mask_for_rf_len != (int) strlen(mask_for_rf)) { ESL_FAIL(eslEINVAL, errbuf, "write_rf_given_rflen(), passed in mask len (%d) is not equal to actual mask length (%d).\n", mask_for_rf_len, (int) strlen(mask_for_rf)); }
data/infernal-1.1.3/easel/miniapps/esl-alimanip.c:811:199:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if(mask_for_rf_len != (int) strlen(mask_for_rf)) { ESL_FAIL(eslEINVAL, errbuf, "write_rf_given_rflen(), passed in mask len (%d) is not equal to actual mask length (%d).\n", mask_for_rf_len, (int) strlen(mask_for_rf)); }
data/infernal-1.1.3/easel/miniapps/esl-alimanip.c:1043:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      uaend   = uastart + strlen(uasubseq) - 1;
data/infernal-1.1.3/easel/miniapps/esl-alimanip.c:1462:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  masklen = strlen(xmask);
data/infernal-1.1.3/easel/miniapps/esl-alimanip.c:2875:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if(strlen(rf) != msa->alen) ESL_FAIL(eslEINCOMPAT, errbuf, "'#=GF %s <RF sequence>' markup is of length %d but it must be equal to aln length (%" PRId64 ").", msa->gf_tag[f], (int) strlen(rf), msa->alen);
data/infernal-1.1.3/easel/miniapps/esl-alimanip.c:2875:183:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if(strlen(rf) != msa->alen) ESL_FAIL(eslEINCOMPAT, errbuf, "'#=GF %s <RF sequence>' markup is of length %d but it must be equal to aln length (%" PRId64 ").", msa->gf_tag[f], (int) strlen(rf), msa->alen);
data/infernal-1.1.3/easel/miniapps/esl-alimerge.c:241:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      namewidth = ESL_MAX(namewidth, strlen(tmpstr));
data/infernal-1.1.3/easel/miniapps/esl-alimerge.c:1795:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(s[i]);
data/infernal-1.1.3/easel/miniapps/esl-compalign.c:344:66:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	for(ni = 0; ni < ka->nseq; ni++) namewidth = ESL_MAX(namewidth, strlen(ka->sqname[ni]));
data/infernal-1.1.3/easel/miniapps/esl-construct.c:231:69:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      for(i = 0; i < msa->nseq; i++) namewidth = ESL_MAX(namewidth, strlen(msa->sqname[i]));
data/infernal-1.1.3/easel/miniapps/esl-reformat.c:173:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (gapsym != NULL && strlen(gapsym) != 1)
data/infernal-1.1.3/easel/miniapps/esl-reformat.c:450:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  special = (strlen(newsyms) == 1 ? TRUE : FALSE);
data/infernal-1.1.3/easel/miniapps/esl-reformat.c:691:8:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	      strncpy(aseqbuf, aseq + apos, acpl);
data/infernal-1.1.3/easel/miniapps/esl-reformat.c:918:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  rlen = strlen(rstring);
data/infernal-1.1.3/easel/miniapps/esl-shuffle.c:293:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	    strncpy(targ, sq->seq + pos, L);
data/infernal-1.1.3/easel/miniapps/esl-ssdraw.c:1676:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ESL_ALLOC(text[1], sizeof(char) * (strlen("as the least ambiguous nt that represents >= 1.00") + 1));
data/infernal-1.1.3/easel/miniapps/esl-ssdraw.c:1688:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ESL_ALLOC(text[2], sizeof(char) * (strlen("Capitalized nts occur in >= 1.00 fraction of sequences") + 1));
data/infernal-1.1.3/easel/miniapps/esl-ssdraw.c:1766:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if(((int) strlen(text)) <= max_chars_per_line) {
data/infernal-1.1.3/easel/miniapps/esl-ssdraw.c:1771:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  else if(((int) strlen(text)) > ((2 * max_chars_per_line) - 6)) { 
data/infernal-1.1.3/easel/miniapps/esl-ssdraw.c:1776:119:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ESL_FAIL(eslEINVAL, errbuf, "add_text_to_scheme_colorlegend(), text is %d chars, max allowed is %d (%s)\n", (int) strlen(text), ((2 * max_chars_per_line) - 6), text);
data/infernal-1.1.3/easel/miniapps/esl-ssdraw.c:1790:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int len = (int) strlen(text);
data/infernal-1.1.3/easel/miniapps/esl-ssdraw.c:1817:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if(((int) strlen(text)) > (max_chars_per_line)) { 
data/infernal-1.1.3/easel/miniapps/esl-ssdraw.c:1818:120:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ESL_FAIL(eslEINVAL, errbuf, "add_text_to_onecell_colorlegend(), text is %d chars, max allowed is %d (%s)\n", (int) strlen(text), max_chars_per_line, text);
data/infernal-1.1.3/easel/miniapps/esl-ssdraw.c:1887:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int textlen = (int) strlen(text);
data/infernal-1.1.3/easel/miniapps/esl-ssdraw.c:1967:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  mask_file_len = (int) strlen(ps->mask);
data/infernal-1.1.3/easel/miniapps/esl-ssdraw.c:1968:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  maskdiff_file_len = (int) strlen(maskdiff_file);
data/infernal-1.1.3/easel/miniapps/esl-ssdraw.c:2145:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if(occl->celltext == NULL || (strlen(occl->celltext) > 0)) { 
data/infernal-1.1.3/easel/miniapps/esl-ssdraw.c:3460:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      namewidth = ESL_MAX(namewidth, strlen(msa->sqname[i]));
data/infernal-1.1.3/easel/miniapps/esl-ssdraw.c:5338:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if((strlen(mask_file) + strlen(mask_desc)) > (ps->desc_max_chars*2 - 2)) { /* desc would be too long, shorten mask_file so desc is legal */
data/infernal-1.1.3/easel/miniapps/esl-ssdraw.c:5338:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if((strlen(mask_file) + strlen(mask_desc)) > (ps->desc_max_chars*2 - 2)) { /* desc would be too long, shorten mask_file so desc is legal */
data/infernal-1.1.3/easel/miniapps/esl-ssdraw.c:5340:84:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if((status = esl_strcat(&(mask_desc), -1, mask_file, ((ps->desc_max_chars*2) - strlen(mask_desc) - 5))) != eslOK) ESL_FAIL(status, errbuf, "error copying mask file name string");
data/infernal-1.1.3/easel/miniapps/esl-ssdraw.c:6181:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    model_width = ESL_MAX(strlen("model"), (int) strlen(ps->modelname));
data/infernal-1.1.3/easel/miniapps/esl-ssdraw.c:6181:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    model_width = ESL_MAX(strlen("model"), (int) strlen(ps->modelname));
data/infernal-1.1.3/easel/miniapps/esl-ssdraw.c:6238:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      desc_width = ESL_MAX((int) strlen(desc_string), (int) strlen(ps->descA[page]));
data/infernal-1.1.3/easel/miniapps/esl-ssdraw.c:6238:61:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      desc_width = ESL_MAX((int) strlen(desc_string), (int) strlen(ps->descA[page]));
data/infernal-1.1.3/easel/miniapps/esl-ssdraw.c:6952:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if(strlen(desc) > (ps->desc_max_chars*2.)) esl_fatal("Error reading --dfile, description length (%d) exceeds max allowed (%d)", strlen(desc), (ps->desc_max_chars*2));
data/infernal-1.1.3/easel/miniapps/esl-ssdraw.c:6952:130:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if(strlen(desc) > (ps->desc_max_chars*2.)) esl_fatal("Error reading --dfile, description length (%d) exceeds max allowed (%d)", strlen(desc), (ps->desc_max_chars*2));
data/infernal-1.1.3/easel/miniapps/esl-ssdraw.c:6961:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if(strlen(legheader) > ps->legx_max_chars) esl_fatal("Error reading --dfile, legend header length (%d) exceeds max allowed (%d)", strlen(legheader), ps->legx_max_chars);
data/infernal-1.1.3/easel/miniapps/esl-ssdraw.c:6961:132:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if(strlen(legheader) > ps->legx_max_chars) esl_fatal("Error reading --dfile, legend header length (%d) exceeds max allowed (%d)", strlen(legheader), ps->legx_max_chars);
data/infernal-1.1.3/easel/miniapps/esl-ssdraw.c:7101:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  if(((int) strlen(s)) != 1) esl_fatal("Read multi-character string (%s) for consensus nucleotide %d on line %d of expertfile %s\n", s, cpos, efp->linenumber, efile);
data/infernal-1.1.3/hmmer/profmark/rocplot.c:290:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int qlen = strlen(query);
data/infernal-1.1.3/hmmer/profmark/rocplot.c:291:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int tlen = strlen(target);
data/infernal-1.1.3/hmmer/src/cachedb.c:119:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  i = strlen(ptr);
data/infernal-1.1.3/hmmer/src/cachedb_shard.c:127:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  i = strlen(ptr);
data/infernal-1.1.3/hmmer/src/cachedb_shard.c:404:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  i = strlen(ptr);
data/infernal-1.1.3/hmmer/src/generic_viterbi.c:451:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int             L    = strlen(targ);
data/infernal-1.1.3/hmmer/src/hmmc2.c:301:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        int n = strlen(buffer);
data/infernal-1.1.3/hmmer/src/hmmc2.c:327:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      n = strlen(seq);
data/infernal-1.1.3/hmmer/src/hmmc2.c:412:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        n = strlen(seq);
data/infernal-1.1.3/hmmer/src/hmmdmstr.c:1094:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if ((n = read(data->sock_fd, ptr, remaining)) < 0) {
data/infernal-1.1.3/hmmer/src/hmmdmstr.c:1193:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      status = esl_sqio_Parse(ptr, strlen(ptr), seq, eslSQFILE_DAEMON);
data/infernal-1.1.3/hmmer/src/hmmdmstr.c:1203:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      status = p7_hmmfile_OpenBuffer(ptr, strlen(ptr), &hfp);
data/infernal-1.1.3/hmmer/src/hmmdmstr.c:1231:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n = n + strlen(opt_str) + 1;
data/infernal-1.1.3/hmmer/src/hmmdmstr.c:1234:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = n + strlen(seq->name) + 1;
data/infernal-1.1.3/hmmer/src/hmmdmstr.c:1235:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = n + strlen(seq->desc) + 1;
data/infernal-1.1.3/hmmer/src/hmmdmstr.c:1242:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (hmm->name   != NULL)    n = n + strlen(hmm->name) + 1;
data/infernal-1.1.3/hmmer/src/hmmdmstr.c:1243:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (hmm->acc    != NULL)    n = n + strlen(hmm->acc)  + 1;
data/infernal-1.1.3/hmmer/src/hmmdmstr.c:1244:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (hmm->desc   != NULL)    n = n + strlen(hmm->desc) + 1;
data/infernal-1.1.3/hmmer/src/hmmdmstr.c:1258:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  cmd->srch.opts_length = strlen(opt_str) + 1;
data/infernal-1.1.3/hmmer/src/hmmdmstr.c:1269:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(seq->name) + 1;
data/infernal-1.1.3/hmmer/src/hmmdmstr.c:1273:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(seq->desc) + 1;
data/infernal-1.1.3/hmmer/src/hmmdmstr.c:1298:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (hmm->name) { n = strlen(hmm->name) + 1;  memcpy(ptr, hmm->name, n);  ptr += n; }
data/infernal-1.1.3/hmmer/src/hmmdmstr.c:1299:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (hmm->acc)  { n = strlen(hmm->acc)  + 1;  memcpy(ptr, hmm->acc, n);   ptr += n; }
data/infernal-1.1.3/hmmer/src/hmmdmstr.c:1300:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (hmm->desc) { n = strlen(hmm->desc) + 1;  memcpy(ptr, hmm->desc, n);  ptr += n; }
data/infernal-1.1.3/hmmer/src/hmmdmstr.c:1418:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(targs->ip_addr, inet_ntoa(addr.sin_addr), addrlen);
data/infernal-1.1.3/hmmer/src/hmmdmstr.c:1684:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (parent->seq_db != NULL) n += strlen(parent->seq_db->name) + 1;
data/infernal-1.1.3/hmmer/src/hmmdmstr.c:1685:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (parent->hmm_db != NULL) n += strlen(parent->hmm_db->name) + 1;
data/infernal-1.1.3/hmmer/src/hmmdmstr.c:1704:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(cmd->init.sid, parent->seq_db->id, sizeof(cmd->init.sid));
data/infernal-1.1.3/hmmer/src/hmmdmstr.c:1708:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      p += strlen(parent->seq_db->name) + 1;
data/infernal-1.1.3/hmmer/src/hmmdmstr.c:1720:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      p += strlen(parent->hmm_db->name) + 1;
data/infernal-1.1.3/hmmer/src/hmmdmstr.c:1850:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(worker->ip_addr, inet_ntoa(addr.sin_addr), addrlen);
data/infernal-1.1.3/hmmer/src/hmmdmstr_shard.c:1133:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if ((n = read(data->sock_fd, ptr, remaining)) < 0) {
data/infernal-1.1.3/hmmer/src/hmmdmstr_shard.c:1232:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      status = esl_sqio_Parse(ptr, strlen(ptr), seq, eslSQFILE_DAEMON);
data/infernal-1.1.3/hmmer/src/hmmdmstr_shard.c:1242:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      status = p7_hmmfile_OpenBuffer(ptr, strlen(ptr), &hfp);
data/infernal-1.1.3/hmmer/src/hmmdmstr_shard.c:1270:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n = n + strlen(opt_str) + 1;
data/infernal-1.1.3/hmmer/src/hmmdmstr_shard.c:1273:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = n + strlen(seq->name) + 1;
data/infernal-1.1.3/hmmer/src/hmmdmstr_shard.c:1274:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = n + strlen(seq->desc) + 1;
data/infernal-1.1.3/hmmer/src/hmmdmstr_shard.c:1281:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (hmm->name   != NULL)    n = n + strlen(hmm->name) + 1;
data/infernal-1.1.3/hmmer/src/hmmdmstr_shard.c:1282:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (hmm->acc    != NULL)    n = n + strlen(hmm->acc)  + 1;
data/infernal-1.1.3/hmmer/src/hmmdmstr_shard.c:1283:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (hmm->desc   != NULL)    n = n + strlen(hmm->desc) + 1;
data/infernal-1.1.3/hmmer/src/hmmdmstr_shard.c:1297:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  cmd->srch.opts_length = strlen(opt_str) + 1;
data/infernal-1.1.3/hmmer/src/hmmdmstr_shard.c:1308:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(seq->name) + 1;
data/infernal-1.1.3/hmmer/src/hmmdmstr_shard.c:1312:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(seq->desc) + 1;
data/infernal-1.1.3/hmmer/src/hmmdmstr_shard.c:1337:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (hmm->name) { n = strlen(hmm->name) + 1;  memcpy(ptr, hmm->name, n);  ptr += n; }
data/infernal-1.1.3/hmmer/src/hmmdmstr_shard.c:1338:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (hmm->acc)  { n = strlen(hmm->acc)  + 1;  memcpy(ptr, hmm->acc, n);   ptr += n; }
data/infernal-1.1.3/hmmer/src/hmmdmstr_shard.c:1339:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (hmm->desc) { n = strlen(hmm->desc) + 1;  memcpy(ptr, hmm->desc, n);  ptr += n; }
data/infernal-1.1.3/hmmer/src/hmmdmstr_shard.c:1457:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(targs->ip_addr, inet_ntoa(addr.sin_addr), addrlen);
data/infernal-1.1.3/hmmer/src/hmmdmstr_shard.c:1724:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (parent->seq_db != NULL) n += strlen(parent->seq_db->name) + 1;
data/infernal-1.1.3/hmmer/src/hmmdmstr_shard.c:1725:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (parent->hmm_db != NULL) n += strlen(parent->hmm_db->name) + 1;
data/infernal-1.1.3/hmmer/src/hmmdmstr_shard.c:1744:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(cmd->init.sid, parent->seq_db->id, sizeof(cmd->init.sid));
data/infernal-1.1.3/hmmer/src/hmmdmstr_shard.c:1748:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      p += strlen(parent->seq_db->name) + 1;
data/infernal-1.1.3/hmmer/src/hmmdmstr_shard.c:1762:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      p += strlen(parent->hmm_db->name) + 1;
data/infernal-1.1.3/hmmer/src/hmmdmstr_shard.c:1888:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(worker->ip_addr, inet_ntoa(addr.sin_addr), addrlen);
data/infernal-1.1.3/hmmer/src/hmmdutils.c:147:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if ((bytes = read(fd, ptr, remaining)) <= 0) {
data/infernal-1.1.3/hmmer/src/hmmdwrkr.c:391:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    desc = name + strlen(name) + 1;
data/infernal-1.1.3/hmmer/src/hmmdwrkr.c:392:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    dsq  = (ESL_DSQ *) (desc + strlen(desc) + 1);
data/infernal-1.1.3/hmmer/src/hmmdwrkr.c:426:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (thmm.name) { hmm->name = strdup(p); p += strlen(hmm->name) + 1; }
data/infernal-1.1.3/hmmer/src/hmmdwrkr.c:427:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (thmm.acc)  { hmm->acc  = strdup(p); p += strlen(hmm->acc)  + 1; }
data/infernal-1.1.3/hmmer/src/hmmdwrkr.c:428:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (thmm.desc) { hmm->desc = strdup(p); p += strlen(hmm->desc) + 1; }
data/infernal-1.1.3/hmmer/src/hmmdwrkr_shard.c:418:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    desc = name + strlen(name) + 1;
data/infernal-1.1.3/hmmer/src/hmmdwrkr_shard.c:419:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    dsq  = (ESL_DSQ *) (desc + strlen(desc) + 1);
data/infernal-1.1.3/hmmer/src/hmmdwrkr_shard.c:453:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (thmm.name) { hmm->name = strdup(p); p += strlen(hmm->name) + 1; }
data/infernal-1.1.3/hmmer/src/hmmdwrkr_shard.c:454:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (thmm.acc)  { hmm->acc  = strdup(p); p += strlen(hmm->acc)  + 1; }
data/infernal-1.1.3/hmmer/src/hmmdwrkr_shard.c:455:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (thmm.desc) { hmm->desc = strdup(p); p += strlen(hmm->desc) + 1; }
data/infernal-1.1.3/hmmer/src/impl_sse/io.c:93:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int n    = strlen(om->name);
data/infernal-1.1.3/hmmer/src/impl_sse/io.c:132:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(om->acc);
data/infernal-1.1.3/hmmer/src/impl_sse/io.c:141:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(om->desc);
data/infernal-1.1.3/hmmer/src/impl_sse/mpi.c:155:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (om->name      != NULL) len += strlen(om->name)      + 1;
data/infernal-1.1.3/hmmer/src/impl_sse/mpi.c:156:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (om->acc       != NULL) len += strlen(om->acc)       + 1;
data/infernal-1.1.3/hmmer/src/impl_sse/mpi.c:157:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (om->desc      != NULL) len += strlen(om->desc)      + 1;
data/infernal-1.1.3/hmmer/src/impl_sse/mpi.c:158:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (om->rf        != NULL) len += strlen(om->rf)        + 1;
data/infernal-1.1.3/hmmer/src/impl_sse/mpi.c:159:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (om->mm        != NULL) len += strlen(om->mm)        + 1;
data/infernal-1.1.3/hmmer/src/impl_sse/mpi.c:160:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (om->cs        != NULL) len += strlen(om->cs)        + 1;
data/infernal-1.1.3/hmmer/src/impl_sse/mpi.c:161:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (om->consensus != NULL) len += strlen(om->consensus) + 1;
data/infernal-1.1.3/hmmer/src/impl_sse/mpi.c:259:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = (om->name != NULL)      ? strlen(om->name)+1 : 0;
data/infernal-1.1.3/hmmer/src/impl_sse/mpi.c:263:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = (om->acc != NULL)       ? strlen(om->acc)+1 : 0;
data/infernal-1.1.3/hmmer/src/impl_sse/mpi.c:267:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = (om->desc != NULL)      ? strlen(om->desc)+1 : 0;
data/infernal-1.1.3/hmmer/src/impl_sse/mpi.c:271:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = (om->rf != NULL)        ? strlen(om->rf)+1 : 0;
data/infernal-1.1.3/hmmer/src/impl_sse/mpi.c:275:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = (om->mm != NULL)        ? strlen(om->mm)+1 : 0;
data/infernal-1.1.3/hmmer/src/impl_sse/mpi.c:279:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = (om->cs != NULL)        ? strlen(om->cs)+1 : 0;
data/infernal-1.1.3/hmmer/src/impl_sse/mpi.c:283:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = (om->consensus != NULL) ? strlen(om->consensus)+1 : 0;
data/infernal-1.1.3/hmmer/src/impl_vmx/io.c:98:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int n   = strlen(om->name);
data/infernal-1.1.3/hmmer/src/impl_vmx/io.c:134:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(om->acc);
data/infernal-1.1.3/hmmer/src/impl_vmx/io.c:143:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(om->desc);
data/infernal-1.1.3/hmmer/src/impl_vmx/mpi.c:156:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (om->name      != NULL) len += strlen(om->name)      + 1;
data/infernal-1.1.3/hmmer/src/impl_vmx/mpi.c:157:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (om->acc       != NULL) len += strlen(om->acc)       + 1;
data/infernal-1.1.3/hmmer/src/impl_vmx/mpi.c:158:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (om->desc      != NULL) len += strlen(om->desc)      + 1;
data/infernal-1.1.3/hmmer/src/impl_vmx/mpi.c:159:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (om->rf        != NULL) len += strlen(om->rf)        + 1;
data/infernal-1.1.3/hmmer/src/impl_vmx/mpi.c:160:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (om->mm        != NULL) len += strlen(om->mm)        + 1;
data/infernal-1.1.3/hmmer/src/impl_vmx/mpi.c:161:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (om->cs        != NULL) len += strlen(om->cs)        + 1;
data/infernal-1.1.3/hmmer/src/impl_vmx/mpi.c:162:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (om->consensus != NULL) len += strlen(om->consensus) + 1;
data/infernal-1.1.3/hmmer/src/impl_vmx/mpi.c:260:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = (om->name != NULL)      ? strlen(om->name)+1 : 0;
data/infernal-1.1.3/hmmer/src/impl_vmx/mpi.c:264:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = (om->acc != NULL)       ? strlen(om->acc)+1 : 0;
data/infernal-1.1.3/hmmer/src/impl_vmx/mpi.c:268:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = (om->desc != NULL)      ? strlen(om->desc)+1 : 0;
data/infernal-1.1.3/hmmer/src/impl_vmx/mpi.c:272:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = (om->rf != NULL)        ? strlen(om->rf)+1 : 0;
data/infernal-1.1.3/hmmer/src/impl_vmx/mpi.c:276:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = (om->mm != NULL)        ? strlen(om->mm)+1 : 0;
data/infernal-1.1.3/hmmer/src/impl_vmx/mpi.c:280:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = (om->cs != NULL)        ? strlen(om->cs)+1 : 0;
data/infernal-1.1.3/hmmer/src/impl_vmx/mpi.c:284:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = (om->consensus != NULL) ? strlen(om->consensus)+1 : 0;
data/infernal-1.1.3/hmmer/src/makehmmerdb.c:134:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  length = strlen(sq->name);
data/infernal-1.1.3/hmmer/src/makehmmerdb.c:138:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  length = strlen(sq->acc);
data/infernal-1.1.3/hmmer/src/makehmmerdb.c:142:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  length = strlen(sq->source);
data/infernal-1.1.3/hmmer/src/makehmmerdb.c:146:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  length = strlen(sq->desc);
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:139:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  hmm_namelen = strlen(om->name);                           n += hmm_namelen + 1;
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:140:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  hmm_acclen  = (om->acc  != NULL ? strlen(om->acc)  : 0);  n += hmm_acclen  + 1;
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:141:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  hmm_desclen = (om->desc != NULL ? strlen(om->desc) : 0);  n += hmm_desclen + 1;
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:143:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  sq_namelen  = strlen(sq->name);                           n += sq_namelen  + 1;	  
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:144:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  sq_acclen   = strlen(sq->acc);                            n += sq_acclen   + 1; /* sq->acc is "\0" when unset */
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:145:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  sq_desclen  = strlen(sq->desc);                           n += sq_desclen  + 1; /* same for desc              */
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:425:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n += 1 + strlen(ad->hmmname);	  
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:426:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n += 1 + strlen(ad->hmmacc);	  /* optional acc, desc fields: when not present, just "" ("\0") */
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:427:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n += 1 + strlen(ad->hmmdesc);
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:428:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n += 1 + strlen(ad->sqname);
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:429:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n += 1 + strlen(ad->sqacc);  
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:430:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n += 1 + strlen(ad->sqdesc); 
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:522:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  hmmname_length = strlen(obj->hmmname);
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:525:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  hmmacc_length = strlen(obj->hmmacc);   
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:528:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  hmmdesc_length = strlen(obj->hmmdesc);
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:531:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  sqname_length = strlen(obj->sqname);
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:534:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  sqacc_length = strlen(obj->sqacc);
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:537:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  sqdesc_length = strlen(obj->sqdesc);
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:786:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    string_length = strlen(ret_obj->rfline);
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:796:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    string_length = strlen(ret_obj->mmline);
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:806:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    string_length = strlen(ret_obj->csline);
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:816:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  string_length = strlen(ret_obj->model);
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:821:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  string_length = strlen(ret_obj->mline);
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:827:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    string_length = strlen(ret_obj->aseq);
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:837:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    string_length = strlen(ret_obj->ntseq);
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:847:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    string_length = strlen(ret_obj->ppline);
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:856:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  string_length = strlen(ret_obj->hmmname);
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:861:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  string_length = strlen(ret_obj->hmmacc);
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:866:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  string_length = strlen(ret_obj->hmmdesc);
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:871:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  string_length = strlen(ret_obj->sqname);
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:876:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  string_length = strlen(ret_obj->sqacc);
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:881:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  string_length = strlen(ret_obj->sqdesc);
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:935:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n = 1 + strlen(ad->hmmname);  memcpy(ad->mem + pos, ad->hmmname, n); free(ad->hmmname); ad->hmmname = ad->mem+pos; pos += n;
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:936:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n = 1 + strlen(ad->hmmacc);   memcpy(ad->mem + pos, ad->hmmacc,  n); free(ad->hmmacc);  ad->hmmacc  = ad->mem+pos; pos += n;
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:937:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n = 1 + strlen(ad->hmmdesc);  memcpy(ad->mem + pos, ad->hmmdesc, n); free(ad->hmmdesc); ad->hmmdesc = ad->mem+pos; pos += n;
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:938:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n = 1 + strlen(ad->sqname);   memcpy(ad->mem + pos, ad->sqname,  n); free(ad->sqname);  ad->sqname  = ad->mem+pos; pos += n;
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:939:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n = 1 + strlen(ad->sqacc);    memcpy(ad->mem + pos, ad->sqacc,   n); free(ad->sqacc);   ad->sqacc   = ad->mem+pos; pos += n;
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:940:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n = 1 + strlen(ad->sqdesc);   memcpy(ad->mem + pos, ad->sqdesc,  n); free(ad->sqdesc);  ad->sqdesc  = ad->mem+pos; pos += n;
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:984:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n = 1 + strlen(ad->mem+pos);  ESL_ALLOC(ad->hmmname,  sizeof(char) * n); memcpy(ad->hmmname,  ad->mem+pos, n); pos += n;
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:985:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n = 1 + strlen(ad->mem+pos);  ESL_ALLOC(ad->hmmacc,   sizeof(char) * n); memcpy(ad->hmmacc,   ad->mem+pos, n); pos += n;
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:986:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n = 1 + strlen(ad->mem+pos);  ESL_ALLOC(ad->hmmdesc,  sizeof(char) * n); memcpy(ad->hmmdesc,  ad->mem+pos, n); pos += n;
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:987:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n = 1 + strlen(ad->mem+pos);  ESL_ALLOC(ad->sqname,   sizeof(char) * n); memcpy(ad->sqname,   ad->mem+pos, n); pos += n;
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:988:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n = 1 + strlen(ad->mem+pos);  ESL_ALLOC(ad->sqacc,    sizeof(char) * n); memcpy(ad->sqacc,    ad->mem+pos, n); pos += n;
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:989:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n = 1 + strlen(ad->mem+pos);  ESL_ALLOC(ad->sqdesc,   sizeof(char) * n); memcpy(ad->sqdesc,   ad->mem+pos, n); pos += n;
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:1009:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n = 1 + strlen(ad->hmmname);  if (ad->hmmname != ad->mem+pos) { free(ad->hmmname); ad->hmmname = ad->mem+pos; }  pos += n;
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:1010:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n = 1 + strlen(ad->hmmacc);   if (ad->hmmacc  != ad->mem+pos) { free(ad->hmmacc);  ad->hmmacc  = ad->mem+pos; }  pos += n;
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:1011:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n = 1 + strlen(ad->hmmname);  if (ad->hmmdesc != ad->mem+pos) { free(ad->hmmdesc); ad->hmmdesc = ad->mem+pos; }  pos += n;
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:1012:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n = 1 + strlen(ad->sqname);   if (ad->sqname  != ad->mem+pos) { free(ad->sqname);  ad->sqname = ad->mem+pos;  }  pos += n;
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:1013:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n = 1 + strlen(ad->sqacc);    if (ad->sqacc   != ad->mem+pos) { free(ad->sqacc);   ad->sqacc  = ad->mem+pos;  }  pos += n;
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:1014:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n = 1 + strlen(ad->sqname);   if (ad->sqdesc  != ad->mem+pos) { free(ad->sqdesc);  ad->sqdesc = ad->mem+pos;  }  pos += n;
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:1181:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  namewidth  = ESL_MAX(strlen(show_hmmname), strlen(show_seqname));
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:1181:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  namewidth  = ESL_MAX(strlen(show_hmmname), strlen(show_seqname));
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:1209:33:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      if (ad->csline != NULL) { strncpy(buf, ad->csline+pos, aliwidth); if (fprintf(fp, "  %*s %s CS\n", namewidth+coordwidth+1, "", buf) < 0) ESL_XEXCEPTION_SYS(eslEWRITE, "alignment display write failed"); } 
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:1210:33:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      if (ad->rfline != NULL) { strncpy(buf, ad->rfline+pos, aliwidth); if (fprintf(fp, "  %*s %s RF\n", namewidth+coordwidth+1, "", buf) < 0) ESL_XEXCEPTION_SYS(eslEWRITE, "alignment display write failed"); } 
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:1211:33:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      if (ad->mmline != NULL) { strncpy(buf, ad->mmline+pos, aliwidth); if (fprintf(fp, "  %*s %s MM\n", namewidth+coordwidth+1, "", buf) < 0) ESL_XEXCEPTION_SYS(eslEWRITE, "alignment display write failed"); }
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:1213:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(buf, ad->model+pos, aliwidth); if (fprintf(fp, "  %*s %*d %s %-*d\n", namewidth,  show_hmmname, coordwidth, k1, buf, coordwidth, k2) < 0) ESL_XEXCEPTION_SYS(eslEWRITE, "alignment display write failed"); 
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:1214:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(buf, ad->mline+pos, aliwidth); if (fprintf(fp, "  %*s %s\n", namewidth+coordwidth+1, " ", buf)                                       < 0) ESL_XEXCEPTION_SYS(eslEWRITE, "alignment display write failed"); 
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:1216:21:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      if (ni > 0) { strncpy(buf, ad->aseq+pos, aliwidth); if (fprintf(fp, "  %*s %*ld %s %-*ld\n", namewidth, show_seqname, coordwidth, i1,  buf, coordwidth, i2)  < 0) ESL_XEXCEPTION_SYS(eslEWRITE, "alignment display write failed");  }
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:1217:21:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      else        { strncpy(buf, ad->aseq+pos, aliwidth); if (fprintf(fp, "  %*s %*s %s %*s\n",    namewidth, show_seqname, coordwidth, "-", buf, coordwidth, "-") < 0) ESL_XEXCEPTION_SYS(eslEWRITE, "alignment display write failed");  }
data/infernal-1.1.3/hmmer/src/p7_alidisplay.c:1219:34:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      if (ad->ppline != NULL)  { strncpy(buf, ad->ppline+pos, aliwidth);  if (fprintf(fp, "  %*s %s PP\n", namewidth+coordwidth+1, "", buf)  < 0) ESL_XEXCEPTION_SYS(eslEWRITE, "alignment display write failed");  }
data/infernal-1.1.3/hmmer/src/p7_hit.c:178:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  name_size = strlen(obj->name) +1;
data/infernal-1.1.3/hmmer/src/p7_hit.c:182:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    acc_size = strlen(obj->acc) + 1;
data/infernal-1.1.3/hmmer/src/p7_hit.c:191:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    desc_size = strlen(obj->desc) + 1;
data/infernal-1.1.3/hmmer/src/p7_hit.c:514:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  string_length = strlen((char *) ptr) +1;
data/infernal-1.1.3/hmmer/src/p7_hit.c:530:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    string_length = strlen((char *) ptr) +1;
data/infernal-1.1.3/hmmer/src/p7_hit.c:547:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    string_length = strlen((char *) ptr) +1;
data/infernal-1.1.3/hmmer/src/p7_hmm.c:414:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(name);
data/infernal-1.1.3/hmmer/src/p7_hmm.c:452:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(acc);
data/infernal-1.1.3/hmmer/src/p7_hmm.c:485:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      n = strlen(desc);
data/infernal-1.1.3/hmmer/src/p7_hmm.c:519:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n += strlen(argv[i]);
data/infernal-1.1.3/hmmer/src/p7_hmm.c:522:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n += strlen(hmm->comlog) + 1; /* +1 for the \n we're going to add to the old comlog */
data/infernal-1.1.3/hmmer/src/p7_hmm.c:524:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(hmm->comlog, "\n");
data/infernal-1.1.3/hmmer/src/p7_hmm.c:533:7:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      strcat(hmm->comlog, " ");
data/infernal-1.1.3/hmmer/src/p7_hmm.c:1282:62:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (hmm->flags & p7H_RF)   { if (hmm->rf == NULL        || strlen(hmm->rf)        != hmm->M+1) ESL_XFAIL(eslFAIL, errbuf, "p7H_RF flag up, but rf string is invalid");            }
data/infernal-1.1.3/hmmer/src/p7_hmm.c:1285:63:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (hmm->flags & p7H_MMASK) { if (hmm->mm == NULL        || strlen(hmm->mm)        != hmm->M+1) ESL_XFAIL(eslFAIL, errbuf, "p7H_MMASK flag up, but mm string is invalid");            }
data/infernal-1.1.3/hmmer/src/p7_hmm.c:1288:62:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (hmm->flags & p7H_CONS) { if (hmm->consensus == NULL || strlen(hmm->consensus) != hmm->M+1) ESL_XFAIL(eslFAIL, errbuf, "p7H_CONS flag up, but consensus string is invalid");   } 
data/infernal-1.1.3/hmmer/src/p7_hmm.c:1291:62:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (hmm->flags & p7H_CS)   { if (hmm->cs == NULL        || strlen(hmm->cs)        != hmm->M+1) ESL_XFAIL(eslFAIL, errbuf, "p7H_CS flag up, but cs string is invalid");   }
data/infernal-1.1.3/hmmer/src/p7_hmm.c:1294:62:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (hmm->flags & p7H_CA)   { if (hmm->ca == NULL        || strlen(hmm->ca)        != hmm->M+1) ESL_XFAIL(eslFAIL, errbuf, "p7H_CA flag up, but ca string is invalid");   }
data/infernal-1.1.3/hmmer/src/p7_hmmcache.c:82:28:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  if (status != eslEOF)  { strncpy(errbuf, hfp->errbuf, eslERRBUFSIZE); goto ERROR; }
data/infernal-1.1.3/hmmer/src/p7_hmmcache.c:106:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n += sizeof(char) * (strlen(cache->name) + 1);
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:284:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int         n       = strlen(filename);
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:342:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      n = strlen(envfile);
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:399:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(hfp->fname);   /* so, n = '\0', n-1 = 'm'  */
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:722:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size =  50 + strlen(HMMER_VERSION) +  strlen(HMMER_DATE);                                                 /* HMMER version text */
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:722:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size =  50 + strlen(HMMER_VERSION) +  strlen(HMMER_DATE);                                                 /* HMMER version text */
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:723:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size += 7 + strlen(hmm->name);                                                                            /* NAME line */
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:724:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size += (hmm->acc ?  ( 7 + strlen(hmm->acc)) : 0);                                                        /* ACC line, if present */
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:725:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size += (hmm->desc ?  ( 7 + strlen(hmm->desc)) : 0);                                                      /* DESC line, if present */
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:728:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size += 7 + strlen( esl_abc_DecodeType(hmm->abc->type));                                                  /*ALPH tag */
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:734:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size += (hmm->ctime != NULL ? (7 + strlen(hmm->ctime)) : 0);                                              /*DATE line*/
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:746:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size += strlen(hmm->comlog);
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:912:16:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
  if((offset = sprintf(ret_hmm + coffset, "\n"))                                < 0) return eslEWRITE;
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:926:17:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
   if((offset = sprintf(ret_hmm + coffset, "\n"))                               < 0) return eslEWRITE;
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:938:16:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
  if((offset = sprintf(ret_hmm + coffset, "\n"))                                < 0) return eslEWRITE;
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:948:16:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
  if((offset = sprintf(ret_hmm + coffset, "\n"))                                < 0) return eslEWRITE;
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:1003:19:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
    if ((offset = sprintf(ret_hmm + coffset, "\n")) < 0) return eslEWRITE;
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:2119:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(*ret_str + *coffset, sptr, sizeof(char) * n); /* using strncpy lets us write fixed # of chars   */
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:2121:21:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
      if ((offset = sprintf(*ret_str + *coffset, "\n"))        < 0)              return eslEWRITE;
data/infernal-1.1.3/hmmer/src/p7_hmmfile.c:2187:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len = strlen(s) + 1;
data/infernal-1.1.3/hmmer/src/p7_tophits.c:536:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      n   = strlen(h->unsrt[i].name);
data/infernal-1.1.3/hmmer/src/p7_tophits.c:555:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      n   = strlen(h->unsrt[i].acc);
data/infernal-1.1.3/hmmer/src/p7_tophits.c:579:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      n   = strlen(h->unsrt[i].acc);
data/infernal-1.1.3/hmmer/src/p7_tophits.c:584:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      n   = strlen(h->unsrt[i].name);
data/infernal-1.1.3/hmmer/src/p7_tophits.c:1236:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    namew    = strlen(th->hit[h]->acc);
data/infernal-1.1.3/hmmer/src/p7_tophits.c:1241:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    namew = strlen(th->hit[h]->name);
data/infernal-1.1.3/hmmer/src/p7_tophits.c:1553:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int qnamew = ESL_MAX(20, strlen(qname));
data/infernal-1.1.3/hmmer/src/p7_tophits.c:1555:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int qaccw  = ((qacc != NULL) ? ESL_MAX(10, strlen(qacc)) : 10);
data/infernal-1.1.3/hmmer/src/p7_tophits.c:1658:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int qnamew = ESL_MAX(20, strlen(qname));
data/infernal-1.1.3/hmmer/src/p7_tophits.c:1660:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int qaccw  = (qacc ? ESL_MAX(10, strlen(qacc)) : 10);
data/infernal-1.1.3/hmmer/src/p7_tophits.c:1762:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int         qnamew     = ESL_MAX(20, strlen(qname));
data/infernal-1.1.3/hmmer/src/p7_tophits.c:2187:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (p7_tophits_GetMaxNameLength(h3) != strlen(name)) esl_fatal("GetMaxNameLength() failed");
data/infernal-1.1.3/hmmer/src/seqmodel.c:242:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int           L       = strlen(seq);
data/infernal-1.1.3/rmark/rmark-rocplot.c:344:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int qlen = strlen(query);
data/infernal-1.1.3/rmark/rmark-rocplot.c:345:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int tlen = strlen(target);
data/infernal-1.1.3/src/alphabet.c:390:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      i = (int) ((float)(strlen(s)) * esl_random(r));
data/infernal-1.1.3/src/alphabet.c:391:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    } while (i<0 || i>=strlen(s));
data/infernal-1.1.3/src/cm.c:2593:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(name);
data/infernal-1.1.3/src/cm.c:2631:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(acc);
data/infernal-1.1.3/src/cm.c:2664:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      n = strlen(desc);
data/infernal-1.1.3/src/cm.c:2771:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n += strlen(argv[i]);
data/infernal-1.1.3/src/cm.c:2783:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n += strlen(cm->comlog) + 1; /* +1 for the \n we're going to add to the old comlog */
data/infernal-1.1.3/src/cm.c:2785:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(cm->comlog, "\n");
data/infernal-1.1.3/src/cm.c:2794:7:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      strcat(cm->comlog, " ");
data/infernal-1.1.3/src/cm.c:3256:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if(cm->comlog  != NULL) bytes += sizeof(char) * strlen(cm->comlog);
data/infernal-1.1.3/src/cm.c:3257:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if(cm->ctime   != NULL) bytes += sizeof(char) * strlen(cm->ctime);
data/infernal-1.1.3/src/cm.c:3291:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if(cm->name       != NULL) bytes += sizeof(char)  * (strlen(cm->name) + 2);
data/infernal-1.1.3/src/cm.c:3292:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if(cm->acc        != NULL) bytes += sizeof(char)  * (strlen(cm->acc) + 2);
data/infernal-1.1.3/src/cm.c:3293:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if(cm->desc       != NULL) bytes += sizeof(char)  * (strlen(cm->desc) + 2);
data/infernal-1.1.3/src/cm.c:3294:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if(cm->rf         != NULL) bytes += sizeof(char)  * (strlen(cm->rf) + 2);
data/infernal-1.1.3/src/cm.c:3295:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if(cm->consensus  != NULL) bytes += sizeof(char)  * (strlen(cm->consensus) + 2);
data/infernal-1.1.3/src/cm_alidisplay.c:246:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  cm_namelen = strlen(cm->name);                           n += cm_namelen + 1;
data/infernal-1.1.3/src/cm_alidisplay.c:247:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  cm_acclen  = (cm->acc  != NULL ? strlen(cm->acc)  : 0);  n += cm_acclen  + 1; 
data/infernal-1.1.3/src/cm_alidisplay.c:248:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  cm_desclen = (cm->desc != NULL ? strlen(cm->desc) : 0);  n += cm_desclen + 1; 
data/infernal-1.1.3/src/cm_alidisplay.c:249:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  sq_namelen = strlen(sq->name);                           n += sq_namelen + 1;
data/infernal-1.1.3/src/cm_alidisplay.c:250:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  sq_acclen  = strlen(sq->acc);                            n += sq_acclen  + 1; /* sq->acc is "\0" when unset */
data/infernal-1.1.3/src/cm_alidisplay.c:251:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  sq_desclen = strlen(sq->desc);                           n += sq_desclen + 1; /* sq->desc is "\0" when unset */
data/infernal-1.1.3/src/cm_alidisplay.c:686:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  cm_namelen = strlen(cm->name);                           n += cm_namelen + 1;
data/infernal-1.1.3/src/cm_alidisplay.c:687:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  cm_acclen  = (cm->acc  != NULL ? strlen(cm->acc)  : 0);  n += cm_acclen  + 1; 
data/infernal-1.1.3/src/cm_alidisplay.c:688:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  cm_desclen = (cm->desc != NULL ? strlen(cm->desc) : 0);  n += cm_desclen + 1; 
data/infernal-1.1.3/src/cm_alidisplay.c:689:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  sq_namelen = strlen(sq->name);                           n += sq_namelen + 1;
data/infernal-1.1.3/src/cm_alidisplay.c:690:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  sq_acclen  = strlen(sq->acc);                            n += sq_acclen  + 1; /* sq->acc is "\0" when unset */
data/infernal-1.1.3/src/cm_alidisplay.c:691:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  sq_desclen = strlen(sq->desc);                           n += sq_desclen + 1; /* sq->desc is "\0" when unset */
data/infernal-1.1.3/src/cm_alidisplay.c:925:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n += 1 + strlen(ad->cmname);	  
data/infernal-1.1.3/src/cm_alidisplay.c:926:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n += 1 + strlen(ad->cmacc);	/* optional acc, desc fields: when not present, just "" ("\0") */
data/infernal-1.1.3/src/cm_alidisplay.c:927:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n += 1 + strlen(ad->cmdesc);
data/infernal-1.1.3/src/cm_alidisplay.c:928:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n += 1 + strlen(ad->sqname);
data/infernal-1.1.3/src/cm_alidisplay.c:929:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n += 1 + strlen(ad->sqacc);  
data/infernal-1.1.3/src/cm_alidisplay.c:930:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n += 1 + strlen(ad->sqdesc); 
data/infernal-1.1.3/src/cm_alidisplay.c:1171:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  namewidth  = ESL_MAX(strlen(show_cmname), strlen(show_seqname));
data/infernal-1.1.3/src/cm_alidisplay.c:1171:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  namewidth  = ESL_MAX(strlen(show_cmname), strlen(show_seqname));
data/infernal-1.1.3/src/cm_alidisplay.c:1237:33:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      if (ad->ncline != NULL) { strncpy(buf, ad->ncline+pos,  cur_aliwidth); fprintf(fp, "  %*s %s %*sNC\n", namewidth+coordwidth+1, "", buf, aliwidth-cur_aliwidth, ""); }
data/infernal-1.1.3/src/cm_alidisplay.c:1238:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(buf, ad->csline+pos, cur_aliwidth); fprintf(fp, "  %*s %s %*sCS\n", namewidth+coordwidth+1, "", buf, aliwidth-cur_aliwidth, "");
data/infernal-1.1.3/src/cm_alidisplay.c:1239:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(buf, ad->model+pos,  cur_aliwidth); fprintf(fp, "  %*s %*d %s %*s%-*d\n", namewidth,  show_cmname, coordwidth, k1, buf, aliwidth-cur_aliwidth, "", coordwidth, k2);
data/infernal-1.1.3/src/cm_alidisplay.c:1240:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(buf, ad->mline+pos,  cur_aliwidth); fprintf(fp, "  %*s %s\n", namewidth+coordwidth+1, " ", buf);
data/infernal-1.1.3/src/cm_alidisplay.c:1241:21:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      if (ni > 0) { strncpy(buf, ad->aseq+pos, cur_aliwidth); fprintf(fp, "  %*s %*ld %s %*s%-*ld\n", namewidth, show_seqname, coordwidth, i1,  buf, aliwidth-cur_aliwidth, "", coordwidth, i2);  }
data/infernal-1.1.3/src/cm_alidisplay.c:1242:21:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      else        { strncpy(buf, ad->aseq+pos, cur_aliwidth); fprintf(fp, "  %*s %*s %s %*s%*s\n",    namewidth, show_seqname, coordwidth, "-", buf, aliwidth-cur_aliwidth, "", coordwidth, "-"); }
data/infernal-1.1.3/src/cm_alidisplay.c:1243:33:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      if (ad->ppline != NULL) { strncpy(buf, ad->ppline+pos, cur_aliwidth); fprintf(fp, "  %*s %s %*sPP\n", namewidth+coordwidth+1, "", buf, aliwidth-cur_aliwidth, ""); }
data/infernal-1.1.3/src/cm_alidisplay.c:1244:33:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      if (ad->rfline != NULL) { strncpy(buf, ad->rfline+pos, cur_aliwidth); fprintf(fp, "  %*s %s %*sRF\n", namewidth+coordwidth+1, "", buf, aliwidth-cur_aliwidth, ""); }
data/infernal-1.1.3/src/cm_file.c:263:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int         n       = strlen(filename);
data/infernal-1.1.3/src/cm_file.c:327:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  n = strlen(envfile);
data/infernal-1.1.3/src/cm_file.c:425:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      n = strlen(cmfp->fname); 	/* so, n = '\0', n-1 = 'm'  */
data/infernal-1.1.3/src/cm_file.c:922:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len = strlen(s) + 1;
data/infernal-1.1.3/src/cm_file.c:3349:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((strncmp(s, "0x", 2) == 0 && (int) strlen(s) > 2) ||
data/infernal-1.1.3/src/cm_file.c:3350:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      (strncmp(s, "0X", 2) == 0 && (int) strlen(s) > 2))
data/infernal-1.1.3/src/cm_file.c:3355:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  else if (*s == '0' && (int) strlen(s) > 1)
data/infernal-1.1.3/src/cm_file.c:3476:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ESL_ALLOC(comlog2print, sizeof(char) * (strlen(cm->comlog)+1));
data/infernal-1.1.3/src/cm_file.c:3478:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    while(x < strlen(cm->comlog) && cm->comlog[x] != '\n') { comlog2print[x] = cm->comlog[x]; x++; }
data/infernal-1.1.3/src/cm_parsetree.c:1171:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ESL_ALLOC(msa->au, sizeof(char) * (strlen(INFERNAL_VERSION)+10));
data/infernal-1.1.3/src/cm_tophits.c:660:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      max = ESL_MAX(max, strlen(h->unsrt[i].name));
data/infernal-1.1.3/src/cm_tophits.c:681:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      max = ESL_MAX(max, strlen(h->unsrt[i].desc));
data/infernal-1.1.3/src/cm_tophits.c:702:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      n   = strlen(h->unsrt[i].acc);
data/infernal-1.1.3/src/cm_tophits.c:728:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      n   = strlen(h->unsrt[i].acc);
data/infernal-1.1.3/src/cm_tophits.c:733:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      n   = strlen(h->unsrt[i].name);
data/infernal-1.1.3/src/cm_tophits.c:767:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    strlen(esl_keyhash_Get(clan_name_kh, h->unsrt[i].clan_idx)));
data/infernal-1.1.3/src/cm_tophits.c:1693:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	namew    = strlen(th->hit[h]->acc);
data/infernal-1.1.3/src/cm_tophits.c:1697:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	namew = strlen(th->hit[h]->name);
data/infernal-1.1.3/src/cm_tophits.c:2234:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int qnamew = ESL_MAX(20, strlen(qname));
data/infernal-1.1.3/src/cm_tophits.c:2235:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int qaccw  = ((qacc != NULL) ? ESL_MAX(9, strlen(qacc)) : 9);
data/infernal-1.1.3/src/cm_tophits.c:2339:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int qnamew = ESL_MAX(20, strlen(qname));
data/infernal-1.1.3/src/cm_tophits.c:2340:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int qaccw  = ((qacc != NULL) ? ESL_MAX(9, strlen(qacc)) : 9);
data/infernal-1.1.3/src/cm_tophits.c:3621:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (cm_tophits_GetMaxNameLength(h1) != strlen(name)) esl_fatal("GetMaxNameLength() failed");
data/infernal-1.1.3/src/cmalign.c:1959:69:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for(i = first_idx; i < ndata; i++) namewidth = ESL_MAX(namewidth, strlen(dataA[i]->sq->name));
data/infernal-1.1.3/src/cmbuild.c:2384:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ESL_ALLOC(map, sizeof(int) * strlen(aseq));
data/infernal-1.1.3/src/cmbuild.c:2387:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for (i = 0; i < strlen(aseq); i++)
data/infernal-1.1.3/src/cmbuild.c:2653:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ndigits  = strlen(cmsa[m]->name);
data/infernal-1.1.3/src/cmcalibrate.c:1495:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ESL_ALLOC(cfg->tmpfile, (sizeof(char) * (strlen(cfg->cmfile) + 5)));
data/infernal-1.1.3/src/cmcalibrate.c:1958:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int           namelen = strlen("irrelevant");
data/infernal-1.1.3/src/cmcalibrate.c:2239:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  seq_reqmb += N * sizeof(char) * strlen("irrelevant");
data/infernal-1.1.3/src/cmemit.c:336:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  namelen = IntMaxDigits() + strlen("sample") + 1;  /* IntMaxDigits() returns number of digits in INT_MAX */
data/infernal-1.1.3/src/cmemit.c:337:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if(cm->name != NULL) namelen += strlen(cm->name) + 1;
data/infernal-1.1.3/src/cmemit.c:505:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  namelen = IntMaxDigits() + strlen("sample") + 1;  /* IntMaxDigits() returns number of digits in INT_MAX */
data/infernal-1.1.3/src/cmemit.c:506:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if(cm->name != NULL) namelen += strlen(cm->name) + 1;
data/infernal-1.1.3/src/cmscan.c:2709:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(src_sq->name)+1;
data/infernal-1.1.3/src/cmscan.c:2717:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(src_sq->desc)+1;
data/infernal-1.1.3/src/cmscan.c:2725:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(src_sq->acc)+1;
data/infernal-1.1.3/src/cmsearch.c:2209:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ESL_ALLOC(tmp_filename, sizeof(char) * (strlen((*dbfp_ptr)->filename) + 1));
data/infernal-1.1.3/src/cp9_modelmaker.c:2551:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (alen != strlen(ss))
data/infernal-1.1.3/src/cp9_trace.c:1268:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ESL_ALLOC(msa->au, sizeof(char) * (strlen(INFERNAL_VERSION)+10));
data/infernal-1.1.3/src/display.c:535:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(buf, ali->rf+pos, linewidth);
data/infernal-1.1.3/src/display.c:539:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(buf, ali->top+pos, linewidth);  
data/infernal-1.1.3/src/display.c:543:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(buf, ali->cstr+pos, linewidth);  
data/infernal-1.1.3/src/display.c:547:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(buf, ali->cseq+pos, linewidth);  
data/infernal-1.1.3/src/display.c:554:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(buf, ali->mid+pos,  linewidth);  
data/infernal-1.1.3/src/display.c:558:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(buf, ali->aseq+pos, linewidth);  
data/infernal-1.1.3/src/display.c:575:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(buf, ali->pcode+pos, linewidth);  
data/infernal-1.1.3/src/impl_sse/sse_cmcons_mscyk.c:38:12:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
   __m128i umask;	/* underflow mask */
data/infernal-1.1.3/src/impl_sse/sse_cmcons_mscyk.c:53:33:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
   ret_v = _mm_and_si128(ret_v, umask);		/* underflow mask zeroes sum if an operand was zero (0 = -infty) */
data/infernal-1.1.3/src/impl_sse/sse_cmcons_mscyk.c:158:14:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
  __m128i    umask;		/* underflow mask */
data/infernal-1.1.3/src/impl_sse/sse_cmcons_mscyk.c:500:76:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
              vec_ntM_v[jp_v][v][d] = _mm_and_si128(vec_ntM_v[jp_v][v][d], umask);
data/infernal-1.1.3/src/impl_sse/sse_cmsearch.c:197:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(cmfile) - 3 < length) length = strlen(cmfile) - 3;
data/infernal-1.1.3/src/impl_sse/sse_cmsearch.c:197:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(cmfile) - 3 < length) length = strlen(cmfile) - 3;
data/infernal-1.1.3/src/impl_sse/sse_cmsearch.c:198:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(fname,&cmfile[strlen(cmfile)-(length+4)],length);
data/infernal-1.1.3/src/impl_sse/sse_cmsearch.c:198:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    strncpy(fname,&cmfile[strlen(cmfile)-(length+4)],length);
data/infernal-1.1.3/src/rnamat.c:499:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy (fullbuf+fullbuf_used, linebuf, 16384-fullbuf_used-1);
data/infernal-1.1.3/src/rnamat.c:500:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    fullbuf_used += strlen(linebuf);
data/infernal-1.1.3/src/rnamat.c:510:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy (fullmat->name, cp, i);
data/infernal-1.1.3/src/stats.c:41:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int namewidth = strlen(cm->name); 
data/infernal-1.1.3/src/stats.c:183:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    namewidth = ESL_MAX(namewidth, strlen(sq->name));

ANALYSIS SUMMARY:

Hits = 2622
Lines analyzed = 355208 in approximately 21.46 seconds (16550 lines/second)
Physical Source Lines of Code (SLOC) = 219559
Hits@level = [0] 6930 [1] 610 [2] 1655 [3]   9 [4] 347 [5]   1
Hits@level+ = [0+] 9552 [1+] 2622 [2+] 2012 [3+] 357 [4+] 348 [5+]   1
Hits/KSLOC@level+ = [0+] 43.5054 [1+] 11.9421 [2+] 9.16382 [3+] 1.62599 [4+] 1.585 [5+] 0.00455458
Symlinks skipped = 1 (--allowlink overrides but see doc for security issue)
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.