Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/jfsutils-1.1.15/fsck/dirindex.c
Examining data/jfsutils-1.1.15/fsck/fsck_message.c
Examining data/jfsutils-1.1.15/fsck/fsckbmap.c
Examining data/jfsutils-1.1.15/fsck/fsckconn.c
Examining data/jfsutils-1.1.15/fsck/fsckdire.c
Examining data/jfsutils-1.1.15/fsck/fsckdtre.c
Examining data/jfsutils-1.1.15/fsck/fsckea.c
Examining data/jfsutils-1.1.15/fsck/fsckimap.c
Examining data/jfsutils-1.1.15/fsck/fsckino.c
Examining data/jfsutils-1.1.15/fsck/fsckmeta.c
Examining data/jfsutils-1.1.15/fsck/fsckpfs.c
Examining data/jfsutils-1.1.15/fsck/fsckpfs.h
Examining data/jfsutils-1.1.15/fsck/fsckruns.c
Examining data/jfsutils-1.1.15/fsck/fsckwsp.c
Examining data/jfsutils-1.1.15/fsck/fsckxtre.c
Examining data/jfsutils-1.1.15/fsck/xchkdsk.c
Examining data/jfsutils-1.1.15/fsck/xchkdsk.h
Examining data/jfsutils-1.1.15/fsck/xfsck.h
Examining data/jfsutils-1.1.15/fsck/xfsckint.h
Examining data/jfsutils-1.1.15/fscklog/jfs_fscklog.h
Examining data/jfsutils-1.1.15/fscklog/extract.c
Examining data/jfsutils-1.1.15/fscklog/fscklog.c
Examining data/jfsutils-1.1.15/fscklog/display.c
Examining data/jfsutils-1.1.15/include/jfs_btree.h
Examining data/jfsutils-1.1.15/include/jfs_byteorder.h
Examining data/jfsutils-1.1.15/include/jfs_dinode.h
Examining data/jfsutils-1.1.15/include/jfs_dmap.h
Examining data/jfsutils-1.1.15/include/jfs_dtree.h
Examining data/jfsutils-1.1.15/include/jfs_filsys.h
Examining data/jfsutils-1.1.15/include/jfs_imap.h
Examining data/jfsutils-1.1.15/include/jfs_logmgr.h
Examining data/jfsutils-1.1.15/include/jfs_superblock.h
Examining data/jfsutils-1.1.15/include/jfs_types.h
Examining data/jfsutils-1.1.15/include/jfs_unicode.h
Examining data/jfsutils-1.1.15/include/jfs_version.h
Examining data/jfsutils-1.1.15/include/jfs_xtree.h
Examining data/jfsutils-1.1.15/libfs/debug.h
Examining data/jfsutils-1.1.15/libfs/devices.h
Examining data/jfsutils-1.1.15/libfs/diskmap.c
Examining data/jfsutils-1.1.15/libfs/diskmap.h
Examining data/jfsutils-1.1.15/libfs/fsck_base.h
Examining data/jfsutils-1.1.15/libfs/fsck_message.h
Examining data/jfsutils-1.1.15/libfs/fsckcbbl.h
Examining data/jfsutils-1.1.15/libfs/fscklog.h
Examining data/jfsutils-1.1.15/libfs/fsckmsgdef.c
Examining data/jfsutils-1.1.15/libfs/fsckwsp.h
Examining data/jfsutils-1.1.15/libfs/fssubs.c
Examining data/jfsutils-1.1.15/libfs/inode.c
Examining data/jfsutils-1.1.15/libfs/inode.h
Examining data/jfsutils-1.1.15/libfs/jfs_endian.c
Examining data/jfsutils-1.1.15/libfs/jfs_endian.h
Examining data/jfsutils-1.1.15/libfs/libjufs.h
Examining data/jfsutils-1.1.15/libfs/log_dump.c
Examining data/jfsutils-1.1.15/libfs/log_map.c
Examining data/jfsutils-1.1.15/libfs/log_read.c
Examining data/jfsutils-1.1.15/libfs/logform.c
Examining data/jfsutils-1.1.15/libfs/logform.h
Examining data/jfsutils-1.1.15/libfs/logredo.h
Examining data/jfsutils-1.1.15/libfs/message.c
Examining data/jfsutils-1.1.15/libfs/message.h
Examining data/jfsutils-1.1.15/libfs/open_by_label.c
Examining data/jfsutils-1.1.15/libfs/super.c
Examining data/jfsutils-1.1.15/libfs/super.h
Examining data/jfsutils-1.1.15/libfs/unicode_to_utf8.c
Examining data/jfsutils-1.1.15/libfs/unicode_to_utf8.h
Examining data/jfsutils-1.1.15/libfs/uniupr.c
Examining data/jfsutils-1.1.15/libfs/utilsubs.c
Examining data/jfsutils-1.1.15/libfs/utilsubs.h
Examining data/jfsutils-1.1.15/libfs/log_work.c
Examining data/jfsutils-1.1.15/libfs/devices.c
Examining data/jfsutils-1.1.15/libfs/logredo.c
Examining data/jfsutils-1.1.15/logdump/logdump.c
Examining data/jfsutils-1.1.15/logdump/helpers.c
Examining data/jfsutils-1.1.15/mkfs/initmap.c
Examining data/jfsutils-1.1.15/mkfs/initmap.h
Examining data/jfsutils-1.1.15/mkfs/inodemap.c
Examining data/jfsutils-1.1.15/mkfs/inodemap.h
Examining data/jfsutils-1.1.15/mkfs/inodes.c
Examining data/jfsutils-1.1.15/mkfs/inodes.h
Examining data/jfsutils-1.1.15/mkfs/mkfs.c
Examining data/jfsutils-1.1.15/tune/super.c
Examining data/jfsutils-1.1.15/tune/tune.c
Examining data/jfsutils-1.1.15/xpeek/alter.c
Examining data/jfsutils-1.1.15/xpeek/directory.c
Examining data/jfsutils-1.1.15/xpeek/display.c
Examining data/jfsutils-1.1.15/xpeek/dmap.c
Examining data/jfsutils-1.1.15/xpeek/fsckcbbl.c
Examining data/jfsutils-1.1.15/xpeek/help.c
Examining data/jfsutils-1.1.15/xpeek/iag.c
Examining data/jfsutils-1.1.15/xpeek/inode.c
Examining data/jfsutils-1.1.15/xpeek/io.c
Examining data/jfsutils-1.1.15/xpeek/super.c
Examining data/jfsutils-1.1.15/xpeek/super2.c
Examining data/jfsutils-1.1.15/xpeek/ui.c
Examining data/jfsutils-1.1.15/xpeek/xpeek.c
Examining data/jfsutils-1.1.15/xpeek/xpeek.h

FINAL RESULTS:

data/jfsutils-1.1.15/fsck/fsck_message.c:99:2:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	vsnprintf(msg_string, sizeof(msg_string), message->msg_txt, args);
data/jfsutils-1.1.15/fsck/fsck_message.c:102:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(debug_detail, " [%s:%d]\n", basename(file_name), line_number);
data/jfsutils-1.1.15/fsck/fsckdtre.c:3906:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
					sprintf(ino_name, "%s%06d%s",
data/jfsutils-1.1.15/fsck/fsckdtre.c:3911:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
					sprintf(ino_name, "%s%06d%s",
data/jfsutils-1.1.15/fscklog/extract.c:659:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(msg, msg_txt);
data/jfsutils-1.1.15/fscklog/fscklog.c:250:2:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	vsnprintf(msg_string, sizeof(msg_string), message->msg_txt, args);
data/jfsutils-1.1.15/fscklog/fscklog.c:253:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(debug_detail, " [%s:%d]\n", basename(file_name), line_number);
data/jfsutils-1.1.15/libfs/debug.h:25:23:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define DBG_TRACE(a) {printf a; fflush(stdout);}
data/jfsutils-1.1.15/libfs/debug.h:31:20:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define DBG_IO(a) {printf a; fflush(stderr);}
data/jfsutils-1.1.15/libfs/debug.h:37:23:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define DBG_ERROR(a) {printf a; fflush(stdout);}
data/jfsutils-1.1.15/libfs/open_by_label.c:129:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(path, lv_ent->d_name);
data/jfsutils-1.1.15/libfs/open_by_label.c:191:8:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
			if (sscanf(line, " %*d %*d %*d %*s %*s %s", device)
data/jfsutils-1.1.15/libfs/open_by_label.c:198:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					strcpy(dev, device);
data/jfsutils-1.1.15/libfs/open_by_label.c:217:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(dev, device);
data/jfsutils-1.1.15/libfs/open_by_label.c:232:8:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
			if (sscanf(line, "%s : active %1s", part_name, tmp) != 2)
data/jfsutils-1.1.15/libfs/open_by_label.c:235:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(device, "/dev/%s", part_name);
data/jfsutils-1.1.15/libfs/open_by_label.c:240:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					strcpy(dev, device);
data/jfsutils-1.1.15/libfs/open_by_label.c:253:8:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
			if (sscanf(line, " %*d %*d %d %s", &size, part_name) != 2)
data/jfsutils-1.1.15/libfs/open_by_label.c:257:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(device, "/dev/%s", part_name);
data/jfsutils-1.1.15/libfs/open_by_label.c:262:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					strcpy(dev, device);
data/jfsutils-1.1.15/libfs/open_by_label.c:276:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(lv_dirname, "/proc/lvm/VGs/%s/LVs", vg_ent->d_name);
data/jfsutils-1.1.15/libfs/open_by_label.c:284:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(device, "/dev/%s/%s", vg_ent->d_name, lv_ent->d_name);
data/jfsutils-1.1.15/libfs/open_by_label.c:289:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
						strcpy(dev, device);
data/jfsutils-1.1.15/logdump/helpers.c:93:2:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	vsnprintf(msg_string, sizeof(msg_string), message->msg_txt, args);
data/jfsutils-1.1.15/logdump/helpers.c:96:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(debug_detail, " [%s:%d]\n", file_name, line_number);
data/jfsutils-1.1.15/mkfs/mkfs.c:618:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(journal_device, ((char *) opts + 7));
data/jfsutils-1.1.15/mkfs/mkfs.c:713:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(logdev, optarg);
data/jfsutils-1.1.15/mkfs/mkfs.c:776:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(logdev, argv[optind]);
data/jfsutils-1.1.15/mkfs/mkfs.c:882:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(msgstr, MINJFSTEXT);
data/jfsutils-1.1.15/mkfs/mkfs.c:903:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(msgstr, MINJFSTEXT);
data/jfsutils-1.1.15/tune/tune.c:95:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(logdev, ((char *) opts + 7));
data/jfsutils-1.1.15/fsck/xchkdsk.c:1683:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, short_opts, long_opts, NULL))
data/jfsutils-1.1.15/fscklog/fscklog.c:173:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt(argc, argv, "de:f:pV")) != EOF) {
data/jfsutils-1.1.15/mkfs/mkfs.c:695:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt(argc, argv, "cj:J:fL:Oqs:V")) != EOF) {
data/jfsutils-1.1.15/tune/tune.c:133:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt(argc, argv, "J:lL:U:V")) != EOF) {
data/jfsutils-1.1.15/fsck/fsck_message.c:29:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char log_entry[max_log_entry_length];
data/jfsutils-1.1.15/fsck/fsck_message.c:69:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((void *) buf_entry_ptr, (void *) hdptr, entry_length);
data/jfsutils-1.1.15/fsck/fsck_message.c:94:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg_string[max_log_entry_length - 4];
data/jfsutils-1.1.15/fsck/fsck_message.c:95:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char debug_detail[100];
data/jfsutils-1.1.15/fsck/fsckbmap.c:883:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *) &(bmap_recptr->eyecatcher), (void *) "bmaprecd", 8);
data/jfsutils-1.1.15/fsck/fsckbmap.c:884:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *) &(bmap_recptr->bmpctlinf_eyecatcher),
data/jfsutils-1.1.15/fsck/fsckbmap.c:886:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *) &(bmap_recptr->AGinf_eyecatcher), (void *) "AG info ",
data/jfsutils-1.1.15/fsck/fsckbmap.c:888:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *) &(bmap_recptr->dmapinf_eyecatcher), (void *) "dmapinfo",
data/jfsutils-1.1.15/fsck/fsckbmap.c:890:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *) &(bmap_recptr->L0inf_eyecatcher), (void *) "L0 info ",
data/jfsutils-1.1.15/fsck/fsckbmap.c:892:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *) &(bmap_recptr->L1inf_eyecatcher), (void *) "L1 info ",
data/jfsutils-1.1.15/fsck/fsckbmap.c:894:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *) &(bmap_recptr->L2inf_eyecatcher), (void *) "L2 info ",
data/jfsutils-1.1.15/fsck/fsckdire.c:175:9:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define bcopy(source, dest, count)	memcpy(dest, source, count)
data/jfsutils-1.1.15/fsck/fsckdire.c:175:36:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define bcopy(source, dest, count)	memcpy(dest, source, count)
data/jfsutils-1.1.15/fsck/fsckdire.c:1051:2:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	bcopy(sp->header.stbl, stbl, sp->header.nextindex);
data/jfsutils-1.1.15/fsck/fsckdire.c:1055:2:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	bcopy(&sp->slot[1], &rp->slot[1], IDATASIZE);
data/jfsutils-1.1.15/fsck/fsckdire.c:1942:4:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			bcopy(slh, dlh, 6 + len * 2);
data/jfsutils-1.1.15/fsck/fsckdire.c:1958:4:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			bcopy(sih, dih, 10 + len * 2);
data/jfsutils-1.1.15/fsck/fsckdtre.c:480:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((void *) &(found_name[*found_name_length]),
data/jfsutils-1.1.15/fsck/fsckdtre.c:506:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((void *) &(found_name[*found_name_length]),
data/jfsutils-1.1.15/fsck/fsckdtre.c:1490:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((void *) &(key_space[*key_length]),
data/jfsutils-1.1.15/fsck/fsckdtre.c:1611:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((void *) &(key_space[*key_length]),
data/jfsutils-1.1.15/fsck/fsckdtre.c:1747:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((void *) &(key_space[*key_length]),
data/jfsutils-1.1.15/fsck/fsckdtre.c:2384:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy((void *)
data/jfsutils-1.1.15/fsck/fsckdtre.c:2449:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char message_parm[MAXPARMLEN];
data/jfsutils-1.1.15/fsck/fsckdtre.c:3875:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char inoname[16];
data/jfsutils-1.1.15/fsck/fsckimap.c:760:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *) target_bufptr, (void *) source_bufptr, bytes_wanted);
data/jfsutils-1.1.15/fsck/fsckimap.c:762:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *) &(target_iagptr->inoext[0]),
data/jfsutils-1.1.15/fsck/fsckimap.c:946:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *) target_inoptr, (void *) source_inoptr,
data/jfsutils-1.1.15/fsck/fsckimap.c:950:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((void *) &(target_inoptr->di_ixpxd),
data/jfsutils-1.1.15/fsck/fsckimap.c:1016:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *) primary_bufptr, (void *) agg_recptr->ino_buf_ptr,
data/jfsutils-1.1.15/fsck/fsckimap.c:1235:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *) source_bufptr, (void *) agg_recptr->ino_buf_ptr,
data/jfsutils-1.1.15/fsck/fsckimap.c:1379:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((void *) source_bufptr, (void *) agg_recptr->ino_buf_ptr,
data/jfsutils-1.1.15/fsck/fsckimap.c:1799:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((void *) primary_nodeptr,
data/jfsutils-1.1.15/fsck/fsckimap.c:1803:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((void *) primary_nodeptr, (void *) leaf_node,
data/jfsutils-1.1.15/fsck/fsckimap.c:1820:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((void *) secondary_nodeptr,
data/jfsutils-1.1.15/fsck/fsckimap.c:1824:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((void *) secondary_nodeptr, (void *) leaf_node,
data/jfsutils-1.1.15/fsck/fsckimap.c:1966:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((void *) source_nodeptr,
data/jfsutils-1.1.15/fsck/fsckimap.c:1972:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((void *) source_nodeptr,
data/jfsutils-1.1.15/fsck/fsckimap.c:1995:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((void *) &(target_inoptr->di_btroot),
data/jfsutils-1.1.15/fsck/fsckimap.c:2073:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *) &(iagiptr->iagptr->pmap[0]),
data/jfsutils-1.1.15/fsck/fsckimap.c:2075:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *) &(iagiptr->iagptr->wmap[0]),
data/jfsutils-1.1.15/fsck/fsckimap.c:2080:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *) &(iagiptr->iagptr->extsmap[0]),
data/jfsutils-1.1.15/fsck/fsckimap.c:2082:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *) &(iagiptr->iagptr->inosmap[0]),
data/jfsutils-1.1.15/fsck/fsckimap.c:4022:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&newpage->xad[XTENTRYSTART], &rootpage->xad[XTENTRYSTART],
data/jfsutils-1.1.15/fsck/fsckino.c:744:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((void *) path_ptr, (void *) &Str_Name, Str_Name_len);
data/jfsutils-1.1.15/fsck/fsckino.c:1890:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *) &(agg_recptr->this_inode.eyecatcher),
data/jfsutils-1.1.15/fsck/fsckmeta.c:3505:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *) &(agg_recptr->this_inode.eyecatcher),
data/jfsutils-1.1.15/fsck/fsckmeta.c:3687:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((void *) &(inoptr->di_ixpxd),
data/jfsutils-1.1.15/fsck/fsckmeta.c:3774:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *) &(agg_recptr->this_inode.eyecatcher),
data/jfsutils-1.1.15/fsck/fsckpfs.c:1770:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((void *) (agg_recptr->mapleaf_buf_ptr),
data/jfsutils-1.1.15/fsck/fsckpfs.c:2327:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((void *)&(agg_recptr->ino_ixpxd),
data/jfsutils-1.1.15/fsck/fsckpfs.c:2423:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((void *) &(agg_recptr->ino_ixpxd),
data/jfsutils-1.1.15/fsck/fsckpfs.c:2549:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy((void *)&(agg_recptr->ino_ixpxd),
data/jfsutils-1.1.15/fsck/fsckpfs.c:3196:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	Dev_IOPort = fopen(Device, "r");
data/jfsutils-1.1.15/fsck/fsckpfs.c:3230:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		Dev_IOPort = fopen(Device, "r+");
data/jfsutils-1.1.15/fsck/fsckwsp.c:1044:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((void *) &(agg_recptr->AIT_ext0_tbl->eyecatcher),
data/jfsutils-1.1.15/fsck/fsckwsp.c:1202:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *)&(IAGtbl->eyecatcher), (void *) "FSAITIAG", 8);
data/jfsutils-1.1.15/fsck/fsckwsp.c:1210:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *)&(inoexttbl->eyecatcher), (void *)"FSAITEXT", 8);
data/jfsutils-1.1.15/fsck/fsckwsp.c:1216:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((void *)&(inotbl->eyecatcher), (void *)"FSAITINO", 8);
data/jfsutils-1.1.15/fsck/fsckwsp.c:1502:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(&(agg_recptr->blkmp_ctlptr->hdr.start_time[0]),
data/jfsutils-1.1.15/fsck/fsckwsp.c:2753:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *) &(agg_recptr->eyecatcher), (void *) "fsckagrc", 8);
data/jfsutils-1.1.15/fsck/fsckwsp.c:2754:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *) &(agg_recptr->this_inode.eyecatcher),
data/jfsutils-1.1.15/fsck/fsckwsp.c:2756:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *) &(agg_recptr->agg_imap_eyecatcher), (void *) "agg imap",
data/jfsutils-1.1.15/fsck/fsckwsp.c:2758:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *) &(agg_recptr->fset_imap_eyecatcher),
data/jfsutils-1.1.15/fsck/fsckwsp.c:2760:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *) &(agg_recptr->AIT_eyecatcher), (void *) "agg ITbl", 8);
data/jfsutils-1.1.15/fsck/fsckwsp.c:2761:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *) &(agg_recptr->FSIT_eyecatcher), (void *) "fsetITbl", 8);
data/jfsutils-1.1.15/fsck/fsckwsp.c:2762:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *) &(agg_recptr->flags_eyecatcher), (void *) "aggflags",
data/jfsutils-1.1.15/fsck/fsckwsp.c:2764:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *) &(agg_recptr->fais.eyecatcher), (void *) "faisinfo", 8);
data/jfsutils-1.1.15/fsck/fsckwsp.c:2765:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *) &(agg_recptr->vlarge_info_eyecatcher),
data/jfsutils-1.1.15/fsck/fsckwsp.c:2767:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *) &(agg_recptr->fscklog_info_eyecatcher),
data/jfsutils-1.1.15/fsck/fsckwsp.c:2769:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *) &(agg_recptr->blkmp_info_eyecatcher),
data/jfsutils-1.1.15/fsck/fsckwsp.c:2771:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *) &(agg_recptr->ea_info_eyecatcher), (void *) "eabuffer",
data/jfsutils-1.1.15/fsck/fsckwsp.c:2773:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *) &(agg_recptr->iag_info_eyecatcher), (void *) "iag buf ",
data/jfsutils-1.1.15/fsck/fsckwsp.c:2775:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *) &(agg_recptr->mapctl_info_eyecatcher),
data/jfsutils-1.1.15/fsck/fsckwsp.c:2777:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *) &(agg_recptr->maplf_info_eyecatcher),
data/jfsutils-1.1.15/fsck/fsckwsp.c:2779:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *) &(agg_recptr->bmplv_info_eyecatcher),
data/jfsutils-1.1.15/fsck/fsckwsp.c:2781:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *) &(agg_recptr->bmpdm_info_eyecatcher),
data/jfsutils-1.1.15/fsck/fsckwsp.c:2783:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *) &(agg_recptr->inobuf_info_eyecatcher),
data/jfsutils-1.1.15/fsck/fsckwsp.c:2785:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *) &(agg_recptr->nodbuf_info_eyecatcher),
data/jfsutils-1.1.15/fsck/fsckwsp.c:2787:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *) &(agg_recptr->dnodbuf_info_eyecatcher),
data/jfsutils-1.1.15/fsck/fsckwsp.c:2789:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *) &(agg_recptr->agg_AGTbl_eyecatcher),
data/jfsutils-1.1.15/fsck/fsckwsp.c:2791:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *) &(agg_recptr->fset_AGTbl_eyecatcher),
data/jfsutils-1.1.15/fsck/fsckwsp.c:2793:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *) &(agg_recptr->amap_eyecatcher), (void *) "iagiamap", 8);
data/jfsutils-1.1.15/fsck/fsckwsp.c:2794:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *) &(agg_recptr->fextsumm_eyecatcher), (void *) "fextsumm",
data/jfsutils-1.1.15/fsck/fsckwsp.c:2796:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *) &(agg_recptr->finosumm_eyecatcher), (void *) "finosumm",
data/jfsutils-1.1.15/fsck/fsckwsp.c:3007:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((void *)&(new_inoexttbl->eyecatcher),
data/jfsutils-1.1.15/fsck/fsckwsp.c:3024:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy((void *)&(new_inotbl->eyecatcher),
data/jfsutils-1.1.15/fsck/xchkdsk.c:80:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char time_stamp[20];
data/jfsutils-1.1.15/fsck/xchkdsk.c:94:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char Str_Name[JFS_NAME_MAX];
data/jfsutils-1.1.15/fsck/xchkdsk.c:105:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char log_device[512] = { 0 };
data/jfsutils-1.1.15/fsck/xchkdsk.c:432:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(time_stamp, "%d/%d/%d %d:%02d:%02d",
data/jfsutils-1.1.15/fsck/xchkdsk.c:441:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&agg_recptr->blkmp_ctlptr->hdr.end_time[0],
data/jfsutils-1.1.15/fsck/xchkdsk.c:870:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((void *) &(inoptr->di_ixpxd),
data/jfsutils-1.1.15/fsck/xchkdsk.c:1436:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char message_parm[MAXPARMLEN];
data/jfsutils-1.1.15/fsck/xchkdsk.c:1448:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(message_parm, "%d/%d/%d %d:%02d:%02d",
data/jfsutils-1.1.15/fsck/xchkdsk.c:1812:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	file_p = fopen(device_name, "r");
data/jfsutils-1.1.15/fsck/xfsck.h:166:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char eyecatcher[8];
data/jfsutils-1.1.15/fsck/xfsck.h:171:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char rsvd0[2];
data/jfsutils-1.1.15/fsck/xfsck.h:173:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char bmpctlinf_eyecatcher[8];
data/jfsutils-1.1.15/fsck/xfsck.h:176:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char rsvd1[4];
data/jfsutils-1.1.15/fsck/xfsck.h:178:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char AGinf_eyecatcher[8];
data/jfsutils-1.1.15/fsck/xfsck.h:182:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dmapinf_eyecatcher[8];
data/jfsutils-1.1.15/fsck/xfsck.h:195:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char rsvd2[4];
data/jfsutils-1.1.15/fsck/xfsck.h:197:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char L0inf_eyecatcher[8];
data/jfsutils-1.1.15/fsck/xfsck.h:210:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char rsvd3[4];
data/jfsutils-1.1.15/fsck/xfsck.h:212:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char L1inf_eyecatcher[8];
data/jfsutils-1.1.15/fsck/xfsck.h:225:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char rsvd4[4];
data/jfsutils-1.1.15/fsck/xfsck.h:227:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char L2inf_eyecatcher[8];
data/jfsutils-1.1.15/fsck/xfsck.h:237:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char rsvd5[5];
data/jfsutils-1.1.15/fscklog/display.c:48:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char file_name[128];
data/jfsutils-1.1.15/fscklog/display.c:57:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char xchklog_buffer[XCHKLOG_BUFSIZE];
data/jfsutils-1.1.15/fscklog/display.c:65:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char *msgprms[10];
data/jfsutils-1.1.15/fscklog/display.c:305:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((void *) file_name, (void *) default_logfile_new,
data/jfsutils-1.1.15/fscklog/display.c:308:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((void *) file_name, (void *) default_logfile_old,
data/jfsutils-1.1.15/fscklog/display.c:313:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	infp = fopen(file_name, "r");
data/jfsutils-1.1.15/fscklog/extract.c:46:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char file_name[128];
data/jfsutils-1.1.15/fscklog/extract.c:67:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char fscklog_buffer[FSCKLOG_BUFSIZE];
data/jfsutils-1.1.15/fscklog/extract.c:68:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char xchklog_buffer[XCHKLOG_BUFSIZE];
data/jfsutils-1.1.15/fscklog/extract.c:493:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	Dev_IOPort = fopen(Device, "r");
data/jfsutils-1.1.15/fscklog/extract.c:523:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((void *) file_name, (void *) default_logfile_new,
data/jfsutils-1.1.15/fscklog/extract.c:527:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((void *) file_name, (void *) default_logfile_old,
data/jfsutils-1.1.15/fscklog/extract.c:532:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	outfp = fopen(file_name, "w");
data/jfsutils-1.1.15/fscklog/extract.c:544:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((void *) (local_recptr->outfile_buf_ptr),
data/jfsutils-1.1.15/fscklog/extract.c:652:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char log_entry[4096];
data/jfsutils-1.1.15/fscklog/extract.c:688:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *) local_recptr->last_msghdr, (void *) hdptr,
data/jfsutils-1.1.15/fscklog/fscklog.c:82:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char file_name[128];
data/jfsutils-1.1.15/fscklog/fscklog.c:186:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			file_p = fopen(Vol_Label, "r");
data/jfsutils-1.1.15/fscklog/fscklog.c:245:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg_string[max_log_entry_length - 4];
data/jfsutils-1.1.15/fscklog/fscklog.c:246:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char debug_detail[100];
data/jfsutils-1.1.15/include/jfs_logmgr.h:80:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char label[16];		/* 16: journal label */
data/jfsutils-1.1.15/include/jfs_superblock.h:42:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s_magic[4];	/* 4: magic number */
data/jfsutils-1.1.15/include/jfs_superblock.h:95:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s_fpack[11];	/* 11: file system volume name
data/jfsutils-1.1.15/include/jfs_superblock.h:109:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s_label[16];	/* 16: volume label */
data/jfsutils-1.1.15/include/jfs_unicode.h:34:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern signed char UniUpperTable[512];
data/jfsutils-1.1.15/libfs/fsck_message.h:698:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg_txt[max_msg_txt_length];
data/jfsutils-1.1.15/libfs/fsckcbbl.h:28:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char eyecatcher[8];
data/jfsutils-1.1.15/libfs/fsckcbbl.h:29:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char avail_1[4];	/*   4 */
data/jfsutils-1.1.15/libfs/fsckcbbl.h:60:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char bufptr_eyecatcher[8];
data/jfsutils-1.1.15/libfs/fsckcbbl.h:67:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char avail_2[28];	/*   28 */
data/jfsutils-1.1.15/libfs/fsckwsp.h:107:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char avail_0[896];	/* 896 */
data/jfsutils-1.1.15/libfs/fsckwsp.h:114:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char eyecatcher[8];		/*    8 */
data/jfsutils-1.1.15/libfs/fsckwsp.h:117:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char start_time[20];		/*   20 */
data/jfsutils-1.1.15/libfs/fsckwsp.h:118:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char end_time[20];		/*   20 */
data/jfsutils-1.1.15/libfs/fsckwsp.h:123:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char avail_1[8];		/*    8 */
data/jfsutils-1.1.15/libfs/fsckwsp.h:128:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char avail_2[1];		/*    1 */
data/jfsutils-1.1.15/libfs/fsckwsp.h:130:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char avail_3[32];		/*   32 */
data/jfsutils-1.1.15/libfs/fsckwsp.h:136:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char avail_5[1024];	/* 1024 */
data/jfsutils-1.1.15/libfs/fsckwsp.h:199:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char unused[14];
data/jfsutils-1.1.15/libfs/fsckwsp.h:213:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char unused[2];
data/jfsutils-1.1.15/libfs/fsckwsp.h:329:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char eyecatcher[8];	/* 8.0 */
data/jfsutils-1.1.15/libfs/fsckwsp.h:343:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char eyecatcher[8];	/* 8.0 */
data/jfsutils-1.1.15/libfs/fsckwsp.h:358:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char eyecatcher[8];	/* 8.0 */
data/jfsutils-1.1.15/libfs/fsckwsp.h:371:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char avail[2];
data/jfsutils-1.1.15/libfs/fsckwsp.h:387:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char reserved[12];
data/jfsutils-1.1.15/libfs/fsckwsp.h:395:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char eyecatcher[8];
data/jfsutils-1.1.15/libfs/fsckwsp.h:427:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char aggrec_rsvd0[4];
data/jfsutils-1.1.15/libfs/fsckwsp.h:442:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char aggrec_rsvd2[8];
data/jfsutils-1.1.15/libfs/fsckwsp.h:445:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char eyecatcher[8];
data/jfsutils-1.1.15/libfs/fsckwsp.h:460:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char aggrec_rsvd4[2];
data/jfsutils-1.1.15/libfs/fsckwsp.h:466:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char agg_imap_eyecatcher[8];
data/jfsutils-1.1.15/libfs/fsckwsp.h:469:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fset_imap_eyecatcher[8];
data/jfsutils-1.1.15/libfs/fsckwsp.h:487:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char aggrec_rsvd7[2];	/* pad to quadword boundary		*/
data/jfsutils-1.1.15/libfs/fsckwsp.h:489:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char aggrec_rsvd8[7];	/* pad to quadword boundary		*/
data/jfsutils-1.1.15/libfs/fsckwsp.h:490:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char flags_eyecatcher[8];
data/jfsutils-1.1.15/libfs/fsckwsp.h:563:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char aggrec_rsvda[4];	/* pad to quadword boundary */
data/jfsutils-1.1.15/libfs/fsckwsp.h:565:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char AIT_eyecatcher[8];	/*                                 */
data/jfsutils-1.1.15/libfs/fsckwsp.h:569:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char FSIT_eyecatcher[8];
data/jfsutils-1.1.15/libfs/fsckwsp.h:578:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char eyecatcher[8];
data/jfsutils-1.1.15/libfs/fsckwsp.h:594:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char aggrec_rsvde[4];	/* pad to quadword boundary */
data/jfsutils-1.1.15/libfs/fsckwsp.h:625:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char vlarge_info_eyecatcher[8];
data/jfsutils-1.1.15/libfs/fsckwsp.h:629:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char aggrec_rsvdf[4];	/* pad to quadword boundary      */
data/jfsutils-1.1.15/libfs/fsckwsp.h:635:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fscklog_info_eyecatcher[8];
data/jfsutils-1.1.15/libfs/fsckwsp.h:645:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char aggrec_rsvdg[5];	/* pad to quadword boundary        */
data/jfsutils-1.1.15/libfs/fsckwsp.h:658:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char blkmp_info_eyecatcher[8];
data/jfsutils-1.1.15/libfs/fsckwsp.h:689:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ea_info_eyecatcher[8];
data/jfsutils-1.1.15/libfs/fsckwsp.h:695:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char aggrec_rsvdh[4];	/* pad to quadword boundary        */
data/jfsutils-1.1.15/libfs/fsckwsp.h:710:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char iag_info_eyecatcher[8];
data/jfsutils-1.1.15/libfs/fsckwsp.h:720:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char aggrec_rsvdi[9];	/* pad to quadword boundary        */
data/jfsutils-1.1.15/libfs/fsckwsp.h:726:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mapctl_info_eyecatcher[8];
data/jfsutils-1.1.15/libfs/fsckwsp.h:732:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char aggrec_rsvdk[3];	/* pad to quadword boundary        */
data/jfsutils-1.1.15/libfs/fsckwsp.h:739:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char maplf_info_eyecatcher[8];
data/jfsutils-1.1.15/libfs/fsckwsp.h:747:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char aggrec_rsvdm[1];	/* pad to quadword boundary        */
data/jfsutils-1.1.15/libfs/fsckwsp.h:753:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char bmplv_info_eyecatcher[8];
data/jfsutils-1.1.15/libfs/fsckwsp.h:761:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char aggrec_rsvdo[10];	/* pad to quadword boundary        */
data/jfsutils-1.1.15/libfs/fsckwsp.h:776:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char bmpdm_info_eyecatcher[8];
data/jfsutils-1.1.15/libfs/fsckwsp.h:783:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char aggrec_rsvdq[11];	/* pad to quadword boundary        */
data/jfsutils-1.1.15/libfs/fsckwsp.h:790:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char inobuf_info_eyecatcher[8];
data/jfsutils-1.1.15/libfs/fsckwsp.h:801:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char aggrec_rsvds[1];	/* pad to quadword boundary        */
data/jfsutils-1.1.15/libfs/fsckwsp.h:808:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char nodbuf_info_eyecatcher[8];
data/jfsutils-1.1.15/libfs/fsckwsp.h:814:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char aggrec_rsvdu[3];	/* pad to quadword boundary        */
data/jfsutils-1.1.15/libfs/fsckwsp.h:818:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dnodbuf_info_eyecatcher[8];
data/jfsutils-1.1.15/libfs/fsckwsp.h:824:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char aggrec_rsvduu[3];	/* pad to quadword boundary        */
data/jfsutils-1.1.15/libfs/fsckwsp.h:828:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char agg_AGTbl_eyecatcher[8];
data/jfsutils-1.1.15/libfs/fsckwsp.h:829:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char aggrec_rsvdw[8];	/* pad to quadword boundary    */
data/jfsutils-1.1.15/libfs/fsckwsp.h:832:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fset_AGTbl_eyecatcher[8];
data/jfsutils-1.1.15/libfs/fsckwsp.h:833:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char aggrec_rsvdy[8];	/* pad to quadword boundary    */
data/jfsutils-1.1.15/libfs/fsckwsp.h:837:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char amap_eyecatcher[8];
data/jfsutils-1.1.15/libfs/fsckwsp.h:839:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char aggrec_rsvd00[8];	/* pad to quadword boundary     */
data/jfsutils-1.1.15/libfs/fsckwsp.h:840:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fextsumm_eyecatcher[8];
data/jfsutils-1.1.15/libfs/fsckwsp.h:842:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char aggrec_rsvd02[8];	/* pad to quadword boundary     */
data/jfsutils-1.1.15/libfs/fsckwsp.h:843:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char finosumm_eyecatcher[8];
data/jfsutils-1.1.15/libfs/fssubs.c:75:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(TEST_FILE, O_RDWR | O_CREAT, S_IRWXU);
data/jfsutils-1.1.15/libfs/inode.c:227:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[PSIZE];
data/jfsutils-1.1.15/libfs/log_dump.c:141:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char bytes[PSIZE];
data/jfsutils-1.1.15/libfs/log_dump.c:534:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char block[PSIZE];
data/jfsutils-1.1.15/libfs/log_dump.c:644:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char linebuf[LINESZ + 1];
data/jfsutils-1.1.15/libfs/log_dump.c:645:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char prevbuf[LINESZ + 1];
data/jfsutils-1.1.15/libfs/log_dump.c:1004:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	outfp = fopen(output_filename, "w");
data/jfsutils-1.1.15/libfs/log_map.c:130:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char bytes[PSIZE];
data/jfsutils-1.1.15/libfs/log_map.c:142:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
unsigned char maptab[256] = {
data/jfsutils-1.1.15/libfs/log_map.c:173:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
signed char budtab[256] = {
data/jfsutils-1.1.15/libfs/log_map.c:618:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((void *) &(dmap_bitrec->pmap), (void *) &(dmap_pg->pmap), maplen);
data/jfsutils-1.1.15/libfs/log_map.c:903:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *) &(iag_datarec->pmap), (void *) &(iag_pg->pmap), maplen);
data/jfsutils-1.1.15/libfs/log_map.c:904:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *) &(iag_datarec->inoext), (void *) &(iag_pg->inoext), inoext_arrlen);
data/jfsutils-1.1.15/libfs/log_map.c:1057:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((void *) &(iagp->pmap), (void *) &(iag_datarec->pmap), maplen);
data/jfsutils-1.1.15/libfs/log_map.c:1058:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((void *) &(iagp->inoext),
data/jfsutils-1.1.15/libfs/log_map.c:1397:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy((void *) &(dmap->pmap),
data/jfsutils-1.1.15/libfs/log_work.c:2712:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			  	memcpy(&dip_local, data, size_dinode);
data/jfsutils-1.1.15/libfs/log_work.c:2796:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(buf_ptr, data, seglen);
data/jfsutils-1.1.15/libfs/log_work.c:2882:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy((caddr_t) buf_btroot, data, ln << l2linesize);
data/jfsutils-1.1.15/libfs/log_work.c:2896:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy((caddr_t) buf_ptr, data, delta_len << l2linesize);
data/jfsutils-1.1.15/libfs/log_work.c:2940:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy((caddr_t) buf, data, ln << l2linesize);
data/jfsutils-1.1.15/libfs/log_work.c:2954:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy((caddr_t) buf_ptr, data, delta_len << l2linesize);
data/jfsutils-1.1.15/libfs/log_work.c:2992:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy((caddr_t) buf_ptr, data, linesize);
data/jfsutils-1.1.15/libfs/log_work.c:3030:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
							memcpy((caddr_t)
data/jfsutils-1.1.15/libfs/log_work.c:3066:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
							memcpy((caddr_t)
data/jfsutils-1.1.15/libfs/logform.c:64:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char logpages[4 * LOGPSIZE];
data/jfsutils-1.1.15/libfs/logform.c:74:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *Working[5];
data/jfsutils-1.1.15/libfs/logredo.c:146:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char bytes[PSIZE];
data/jfsutils-1.1.15/libfs/logredo.c:1062:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char block[PSIZE];
data/jfsutils-1.1.15/libfs/logredo.c:1226:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				Log.fp = fopen(log_device, "r");
data/jfsutils-1.1.15/libfs/logredo.c:1455:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *) &temp_pxd, (void *) &(dip1->di_ixpxd), sizeof (pxd_t));
data/jfsutils-1.1.15/libfs/logredo.c:1456:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dip1, dip2, DISIZE);
data/jfsutils-1.1.15/libfs/logredo.c:1457:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *) &(dip1->di_ixpxd), (void *) &temp_pxd, sizeof (pxd_t));
data/jfsutils-1.1.15/libfs/logredo.c:1629:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *) &temp_pxd, (void *) &(dip2->di_ixpxd), sizeof (pxd_t));
data/jfsutils-1.1.15/libfs/logredo.c:1630:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dip2, dip1, DISIZE);
data/jfsutils-1.1.15/libfs/logredo.c:1631:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *) &(dip2->di_ixpxd), (void *) &temp_pxd, sizeof (pxd_t));
data/jfsutils-1.1.15/libfs/logredo.c:1820:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char linebuf[LINESZ + 1];
data/jfsutils-1.1.15/libfs/logredo.c:1821:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char prevbuf[LINESZ + 1];
data/jfsutils-1.1.15/libfs/message.c:27:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char Current_String[MAX_STRING_ACCEPTED + 1];
data/jfsutils-1.1.15/libfs/open_by_label.c:54:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fp = fopen(device, "r");
data/jfsutils-1.1.15/libfs/open_by_label.c:60:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			fp = fopen(device, "r");
data/jfsutils-1.1.15/libfs/open_by_label.c:169:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char device[100];
data/jfsutils-1.1.15/libfs/open_by_label.c:171:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[100];
data/jfsutils-1.1.15/libfs/open_by_label.c:173:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char lv_dirname[100];
data/jfsutils-1.1.15/libfs/open_by_label.c:177:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char part_name[95];
data/jfsutils-1.1.15/libfs/open_by_label.c:185:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	part_fd = fopen("/proc/evms/volumes", "r");
data/jfsutils-1.1.15/libfs/open_by_label.c:213:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(device, "/dev/evms");
data/jfsutils-1.1.15/libfs/open_by_label.c:226:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	part_fd = fopen("/proc/mdstat", "r");
data/jfsutils-1.1.15/libfs/open_by_label.c:229:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[4];
data/jfsutils-1.1.15/libfs/open_by_label.c:250:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	part_fd = fopen("/proc/partitions", "r");
data/jfsutils-1.1.15/libfs/super.c:165:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[SIZE_OF_SUPER];
data/jfsutils-1.1.15/libfs/super.c:169:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buf, sb, sizeof (*sb));
data/jfsutils-1.1.15/libfs/super.c:209:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[SIZE_OF_SUPER];
data/jfsutils-1.1.15/libfs/super.c:220:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(sb, sblk, sizeof (*sb));
data/jfsutils-1.1.15/libfs/super.c:285:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[sizeof (struct logsuper)];
data/jfsutils-1.1.15/libfs/super.c:288:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buf, logsup, sizeof (struct logsuper));
data/jfsutils-1.1.15/libfs/super.c:324:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[sizeof (struct logsuper)];
data/jfsutils-1.1.15/libfs/super.c:331:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(logsup, logsup_buf, sizeof (struct logsuper));
data/jfsutils-1.1.15/libfs/uniupr.c:27:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
signed char UniUpperTable[512] = {
data/jfsutils-1.1.15/libfs/uniupr.c:63:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static signed char UniCaseRangeU03a0[47] = {
data/jfsutils-1.1.15/libfs/uniupr.c:70:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static signed char UniCaseRangeU0430[48] = {
data/jfsutils-1.1.15/libfs/uniupr.c:77:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static signed char UniCaseRangeU0490[61] = {
data/jfsutils-1.1.15/libfs/uniupr.c:85:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static signed char UniCaseRangeU1e00[509] = {
data/jfsutils-1.1.15/libfs/uniupr.c:121:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static signed char UniCaseRangeUff40[27] = {
data/jfsutils-1.1.15/libfs/utilsubs.c:54:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmd[81];
data/jfsutils-1.1.15/libfs/utilsubs.c:70:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmd[81];
data/jfsutils-1.1.15/libfs/utilsubs.h:40:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, O_RDWR | O_EXCL, 0);
data/jfsutils-1.1.15/logdump/helpers.c:88:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg_string[max_log_entry_length - 4];
data/jfsutils-1.1.15/logdump/helpers.c:89:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char debug_detail[100];
data/jfsutils-1.1.15/logdump/logdump.c:46:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char log_device[1];		/* This avoids linker error */
data/jfsutils-1.1.15/logdump/logdump.c:103:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	Dev_IOPort = fopen(Vol_Label, "r");
data/jfsutils-1.1.15/mkfs/initmap.c:843:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&newpage->xad[XTENTRYSTART], &rootpage->xad[XTENTRYSTART],
data/jfsutils-1.1.15/mkfs/initmap.c:1081:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *msg_parms[MAXPARMS];
data/jfsutils-1.1.15/mkfs/initmap.c:1082:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char msgstr[MAXSTR];
data/jfsutils-1.1.15/mkfs/initmap.c:1151:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msgstr, "%d", percent);
data/jfsutils-1.1.15/mkfs/inodemap.c:112:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&(in_agctl[index]), &(empty_entry),
data/jfsutils-1.1.15/mkfs/inodes.c:114:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buffer, aggr_inodes, num_aggr_inodes * sizeof (struct dinode));
data/jfsutils-1.1.15/mkfs/inodes.c:219:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(bp, &inode_buffer, sizeof (inode_buffer));
data/jfsutils-1.1.15/mkfs/inodes.c:235:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(bp, &inode_buffer, sizeof (inode_buffer));
data/jfsutils-1.1.15/mkfs/inodes.c:278:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(bp, &inode_buffer, sizeof (inode_buffer));
data/jfsutils-1.1.15/mkfs/inodes.c:290:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(bp, &inode_buffer, sizeof (inode_buffer));
data/jfsutils-1.1.15/mkfs/mkfs.c:59:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *msg_parms[MAXPARMS];
data/jfsutils-1.1.15/mkfs/mkfs.c:60:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char msgstr[MAXSTR];
data/jfsutils-1.1.15/mkfs/mkfs.c:472:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(aggr_superblock.s_magic, JFS_MAGIC, strlen(JFS_MAGIC));
data/jfsutils-1.1.15/mkfs/mkfs.c:666:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char volume_label[16] = { "\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0" };
data/jfsutils-1.1.15/mkfs/mkfs.c:670:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char logdev[255] = { '\0' };	/* Need to use a macro for this size */
data/jfsutils-1.1.15/mkfs/mkfs.c:831:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msgstr, "%d", aggr_block_size);
data/jfsutils-1.1.15/mkfs/mkfs.c:843:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msgstr, "%d", aggr_block_size);
data/jfsutils-1.1.15/mkfs/mkfs.c:1072:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msgstr, "%lld", (long long) (number_of_bytes / 1024));
data/jfsutils-1.1.15/tune/super.c:43:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(string_ptr, "JFS_LINUX  ");
data/jfsutils-1.1.15/tune/super.c:47:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(string_ptr, "JFS_OS2  ");
data/jfsutils-1.1.15/tune/super.c:51:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(string_ptr, "JFS_COMMIT  ");
data/jfsutils-1.1.15/tune/super.c:55:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(string_ptr, "JFS_GROUPCOMMIT  ");
data/jfsutils-1.1.15/tune/super.c:59:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(string_ptr, "JFS_LAZYCOMMIT  ");
data/jfsutils-1.1.15/tune/super.c:63:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(string_ptr, "JFS_INLINELOG  ");
data/jfsutils-1.1.15/tune/super.c:67:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(string_ptr, "JFS_BAD_SAIT  ");
data/jfsutils-1.1.15/tune/super.c:71:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(string_ptr, "JFS_SPARSE  ");
data/jfsutils-1.1.15/tune/super.c:75:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(string_ptr, "JFS_DASD_ENABLED  ");
data/jfsutils-1.1.15/tune/super.c:79:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(string_ptr, "JFS_DASD_PRIME  ");
data/jfsutils-1.1.15/tune/super.c:115:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char uuid_unparsed[37];
data/jfsutils-1.1.15/tune/super.c:116:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char flag_string[142];
data/jfsutils-1.1.15/tune/super.c:196:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char uuid_unparsed[37];
data/jfsutils-1.1.15/tune/super.c:199:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char flag_string[142];
data/jfsutils-1.1.15/tune/tune.c:41:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char logdev[255] = { '\0' };
data/jfsutils-1.1.15/tune/tune.c:97:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				log_fd = fopen(logdev, "r");
data/jfsutils-1.1.15/tune/tune.c:235:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fp = fopen(device, OpenMode);
data/jfsutils-1.1.15/xpeek/alter.c:33:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmdline[512];
data/jfsutils-1.1.15/xpeek/directory.c:52:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char UTF8_Buffer[8 * JFS_PATH_MAX];
data/jfsutils-1.1.15/xpeek/directory.c:56:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmd_line[80];
data/jfsutils-1.1.15/xpeek/directory.c:207:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmd_line[80];
data/jfsutils-1.1.15/xpeek/directory.c:210:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char flag_names[64];
data/jfsutils-1.1.15/xpeek/directory.c:269:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(flag_names, "BT_ROOT  ");
data/jfsutils-1.1.15/xpeek/directory.c:271:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(flag_names, "BT_LEAF  ");
data/jfsutils-1.1.15/xpeek/directory.c:273:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(flag_names, "BT_INTERNAL  ");
data/jfsutils-1.1.15/xpeek/directory.c:275:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(flag_names, "BT_RIGHTMOST  ");
data/jfsutils-1.1.15/xpeek/directory.c:277:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(flag_names, "BT_LEFTMOST  ");
data/jfsutils-1.1.15/xpeek/directory.c:397:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmd_line[80];
data/jfsutils-1.1.15/xpeek/directory.c:546:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char flag_names[64];
data/jfsutils-1.1.15/xpeek/directory.c:550:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(flag_names, "BT_ROOT  ");
data/jfsutils-1.1.15/xpeek/directory.c:552:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(flag_names, "BT_LEAF  ");
data/jfsutils-1.1.15/xpeek/directory.c:554:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(flag_names, "BT_INTERNAL  ");
data/jfsutils-1.1.15/xpeek/directory.c:556:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(flag_names, "BT_RIGHTMOST  ");
data/jfsutils-1.1.15/xpeek/directory.c:558:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(flag_names, "BT_LEFTMOST  ");
data/jfsutils-1.1.15/xpeek/directory.c:571:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmd_line[512];
data/jfsutils-1.1.15/xpeek/directory.c:766:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmd_line[80];
data/jfsutils-1.1.15/xpeek/directory.c:880:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char flag_names[64];
data/jfsutils-1.1.15/xpeek/directory.c:898:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(flag_names, "BT_ROOT  ");
data/jfsutils-1.1.15/xpeek/directory.c:901:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(flag_names, "BT_LEAF  ");
data/jfsutils-1.1.15/xpeek/directory.c:903:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(flag_names, "BT_INTERNAL  ");
data/jfsutils-1.1.15/xpeek/directory.c:905:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(flag_names, "BT_RIGHTMOST  ");
data/jfsutils-1.1.15/xpeek/directory.c:907:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(flag_names, "BT_LEFTMOST  ");
data/jfsutils-1.1.15/xpeek/display.c:40:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmdline[512];
data/jfsutils-1.1.15/xpeek/dmap.c:142:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmdline[80];
data/jfsutils-1.1.15/xpeek/dmap.c:292:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmdline[80];
data/jfsutils-1.1.15/xpeek/dmap.c:486:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmdline[80];
data/jfsutils-1.1.15/xpeek/dmap.c:663:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmdline[80];
data/jfsutils-1.1.15/xpeek/dmap.c:879:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmdline[80];
data/jfsutils-1.1.15/xpeek/fsckcbbl.c:85:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[PSIZE];
data/jfsutils-1.1.15/xpeek/fsckcbbl.c:127:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmdline[512];
data/jfsutils-1.1.15/xpeek/fsckcbbl.c:130:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s1[9];
data/jfsutils-1.1.15/xpeek/fsckcbbl.c:131:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s2[9];
data/jfsutils-1.1.15/xpeek/fsckcbbl.c:264:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmdline[512];
data/jfsutils-1.1.15/xpeek/fsckcbbl.c:267:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s1[9];
data/jfsutils-1.1.15/xpeek/fsckcbbl.c:374:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmdline[512];
data/jfsutils-1.1.15/xpeek/fsckcbbl.c:378:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char uuid_unparsed[37];
data/jfsutils-1.1.15/xpeek/iag.c:42:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmd_line[80];
data/jfsutils-1.1.15/xpeek/iag.c:155:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmdline[80];
data/jfsutils-1.1.15/xpeek/iag.c:242:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[PSIZE];
data/jfsutils-1.1.15/xpeek/iag.c:328:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmdline[80];
data/jfsutils-1.1.15/xpeek/inode.c:42:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmd_line[80];
data/jfsutils-1.1.15/xpeek/inode.c:186:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmdline[512];
data/jfsutils-1.1.15/xpeek/inode.c:311:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char mode_str[5];
data/jfsutils-1.1.15/xpeek/inode.c:313:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(mode_str, "----");
data/jfsutils-1.1.15/xpeek/io.c:51:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buffer, block_buffer + offset, count);
data/jfsutils-1.1.15/xpeek/io.c:78:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(block_buffer + offset, buffer, count);
data/jfsutils-1.1.15/xpeek/super.c:91:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmdline[512];
data/jfsutils-1.1.15/xpeek/super.c:104:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char uuid_unparsed[37];
data/jfsutils-1.1.15/xpeek/super2.c:94:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmdline[512];
data/jfsutils-1.1.15/xpeek/super2.c:106:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char uuid_unparsed[37];
data/jfsutils-1.1.15/xpeek/xpeek.c:59:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char command_line[512];
data/jfsutils-1.1.15/xpeek/xpeek.c:76:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen(device, "r+");
data/jfsutils-1.1.15/fsck/fsck_message.c:43:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(msg, msg_txt, max_log_entry_length - entry_length);
data/jfsutils-1.1.15/fsck/fsck_message.c:44:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	entry_length += strlen(msg_txt);
data/jfsutils-1.1.15/fsck/fsck_message.c:113:2:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
	strncat(msg_string, debug_detail,
data/jfsutils-1.1.15/fsck/fsck_message.c:114:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		max_log_entry_length - 4 - strlen(msg_string));
data/jfsutils-1.1.15/fsck/fsckwsp.c:1484:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(agg_recptr->blkmp_ctlptr->hdr.eyecatcher,
data/jfsutils-1.1.15/fsck/fsckwsp.c:1485:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			fbmh_eyecatcher_string, strlen(fbmh_eyecatcher_string));
data/jfsutils-1.1.15/fsck/xchkdsk.c:1732:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(log_device, optarg, sizeof (log_device) - 1);
data/jfsutils-1.1.15/fsck/xchkdsk.c:3059:12:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if ((c = getchar()) == EOF)
data/jfsutils-1.1.15/fscklog/extract.c:660:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	entry_length += strlen(msg_txt);
data/jfsutils-1.1.15/fscklog/fscklog.c:198:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			arg_len = strlen(optarg);
data/jfsutils-1.1.15/fscklog/fscklog.c:205:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
				strncpy(file_name, optarg, arg_len);
data/jfsutils-1.1.15/libfs/devices.c:261:18:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			Read_Result = fgetc(device);
data/jfsutils-1.1.15/libfs/devices.c:294:18:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			Read_Result = fgetc(device);
data/jfsutils-1.1.15/libfs/devices.c:324:18:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			Read_Result = fgetc(device);
data/jfsutils-1.1.15/libfs/logform.c:153:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy((char *) &log_sup->label, label, sizeof (log_sup->label));
data/jfsutils-1.1.15/libfs/logredo.c:922:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strncmp(sb.s_magic, JFS_MAGIC, (unsigned) strlen(JFS_MAGIC))) {
data/jfsutils-1.1.15/libfs/open_by_label.c:121:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
		strcat(path, "/");
data/jfsutils-1.1.15/libfs/open_by_label.c:122:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		path_len = strlen(path);
data/jfsutils-1.1.15/mkfs/initmap.c:1118:14:  [1] (free) memalign:
  On some systems (though not Linux-based systems) an attempt to free()
  results from memalign() may fail. This may, on a few systems, be
  exploitable. Also note that memalign() may not check that the boundary
  parameter is correct (CWE-676). Use posix_memalign instead (defined in
  POSIX's 1003.1d). Don't switch to valloc(); it is marked as obsolete in BSD
  4.3, as legacy in SUSv2, and is no longer defined in SUSv3. In some cases,
  malloc()'s alignment may be sufficient.
			(buffer = memalign(aggr_block_size, bufsize)) == NULL)
data/jfsutils-1.1.15/mkfs/mkfs.c:472:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	memcpy(aggr_superblock.s_magic, JFS_MAGIC, strlen(JFS_MAGIC));
data/jfsutils-1.1.15/mkfs/mkfs.c:522:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(aggr_superblock.s_fpack, volume_label, LV_NAME_SIZE);
data/jfsutils-1.1.15/mkfs/mkfs.c:530:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(aggr_superblock.s_label, volume_label, 16);
data/jfsutils-1.1.15/mkfs/mkfs.c:730:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(volume_label, optarg, 16);
data/jfsutils-1.1.15/mkfs/mkfs.c:927:8:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			c = getchar();
data/jfsutils-1.1.15/tune/super.c:82:2:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
	strcpy(string_ptr, "\0");
data/jfsutils-1.1.15/tune/tune.c:324:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(sb.s_fpack, new_label, sizeof (sb.s_fpack));
data/jfsutils-1.1.15/tune/tune.c:325:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (strlen(new_label) > sizeof (sb.s_label))
data/jfsutils-1.1.15/tune/tune.c:328:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(sb.s_label, new_label, sizeof (sb.s_label));
data/jfsutils-1.1.15/tune/tune.c:332:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (strlen(new_label) > sizeof (logsup.label))
data/jfsutils-1.1.15/tune/tune.c:335:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(logsup.label, new_label, sizeof (logsup.label));
data/jfsutils-1.1.15/tune/tune.c:372:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
					strncpy(sb.s_label, sb.s_fpack, 11);
data/jfsutils-1.1.15/xpeek/alter.c:76:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	hex_length = strlen(hexstring);
data/jfsutils-1.1.15/xpeek/fsckcbbl.c:137:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(s1, cbblrec->eyecatcher, 8);
data/jfsutils-1.1.15/xpeek/fsckcbbl.c:139:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(s2, cbblrec->bufptr_eyecatcher, 8);
data/jfsutils-1.1.15/xpeek/fsckcbbl.c:177:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(cbblrec->eyecatcher, token, 8);
data/jfsutils-1.1.15/xpeek/fsckcbbl.c:213:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(cbblrec->bufptr_eyecatcher, token, 8);
data/jfsutils-1.1.15/xpeek/fsckcbbl.c:271:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(s1, wp->hdr.eyecatcher, 8);
data/jfsutils-1.1.15/xpeek/fsckcbbl.c:303:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(wp->hdr.eyecatcher, token, 8);
data/jfsutils-1.1.15/xpeek/fsckcbbl.c:312:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(wp->hdr.start_time, token, 16);
data/jfsutils-1.1.15/xpeek/fsckcbbl.c:315:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(wp->hdr.end_time, token, 16);
data/jfsutils-1.1.15/xpeek/fsckcbbl.c:467:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(uuid_unparsed, token, 36);
data/jfsutils-1.1.15/xpeek/fsckcbbl.c:477:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(lsp->label, token, 16);
data/jfsutils-1.1.15/xpeek/help.c:57:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cmd_len = strlen(cmd);
data/jfsutils-1.1.15/xpeek/super.c:244:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(sb->s_magic, token, 4);
data/jfsutils-1.1.15/xpeek/super.c:323:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(sb->s_fpack, token, 11);
data/jfsutils-1.1.15/xpeek/super.c:326:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(uuid_unparsed, token, 36);
data/jfsutils-1.1.15/xpeek/super.c:336:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(sb->s_label, token, 16);
data/jfsutils-1.1.15/xpeek/super.c:339:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(uuid_unparsed, token, 36);
data/jfsutils-1.1.15/xpeek/super2.c:235:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(sb->s_magic, token, 4);
data/jfsutils-1.1.15/xpeek/super2.c:319:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(sb->s_fpack, token, 8);
data/jfsutils-1.1.15/xpeek/super2.c:322:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(uuid_unparsed, token, 36);
data/jfsutils-1.1.15/xpeek/super2.c:332:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(sb->s_label, token, 16);
data/jfsutils-1.1.15/xpeek/super2.c:335:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(uuid_unparsed, token, 36);
data/jfsutils-1.1.15/xpeek/xpeek.c:110:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			cmd_len = strlen(command);

ANALYSIS SUMMARY:

Hits = 451
Lines analyzed = 61037 in approximately 1.60 seconds (38202 lines/second)
Physical Source Lines of Code (SLOC) = 35080
Hits@level = [0] 846 [1]  54 [2] 362 [3]   4 [4]  31 [5]   0
Hits@level+ = [0+] 1297 [1+] 451 [2+] 397 [3+]  35 [4+]  31 [5+]   0
Hits/KSLOC@level+ = [0+] 36.9726 [1+] 12.8563 [2+] 11.317 [3+] 0.997719 [4+] 0.883694 [5+]   0
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.