Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/jimtcl-0.79+dfsg0/examples.api/jim_command.c Examining data/jimtcl-0.79+dfsg0/examples.api/jim_hello.c Examining data/jimtcl-0.79+dfsg0/examples.api/jim_list.c Examining data/jimtcl-0.79+dfsg0/examples.api/jim_obj.c Examining data/jimtcl-0.79+dfsg0/examples.api/jim_return.c Examining data/jimtcl-0.79+dfsg0/examples.ext/helloworld.c Examining data/jimtcl-0.79+dfsg0/jim-aio.c Examining data/jimtcl-0.79+dfsg0/jim-array.c Examining data/jimtcl-0.79+dfsg0/jim-clock.c Examining data/jimtcl-0.79+dfsg0/jim-eventloop.c Examining data/jimtcl-0.79+dfsg0/jim-eventloop.h Examining data/jimtcl-0.79+dfsg0/jim-exec.c Examining data/jimtcl-0.79+dfsg0/jim-file.c Examining data/jimtcl-0.79+dfsg0/jim-format.c Examining data/jimtcl-0.79+dfsg0/jim-history.c Examining data/jimtcl-0.79+dfsg0/jim-interactive.c Examining data/jimtcl-0.79+dfsg0/jim-interp.c Examining data/jimtcl-0.79+dfsg0/jim-json.c Examining data/jimtcl-0.79+dfsg0/jim-load.c Examining data/jimtcl-0.79+dfsg0/jim-mk.cpp Examining data/jimtcl-0.79+dfsg0/jim-namespace.c Examining data/jimtcl-0.79+dfsg0/jim-nosignal.c Examining data/jimtcl-0.79+dfsg0/jim-pack.c Examining data/jimtcl-0.79+dfsg0/jim-package.c Examining data/jimtcl-0.79+dfsg0/jim-posix.c Examining data/jimtcl-0.79+dfsg0/jim-readdir.c Examining data/jimtcl-0.79+dfsg0/jim-readline.c Examining data/jimtcl-0.79+dfsg0/jim-regexp.c Examining data/jimtcl-0.79+dfsg0/jim-sdl.c Examining data/jimtcl-0.79+dfsg0/jim-signal.c Examining data/jimtcl-0.79+dfsg0/jim-signal.h Examining data/jimtcl-0.79+dfsg0/jim-sqlite3.c Examining data/jimtcl-0.79+dfsg0/jim-subcmd.c Examining data/jimtcl-0.79+dfsg0/jim-subcmd.h Examining data/jimtcl-0.79+dfsg0/jim-syslog.c Examining data/jimtcl-0.79+dfsg0/jim-tclprefix.c Examining data/jimtcl-0.79+dfsg0/jim-tty.c Examining data/jimtcl-0.79+dfsg0/jim-tty.h Examining data/jimtcl-0.79+dfsg0/jim-win32.c Examining data/jimtcl-0.79+dfsg0/jim-win32compat.c Examining data/jimtcl-0.79+dfsg0/jim-win32compat.h Examining data/jimtcl-0.79+dfsg0/jim-zlib.c Examining data/jimtcl-0.79+dfsg0/jim.c Examining data/jimtcl-0.79+dfsg0/jim.h Examining data/jimtcl-0.79+dfsg0/jimiocompat.c Examining data/jimtcl-0.79+dfsg0/jimiocompat.h Examining data/jimtcl-0.79+dfsg0/jimregexp.c Examining data/jimtcl-0.79+dfsg0/jimregexp.h Examining data/jimtcl-0.79+dfsg0/jimsh.c Examining data/jimtcl-0.79+dfsg0/jsmn/jsmn.c Examining data/jimtcl-0.79+dfsg0/jsmn/jsmn.h Examining data/jimtcl-0.79+dfsg0/linenoise-win32.c Examining data/jimtcl-0.79+dfsg0/linenoise.c Examining data/jimtcl-0.79+dfsg0/linenoise.h Examining data/jimtcl-0.79+dfsg0/sqlite3/jim-sqlite3.c Examining data/jimtcl-0.79+dfsg0/sqlite3/shell.c Examining data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c Examining data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.h Examining data/jimtcl-0.79+dfsg0/sqlite3/sqlite3ext.h Examining data/jimtcl-0.79+dfsg0/utf8.c Examining data/jimtcl-0.79+dfsg0/utf8.h FINAL RESULTS: data/jimtcl-0.79+dfsg0/jim-file.c:815:22: [5] (race) readlink: This accepts filename arguments; if an attacker can move those files or change the link content, a race condition results. Also, it does not terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach. int linkLength = readlink(path, linkValue, MAXPATHLEN); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:29819:42: [5] (race) readlink: This accepts filename arguments; if an attacker can move those files or change the link content, a race condition results. Also, it does not terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach. { "readlink", (sqlite3_syscall_ptr)readlink, 0 }, data/jimtcl-0.79+dfsg0/jim-aio.c:1860:5: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(buf, sizeof(buf), hdlfmt, Jim_GetId(interp)); data/jimtcl-0.79+dfsg0/jim-eventloop.c:714:21: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(buf, sizeof(buf), fmt, te->id); data/jimtcl-0.79+dfsg0/jim-exec.c:67:10: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. rc = system(Jim_String(cmdlineObj)); data/jimtcl-0.79+dfsg0/jim-exec.c:213:20: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. envdata += sprintf(envdata, "%s=%s", s1, s2); data/jimtcl-0.79+dfsg0/jim-exec.c:1093:17: [4] (shell) execvp: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execvp(false_argv[0],false_argv); data/jimtcl-0.79+dfsg0/jim-file.c:443:31: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Jim_SetResultBool(interp, access(Jim_String(filename), mode) != -1); data/jimtcl-0.79+dfsg0/jim-file.c:605:19: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (!force && access(dest, F_OK) == 0) { data/jimtcl-0.79+dfsg0/jim-format.c:424:17: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(num_buffer, length + 1, spec, d); data/jimtcl-0.79+dfsg0/jim-format.c:427:35: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. formatted_bytes = snprintf(num_buffer, length + 1, spec, w); data/jimtcl-0.79+dfsg0/jim-package.c:54:13: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(buf, R_OK) == 0) { data/jimtcl-0.79+dfsg0/jim-package.c:65:13: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(buf, R_OK) == 0) { data/jimtcl-0.79+dfsg0/jim-win32.c:515:9: [4] (shell) ShellExecute: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. CMD(ShellExecute); data/jimtcl-0.79+dfsg0/jim-win32compat.c:79:13: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(strcpy(dir->name, name), all); data/jimtcl-0.79+dfsg0/jim-win32compat.c:79:20: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcat(strcpy(dir->name, name), all); data/jimtcl-0.79+dfsg0/jim.c:625:5: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(stderr, fmt, ap); data/jimtcl-0.79+dfsg0/jim.c:5187:5: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(buf, fmt, refPtr->tag, id); data/jimtcl-0.79+dfsg0/jim.c:13768:5: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(buf, fmt, count == 0 ? 0 : elapsed / count); data/jimtcl-0.79+dfsg0/jim.c:15563:11: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. len = snprintf(buf, len + 1, format, params[0], params[1], params[2], params[3], params[4]); data/jimtcl-0.79+dfsg0/jimiocompat.c:165:50: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (tmpdir == NULL || *tmpdir == '\0' || access(tmpdir, W_OK) != 0) { data/jimtcl-0.79+dfsg0/jimiocompat.c:183:9: [4] (tmpfile) mktemp: Temporary file race condition (CWE-377). if (mktemp(filenameObj->bytes) == NULL) { data/jimtcl-0.79+dfsg0/jimiocompat.h:76:42: [4] (shell) execvp: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. #define execvpe(ARG0, ARGV, ENV) execvp(ARG0, ARGV) data/jimtcl-0.79+dfsg0/linenoise.c:418:9: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. #define snprintf _snprintf data/jimtcl-0.79+dfsg0/linenoise.c:418:18: [4] (format) _snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. #define snprintf _snprintf data/jimtcl-0.79+dfsg0/linenoise.c:617:22: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define DRL(ARGS...) fprintf(dfh, ARGS) data/jimtcl-0.79+dfsg0/linenoise.c:759:9: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. n = vsnprintf(buf, sizeof(buf), format, args); data/jimtcl-0.79+dfsg0/sqlite3/shell.c:105:10: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. # ifndef access data/jimtcl-0.79+dfsg0/sqlite3/shell.c:106:11: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. # define access(f,m) _access((f),(m)) data/jimtcl-0.79+dfsg0/sqlite3/shell.c:108:9: [4] (shell) popen: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. # undef popen data/jimtcl-0.79+dfsg0/sqlite3/shell.c:109:10: [4] (shell) popen: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. # define popen _popen data/jimtcl-0.79+dfsg0/sqlite3/shell.c:119:17: [4] (shell) popen: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. extern FILE *popen(const char*,const char*); data/jimtcl-0.79+dfsg0/sqlite3/shell.c:387:5: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(out, zFormat, ap); data/jimtcl-0.79+dfsg0/sqlite3/shell.c:392:22: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define utf8_printf fprintf data/jimtcl-0.79+dfsg0/sqlite3/shell.c:400:21: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define raw_printf fprintf data/jimtcl-0.79+dfsg0/sqlite3/shell.c:2907:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if( access(zNewDb,0)==0 ){ data/jimtcl-0.79+dfsg0/sqlite3/shell.c:3490:17: [4] (shell) popen: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. sCtx.in = popen(sCtx.zFile+1, "r"); data/jimtcl-0.79+dfsg0/sqlite3/shell.c:3881:16: [4] (shell) popen: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. p->out = popen(zFile + 1, "w"); data/jimtcl-0.79+dfsg0/sqlite3/shell.c:4345:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. x = system(zCmd); data/jimtcl-0.79+dfsg0/sqlite3/shell.c:5404:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if( access(data.zDbFilename, 0)==0 ){ data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:29693:42: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. { "access", (sqlite3_syscall_ptr)access, 0 }, data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:46398:28: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define sqlite3DebugPrintf printf data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:58170:42: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define TRACE(X) if(sqlite3BtreeTrace){printf X;fflush(stdout);} data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:71807:3: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(pOut, zFormat1, pc, data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:104985:14: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. FUNCTION(printf, -1, 0, 0, printfFunc ), data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:108967:12: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. char * (*snprintf)(int,char*,const char*,...); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:109079:11: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. char *(*vsnprintf)(int,char*,const char*,va_list); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:109241:53: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. #define sqlite3_snprintf sqlite3_api->snprintf data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:109265:53: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. #define sqlite3_vsnprintf sqlite3_api->vsnprintf data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:109341:53: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. #define sqlite3_uri_vsnprintf sqlite3_api->vsnprintf data/jimtcl-0.79+dfsg0/sqlite3/sqlite3ext.h:137:12: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. char * (*snprintf)(int,char*,const char*,...); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3ext.h:249:11: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. char *(*vsnprintf)(int,char*,const char*,va_list); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3ext.h:411:53: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. #define sqlite3_snprintf sqlite3_api->snprintf data/jimtcl-0.79+dfsg0/sqlite3/sqlite3ext.h:435:53: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. #define sqlite3_vsnprintf sqlite3_api->vsnprintf data/jimtcl-0.79+dfsg0/sqlite3/sqlite3ext.h:511:53: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. #define sqlite3_uri_vsnprintf sqlite3_api->vsnprintf data/jimtcl-0.79+dfsg0/jim-exec.c:1452:10: [3] (shell) CreateProcess: This causes a new process to execute and is difficult to use safely (CWE-78). Specify the application path in the first argument, NOT as part of the second, or embedded spaces could allow an attacker to force a different program to run. if (!CreateProcess(NULL, (char *)Jim_String(cmdLineObj), NULL, NULL, TRUE, data/jimtcl-0.79+dfsg0/jim-exec.c:1452:10: [3] (shell) CreateProcess: This causes a new process to execute and is difficult to use safely (CWE-78). Specify the application path in the first argument, NOT as part of the second, or embedded spaces could allow an attacker to force a different program to run. if (!CreateProcess(NULL, (char *)Jim_String(cmdLineObj), NULL, NULL, TRUE, data/jimtcl-0.79+dfsg0/jim-file.c:361:9: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. if (realpath(path, newname)) { data/jimtcl-0.79+dfsg0/jim-interactive.c:179:12: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. home = getenv("HOME"); data/jimtcl-0.79+dfsg0/jim-win32.c:533:9: [3] (misc) LoadLibrary: Ensure that the full path to the library is specified, or current directory may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to find library path, if you aren't already. CMD(LoadLibrary); data/jimtcl-0.79+dfsg0/jim.c:15095:11: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. val = getenv(key); data/jimtcl-0.79+dfsg0/jimiocompat.c:111:42: [3] (tmpfile) GetTempFileName: Temporary file race condition in certain cases (e.g., if run as SYSTEM in many versions of Windows) (CWE-377). if (!GetTempPath(MAX_PATH, name) || !GetTempFileName(name, filename_template ? filename_template : "JIM", 0, name)) { data/jimtcl-0.79+dfsg0/jimiocompat.c:164:30: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. const char *tmpdir = getenv("TMPDIR"); data/jimtcl-0.79+dfsg0/linenoise.c:660:18: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char *term = getenv("TERM"); data/jimtcl-0.79+dfsg0/sqlite3/shell.c:264:28: [3] (misc) LoadLibrary: Ensure that the full path to the library is specified, or current directory may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to find library path, if you aren't already. HINSTANCE hinstLib = LoadLibrary(TEXT("Kernel32.dll")); data/jimtcl-0.79+dfsg0/sqlite3/shell.c:5031:16: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. home_dir = getenv("USERPROFILE"); data/jimtcl-0.79+dfsg0/sqlite3/shell.c:5036:16: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. home_dir = getenv("HOME"); data/jimtcl-0.79+dfsg0/sqlite3/shell.c:5043:14: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. zDrive = getenv("HOMEDRIVE"); data/jimtcl-0.79+dfsg0/sqlite3/shell.c:5044:13: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. zPath = getenv("HOMEPATH"); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:23569:7: [3] (misc) InitializeCriticalSection: Exceptions can be thrown in low-memory situations. Use InitializeCriticalSectionAndSpinCount instead. InitializeCriticalSection(&winMutex_staticMutexes[i].mutex); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:23663:9: [3] (misc) InitializeCriticalSection: Exceptions can be thrown in low-memory situations. Use InitializeCriticalSectionAndSpinCount instead. InitializeCriticalSection(&p->mutex); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:23729:3: [3] (misc) EnterCriticalSection: On some versions of Windows, exceptions can be thrown in low-memory situations. Use InitializeCriticalSectionAndSpinCount instead. EnterCriticalSection(&p->mutex); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:32169:10: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. lk = random(); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:34748:32: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if( !azDirs[0] ) azDirs[0] = getenv("SQLITE_TMPDIR"); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:34749:32: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if( !azDirs[1] ) azDirs[1] = getenv("TMPDIR"); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:35176:22: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char *envforce = getenv("SQLITE_FORCE_PROXY_LOCKING"); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:41758:34: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if( !azDirs[0] ) azDirs[0] = getenv("SQLITE_TMPDIR"); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:41759:34: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if( !azDirs[1] ) azDirs[1] = getenv("TMPDIR"); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:41760:34: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if( !azDirs[2] ) azDirs[2] = getenv("TMP"); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:41761:34: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if( !azDirs[3] ) azDirs[3] = getenv("TEMP"); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:41762:34: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if( !azDirs[4] ) azDirs[4] = getenv("USERPROFILE"); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:104997:15: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. VFUNCTION(random, 0, 0, 0, randomFunc ), data/jimtcl-0.79+dfsg0/jim-aio.c:344:21: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&ai->ai_storage.sin.sin_addr, he->h_addr_list[i], he->h_length); data/jimtcl-0.79+dfsg0/jim-aio.c:352:21: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&ai->ai_storage.sin6.sin6_addr, he->h_addr_list[i], he->h_length); data/jimtcl-0.79+dfsg0/jim-aio.c:420:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&sa->sin6, ai->ai_addr, ai->ai_addrlen); data/jimtcl-0.79+dfsg0/jim-aio.c:467:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&sa->sin, ai->ai_addr, ai->ai_addrlen); data/jimtcl-0.79+dfsg0/jim-aio.c:513:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addrbuf[60]; data/jimtcl-0.79+dfsg0/jim-aio.c:643:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[AIO_BUF_LEN]; data/jimtcl-0.79+dfsg0/jim-aio.c:756:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[AIO_BUF_LEN]; data/jimtcl-0.79+dfsg0/jim-aio.c:784:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[AIO_BUF_LEN]; data/jimtcl-0.79+dfsg0/jim-aio.c:1858:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[AIO_CMD_LEN]; data/jimtcl-0.79+dfsg0/jim-aio.c:1874:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fh = fopen(Jim_String(filename), mode); data/jimtcl-0.79+dfsg0/jim-aio.c:1921:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *hdlfmt, int family, const char * const mode[2]) data/jimtcl-0.79+dfsg0/jim-aio.c:1921:43: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *hdlfmt, int family, const char * const mode[2]) data/jimtcl-0.79+dfsg0/jim-aio.c:1945:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char * const mode[2] = { "r", "w" }; data/jimtcl-0.79+dfsg0/jim-aio.c:2035:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char * const mode[2] = { "r+", "r+" }; data/jimtcl-0.79+dfsg0/jim-clock.c:71:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100]; data/jimtcl-0.79+dfsg0/jim-eventloop.c:710:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[30]; data/jimtcl-0.79+dfsg0/jim-exec.c:136:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/jimtcl-0.79+dfsg0/jim-exec.c:1046:15: [2] (race) vfork: On some old systems, vfork() permits race conditions, and it's very difficult to use correctly (CWE-362). Use fork() instead. pid = vfork(); data/jimtcl-0.79+dfsg0/jim-exec.c:1092:24: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *const false_argv[2] = {"false", NULL}; data/jimtcl-0.79+dfsg0/jim-exec.c:1252:28: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. JimWinFindExecutable(const char *originalName, char fullPath[MAX_PATH]) data/jimtcl-0.79+dfsg0/jim-exec.c:1252:48: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. JimWinFindExecutable(const char *originalName, char fullPath[MAX_PATH]) data/jimtcl-0.79+dfsg0/jim-exec.c:1372:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char execPath[MAX_PATH]; data/jimtcl-0.79+dfsg0/jim-file.c:419:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(last, part, len); data/jimtcl-0.79+dfsg0/jim-format.c:62:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char * const badIndex[2] = { data/jimtcl-0.79+dfsg0/jim-format.c:89:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char spec[2*JIM_INTEGER_SPACE + 12]; data/jimtcl-0.79+dfsg0/jim-format.c:365:22: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. p += sprintf(p, "%ld", width); data/jimtcl-0.79+dfsg0/jim-format.c:368:22: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. p += sprintf(p, ".%ld", precision); data/jimtcl-0.79+dfsg0/jim-interactive.c:198:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char prompt[20]; data/jimtcl-0.79+dfsg0/jim-interactive.c:211:13: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(prompt, ". "); data/jimtcl-0.79+dfsg0/jim-interp.c:142:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[34]; data/jimtcl-0.79+dfsg0/jim-load.c:45:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char initsym[40]; data/jimtcl-0.79+dfsg0/jim-mk.cpp:238:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(outPtr, rep, len); data/jimtcl-0.79+dfsg0/jim-mk.cpp:409:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(obj->bytes, name, len + 1); data/jimtcl-0.79+dfsg0/jim-mk.cpp:628:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[JIM_CURSOR_SPACE + 1]; data/jimtcl-0.79+dfsg0/jim-mk.cpp:647:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(obj->bytes, buf, len + 1); data/jimtcl-0.79+dfsg0/jim-mk.cpp:1779:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(objv + 2, argv + 2, (pipe - 2) * sizeof(Jim_Obj *)); data/jimtcl-0.79+dfsg0/jim-mk.cpp:1982:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(descr, name, len); data/jimtcl-0.79+dfsg0/jim-mk.cpp:2131:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(objv + 2, argv + 2, (argc - 2) * sizeof(Jim_Obj *)); data/jimtcl-0.79+dfsg0/jim-mk.cpp:2160:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MK_CMD_LEN]; data/jimtcl-0.79+dfsg0/jim-mk.cpp:2259:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char version[MK_VERSION_SPACE]; data/jimtcl-0.79+dfsg0/jim-nosignal.c:20:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[10]; data/jimtcl-0.79+dfsg0/jim-pack.c:209:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&val, (unsigned char *) &value + offs, sizeof(float)); data/jimtcl-0.79+dfsg0/jim-pack.c:226:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&val, (unsigned char *) &value + offs, sizeof(double)); data/jimtcl-0.79+dfsg0/jim-pack.c:246:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((unsigned char *) &val + offs, &value, sizeof(float)); data/jimtcl-0.79+dfsg0/jim-pack.c:263:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((unsigned char *) &val + offs, &value, sizeof(double)); data/jimtcl-0.79+dfsg0/jim-pack.c:319:52: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const unsigned char *str = (const unsigned char *)Jim_GetString(argv[1], &len); data/jimtcl-0.79+dfsg0/jim-pack.c:467:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stringObjPtr->bytes + pos, Jim_String(argv[2]), width); data/jimtcl-0.79+dfsg0/jim-regexp.c:98:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100]; data/jimtcl-0.79+dfsg0/jim-regexp.c:242:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100]; data/jimtcl-0.79+dfsg0/jim-regexp.c:463:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100]; data/jimtcl-0.79+dfsg0/jim-sdl.c:198:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[AIO_CMD_LEN]; data/jimtcl-0.79+dfsg0/jim-sdl.c:229:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "sdl.surface%ld", screenId); data/jimtcl-0.79+dfsg0/jim-signal.c:150:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). i = atoi(pt); data/jimtcl-0.79+dfsg0/jim-sqlite3.c:82:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char spec[2]; data/jimtcl-0.79+dfsg0/jim-sqlite3.c:267:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[60]; data/jimtcl-0.79+dfsg0/jim-syslog.c:18:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ident[32]; data/jimtcl-0.79+dfsg0/jim-syslog.c:159:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(info->ident, "Tcl script"); data/jimtcl-0.79+dfsg0/jim-win32.c:97:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cwd[MAX_PATH + 1]; data/jimtcl-0.79+dfsg0/jim-win32.c:243:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_COMPUTERNAME_LENGTH + 1]; data/jimtcl-0.79+dfsg0/jim-win32.c:267:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[UNLEN + 1]; data/jimtcl-0.79+dfsg0/jim-win32.c:292:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[MAX_PATH]; data/jimtcl-0.79+dfsg0/jim-win32compat.c:32:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char msg[121]; data/jimtcl-0.79+dfsg0/jim.c:676:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(copy, s, l + 1); data/jimtcl-0.79+dfsg0/jim.c:2017:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(token, start, len); data/jimtcl-0.79+dfsg0/jim.c:2248:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dupPtr->bytes, objPtr->bytes, objPtr->length + 1); data/jimtcl-0.79+dfsg0/jim.c:2486:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(objPtr->bytes + objPtr->length, str, len); data/jimtcl-0.79+dfsg0/jim.c:3173:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100]; data/jimtcl-0.79+dfsg0/jim.c:3384:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tokenlist->list, tokenlist->static_list, data/jimtcl-0.79+dfsg0/jim.c:5143:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(copy, key, sizeof(unsigned long)); data/jimtcl-0.79+dfsg0/jim.c:5203:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[JIM_REFERENCE_SPACE + 1]; data/jimtcl-0.79+dfsg0/jim.c:5221:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char refId[21]; data/jimtcl-0.79+dfsg0/jim.c:5251:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(refId, start + 14 + JIM_REFERENCE_TAGLEN, 20); data/jimtcl-0.79+dfsg0/jim.c:5513:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char c[2]; data/jimtcl-0.79+dfsg0/jim.c:5884:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[JIM_INTEGER_SPACE + 1]; data/jimtcl-0.79+dfsg0/jim.c:5892:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[JIM_INTEGER_SPACE]; data/jimtcl-0.79+dfsg0/jim.c:6043:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[JIM_DOUBLE_SPACE + 1]; data/jimtcl-0.79+dfsg0/jim.c:6045:19: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. int len = sprintf(buf, "%.12g", value); data/jimtcl-0.79+dfsg0/jim.c:6233:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dupPtr->internalRep.listValue.ele, srcPtr->internalRep.listValue.ele, data/jimtcl-0.79+dfsg0/jim.c:6405:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char *quotingType, staticQuoting[STATIC_QUOTING_LEN]; data/jimtcl-0.79+dfsg0/jim.c:6450:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, strRep, len); data/jimtcl-0.79+dfsg0/jim.c:6456:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, strRep, len); data/jimtcl-0.79+dfsg0/jim.c:7044:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, s, objLen); data/jimtcl-0.79+dfsg0/jim.c:7467:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[JIM_INTEGER_SPACE + 1]; data/jimtcl-0.79+dfsg0/jim.c:7469:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%d", objPtr->internalRep.intValue); data/jimtcl-0.79+dfsg0/jim.c:7473:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "end%d", objPtr->internalRep.intValue + 1); data/jimtcl-0.79+dfsg0/jim.c:8670:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char * const tt_names[JIM_TT_EXPR_OP] = data/jimtcl-0.79+dfsg0/jim.c:8684:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[20]; data/jimtcl-0.79+dfsg0/jim.c:8689:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "(%d)", type); data/jimtcl-0.79+dfsg0/jim.c:9502:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(newVec, srcPtr->internalRep.ptr, size); data/jimtcl-0.79+dfsg0/jim.c:9548:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(fmtObj->stringRep, fmt, maxFmtLen); data/jimtcl-0.79+dfsg0/jim.c:10207:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&nargv[1], &objv[0], sizeof(nargv[0]) * objc); data/jimtcl-0.79+dfsg0/jim.c:10377:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(s, intv[i]->bytes, intv[i]->length); data/jimtcl-0.79+dfsg0/jim.c:10590:29: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(argv, sargv, sizeof(*argv) * j); data/jimtcl-0.79+dfsg0/jim.c:10985:43: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (stat(filename, &sb) != 0 || (fp = fopen(filename, "rt")) == NULL) { data/jimtcl-0.79+dfsg0/jim.c:12725:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/jimtcl-0.79+dfsg0/jim.c:12745:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "free %d used %d", freeobj, liveobj); data/jimtcl-0.79+dfsg0/jim.c:12756:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/jimtcl-0.79+dfsg0/jim.c:12760:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%p", objPtr); data/jimtcl-0.79+dfsg0/jim.c:13246:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&nargv[1], argv + 2, (argc - 2) * sizeof(*nargv)); data/jimtcl-0.79+dfsg0/jim.c:13614:21: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p - l, str, l); data/jimtcl-0.79+dfsg0/jim.c:13744:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[60]; data/jimtcl-0.79+dfsg0/jim.c:14026:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[JIM_REFERENCE_SPACE + 1]; data/jimtcl-0.79+dfsg0/jim.c:14136:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[100]; data/jimtcl-0.79+dfsg0/jim.c:14646:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[(JIM_INTEGER_SPACE * 2) + 1]; data/jimtcl-0.79+dfsg0/jim.c:14648:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%d.%d", JIM_VERSION / 100, JIM_VERSION % 100); data/jimtcl-0.79+dfsg0/jim.c:15352:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tablePtrSorted, tablePtr, sizeof(char *) * count); data/jimtcl-0.79+dfsg0/jim.c:15527:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *params[5]; data/jimtcl-0.79+dfsg0/jim.h:494:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char sbox[256]; data/jimtcl-0.79+dfsg0/jim.h:590:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tag[JIM_REFERENCE_TAGLEN+1]; data/jimtcl-0.79+dfsg0/jimiocompat.c:108:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_PATH]; data/jimtcl-0.79+dfsg0/jimiocompat.c:181:10: [2] (tmpfile) mkstemp: Potential for temporary file vulnerability in some circumstances. Some older Unix-like systems create temp files with permission to write by all by default, so be sure to set the umask to override this. Also, some older Unix systems might fail to use O_EXCL when opening the file, so make sure that O_EXCL is used by the library (CWE-377). fd = mkstemp(filenameObj->bytes); data/jimtcl-0.79+dfsg0/jimiocompat.c:187:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(filenameObj->bytes, O_RDWR | O_CREAT | O_TRUNC); data/jimtcl-0.79+dfsg0/jimiocompat.c:206:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). return open(filename, O_WRONLY | O_CREAT | (append ? O_APPEND : O_TRUNC), 0666); data/jimtcl-0.79+dfsg0/jimiocompat.c:211:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). return open(filename, O_RDONLY, 0); data/jimtcl-0.79+dfsg0/jimregexp.c:1713:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_UTF8_LEN + 1]; data/jimtcl-0.79+dfsg0/jimregexp.c:1799:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[50]; data/jimtcl-0.79+dfsg0/linenoise.c:186:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sb->data + sb->last, str, len); data/jimtcl-0.79+dfsg0/linenoise.c:264:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sb->data + index, str, len); data/jimtcl-0.79+dfsg0/linenoise.c:755:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/jimtcl-0.79+dfsg0/linenoise.c:846:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_UTF8_LEN]; data/jimtcl-0.79+dfsg0/linenoise.c:1344:11: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). dfh = fopen("linenoise.debuglog", "a"); data/jimtcl-0.79+dfsg0/linenoise.c:1634:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_UTF8_LEN + 1]; data/jimtcl-0.79+dfsg0/linenoise.c:1744:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rbuf[50]; data/jimtcl-0.79+dfsg0/linenoise.c:1745:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rprompt[80]; data/jimtcl-0.79+dfsg0/linenoise.c:2198:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(newHistory,history+(history_len-tocopy), sizeof(char*)*tocopy); data/jimtcl-0.79+dfsg0/linenoise.c:2211:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen(filename,"w"); data/jimtcl-0.79+dfsg0/linenoise.c:2247:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen(filename,"r"); data/jimtcl-0.79+dfsg0/sqlite3/jim-sqlite3.c:345:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zChannel[64]; data/jimtcl-0.79+dfsg0/sqlite3/jim-sqlite3.c:499:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zVal[30]; data/jimtcl-0.79+dfsg0/sqlite3/jim-sqlite3.c:507:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if( rc!=JIM_OK || atoi(Jim_String(Jim_GetResult(pDb->interp))) ){ data/jimtcl-0.79+dfsg0/sqlite3/jim-sqlite3.c:523:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if( rc!=JIM_OK || atoi(Jim_String(Jim_GetResult(pDb->interp))) ){ data/jimtcl-0.79+dfsg0/sqlite3/jim-sqlite3.c:553:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zTm[100]; data/jimtcl-0.79+dfsg0/sqlite3/jim-sqlite3.c:575:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if( rc!=JIM_OK || atoi(Jim_String(Jim_GetResult(pDb->interp))) ){ data/jimtcl-0.79+dfsg0/sqlite3/jim-sqlite3.c:589:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zBuf[64]; data/jimtcl-0.79+dfsg0/sqlite3/jim-sqlite3.c:590:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(zBuf, "%d", iArg); data/jimtcl-0.79+dfsg0/sqlite3/jim-sqlite3.c:592:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(zBuf, "%d", nArg); data/jimtcl-0.79+dfsg0/sqlite3/jim-sqlite3.c:671:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). return (atoi(Jim_String(Jim_GetResult(p->interp)))); data/jimtcl-0.79+dfsg0/sqlite3/jim-sqlite3.c:1554:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pDb->zAuth, zAuth, len+1); data/jimtcl-0.79+dfsg0/sqlite3/jim-sqlite3.c:1637:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pDb->zBusy, zBusy, len+1); data/jimtcl-0.79+dfsg0/sqlite3/jim-sqlite3.c:1744:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pCollate->zScript, zScript, nScript+1); data/jimtcl-0.79+dfsg0/sqlite3/jim-sqlite3.c:1797:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pDb->zCommit, zCommit, len+1); data/jimtcl-0.79+dfsg0/sqlite3/jim-sqlite3.c:1861:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zLineNum[80]; /* Line number print buffer */ data/jimtcl-0.79+dfsg0/sqlite3/jim-sqlite3.c:1933:10: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). in = fopen(zFile, "rb"); data/jimtcl-0.79+dfsg0/sqlite3/jim-sqlite3.c:2295:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pDb->zProgress, zProgress, len+1); data/jimtcl-0.79+dfsg0/sqlite3/jim-sqlite3.c:2337:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pDb->zProfile, zProfile, len+1); data/jimtcl-0.79+dfsg0/sqlite3/jim-sqlite3.c:2512:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pDb->zTrace, zTrace, len+1); data/jimtcl-0.79+dfsg0/sqlite3/shell.c:368:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char mainPrompt[20]; /* First line prompt. default: "sqlite> "*/ data/jimtcl-0.79+dfsg0/sqlite3/shell.c:369:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char continuePrompt[20]; /* Continuation prompt. default: " ...> " */ data/jimtcl-0.79+dfsg0/sqlite3/shell.c:538:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zLine, zTrans, nTrans); data/jimtcl-0.79+dfsg0/sqlite3/shell.c:631:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char colSeparator[20]; /* Column separator character for several modes */ data/jimtcl-0.79+dfsg0/sqlite3/shell.c:632:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rowSeparator[20]; /* Row separator character for MODE_Ascii */ data/jimtcl-0.79+dfsg0/sqlite3/shell.c:635:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nullValue[20]; /* The text to print when a NULL comes back from data/jimtcl-0.79+dfsg0/sqlite3/shell.c:637:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char outfile[FILENAME_MAX]; /* Filename for *out */ data/jimtcl-0.79+dfsg0/sqlite3/shell.c:924:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *az[4]; data/jimtcl-0.79+dfsg0/sqlite3/shell.c:1339:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&zIn[nIn], zAppend, nAppend); data/jimtcl-0.79+dfsg0/sqlite3/shell.c:1413:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zErrMsg, sqlite3_errmsg(db), nErrMsg); data/jimtcl-0.79+dfsg0/sqlite3/shell.c:1424:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char z[200]; data/jimtcl-0.79+dfsg0/sqlite3/shell.c:1426:8: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). in = fopen(z, "rb"); data/jimtcl-0.79+dfsg0/sqlite3/shell.c:2253:8: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). in = fopen(zName, "rb"); data/jimtcl-0.79+dfsg0/sqlite3/shell.c:2286:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). out = fopen(zFile, "wb"); data/jimtcl-0.79+dfsg0/sqlite3/shell.c:2535:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(zFile, "wb"); data/jimtcl-0.79+dfsg0/sqlite3/shell.c:2750:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zInsert+i, ",?", 2); data/jimtcl-0.79+dfsg0/sqlite3/shell.c:2753:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zInsert+i, ");", 3); data/jimtcl-0.79+dfsg0/sqlite3/shell.c:3001:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char aHdr[100]; data/jimtcl-0.79+dfsg0/sqlite3/shell.c:3088:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *azArg[50]; data/jimtcl-0.79+dfsg0/sqlite3/shell.c:3495:17: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). sCtx.in = fopen(sCtx.zFile, "rb"); data/jimtcl-0.79+dfsg0/sqlite3/shell.c:3686:17: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). iotrace = fopen(azArg[1], "w"); data/jimtcl-0.79+dfsg0/sqlite3/shell.c:3933:11: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). alt = fopen(azArg[1], "rb"); data/jimtcl-0.79+dfsg0/sqlite3/shell.c:4023:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *new_argv[2], *new_colv[2]; data/jimtcl-0.79+dfsg0/sqlite3/shell.c:4037:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *new_argv[2], *new_colv[2]; data/jimtcl-0.79+dfsg0/sqlite3/shell.c:4145:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). out = fopen(azCmd[1], "wb"); data/jimtcl-0.79+dfsg0/sqlite3/shell.c:4306:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zBuf[200]; data/jimtcl-0.79+dfsg0/sqlite3/shell.c:4931:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zLine,";",2); data/jimtcl-0.79+dfsg0/sqlite3/shell.c:4947:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zSql, zLine+i, nLine+1-i); data/jimtcl-0.79+dfsg0/sqlite3/shell.c:4952:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zSql+nSql, zLine, nLine+1); data/jimtcl-0.79+dfsg0/sqlite3/shell.c:4964:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zPrefix[100]; data/jimtcl-0.79+dfsg0/sqlite3/shell.c:5061:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. if( z ) memcpy(z, home_dir, n); data/jimtcl-0.79+dfsg0/sqlite3/shell.c:5094:8: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). in = fopen(sqliterc,"rb"); data/jimtcl-0.79+dfsg0/sqlite3/shell.c:5163:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data->colSeparator,SEP_Column, 2); data/jimtcl-0.79+dfsg0/sqlite3/shell.c:5164:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data->rowSeparator,SEP_Row, 2); data/jimtcl-0.79+dfsg0/sqlite3/shell.c:5435:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data.colSeparator,",",2); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:15253:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zSelName[12]; /* Symbolic name of this SELECT use for debugging */ data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:15446:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. typedef unsigned char yDbMask[(SQLITE_MAX_ATTACHED+9)/8]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:16964:31: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. SQLITE_PRIVATE const unsigned char sqlite3CtypeMap[256] = { data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:17958:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zBase[100]; /* Initial space */ data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:19111:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *z, zBuf[30]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:19382:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zBuf[100]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:19402:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zBuf[100]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:19421:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zBuf[100]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:19458:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zBuf[100]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:19645:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zBuf[20]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:20668:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zTitle[100]; /* The title text */ data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:20838:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pBt, &aAddr[1], pHdr->nBacktrace*sizeof(void*)); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:20847:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(z, mem.zTitle, mem.nTitle); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:20914:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pNew, pPrior, (int)(nByte<pOldHdr->iSize ? nByte : pOldHdr->iSize)); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:21020:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mem.zTitle, zTitle, n); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:21044:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). out = fopen(zFilename, "w"); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:21633:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, pPrior, nOld); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:21635:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, pPrior, nBytes); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:21691:11: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). out = fopen(zFilename, "w"); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:22190:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, pPrior, nOld); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:22311:11: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). out = fopen(zFilename, "w"); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:24521:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pNew, p, db->lookaside.sz); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:24569:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zNew, z, n); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:24582:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zNew, z, (size_t)n); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:24873:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[etBUFSIZE]; /* Conversion buffer */ data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:25155:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf+(prefix!=0),"Inf",4); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:25454:42: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. if( !isMalloced(p) && p->nChar>0 ) memcpy(zNew, p->zText, p->nChar); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:25490:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&p->zText[p->nChar], z, N); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:25510:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&p->zText[p->nChar-N], z, N); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:25534:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p->zText, p->zBase, p->nChar+1); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:25586:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zBase[SQLITE_PRINT_BUF_SIZE]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:25619:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zBase[SQLITE_PRINT_BUF_SIZE]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:25705:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zMsg[SQLITE_PRINT_BUF_SIZE*3]; /* Complete log message */ data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:25734:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zBuf[500]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:25815:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zBuf[500]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:25856:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zLine[1000]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:25919:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zLine[100]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:25994:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zFlgs[30]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:26287:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char s[256]; /* State variables */ data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:26340:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char k[256]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:26381:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:26388:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:26892:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zBuf[100]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:27002:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zBuf[100]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:27159:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char zBuf[20]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:27875:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pOut, &u, 8); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:27916:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pValue, &u, 4); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:28348:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&x,p,4); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:28353:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&x,p,4); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:28358:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&x,p,4); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:28367:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p,&v,4); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:28371:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p,&x,4); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:28375:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p,&x,4); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:28646:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&a, &x, 8); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:29385:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char aPadding[32]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:29669:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). return open(zFile, flags, mode); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:30244:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pNew->zCanonicalName, zAbsoluteName, n+1); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:30422:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char aSemName[MAX_PATHNAME+2]; /* Name of that semaphore */ data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:30462:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char aErr[80]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:30650:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&pInode->fileId, &fileId, sizeof(fileId)); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:32519:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pBuf, &((u8 *)(pFile->pMapRegion))[offset], amt); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:32523:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pBuf, &((u8 *)(pFile->pMapRegion))[offset], nCopy); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:32638:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char oldCntr[4]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:32654:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&((u8 *)(pFile->pMapRegion))[offset], pBuf, amt); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:32658:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&((u8 *)(pFile->pMapRegion))[offset], pBuf, nCopy); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:32841:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zDirname[MAX_PATHNAME+1]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:34894:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zDb[MAX_PATHNAME+1]; /* Database file path */ data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:34924:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zDb, zPath, nDb); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:35002:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zTmpname[MAX_PATHNAME+2]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:35182:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). useProxy = atoi(envforce)>0; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:35384:15: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zDel, zIn, n); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:35499:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zBuf, &t, sizeof(t)); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:35500:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&zBuf[sizeof(t)], &randomnessPid, sizeof(randomnessPid)); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:35843:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAXPATHLEN]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:36021:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tPath[MAXPATHLEN]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:36022:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[PROXY_MAXCONCHLEN]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:36026:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char errmsg[64] = ""; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:36115:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tBuf[PROXY_MAXCONCHLEN]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:36165:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char readBuf[PROXY_MAXCONCHLEN]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:36166:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lockPath[MAXPATHLEN]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:36222:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(lockPath, &readBuf[PROXY_PATHINDEX], pathLen); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:36268:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char writeBuffer[PROXY_MAXCONCHLEN]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:36272:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&writeBuffer[PROXY_HEADERLEN], myHostID, PROXY_HOSTIDLEN); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:36419:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(conchPath, dbPath, len+1); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:36435:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&conchPath[i+1], "-conch", 7); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:36495:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dbPath, (char *)pFile->lockingContext, len + 1); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:36514:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dbPath[MAXPATHLEN+1]; /* Name of the database file */ data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:38018:41: [2] (buffer) MultiByteToWideChar: Requires maximum length in CHARACTERS, not bytes (CWE-120). { "MultiByteToWideChar", (SYSCALL)MultiByteToWideChar, 0 }, data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:38436:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zDbgBuf[SQLITE_WIN32_DBG_BUF_SIZE]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:38449:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zDbgBuf, zBuf, nMin); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:38465:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zDbgBuf, zBuf, nMin); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:39151:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zMsg[500]; /* Human readable error text */ data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:39805:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pBuf, &((u8 *)(pFile->pMapRegion))[offset], amt); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:39811:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pBuf, &((u8 *)(pFile->pMapRegion))[offset], nCopy); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:39883:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&((u8 *)(pFile->pMapRegion))[offset], pBuf, amt); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:39889:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&((u8 *)(pFile->pMapRegion))[offset], pBuf, nCopy); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:43297:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(aiValues, p->u.aHash, sizeof(p->u.aHash)); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:43337:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(aiValues, p->u.aHash, sizeof(p->u.aHash)); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:46952:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dbFileVers[16]; /* Changes whenever database file changes */ data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:47261:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char zRet[1024]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:47342:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char ac[4]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:47361:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ac[4]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:47533:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char aMagic[8]; /* A buffer to hold the magic header */ data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:47625:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char zeroHdr[28] = {0}; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:47713:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zHeader, aJournalMagic, sizeof(aJournalMagic)); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:47790:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char aMagic[8]; /* A buffer to hold the magic header */ data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:48672:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pData, (u8*)aData, pPager->pageSize); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:50454:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zHeader, aJournalMagic, sizeof(aJournalMagic)); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:50969:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pPager->zFilename, zPathname, nPathname); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:50970:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. if( nUri ) memcpy(&pPager->zFilename[nPathname+1], zUri, nUri); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:50971:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pPager->zJournal, zPathname, nPathname); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:50972:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&pPager->zJournal[nPathname], "-journal\000", 8+2); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:50976:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pPager->zWal, zPathname, nPathname); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:50977:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&pPager->zWal[nPathname], "-wal\000", 4+1); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:51468:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dbFileVers[sizeof(pPager->dbFileVers)]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:52376:54: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const void *pCopy = (const void *)&((const char *)zBuf)[24]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:54352:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((void*)&aHdr[1], (const void*)&pWal->hdr, sizeof(WalIndexHdr)); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:54354:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((void*)&aHdr[0], (const void*)&pWal->hdr, sizeof(WalIndexHdr)); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:54383:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&aFrame[8], pWal->hdr.aSalt, 8); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:54464:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char zName[15]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:54832:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&pWal->hdr.aSalt, &aBuf[16], 8); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:55137:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(aLeft, aTmp, sizeof(aTmp[0])*iOut); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:55364:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&pWal->hdr.aSalt[1], &salt1, 4); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:55717:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&pWal->hdr, &h1, sizeof(WalIndexHdr)); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:56131:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&pWal->hdr, pSnapshot, sizeof(WalIndexHdr)); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:56383:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&pWal->hdr, (void *)walIndexHdr(pWal), sizeof(WalIndexHdr)); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:56691:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&aWalHdr[16], pWal->hdr.aSalt, 8); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:57075:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pRet, &pWal->hdr, sizeof(WalIndexHdr)); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:58906:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char aSpace[200]; /* Temp space for pIdxKey - to avoid a malloc */ data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:59531:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&temp[x], &data[x], (cbrk+size) - x); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:59534:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&data[cbrk], &src[pc], size); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:59597:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&aData[iAddr], &aData[pc], 2); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:60291:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char zDbHeader[100]; /* Database header content */ data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:60353:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zFullPathname, zFilename, nFilename); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:61198:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data, zMagicHeader, sizeof(zMagicHeader)); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:62542:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pPayload, pBuf, nByte); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:62545:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pBuf, pPayload, nByte); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:62747:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(aSave, aWrite, 4); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:62750:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(aWrite, aSave, 4); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:63766:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&pPage1->aData[32], &pTrunk->aData[0], 4); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:63790:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&pPage1->aData[32], &pTrunk->aData[0], 4); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:63796:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&pPrevTrunk->aData[0], &pTrunk->aData[0], 4); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:63819:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&pNewTrunk->aData[0], &pTrunk->aData[0], 4); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:63821:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&pNewTrunk->aData[8], &pTrunk->aData[12], (k-1)*4); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:63886:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&aData[8+closest*4], &aData[4+k*4], 4); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:64362:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pPayload, pSrc, n); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:64469:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pTemp, pCell, sz); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:64504:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&data[idx], pCell, sz); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:64601:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&pTmp[i], &aData[i], usableSize - i); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:64613:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pData, pCell, szCell[i]); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:64776:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pTmp, aData, pPg->pBt->usableSize); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:65052:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&aTo[iData], &aFrom[iData], pBt->usableSize-iData); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:65053:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&aTo[iToHdr], &aFrom[iFromHdr], pFrom->cellOffset + 2*pFrom->nCell); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:65247:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&aOvflSpace[iOff], apDiv[i], szNew[i]); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:65363:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pTemp, apDiv[i], sz); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:65372:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(b.apCell[b.nCell], &pOld->aData[8], 4); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:65611:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&apNew[nNew-1]->aData[8], &pOld->aData[8], 4); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:65685:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&pNew->aData[8], pCell, 4); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:65913:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pChild->aiOvfl, pRoot->aiOvfl, data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:65915:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pChild->apOvfl, pRoot->apOvfl, data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:66178:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(newCell, oldCell, 4); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:67468:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zErr[100]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:68165:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zOut, zIn, nCopy); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:68803:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pMem->zMalloc, pMem->z, pMem->n); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:69000:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pMem, &t, sizeof(t)); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:69445:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pTo, pFrom, MEMCELLSIZE); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:69462:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pTo, pFrom, MEMCELLSIZE); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:69486:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pTo, pFrom, sizeof(Mem)); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:69561:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pMem->z, z, nAlloc); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:70648:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. if( p4copy ) memcpy(p4copy, zP4, 8); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:71794:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zPtr[50]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:71795:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zCom[100]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:72098:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char z[1000]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:73207:17: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *out = fopen("vdbe_profile.out", "a"); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:73226:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zHdr[100]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:73660:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. if( len>0 ) memcpy(buf, pMem->z, len); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:73717:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&pMem->u.r, &x, sizeof(x)); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:75213:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pNew, pOrig, MEMCELLSIZE); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:76933:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zBase[100]; /* Initial working space */ data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:77526:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zBuf[200]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:78565:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pOut->z, pIn2->z, pIn2->n); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:78567:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&pOut->z[pIn2->n], pIn1->z, pIn1->n); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:79726:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pDest->z, zData, len); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:80022:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pNew->zName, zName, nName+1); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:81078:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char aTempRec[ROUND8(sizeof(UnpackedRecord)) + sizeof(Mem)*4 + 7]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:85167:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p->aAlloc, &p->aBuffer[iBuf], nAvail); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:85183:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&p->aAlloc[nByte - nRem], aNext, nCopy); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:85590:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pKeyInfo, pCsr->pKeyInfo, szKeyInfo); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:86105:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&p->aBuffer[p->iBufEnd], &pData[nData-nRem], nCopy); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:86482:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(SRVAL(pNew), pVal->z, pVal->n); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:87315:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pOut->z, pKey, nKey); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:87499:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zOut, (u8*)pChunk->zChunk + iChunkOffset, nCopy); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:87596:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((u8*)p->pFirst->zChunk, zBuf, iAmt); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:87624:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((u8*)p->endpoint.pChunk->zChunk + iChunkOffset, zWrite, iSpace); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:88056:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pExpr, pDup, sizeof(*pExpr)); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:89940:25: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. if( pToken->n ) memcpy(pNew->u.zToken, pToken->z, pToken->n); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:90375:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zAlloc, p, nNewSize); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:90378:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zAlloc, p, nSize); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:90392:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zToken, p->u.zToken, nToken); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:94629:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pNew->aCol, pTab->aCol, sizeof(Column)*pNew->nCol); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:94972:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p->u.aRowid, pData, n); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:94999:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pTo->anEq, pFrom->anEq, sizeof(tRowcnt)*p->nCol); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:95000:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pTo->anLt, pFrom->anLt, sizeof(tRowcnt)*p->nCol); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:95001:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pTo->anDLt, pFrom->anDLt, sizeof(tRowcnt)*p->nCol); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:96422:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pSample->p, sqlite3_column_blob(pStmt, 4), pSample->n); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:96621:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. zFile = (const char *)sqlite3_value_text(argv[0]); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:96622:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. zName = (const char *)sqlite3_value_text(argv[1]); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:96657:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(aNew, db->aDb, sizeof(db->aDb[0])*2); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:96731:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. zKey = (char *)sqlite3_value_blob(argv[2]); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:96809:30: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *zName = (const char *)sqlite3_value_text(argv[0]); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:96813:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zErr[128]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:97655:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char saveBuf[SAVE_SZ]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:97666:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(saveBuf, &pParse->nVar, SAVE_SZ); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:97671:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&pParse->nVar, saveBuf, SAVE_SZ); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:97897:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(db->aDbStatic, db->aDb, 2*sizeof(db->aDb[0])); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:98451:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(z, pName->z, pName->n); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:98482:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zType, pType->z, pType->n); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:98973:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&zStmt[k], zType, len); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:98993:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zExtra, pIdx->azColl, sizeof(char*)*pIdx->nColumn); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:98996:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zExtra, pIdx->aiColumn, sizeof(i16)*pIdx->nColumn); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:98999:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zExtra, pIdx->aSortOrder, pIdx->nColumn); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:99802:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zTab[24]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:100054:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(z, pTo->z, pTo->n); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:100082:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(z, pToCol->a[i].zName, n); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:100497:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pIndex->zName, zName, nName+1); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:100570:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zExtra, zColl, nColl); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:100846:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&a[1], aVal, nCopy*sizeof(LogEst)); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:101884:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pColl, pColl2, sizeof(CollSeq)); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:101994:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pColl[0].zName, zName, nName); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:102235:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char*)&pBest[1], zName, nName+1); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:104189:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zBuf[50]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:104433:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&zOut[j], zRep, nRep); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:104439:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&zOut[j], &zStr[i], nStr-i); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:104567:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zResult[8]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:104616:30: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *zFile = (const char *)sqlite3_value_text(argv[0]); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:104630:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. zProc = (const char *)sqlite3_value_text(argv[1]); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:104924:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(aWc, pDef->pUserData, 3); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:106351:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)pStep->zTarget, zFrom, nFrom); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:108795:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*pzErrMsg, sqlite3_errmsg(db), nErrMsg); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:108943:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int (*open)(const char*,sqlite3**); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:109216:53: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). #define sqlite3_open sqlite3_api->open data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:109902:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zAltEntry, "sqlite3_", 8); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:109911:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zAltEntry+iEntry, "_init", 6); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:109947:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(aHandle, db->aExtension, sizeof(handle)*db->nExtension); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:110946:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *aFcntl[4]; /* Argument to SQLITE_FCNTL_PRAGMA */ data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:112593:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zKey[40]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:112773:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char const *azArg[4]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:115253:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&pCol->zName[n+1], zType, m+1); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:119296:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(z, argv[i], n); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:119781:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(z, pName->z, pName->n); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:121773:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zCopy, zName, nName+1); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:122791:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char*)&pNew[1], pDef->zName, sqlite3Strlen30(pDef->zName)+1); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:123623:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zBuf[100]; /* Initial space for EQP output string */ data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:124150:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char d2[3]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:125014:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pOrTab->a, pTabItem, sizeof(*pTabItem)); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:125421:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pWC->a, pOld, sizeof(pWC->a[0])*pWC->nTerm); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:125547:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char wc[3]; /* Wildcard characters */ data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:126811:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(aiCur, pWInfo->aiCurOnePass, sizeof(int)*2); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:126827:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pDest->a, pSrc->a, pDest->n*sizeof(pDest->a[0])); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:128360:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zType[4]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:128361:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zLeft[50]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:128362:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zType, "...", 4); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:128494:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(paNew, p->aLTerm, sizeof(p->aLTerm[0])*p->nLSlot); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:128510:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pTo, pFrom, WHERE_LOOP_XFER_SZ); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:128511:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pTo->aLTerm, pFrom->aLTerm, pTo->nLTerm*sizeof(pTo->aLTerm[0])); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:130309:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char zName[65]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:130601:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pTo->aLoop, pFrom->aLoop, sizeof(WhereLoop*)*iLoop); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:135394:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char zText[553] = { data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:135427:25: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const unsigned char aHash[127] = { data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:135439:25: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const unsigned char aNext[124] = { data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:135451:25: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const unsigned char aLen[124] = { data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:135475:25: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const unsigned char aCode[124] = { data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:136773:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&y, &x, 8); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:137865:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char zBuf[50]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:139219:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zFile, zUri, nUri); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:139559:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zKey[40]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:140783:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pNew, aArg, nArg*sizeof(void *)); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:142839:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, zCol, n); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:143135:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p->aIndex, aIndex, sizeof(struct Fts3Index) * nIndex); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:143145:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zCsr, argv[2], nName); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:143148:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zCsr, argv[1], nDb); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:143155:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. z = (char *)sqlite3Fts3NextToken(aCol[iCol], &n); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:143156:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zCsr, z, n); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:143161:24: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. assert( zCsr <= &((char *)p)[nByte] ); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:143596:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&zBuffer[nPrefix], zCsr, nSuffix); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:143748:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, *ppPoslist, n); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:143786:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, *ppPoslist, n); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:144111:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *aaOutput[16]; /* Malloc'd output buffers */ data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:144503:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pTS->aaOutput[0], aDoclist, nDoclist); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:145300:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&pRet, sqlite3_value_blob(pVal), sizeof(Fts3Cursor *)); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:145421:21: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. zArg = (const char *)sqlite3_value_text(apVal[1]); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:146320:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(aDoclist, a[p->nToken-1].pList, nByte+1); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:147795:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)p->pFts3Tab->zDb, zDb, nDb); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:147796:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)p->pFts3Tab->zName, zFts3, nFts3); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:148453:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pRet->pPhrase->aToken[0].z, zToken, nToken); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:148568:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&zTemp[nTemp], zByte, nByte); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:148596:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zBuf, zTemp, nTemp); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:149369:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((void *)pp, sqlite3_column_blob(pStmt, 0), sizeof(*pp)); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:149468:34: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. (const char *)sqlite3_value_text(argv[0]), &pModule); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:149485:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. zExpr = (const char *)sqlite3_value_text(argv[1]); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:149494:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. azCol[ii] = (char *)sqlite3_value_text(argv[ii+2]); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:149918:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((void*)new_elem->pKey, pKey, nKey); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:150278:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zReverse[28]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:150876:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *azArg[64]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:150893:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. zName = (const char *)sqlite3_value_text(argv[0]); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:150895:19: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. zInput = (const char *)sqlite3_value_text(argv[argc-1]); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:150911:25: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. azArg[i-1] = (const char *)sqlite3_value_text(argv[i]); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:150992:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((void *)pp, sqlite3_column_blob(pStmt, 0), sizeof(*pp)); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:151156:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char delim[128]; /* flag ASCII delimiters */ data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:151489:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pSpace, argv[i], n+1); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:151703:32: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *zByte = (const char *)sqlite3_value_text(apVal[0]); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:151709:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pCsr->zInput, zByte, nByte); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:152739:34: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *zText = (const char *)sqlite3_value_text(apVal[i]); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:153149:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(aCopy, pList->aData, nCopy); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:153208:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&pReader->zTerm[nPrefix], pNext, nSuffix); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:153440:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pReader->aNode, zRoot, nRoot); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:153563:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pReader->ppNextElem, aElem, nElem*sizeof(Fts3HashElem *)); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:153854:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&pTree->aData[nData], &zTerm[nPrefix], nSuffix); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:153868:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pTree->zTerm, zTerm, nTerm); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:154118:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&pWriter->aData[nData], &zTerm[nPrefix], nSuffix); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:154121:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&pWriter->aData[nData], aDoclist, nDoclist); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:154140:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pWriter->zTerm, zTerm, nTerm); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:154448:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pMsr->aBuffer, pList, nList); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:154792:15: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&pCsr->aBuffer[nDoclist], pList, nList); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:155544:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&p->term.a[nPrefix], &p->aNode[p->iOff], nSuffix); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:155648:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&pBlk->a[pBlk->n], &zTerm[nPrefix], nSuffix); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:155651:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pNode->key.a, zTerm, nTerm); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:155724:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pPrev->a, zTerm, nTerm); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:155731:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&pNode->a[pNode->n], &zTerm[nPrefix], nSuffix); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:155736:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&pNode->a[pNode->n], aDoclist, nDoclist); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:156067:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pNode->block.a, aRoot, nRoot); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:156079:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pNode->key.a, reader.term.a, reader.term.n); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:156089:15: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pNode->block.a, aBlock, nBlock); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:156553:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pHint->a, aHint, nHint); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:157116:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). p->nNodeSize = atoi(&zVal[9]); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:157119:26: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). p->nMaxPendingData = atoi(&zVal[11]); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:157122:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). p->bNoIncrDoclist = atoi(&zVal[21]); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:157244:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pRet, &p->pList->aData[nSkip], *pnData); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:157637:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pRet->zMatchinfo, zMatchinfo, nStr+1); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:157678:24: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. if( p->bGlobal ) memcpy(aOut, &p->aMatchinfo[1], p->nElem*sizeof(u32)); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:157688:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&p->aMatchinfo[2+p->nElem], &p->aMatchinfo[1], p->nElem*sizeof(u32)); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:158112:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&pStr->z[pStr->n], zAppend, nAppend); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:159142:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char aBuffer[64]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:160514:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pNode->zData, zBlob, pRtree->iNodeSize); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:160892:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&c.u,a,4); \ data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:160900:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&c.u,a,4); \ data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:161462:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pBlob, sqlite3_value_blob(pValue), nBlob); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:161644:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zIdxStr[RTREE_MAX_DIMENSIONS*8+1]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:161786:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&cell, p, sizeof(RtreeCell)); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:161968:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(aSpare, aLeft, sizeof(int)*nLeft); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:162037:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(aSpare, aLeft, sizeof(int)*nLeft); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:162128:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&left, &aCell[aaSorted[ii][0]], sizeof(RtreeCell)); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:162129:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&right, &aCell[aaSorted[ii][nCell-1]], sizeof(RtreeCell)); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:162158:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pBboxLeft, &aCell[aaSorted[iBestDim][0]], sizeof(RtreeCell)); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:162159:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pBboxRight, &aCell[aaSorted[iBestDim][iBestSplit]], sizeof(RtreeCell)); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:162226:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&aCell[nCell], pCell, sizeof(RtreeCell)); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:162518:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&aCell[ii], pCell, sizeof(RtreeCell)); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:163048:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *azSql[N_STATEMENT] = { data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:163237:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pRtree->zDb, argv[1], nDb); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:163238:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pRtree->zName, argv[2], nName); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:163314:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zCell[512]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:163773:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zBuf[128]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:163903:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. zLocale = (const char *)sqlite3_value_text(apArg[1]); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:164003:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. zLocale = (const char *)sqlite3_value_text(apArg[0]); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:164004:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. zName = (const char *)sqlite3_value_text(apArg[1]); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:164156:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p->zLocale, argv[0], n); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:165278:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zStateDb[5]; /* Db name for state ("stat" or "main") */ data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:165482:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zOut, &zSrc[ofst], cnt); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:165497:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zOut, zDelta, cnt); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:165987:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zRet, zStr, nCopy); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:166140:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pIter->abIndexed, pIter->abTblPk, sizeof(u8)*pIter->nTblCol); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:167129:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pUp->zMask, zMask, pIter->nTblCol); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:167279:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p->zStateDb, "stat", 4); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:167281:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p->zStateDb, "main", 4); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:167619:11: [2] (buffer) MultiByteToWideChar: Requires maximum length in CHARACTERS, not bytes (CWE-120). nChar = MultiByteToWideChar(CP_UTF8, 0, zFilename, -1, NULL, 0); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:167628:11: [2] (buffer) MultiByteToWideChar: Requires maximum length in CHARACTERS, not bytes (CWE-120). nChar = MultiByteToWideChar(CP_UTF8, 0, zFilename, -1, zWideFilename, data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:168280:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zRnd[64]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:168423:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p->zTarget, zTarget, nTarget+1); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:168427:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p->zRbu, zRbu, nRbu+1); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:168431:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p->zState, zState, nState+1); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:169359:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zCopy, zBase, nCopy); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:169612:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&pNew->base, &vfs_template, sizeof(sqlite3_vfs)); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:169617:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zSpace, zName, nName); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:170701:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&i, &r, 8); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:170725:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&aBuf[nVarint + 1], eType==SQLITE_TEXT ? data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:170833:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&iVal, &rVal, 8); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:170988:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(aOut, a2, n2); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:170991:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(aOut, a1, n1); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:171086:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(aOut, aOld, nOld); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:171114:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(aOut, aNew, nNew); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:171176:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&rVal, &iVal, 8); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:171324:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pAlloc, zThis, nThis+1); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:171334:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pAlloc, zName, nName+1); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:171920:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pNew->zDb, zDb, nDb+1); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:172044:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pTab->zName, zName, nName+1); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:172144:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&p->aBuf[p->nBuf], aBlob, nBlob); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:172164:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&p->aBuf[p->nBuf], zStr, nStr); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:172182:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char aBuf[24]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:172237:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&i, &r, 8); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:172320:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&dVal, &iVal, 8); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:172512:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&rVal, &iVal, 8); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:172936:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(aCopy, aData, nData); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:173006:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&d, &v, 8); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:173126:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&p->tblhdr.aBuf[iPK], &p->in.aData[p->in.iNext], nCopy); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:174574:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pNew->aRecord, aRec, nRec); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:174628:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(aCsr, aRec, nRec); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:174653:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(aCsr, aRec, nRec); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:174723:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pTab->abPK, abPK, nCol); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:174725:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pTab->zName, zNew, nNew+1); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:175102:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zSpace[100]; /* Initial static space */ data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:175214:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zNew, p->zBuf, (size_t)p->nUsed); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:175233:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p->zBuf+p->nUsed, zIn, N); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:177003:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p->zJson, z, (size_t)n+1); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:177025:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p->zRoot, zRoot, (size_t)n+1); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:180478:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&pBuf->p[pBuf->n], pData, nData); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:180681:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zRet, pIn, nIn); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:180776:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pEntry->pTerm, pTerm, nTerm); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:181116:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pSpace, p2, p-p2); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:181238:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zOut, zIn, nIn+1); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:181582:19: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. if( zRank ) memcpy(zRank, pRank, p-pRank); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:181602:27: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. if( zRankArgs ) memcpy(zRankArgs, pArgs, p-pArgs); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:182110:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(aNew, aIter, sizeof(Fts5PoslistReader) * nIter); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:183269:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pSyn->zTerm, pToken, nToken); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:183426:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pColset, pColsetOrig, nByte); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:183646:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&p->apChild[p->nChild], pSub->apChild, nByte); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:184491:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zKey[8]; /* Nul-terminated entry key */ data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:184694:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&p->zKey[1], pToken, nToken); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:186035:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&(pBuf)->p[(pBuf)->n], pBlob, nBlob); \ data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:186133:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pOut->aSeg, &pLvl->aSeg[is], sizeof(Fts5StructureSegment)); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:190013:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pData->p, doclist.p, doclist.n); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:190252:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&buf.p[1], pToken, nToken); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:191183:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(a, aBlob, n); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:193855:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pAux->zFunc, zName, nName); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:193893:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pNew->zName, zName, nName); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:194009:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[8]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:194013:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, (void*)&pGlobal, sizeof(pGlobal)); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:195302:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char aAsciiTokenChar[128] = { data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:195315:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char aTokenChar[128]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:195358:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p->aTokenChar, aAsciiTokenChar, sizeof(aAsciiTokenChar)); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:195406:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char aFold[64]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:195511:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char aTokenChar[128]; /* ASCII range token characters */ data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:195622:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p->aTokenChar, aAsciiTokenChar, sizeof(aAsciiTokenChar)); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:195730:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(aFold, p->aFold, nFold); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:195784:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char aBuf[FTS5_PORTER_MAX_TOKEN + 64]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:195871:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&aBuf[nStem], p->zOutput, p->nOutput); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:196110:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&aBuf[nBuf-2], "ate", 3); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:196118:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&aBuf[nBuf-2], "ble", 3); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:196126:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&aBuf[nBuf-2], "ize", 3); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:196145:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&aBuf[nBuf-7], "ate", 3); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:196150:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&aBuf[nBuf-6], "tion", 4); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:196159:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&aBuf[nBuf-4], "ence", 4); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:196164:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&aBuf[nBuf-4], "ance", 4); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:196173:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&aBuf[nBuf-4], "ize", 3); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:196182:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&aBuf[nBuf-4], "log", 3); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:196191:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&aBuf[nBuf-3], "ble", 3); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:196196:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&aBuf[nBuf-4], "al", 2); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:196201:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&aBuf[nBuf-5], "ent", 3); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:196206:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&aBuf[nBuf-3], "e", 1); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:196211:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&aBuf[nBuf-5], "ous", 3); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:196220:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&aBuf[nBuf-7], "ize", 3); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:196225:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&aBuf[nBuf-5], "ate", 3); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:196230:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&aBuf[nBuf-4], "ate", 3); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:196239:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&aBuf[nBuf-5], "al", 2); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:196244:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&aBuf[nBuf-7], "ive", 3); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:196249:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&aBuf[nBuf-7], "ful", 3); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:196254:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&aBuf[nBuf-7], "ous", 3); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:196263:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&aBuf[nBuf-5], "al", 2); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:196268:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&aBuf[nBuf-5], "ive", 3); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:196273:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&aBuf[nBuf-6], "ble", 3); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:196292:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&aBuf[nBuf-4], "ic", 2); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:196309:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&aBuf[nBuf-5], "ic", 2); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:196314:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&aBuf[nBuf-5], "ic", 2); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:196339:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&aBuf[nBuf-5], "al", 2); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:196358:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&aBuf[nBuf-3], "ee", 2); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:196421:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(aBuf, pToken, nBuf); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:197426:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pRet->zFts5Tbl, zTab, nTab); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:197427:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pRet->zFts5Db, zDb, nDb); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:197759:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pCsr->zLeTerm, zCopy, pCsr->nLeTerm+1); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3ext.h:113:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int (*open)(const char*,sqlite3**); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3ext.h:386:53: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). #define sqlite3_open sqlite3_api->open data/jimtcl-0.79+dfsg0/examples.api/jim_obj.c:60:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). obj = Jim_NewStringObj(interp, OBJ_DESC, strlen(OBJ_DESC)); data/jimtcl-0.79+dfsg0/jim-aio.c:485:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *salen = strlen(sa->sun.sun_path) + 1 + sizeof(sa->sun.sun_family); data/jimtcl-0.79+dfsg0/jim-aio.c:532:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). snprintf(addrbuf + strlen(addrbuf), 8, "]:%d", ntohs(sa->sin6.sin6_port)); data/jimtcl-0.79+dfsg0/jim-aio.c:538:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). snprintf(addrbuf + strlen(addrbuf), 7, ":%d", ntohs(sa->sin.sin_port)); data/jimtcl-0.79+dfsg0/jim-aio.c:801:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(buf); data/jimtcl-0.79+dfsg0/jim-eventloop.c:58:9: [1] (obsolete) usleep: This C routine is considered obsolete (as opposed to the shell command by the same name). The interaction of this function with SIGALRM and other timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead. #define usleep(US) Sleep((US) / 1000) data/jimtcl-0.79+dfsg0/jim-eventloop.c:70:9: [1] (obsolete) usleep: This C routine is considered obsolete (as opposed to the shell command by the same name). The interaction of this function with SIGALRM and other timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead. #define usleep(US) sleep((US) / 1000000) data/jimtcl-0.79+dfsg0/jim-eventloop.c:474:9: [1] (obsolete) usleep: This C routine is considered obsolete (as opposed to the shell command by the same name). The interaction of this function with SIGALRM and other timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead. usleep(sleep_us); data/jimtcl-0.79+dfsg0/jim-eventloop.c:655:9: [1] (obsolete) usleep: This C routine is considered obsolete (as opposed to the shell command by the same name). The interaction of this function with SIGALRM and other timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead. usleep(ms * 1000); data/jimtcl-0.79+dfsg0/jim-exec.c:1039:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). i = strlen(arg_array[firstArg]); data/jimtcl-0.79+dfsg0/jim-format.c:429:49: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). formatted_chars = formatted_bytes = strlen(num_buffer); data/jimtcl-0.79+dfsg0/jim-interactive.c:60:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(line); data/jimtcl-0.79+dfsg0/jim-interactive.c:88:12: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). mask = umask(S_IXUSR | S_IRWXG | S_IRWXO); data/jimtcl-0.79+dfsg0/jim-interactive.c:92:5: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). umask(mask); data/jimtcl-0.79+dfsg0/jim-interactive.c:181:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int history_len = strlen(home) + sizeof("/.jim_history"); data/jimtcl-0.79+dfsg0/jim-load.c:61:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pkgnamelen = strlen(pkgname); data/jimtcl-0.79+dfsg0/jim-mk.cpp:268:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *descrPtr = (char *)Jim_Realloc(descr, strlen(descr) + 1); data/jimtcl-0.79+dfsg0/jim-mk.cpp:350:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (len != (int)strlen(rep)) { data/jimtcl-0.79+dfsg0/jim-mk.cpp:406:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(name); data/jimtcl-0.79+dfsg0/jim-mk.cpp:1978:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dlen = strlen(descr); data/jimtcl-0.79+dfsg0/jim-signal.c:478:13: [1] (obsolete) usleep: This C routine is considered obsolete (as opposed to the shell command by the same name). The interaction of this function with SIGALRM and other timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead. usleep((int)((t - (int)t) * 1e6)); data/jimtcl-0.79+dfsg0/jim-syslog.c:118:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(info->ident, Jim_String(argv[i + 1]), sizeof(info->ident)); data/jimtcl-0.79+dfsg0/jim-syslog.c:156:17: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(info->ident, Jim_String(argv0), sizeof(info->ident)); data/jimtcl-0.79+dfsg0/jim-win32compat.c:73:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t base_length = strlen(name); data/jimtcl-0.79+dfsg0/jim-win32compat.c:78:58: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (dir->name = (char *)Jim_Alloc(base_length + strlen(all) + 1)) != 0) { data/jimtcl-0.79+dfsg0/jim.c:1045:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return Jim_GenHashFunction(key, strlen(key)); data/jimtcl-0.79+dfsg0/jim.c:2304:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). objPtr->length = strlen(str); data/jimtcl-0.79+dfsg0/jim.c:2415:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(s); data/jimtcl-0.79+dfsg0/jim.c:2457:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). objPtr->length = (len == -1) ? strlen(s) : len; data/jimtcl-0.79+dfsg0/jim.c:2469:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(str); data/jimtcl-0.79+dfsg0/jim.c:5624:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (objPtr->bytes && strlen(objPtr->bytes) > 20) { data/jimtcl-0.79+dfsg0/jim.c:15524:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(format); data/jimtcl-0.79+dfsg0/jim.c:15542:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(params[n]); data/jimtcl-0.79+dfsg0/jimiocompat.c:169:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (tmpdir[0] && tmpdir[strlen(tmpdir) - 1] != '/') { data/jimtcl-0.79+dfsg0/jimiocompat.c:179:12: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). mask = umask(S_IXUSR | S_IRWXG | S_IRWXO); data/jimtcl-0.79+dfsg0/jimiocompat.c:190:5: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). umask(mask); data/jimtcl-0.79+dfsg0/jimregexp.c:254:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). preg->proglen = (strlen(exp) + 1) * 5; data/jimtcl-0.79+dfsg0/jimregexp.c:780:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). n = strlen(character_class[cc]); data/jimtcl-0.79+dfsg0/linenoise-win32.c:193:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(buf); data/jimtcl-0.79+dfsg0/linenoise.c:178:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sb_append_len(sb, str, strlen(str)); data/jimtcl-0.79+dfsg0/linenoise.c:261:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(str); data/jimtcl-0.79+dfsg0/linenoise.c:740:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(buf); data/jimtcl-0.79+dfsg0/linenoise.c:833:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (read(fd, &c, 1) != 1) { data/jimtcl-0.79+dfsg0/linenoise.c:851:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (read(current->fd, &buf[0], 1) != 1) { data/jimtcl-0.79+dfsg0/linenoise.c:859:13: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (read(current->fd, &buf[i], 1) != 1) { data/jimtcl-0.79+dfsg0/linenoise.c:1765:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). rlen = strlen(rbuf); data/jimtcl-0.79+dfsg0/linenoise.c:2092:17: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ((c = getc(fh)) != EOF) { data/jimtcl-0.79+dfsg0/sqlite3/jim-sqlite3.c:2244:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(pDb->zNull, zNull, len); data/jimtcl-0.79+dfsg0/sqlite3/shell.c:1443:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int n = (int)strlen(aTrans[i].zPattern); data/jimtcl-0.79+dfsg0/sqlite3/shell.c:2557:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int i = (int)strlen(z); data/jimtcl-0.79+dfsg0/sqlite3/shell.c:2620:7: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). c = fgetc(p->in); data/jimtcl-0.79+dfsg0/sqlite3/shell.c:2631:11: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). c = fgetc(p->in); data/jimtcl-0.79+dfsg0/sqlite3/shell.c:2665:11: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). c = fgetc(p->in); data/jimtcl-0.79+dfsg0/sqlite3/shell.c:2694:7: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). c = fgetc(p->in); data/jimtcl-0.79+dfsg0/sqlite3/shell.c:2701:9: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). c = fgetc(p->in); data/jimtcl-0.79+dfsg0/sqlite3/shell.c:2727:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int nTable = (int)strlen(zTable); data/jimtcl-0.79+dfsg0/sqlite3/shell.c:2748:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). i = (int)strlen(zInsert); data/jimtcl-0.79+dfsg0/sqlite3/shell.c:3790:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int n2 = (int)strlen(zMode); data/jimtcl-0.79+dfsg0/sqlite3/shell.c:3915:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(mainPrompt,azArg[1],(int)ArraySize(mainPrompt)-1); data/jimtcl-0.79+dfsg0/sqlite3/shell.c:3918:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(continuePrompt,azArg[2],(int)ArraySize(continuePrompt)-1); data/jimtcl-0.79+dfsg0/sqlite3/shell.c:4689:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (int)strlen(azArg[3])); data/jimtcl-0.79+dfsg0/sqlite3/shell.c:4701:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). azArg[3], (int)strlen(azArg[3]), data/jimtcl-0.79+dfsg0/sqlite3/shell.c:4714:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). azArg[3], (int)strlen(azArg[3]), data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:27316:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return 0x3fffffff & (int)strlen(z); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:27328:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return pCol->zName + strlen(pCol->zName) + 1; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:29722:42: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). { "read", (sqlite3_syscall_ptr)read, 0 }, data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:30240:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). n = (int)strlen(zAbsoluteName); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:32844:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for(ii=(int)strlen(zDirname); ii>0 && zDirname[ii]!='/'; ii--); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:33600:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nShmFilename = 6 + (int)strlen(zBasePath); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:34678:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nFilename = (int)strlen(zFilename) + 6; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:35059:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert( (flags & SQLITE_OPEN_URI) || zName[strlen(zName)+1]==0 ); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:35072:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert( zName[strlen(zName)+1]==0 ); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:35531:3: [1] (obsolete) usleep: This C routine is considered obsolete (as opposed to the shell command by the same name). The interaction of this function with SIGALRM and other timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead. usleep(microseconds); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:35827:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dbLen = (int)strlen(dbPath); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:35848:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = (int)strlen(lockPath); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:36104:9: [1] (obsolete) usleep: This C routine is considered obsolete (as opposed to the shell command by the same name). The interaction of this function with SIGALRM and other timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead. usleep(500000); /* wait 0.5 sec and try the lock again*/ data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:36130:9: [1] (obsolete) usleep: This C routine is considered obsolete (as opposed to the shell command by the same name). The interaction of this function with SIGALRM and other timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead. usleep(10000000); /* wait 10 sec and try the lock again */ data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:36279:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). writeSize = PROXY_PATHINDEX + strlen(&writeBuffer[PROXY_PATHINDEX]); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:36410:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = (int)strlen(dbPath); /* Length of database filename - dbPath */ data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:36436:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert( (int)strlen(conchPath) == len+7 ); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:36486:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert( (int)strlen((char*)pFile->lockingContext)<=MAXPATHLEN ); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:36494:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen((char *)pFile->lockingContext) - strlen(DOTLOCK_SUFFIX); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:36494:55: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen((char *)pFile->lockingContext) - strlen(DOTLOCK_SUFFIX); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:36498:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert( strlen((char*)pFile->lockingContext)<=MAXPATHLEN ); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:124019:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert( zAff==0 || (int)strlen(zAff)>=nEq ); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:142556:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nRet = 2 + (int)strlen(zInput)*2 + 1; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:142827:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nStr += (int)strlen(zCol) + 1; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:142838:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int n = (int)strlen(zCol)+1; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:142904:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert( strlen(argv[0])==4 ); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:142909:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nDb = (int)strlen(argv[1]) + 1; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:142910:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nName = (int)strlen(argv[2]) + 1; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:142944:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). && strlen(z)>8 data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:142983:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if( strlen(zVal)!=4 || sqlite3_strnicmp(zVal, "fts3", 4) ){ data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:143009:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if( (strlen(zVal)!=3 || sqlite3_strnicmp(zVal, "asc", 3)) data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:143010:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). && (strlen(zVal)!=4 || sqlite3_strnicmp(zVal, "desc", 4)) data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:143043:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nString += (int)(strlen(z) + 1); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:143166:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int n = (int)strlen(p->azColumn[iCol]); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:143169:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if( zNot && n==(int)strlen(zNot) data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:147767:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nDb = (int)strlen(zDb); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:147771:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nDb = (int)strlen(zDb); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:147779:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nFts3 = (int)strlen(zFts3); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:148763:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int nStr = (int)strlen(zStr); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:149223:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). n = (int)strlen(z); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:149649:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if( nKey<=0 ) nKey = (int) strlen(z); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:150040:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). c->nInput = (int)strlen(zInput); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:150502:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *pnOut = i = (int)strlen(z); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:150778:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). zEnd = &zCopy[strlen(zCopy)]; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:150788:68: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). m = (sqlite3_tokenizer_module *)sqlite3Fts3HashFind(pHash,z,(int)strlen(z)+1); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:151196:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int i, n = (int)strlen(argv[1]); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:151248:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). c->nBytes = (int)strlen(pInput); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:151440:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int nName = (int)strlen(zName); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:151478:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nByte += (int)(strlen(argv[i]) + 1); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:151487:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int n = (int)strlen(argv[i]); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:157628:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int nStr = (int)strlen(zMatchinfo); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:158093:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nAppend = (int)strlen(zAppend); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:159437:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int n = (int)strlen(z); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:159489:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pCsr->nInput = (int)strlen(aInput); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:161542:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). || (idxStr && (int)strlen(idxStr)==argc*2) ); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:163223:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nDb = (int)strlen(argv[1]); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:163224:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nName = (int)strlen(argv[2]); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:163321:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nCell = (int)strlen(zCell); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:163330:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nCell = (int)strlen(zCell); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:164146:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). n = strlen(argv[0])+1; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:164202:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nInput = strlen(zInput); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:165828:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if( strlen(zIn)>4 && memcmp("data", zIn, 4)==0 ){ data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:165984:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t nCopy = strlen(zStr) + 1; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:166548:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if( (int)strlen(zMask)!=pIter->nTblCol ){ data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:167352:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if( strlen(p->zRbu)>=5 && 0==memcmp("file:", p->zRbu, 5) ){ data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:167437:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz = (int)strlen(z)&0xffffff; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:168405:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t nTarget = zTarget ? strlen(zTarget) : 0; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:168406:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t nRbu = strlen(zRbu); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:168407:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t nState = zState ? strlen(zState) : 0; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:168584:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t nErrmsg = strlen(p->zErrmsg); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:169272:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int n = (int)strlen(zName); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:169356:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nCopy = strlen(zBase); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:169599:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nName = strlen(zName); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:172561:51: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sessionAppendBlob(pBuf, (u8 *)pTab->zName, (int)strlen(pTab->zName)+1, pRc); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:174391:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nTab = (int)strlen(zTab); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:174705:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int nNew = (int)strlen(zNew); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:175245:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). p->nUsed += (int)strlen(p->zBuf+p->nUsed); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:176894:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). jsonAppendRaw(&x, p->zRoot, (int)strlen(p->zRoot)); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:179984:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if( n<0 ) n = (int)strlen(z); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:180492:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int nStr = (int)strlen(zStr); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:180677:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nIn = (int)strlen(pIn); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:181010:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int nEnum = (int)strlen(zEnum); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:181042:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int nCmd = (int)strlen(zCmd); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:181098:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int nArg = (int)strlen(zArg) + 1; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:181228:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int nIn = (int)strlen(zIn); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:182533:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pExpr->pIndex, p->zTerm, (int)strlen(p->zTerm), data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:183353:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). n = (int)strlen(z); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:183437:64: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). rc = fts5ParseTokenize((void*)&sCtx, tflags, zTerm, (int)strlen(zTerm), data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:183804:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nByte += (int)strlen(pTerm->zTerm) * 2 + 3 + 2; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:184278:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int nTerm = (int)strlen(pTerm->zTerm); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:184596:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). iHash = fts5HashKey(nNew, (u8*)p->zKey, (int)strlen(p->zKey)); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:184936:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int nTerm = (int)strlen(p->zKey); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:186873:54: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sqlite3Fts5BufferSet(&p->rc,&pIter->term, (int)strlen(zTerm), (u8*)zTerm); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:186953:55: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sqlite3Fts5BufferSet(&p->rc, &pIter->term, (int)strlen(zTerm), data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:187390:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). n = (z ? (int)strlen((const char*)z) : 0); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:189421:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). fts5WriteAppendTerm(p, &writer, (int)strlen(zTerm), (const u8*)zTerm); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:193849:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nName = (int)strlen(zName) + 1; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:193887:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nName = (int)strlen(zName) + 1; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:194447:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). iOff = (int)strlen(zDefn); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:194450:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). iOff += (int)strlen(&zDefn[iOff]); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:195525:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int n = (int)strlen(z); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:195862:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert( strlen(p->zSuffix)==p->nSuffix ); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:195863:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert( strlen(p->zOutput)==p->nOutput ); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:197398:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bDb = (argc==6 && strlen(argv[1])==4 && memcmp("temp", argv[1], 4)==0); data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:197408:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int nDb = (int)strlen(zDb)+1; data/jimtcl-0.79+dfsg0/sqlite3/sqlite3.c:197409:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int nTab = (int)strlen(zTab)+1; data/jimtcl-0.79+dfsg0/utf8.c:67:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bytelen = strlen(str); data/jimtcl-0.79+dfsg0/utf8.h:32:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). #define utf8_strlen(S, B) ((B) < 0 ? (int)strlen(S) : (B)) ANALYSIS SUMMARY: Hits = 914 Lines analyzed = 255606 in approximately 7.39 seconds (34576 lines/second) Physical Source Lines of Code (SLOC) = 157393 Hits@level = [0] 268 [1] 171 [2] 661 [3] 27 [4] 53 [5] 2 Hits@level+ = [0+] 1182 [1+] 914 [2+] 743 [3+] 82 [4+] 55 [5+] 2 Hits/KSLOC@level+ = [0+] 7.50986 [1+] 5.80712 [2+] 4.72067 [3+] 0.520989 [4+] 0.349444 [5+] 0.012707 Dot directories skipped = 1 (--followdotdir overrides) Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.