Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/libburn-1.5.2/test/libburner.c
Examining data/libburn-1.5.2/test/telltoc.c
Examining data/libburn-1.5.2/test/fake_au.c
Examining data/libburn-1.5.2/test/offst_source.c
Examining data/libburn-1.5.2/test/dewav.c
Examining data/libburn-1.5.2/test/poll.c
Examining data/libburn-1.5.2/cdrskin/cdrskin.c
Examining data/libburn-1.5.2/cdrskin/cleanup.c
Examining data/libburn-1.5.2/cdrskin/cdrfifo.h
Examining data/libburn-1.5.2/cdrskin/cleanup.h
Examining data/libburn-1.5.2/cdrskin/cdrskin_timestamp.h
Examining data/libburn-1.5.2/cdrskin/cdrfifo.c
Examining data/libburn-1.5.2/libburn/init.h
Examining data/libburn-1.5.2/libburn/toc.h
Examining data/libburn-1.5.2/libburn/structure.c
Examining data/libburn-1.5.2/libburn/cleanup.c
Examining data/libburn-1.5.2/libburn/null.c
Examining data/libburn-1.5.2/libburn/sg-libcdio.c
Examining data/libburn-1.5.2/libburn/ecma130ab.c
Examining data/libburn-1.5.2/libburn/sg-solaris.c
Examining data/libburn-1.5.2/libburn/ecma130ab.h
Examining data/libburn-1.5.2/libburn/back_hacks.h
Examining data/libburn-1.5.2/libburn/spc.h
Examining data/libburn-1.5.2/libburn/crc.c
Examining data/libburn-1.5.2/libburn/mmc.c
Examining data/libburn-1.5.2/libburn/options.h
Examining data/libburn-1.5.2/libburn/sector.h
Examining data/libburn-1.5.2/libburn/os-freebsd.h
Examining data/libburn-1.5.2/libburn/libdax_msgs.c
Examining data/libburn-1.5.2/libburn/sg.c
Examining data/libburn-1.5.2/libburn/async.h
Examining data/libburn-1.5.2/libburn/debug.c
Examining data/libburn-1.5.2/libburn/util.h
Examining data/libburn-1.5.2/libburn/libburn.h
Examining data/libburn-1.5.2/libburn/read.c
Examining data/libburn-1.5.2/libburn/write.c
Examining data/libburn-1.5.2/libburn/file.h
Examining data/libburn-1.5.2/libburn/init.c
Examining data/libburn-1.5.2/libburn/os-solaris.h
Examining data/libburn-1.5.2/libburn/cleanup.h
Examining data/libburn-1.5.2/libburn/drive.c
Examining data/libburn-1.5.2/libburn/write.h
Examining data/libburn-1.5.2/libburn/cdtext.c
Examining data/libburn-1.5.2/libburn/sg-netbsd.c
Examining data/libburn-1.5.2/libburn/read.h
Examining data/libburn-1.5.2/libburn/error.h
Examining data/libburn-1.5.2/libburn/sg-dummy.c
Examining data/libburn-1.5.2/libburn/transport.h
Examining data/libburn-1.5.2/libburn/libdax_audioxtr.h
Examining data/libburn-1.5.2/libburn/source.h
Examining data/libburn-1.5.2/libburn/source.c
Examining data/libburn-1.5.2/libburn/crc.h
Examining data/libburn-1.5.2/libburn/sector.c
Examining data/libburn-1.5.2/libburn/sbc.h
Examining data/libburn-1.5.2/libburn/debug.h
Examining data/libburn-1.5.2/libburn/structure.h
Examining data/libburn-1.5.2/libburn/sg.h
Examining data/libburn-1.5.2/libburn/spc.c
Examining data/libburn-1.5.2/libburn/util.c
Examining data/libburn-1.5.2/libburn/options.c
Examining data/libburn-1.5.2/libburn/sg-freebsd.c
Examining data/libburn-1.5.2/libburn/drive.h
Examining data/libburn-1.5.2/libburn/null.h
Examining data/libburn-1.5.2/libburn/file.c
Examining data/libburn-1.5.2/libburn/sbc.c
Examining data/libburn-1.5.2/libburn/os.h
Examining data/libburn-1.5.2/libburn/libdax_msgs.h
Examining data/libburn-1.5.2/libburn/async.c
Examining data/libburn-1.5.2/libburn/toc.c
Examining data/libburn-1.5.2/libburn/os-libcdio.h
Examining data/libburn-1.5.2/libburn/libdax_audioxtr.c
Examining data/libburn-1.5.2/libburn/os-netbsd.h
Examining data/libburn-1.5.2/libburn/mmc.h
Examining data/libburn-1.5.2/libburn/os-linux.h
Examining data/libburn-1.5.2/libburn/os-dummy.h
Examining data/libburn-1.5.2/libburn/sg-linux.c

FINAL RESULTS:

data/libburn-1.5.2/libburn/drive.c:2058:8:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
	ret = readlink(path, link_target, link_target_size);
data/libburn-1.5.2/cdrskin/cdrskin.c:499:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
       strcpy((*argv)[0],progname);
data/libburn-1.5.2/cdrskin/cdrskin.c:530:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy((*argv)[argcount],buf);
data/libburn-1.5.2/cdrskin/cdrskin.c:574:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
 strcpy(fileadr,filename);
data/libburn-1.5.2/cdrskin/cdrskin.c:580:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
 strcpy(fileadr,home);
data/libburn-1.5.2/cdrskin/cdrskin.c:583:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
   strcat(fileadr,filename);
data/libburn-1.5.2/cdrskin/cdrskin.c:730:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(buf,from);
data/libburn-1.5.2/cdrskin/cdrskin.c:748:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
 strcpy(trn->from_address[cnt],from_pt);
data/libburn-1.5.2/cdrskin/cdrskin.c:749:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
 strcpy(trn->to_address[cnt],to_pt);
data/libburn-1.5.2/cdrskin/cdrskin.c:791:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
 strcpy(to,adr);
data/libburn-1.5.2/cdrskin/cdrskin.c:796:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(to,"%s%d",Cdrskin_no_transl_prefiX,driveno);
data/libburn-1.5.2/cdrskin/cdrskin.c:798:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(to,from);
data/libburn-1.5.2/cdrskin/cdrskin.c:805:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(to,trn->from_address[i]);
data/libburn-1.5.2/cdrskin/cdrskin.c:813:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
       sprintf(to,"%s%s",Cdrskin_no_transl_prefiX,from);
data/libburn-1.5.2/cdrskin/cdrskin.c:992:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
 strcpy(o->original_source_path,o->source_path);
data/libburn-1.5.2/cdrskin/cdrskin.c:2066:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(o->rc_filenames[i],Cdrpreskin_sys_rc_nameS[i]);
data/libburn-1.5.2/cdrskin/cdrskin.c:2110:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(preskin->queue_severity,queue_severity);
data/libburn-1.5.2/cdrskin/cdrskin.c:2112:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(preskin->print_severity,print_severity);
data/libburn-1.5.2/cdrskin/cdrskin.c:2213:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
     strcpy(queue_severity,o->queue_severity);
data/libburn-1.5.2/cdrskin/cdrskin.c:2214:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
     strcpy(print_severity,o->print_severity);
data/libburn-1.5.2/cdrskin/cdrskin.c:2370:2:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
 execvp(hargv[0], hargv);
data/libburn-1.5.2/cdrskin/cdrskin.c:2761:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
     strcpy(o->raw_device_adr,value_pt);
data/libburn-1.5.2/cdrskin/cdrskin.c:3119:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
     strcpy(o->fallback_program,argv[i]+17);
data/libburn-1.5.2/cdrskin/cdrskin.c:3271:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
     strcpy(o->device_adr,adr);
data/libburn-1.5.2/cdrskin/cdrskin.c:3280:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
       strcpy(o->device_adr,adr);
data/libburn-1.5.2/cdrskin/cdrskin.c:3289:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
     strcpy(link_adr,o->device_adr);
data/libburn-1.5.2/cdrskin/cdrskin.c:3878:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
 strcpy(source_path,skin->source_path);
data/libburn-1.5.2/cdrskin/cdrskin.c:4456:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(btldev,"stdio:%s",adr);
data/libburn-1.5.2/cdrskin/cdrskin.c:4491:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
     sprintf(btldev,"1,%s,0",loc+k_start);
data/libburn-1.5.2/cdrskin/cdrskin.c:4506:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
     strcpy(btldev,loc);
data/libburn-1.5.2/cdrskin/cdrskin.c:4521:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
       strcpy(btldev,buf);
data/libburn-1.5.2/cdrskin/cdrskin.c:4526:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
     strcpy(btldev,buf);
data/libburn-1.5.2/cdrskin/cdrskin.c:4704:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(adr, link_adr);
data/libburn-1.5.2/cdrskin/cdrskin.c:4736:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(adr, link_adr);
data/libburn-1.5.2/cdrskin/cdrskin.c:6182:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
       sprintf(path, "%s/%s%2.2u.wav", dir, basename, toc_entry.point);
data/libburn-1.5.2/cdrskin/cdrskin.c:8546:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
     strcpy(skin->cdtext_to_textfile_path, value_pt);
data/libburn-1.5.2/cdrskin/cdrskin.c:8561:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
     strcpy(skin->cdtext_to_vt07_path, value_pt);
data/libburn-1.5.2/cdrskin/cdrskin.c:8585:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
     strcpy(skin->cuefile, value_pt);
data/libburn-1.5.2/cdrskin/cdrskin.c:8719:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
     strcpy(skin->eject_device,argv[i]+13);
data/libburn-1.5.2/cdrskin/cdrskin.c:8736:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
     strcpy(skin->extract_audio_dir, value_pt);
data/libburn-1.5.2/cdrskin/cdrskin.c:8781:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
     strcpy(skin->extract_basename, value_pt);
data/libburn-1.5.2/cdrskin/cdrskin.c:8930:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
     strcpy(skin->sheet_v07t_paths[skin->sheet_v07t_blocks], argv[i] + 17);
data/libburn-1.5.2/cdrskin/cdrskin.c:9130:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
     strcpy(skin->msifile, value_pt);
data/libburn-1.5.2/cdrskin/cdrskin.c:9448:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
     strcpy(skin->source_path,argv[i]);
data/libburn-1.5.2/cdrskin/cleanup.c:123:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
     sprintf(cleanup_msg,"UNIX-SIGNAL:  %s  errno= %d",
data/libburn-1.5.2/libburn/cdtext.c:472:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(buf, payload);
data/libburn-1.5.2/libburn/cdtext.c:641:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(line + 2, genre_text);
data/libburn-1.5.2/libburn/cdtext.c:704:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(msg,
data/libburn-1.5.2/libburn/cdtext.c:1007:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(msg,
data/libburn-1.5.2/libburn/cdtext.c:1218:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(*respt, "%-19s = ", spec);
data/libburn-1.5.2/libburn/cdtext.c:1378:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(msg, "%s %-2.2d",
data/libburn-1.5.2/libburn/cdtext.c:1381:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(msg, "Track %-2.2d %s",
data/libburn-1.5.2/libburn/cdtext.c:1384:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(msg, spec);
data/libburn-1.5.2/libburn/cdtext.c:1517:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(msg, genres[genre]);
data/libburn-1.5.2/libburn/cleanup.c:128:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
     sprintf(cleanup_msg,"UNIX-SIGNAL:  %s  errno= %d",
data/libburn-1.5.2/libburn/drive.c:260:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(off_adr, path);
data/libburn-1.5.2/libburn/drive.c:633:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(msg, "Unable to grab scanned drive %s", d->devname);
data/libburn-1.5.2/libburn/drive.c:1688:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(new_item, device_address);
data/libburn-1.5.2/libburn/drive.c:1982:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
		sprintf(msg, fmt, arg);
data/libburn-1.5.2/libburn/drive.c:2005:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(adr,d->devname);
data/libburn-1.5.2/libburn/drive.c:2066:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(msg,"readlink( %s ) returns %d (too much)", path, ret);
data/libburn-1.5.2/libburn/drive.c:2074:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(link_adr, path);
data/libburn-1.5.2/libburn/drive.c:2076:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(adrpt + 1, link_target);
data/libburn-1.5.2/libburn/drive.c:2089:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(adr, adrpt);
data/libburn-1.5.2/libburn/drive.c:2095:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(msg,"burn_drive_convert_fs_adr( %s ) returns %d",
data/libburn-1.5.2/libburn/drive.c:2132:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(msg, "burn_drive_find_devno( 0x%lX ) found %s",
data/libburn-1.5.2/libburn/drive.c:2135:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(adr, fname);
data/libburn-1.5.2/libburn/drive.c:2228:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(adr, fname);
data/libburn-1.5.2/libburn/drive.c:2252:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(msg,"burn_drive_obtain_scsi_adr( %s ) returns %d",
data/libburn-1.5.2/libburn/drive.c:2257:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(msg, "burn_drive_find_scsi_equiv( %s ) : (%d),%d,%d,%d,%d",
data/libburn-1.5.2/libburn/drive.c:2283:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(adr, path);
data/libburn-1.5.2/libburn/drive.c:2359:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(adr, dir_adr);
data/libburn-1.5.2/libburn/drive.c:2368:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  	strcpy(namept, entry->d_name);
data/libburn-1.5.2/libburn/drive.c:2392:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(link_adr, adr); 
data/libburn-1.5.2/libburn/drive.c:2732:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(name,d->current_profile_text);
data/libburn-1.5.2/libburn/drive.c:2756:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(name, mmc_obtain_profile_name(profile_number));
data/libburn-1.5.2/libburn/drive.c:2831:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(to->profile_name, from->profile_name);
data/libburn-1.5.2/libburn/drive.c:3298:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(conv_adr1, adr1);
data/libburn-1.5.2/libburn/drive.c:3300:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(conv_adr2, adr2);
data/libburn-1.5.2/libburn/init.c:298:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(severity,sev_name);
data/libburn-1.5.2/libburn/libdax_audioxtr.c:100:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(msg,"Cannot open audio source file : %s",o->path);
data/libburn-1.5.2/libburn/libdax_audioxtr.c:108:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(msg,"Audio source file has unsuitable format : %s",o->path);
data/libburn-1.5.2/libburn/libdax_audioxtr.c:116:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(msg,"Failed to prepare reading of audio data : %s",o->path);
data/libburn-1.5.2/libburn/libdax_msgs.c:350:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
     sprintf(sev_text,"%s : ",sev_name);
data/libburn-1.5.2/libburn/libdax_msgs.c:381:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(item->msg_text,msg_text);
data/libburn-1.5.2/libburn/libdax_msgs.h:511:71:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
 0x00020140 (FATAL,HIGH)   = Drive is busy on attempt to write random access
data/libburn-1.5.2/libburn/libdax_msgs.h:513:61:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
 0x00020142 (FATAL,HIGH)   = Drive is not grabbed on random access write
data/libburn-1.5.2/libburn/mmc.c:277:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(msg, "Emulated drive caught in SCSI adapter \"%s\"",
data/libburn-1.5.2/libburn/mmc.c:633:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(msg, "Failed to close %s (%d)",
data/libburn-1.5.2/libburn/mmc.c:791:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(sleeplist,"(%d%s %d)",
data/libburn-1.5.2/libburn/mmc.c:804:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(sleeplist+strlen(sleeplist)," (%d%s %d)",
data/libburn-1.5.2/libburn/mmc.c:1931:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(d->current_profile_text, mmc_obtain_profile_name(cp));
data/libburn-1.5.2/libburn/mmc.c:2144:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(msg,
data/libburn-1.5.2/libburn/mmc.c:2518:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(msg,
data/libburn-1.5.2/libburn/mmc.c:2521:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(msg, "SCSI error on %s(%dm%ds%df,%dm%ds%df): ",
data/libburn-1.5.2/libburn/mmc.c:3096:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(d->current_profile_text, mmc_obtain_profile_name(cp));
data/libburn-1.5.2/libburn/mmc.c:3137:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(d->current_profile_text, mmc_obtain_profile_name(cp));
data/libburn-1.5.2/libburn/mmc.c:3278:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(d->phys_if_name, phys_name);
data/libburn-1.5.2/libburn/mmc.c:3785:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(descr, "%s (descr %d)", d->current_profile_text,index);
data/libburn-1.5.2/libburn/mmc.c:3806:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(msg,"FORMAT UNIT ignored. Already %s.",
data/libburn-1.5.2/libburn/mmc.c:3894:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(descr, "DVD-RW %s",
data/libburn-1.5.2/libburn/mmc.c:3968:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(descr, "%s", d->current_profile_text);
data/libburn-1.5.2/libburn/mmc.c:4093:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(descr, "%s", d->current_profile_text);
data/libburn-1.5.2/libburn/mmc.c:4228:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(descr, "%s", d->current_profile_text);
data/libburn-1.5.2/libburn/mmc.c:4237:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(msg, "Unsuitable media detected. Profile %4.4Xh  %s",
data/libburn-1.5.2/libburn/mmc.c:4261:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(msg, "Format type %2.2Xh \"%s\", blocks = %.f",
data/libburn-1.5.2/libburn/mmc.c:4282:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(msg,
data/libburn-1.5.2/libburn/mmc.c:4302:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(msg, "SCSI error on format_unit(%s): ", descr);
data/libburn-1.5.2/libburn/mmc.c:4347:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy((*sd)->profile_name, d->current_profile_text);
data/libburn-1.5.2/libburn/mmc.c:5093:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(*media_code2, "%.3s%s", reply + type_idx,
data/libburn-1.5.2/libburn/mmc.c:5103:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(*product_id, "%s/%s", *media_code1, *media_code2);
data/libburn-1.5.2/libburn/mmc.c:5152:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(*product_id, "%s/%s", *media_code1, *media_code2);
data/libburn-1.5.2/libburn/mmc.c:5262:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(*book_type, "%2.2Xh, %s book [revision %d]",
data/libburn-1.5.2/libburn/mmc.c:5471:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(text, to_add);
data/libburn-1.5.2/libburn/mmc.c:5616:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(addon,
data/libburn-1.5.2/libburn/mmc.c:5627:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(addon,
data/libburn-1.5.2/libburn/mmc.c:5799:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(addon + strlen(addon),
data/libburn-1.5.2/libburn/mmc.c:5894:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(addon + strlen(addon),
data/libburn-1.5.2/libburn/sg-dummy.c:268:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(testpath, path);
data/libburn-1.5.2/libburn/sg-dummy.c:298:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(testpath, path);
data/libburn-1.5.2/libburn/sg-freebsd.c:628:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(msg,
data/libburn-1.5.2/libburn/sg-freebsd.c:670:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
					sprintf(msg,
data/libburn-1.5.2/libburn/sg-freebsd.c:1087:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(testpath, path);
data/libburn-1.5.2/libburn/sg-freebsd.c:1130:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(testpath, path);
data/libburn-1.5.2/libburn/sg-libcdio.c:272:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(adr, *(idx->pos));
data/libburn-1.5.2/libburn/sg-libcdio.c:311:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(out.libcdio_name, fname);
data/libburn-1.5.2/libburn/sg-libcdio.c:313:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(out.libcdio_name, cdio_name);
data/libburn-1.5.2/libburn/sg-libcdio.c:465:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(adr, path);
data/libburn-1.5.2/libburn/sg-libcdio.c:512:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(target, buf);
data/libburn-1.5.2/libburn/sg-libcdio.c:558:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(d->libcdio_name, d->devname);
data/libburn-1.5.2/libburn/sg-libcdio.c:565:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(msg, "Could not grab drive '%s'", d->devname);
data/libburn-1.5.2/libburn/sg-libcdio.c:893:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(testpath, path);
data/libburn-1.5.2/libburn/sg-libcdio.c:958:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(testpath, path);
data/libburn-1.5.2/libburn/sg-linux.c:366:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(scd + 8, fname + 7);
data/libburn-1.5.2/libburn/sg-linux.c:371:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(msg, "%s substitutes for non-existent %s", scd, fname);
data/libburn-1.5.2/libburn/sg-linux.c:377:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(fname, scd);
data/libburn-1.5.2/libburn/sg-linux.c:482:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(msg,
data/libburn-1.5.2/libburn/sg-linux.c:497:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(msg, "INQUIRY failed on '%s' : host_status= %hd , driver_status= %hd", fname, s.host_status, s.driver_status);
data/libburn-1.5.2/libburn/sg-linux.c:517:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(msg, "INQUIRY on '%s' : byte 0 = 0x%2.2X",
data/libburn-1.5.2/libburn/sg-linux.c:546:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(msg, "%s1", fname);
data/libburn-1.5.2/libburn/sg-linux.c:581:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(msg, "Could not examine busy device '%s'", fname);
data/libburn-1.5.2/libburn/sg-linux.c:585:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(msg,
data/libburn-1.5.2/libburn/sg-linux.c:593:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(msg, "Cannot open busy device '%s'", fname);
data/libburn-1.5.2/libburn/sg-linux.c:645:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(msg, "Encountered error when closing drive '%s'", fname);
data/libburn-1.5.2/libburn/sg-linux.c:684:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(msg, "Device busy. Failed to fcntl-lock '%s'",
data/libburn-1.5.2/libburn/sg-linux.c:768:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(msg, "Failed to open device '%s'",fname);
data/libburn-1.5.2/libburn/sg-linux.c:868:4:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
			sprintf(fname, tldev[tld], i);
data/libburn-1.5.2/libburn/sg-linux.c:889:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(msg, "Too many scsi siblings of '%s'",
data/libburn-1.5.2/libburn/sg-linux.c:897:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(msg, "Opened O_EXCL scsi sibling '%s' of '%s'",
data/libburn-1.5.2/libburn/sg-linux.c:904:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(sibling_fnames[*sibling_count], fname);
data/libburn-1.5.2/libburn/sg-linux.c:1133:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
		sprintf(fname, linux_ata_device_family, 'a' + i);
data/libburn-1.5.2/libburn/sg-linux.c:1175:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
		sprintf(fname, linux_sg_device_family, i);
data/libburn-1.5.2/libburn/sg-linux.c:1217:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(other_name, "/dev/scd%s", fname + 7);
data/libburn-1.5.2/libburn/sg-linux.c:1224:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(other_name, "/dev/sr%s", fname + 8);
data/libburn-1.5.2/libburn/sg-linux.c:1263:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(msg, "File object '%s' not found", fname);
data/libburn-1.5.2/libburn/sg-linux.c:1314:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(msg, "Cannot access '%s' as SG_IO CDROM drive", fname);
data/libburn-1.5.2/libburn/sg-linux.c:1374:4:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
			sscanf(cpt, "%s", fname + 5);
data/libburn-1.5.2/libburn/sg-linux.c:1378:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy((*list)[*count], fname);
data/libburn-1.5.2/libburn/sg-linux.c:1602:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(adr, linux_sg_device_family, idx->pos);
data/libburn-1.5.2/libburn/sg-linux.c:1613:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(adr, linux_ata_device_family, 'a' + (idx->pos - baseno));
data/libburn-1.5.2/libburn/sg-linux.c:1626:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(adr, (idx->info_list)[i]);
data/libburn-1.5.2/libburn/sg-linux.c:1953:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(msg+strlen(msg), "0x%x %s",
data/libburn-1.5.2/libburn/sg-linux.c:1966:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(msg, "--- SG_IO: host_status= 0x%x %s",
data/libburn-1.5.2/libburn/sg-linux.c:2014:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(msg+strlen(msg), "driver_status= 0x%x %s / %s",
data/libburn-1.5.2/libburn/sg-linux.c:2028:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(msg, "--- SG_IO: driver_status= 0x%x %s / %s",
data/libburn-1.5.2/libburn/sg-linux.c:2151:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(text, "dxferp before = %lx%s",
data/libburn-1.5.2/libburn/sg-linux.c:2427:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(testpath, path);
data/libburn-1.5.2/libburn/sg-linux.c:2448:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(testpath, path);
data/libburn-1.5.2/libburn/sg-netbsd.c:261:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(adr, path);
data/libburn-1.5.2/libburn/sg-netbsd.c:461:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(msg, "Could not grab drive '%s'", d->devname);
data/libburn-1.5.2/libburn/sg-netbsd.c:496:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(msg, "Could not grab drive '%s'.", d->devname);
data/libburn-1.5.2/libburn/sg-netbsd.c:776:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(try, "/dev/%s", dev_names[dev]);
data/libburn-1.5.2/libburn/sg-netbsd.c:827:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(testpath, path);
data/libburn-1.5.2/libburn/sg-netbsd.c:855:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(testpath, path);
data/libburn-1.5.2/libburn/sg-solaris.c:271:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(msg, "Volume Management symbolic name: '%s' -> %s",
data/libburn-1.5.2/libburn/sg-solaris.c:283:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(msg, "Media name: %s -> %s",
data/libburn-1.5.2/libburn/sg-solaris.c:292:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(*dev_to_open, curr_name);
data/libburn-1.5.2/libburn/sg-solaris.c:338:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(volpath, "/dev/rdsk/%s", entry->d_name);
data/libburn-1.5.2/libburn/sg-solaris.c:347:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(msg, "Could not open '%s' , errno = %d",
data/libburn-1.5.2/libburn/sg-solaris.c:360:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(msg,
data/libburn-1.5.2/libburn/sg-solaris.c:370:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(msg,
data/libburn-1.5.2/libburn/sg-solaris.c:381:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(msg,
data/libburn-1.5.2/libburn/sg-solaris.c:390:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(adr, volpath);
data/libburn-1.5.2/libburn/sg-solaris.c:391:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(msg, "Accepted as valid drive '%s'", volpath);
data/libburn-1.5.2/libburn/sg-solaris.c:626:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(msg, "Could not grab drive '%s'",
data/libburn-1.5.2/libburn/sg-solaris.c:629:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(msg + strlen(msg), " via '%s'", dev_to_open);
data/libburn-1.5.2/libburn/sg-solaris.c:639:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(msg, "ioctl(DKIOCINFO) failed on drive '%s'",
data/libburn-1.5.2/libburn/sg-solaris.c:648:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(msg,
data/libburn-1.5.2/libburn/sg-solaris.c:664:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(msg, "Could not grab drive '%s'. Not a CDROM device.",
data/libburn-1.5.2/libburn/sg-solaris.c:931:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(testpath, path);
data/libburn-1.5.2/libburn/sg-solaris.c:957:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(testpath, path);
data/libburn-1.5.2/libburn/spc.c:171:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(cmd_name, cmd_text);
data/libburn-1.5.2/libburn/spc.c:204:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(msg,
data/libburn-1.5.2/libburn/spc.c:217:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(msg, "Attempted SCSI CDB: %s",
data/libburn-1.5.2/libburn/spc.c:238:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
					sprintf(msg, "Attempted SCSI CDB: %s",
data/libburn-1.5.2/libburn/spc.c:257:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(msg, "Async %s %s after %d.%d seconds",
data/libburn-1.5.2/libburn/spc.c:268:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(msg, "Timeout (%d s) with asynchronous SCSI command %s\n",
data/libburn-1.5.2/libburn/spc.c:273:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(msg, "Attempted SCSI CDB: %s", cmd_cpt + 1);
data/libburn-1.5.2/libburn/spc.c:535:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(msg,
data/libburn-1.5.2/libburn/spc.c:576:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(msg, "MODE SENSE page 2A too short: %s : %d",
data/libburn-1.5.2/libburn/spc.c:657:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(sd->profile_name,
data/libburn-1.5.2/libburn/spc.c:1303:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(msg, "%s. ", key_def[*key & 0xf]);
data/libburn-1.5.2/libburn/spc.c:1642:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(msg_data,
data/libburn-1.5.2/libburn/spc.c:1789:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(msg, spc_command_name( (unsigned int) c->opcode[0], 0));
data/libburn-1.5.2/libburn/spc.c:1851:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(msg, "SCSI error condition on command %2.2Xh %s: ",
data/libburn-1.5.2/libburn/spc.c:1854:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(msg, scsi_msg);
data/libburn-1.5.2/libburn/spc.c:2190:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(msg, "INQUIRY failed with drive '%s'", d->devname);
data/libburn-1.5.2/libburn/spc.c:2197:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(msg, "Does not identify itself as CD-ROM drive '%s'",
data/libburn-1.5.2/libburn/structure.c:1523:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(msg,
data/libburn-1.5.2/libburn/structure.c:1564:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(msg, "In cue sheet file: %s found before TRACK",
data/libburn-1.5.2/libburn/util.c:131:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(buf, "%s  (aka %s)",
data/libburn-1.5.2/libburn/util.c:242:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(buf, "Unknown DVD/BD manufacturer. Please report code '%s/%s', the human readable brand, size, and speed to scdbackup@gmx.net.", 
data/libburn-1.5.2/libburn/write.c:1449:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(reasons, "%s: ", d->current_profile_text);
data/libburn-1.5.2/libburn/write.c:1522:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(msg,
data/libburn-1.5.2/libburn/write.c:1711:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(msg, "Finalizing %s ...",
data/libburn-1.5.2/libburn/write.c:1726:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(msg, "... finalizing %s done               ",
data/libburn-1.5.2/libburn/write.c:2418:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(msg, "Write preparation setup failed for %s",
data/libburn-1.5.2/test/fake_au.c:66:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
     strcpy(out_path, argv[i]);
data/libburn-1.5.2/test/fake_au.c:90:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
     strcpy(in_path, argv[i]);
data/libburn-1.5.2/test/libburner.c:679:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(drive_adr, argv[i]);
data/libburn-1.5.2/test/libburner.c:709:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(source_adr[source_adr_count], argv[i]);
data/libburn-1.5.2/test/telltoc.c:836:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(drive_adr, argv[i]);
data/libburn-1.5.2/test/telltoc.c:862:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(print_raw_file, strchr(argv[i], ':') + 1);
data/libburn-1.5.2/cdrskin/cdrskin.c:575:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
 home= getenv("HOME");
data/libburn-1.5.2/libburn/libdax_msgs.h:511:64:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
 0x00020140 (FATAL,HIGH)   = Drive is busy on attempt to write random access
data/libburn-1.5.2/libburn/libdax_msgs.h:513:54:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
 0x00020142 (FATAL,HIGH)   = Drive is not grabbed on random access write
data/libburn-1.5.2/cdrskin/cdrfifo.c:670:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
     memcpy(reply_buffer,o->buffer+o->read_idx,can_write);
data/libburn-1.5.2/cdrskin/cdrfifo.c:989:35:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   int Scan_for_iso_size(unsigned char data[2048], double *size_in_bytes,
data/libburn-1.5.2/cdrskin/cdrfifo.c:1000:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(o->iso_fs_descr,o->buffer+bs,bs);
data/libburn-1.5.2/cdrskin/cdrfifo.c:1074:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char target_path[80];
data/libburn-1.5.2/cdrskin/cdrfifo.c:1082:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fd_in[2*i]= open(paths[i],O_RDONLY);
data/libburn-1.5.2/cdrskin/cdrfifo.c:1095:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(target_path,"/dvdbuffer/fifo_mixed_bs_test_%d",i);
data/libburn-1.5.2/cdrskin/cdrfifo.c:1096:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fd_out[2*i+1]= open(target_path,O_WRONLY|O_CREAT|O_TRUNC, S_IRUSR|S_IWUSR);
data/libburn-1.5.2/cdrskin/cdrfifo.c:1147:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
 fd_in[0]= open("/u/test/cdrskin/in_1",O_RDONLY);
data/libburn-1.5.2/cdrskin/cdrfifo.c:1148:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
 fd_in[1]= open("/u/test/cdrskin/in_2",O_RDONLY);
data/libburn-1.5.2/cdrskin/cdrfifo.c:1149:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
 fd_out[2]= open("/u/test/cdrskin/out_1",
data/libburn-1.5.2/cdrskin/cdrfifo.c:1151:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
 fd_out[3]= open("/u/test/cdrskin/out_2",
data/libburn-1.5.2/cdrskin/cdrfifo.c:1204:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char output_file[4096];
data/libburn-1.5.2/cdrskin/cdrfifo.c:1235:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
     fd= open(argv[i]+3,O_WRONLY|O_CREAT);
data/libburn-1.5.2/cdrskin/cdrskin.c:478:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char buf[Cdrskin_strleN];
data/libburn-1.5.2/cdrskin/cdrskin.c:509:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
     fp= fopen(filenames[i],"rb");
data/libburn-1.5.2/cdrskin/cdrskin.c:598:32:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int Scan_for_iso_size(unsigned char data[2048], double *size_in_bytes,
data/libburn-1.5.2/cdrskin/cdrskin.c:613:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int Set_descr_iso_size(unsigned char data[2048], double size_in_bytes,
data/libburn-1.5.2/cdrskin/cdrskin.c:665:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char *from_address[Cdradrtrn_leN];
data/libburn-1.5.2/cdrskin/cdrskin.c:666:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char *to_address[Cdradrtrn_leN];
data/libburn-1.5.2/cdrskin/cdrskin.c:721:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char buf[2*Cdrskin_adrleN+1],*from_pt,*to_pt;
data/libburn-1.5.2/cdrskin/cdrskin.c:765:48:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int Cdradrtrn_translate(struct CdradrtrN *trn, char *from, int driveno,
data/libburn-1.5.2/cdrskin/cdrskin.c:766:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                        char to[Cdrskin_adrleN], int flag)
data/libburn-1.5.2/cdrskin/cdrskin.c:855:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char source_path[Cdrskin_strleN];
data/libburn-1.5.2/cdrskin/cdrskin.c:856:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char original_source_path[Cdrskin_strleN];
data/libburn-1.5.2/cdrskin/cdrskin.c:872:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char isrc[13];
data/libburn-1.5.2/cdrskin/cdrskin.c:1268:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char secbuf[2048];
data/libburn-1.5.2/cdrskin/cdrskin.c:1290:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(track->iso_fs_descr+(i-16)*2048,secbuf,2048);
data/libburn-1.5.2/cdrskin/cdrskin.c:1341:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   *fd= atoi(track->source_path+1);
data/libburn-1.5.2/cdrskin/cdrskin.c:1396:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
       *fd= open(track->source_path, O_RDONLY);
data/libburn-1.5.2/cdrskin/cdrskin.c:1513:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
 sprintf(track->source_path,"#%d",track->fifo_outlet_fd);
data/libburn-1.5.2/cdrskin/cdrskin.c:1536:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char buf[64 * 1024], *buffer_text;
data/libburn-1.5.2/cdrskin/cdrskin.c:1577:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
     memcpy(track->iso_fs_descr, buf + bs, bs);
data/libburn-1.5.2/cdrskin/cdrskin.c:1879:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char buf[2];
data/libburn-1.5.2/cdrskin/cdrskin.c:1900:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char Cdrpreskin_sys_rc_nameS[Cdrpreskin_rc_nuM][80]= {
data/libburn-1.5.2/cdrskin/cdrskin.c:1915:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char queue_severity[81];
data/libburn-1.5.2/cdrskin/cdrskin.c:1916:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char print_severity[81];
data/libburn-1.5.2/cdrskin/cdrskin.c:1922:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char raw_device_adr[Cdrskin_adrleN];
data/libburn-1.5.2/cdrskin/cdrskin.c:1927:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char device_adr[Cdrskin_adrleN];
data/libburn-1.5.2/cdrskin/cdrskin.c:1996:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char write_mode_name[80];
data/libburn-1.5.2/cdrskin/cdrskin.c:2001:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char rc_filenames[Cdrpreskin_rc_nuM][Cdrskin_strleN];
data/libburn-1.5.2/cdrskin/cdrskin.c:2015:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char fallback_program[Cdrskin_strleN];
data/libburn-1.5.2/cdrskin/cdrskin.c:2040:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
 strcpy(o->queue_severity,"NEVER");
data/libburn-1.5.2/cdrskin/cdrskin.c:2041:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
 strcpy(o->print_severity,"SORRY");
data/libburn-1.5.2/cdrskin/cdrskin.c:2061:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
 strcpy(o->write_mode_name,"DEFAULT");
data/libburn-1.5.2/cdrskin/cdrskin.c:2206:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 static char queue_severity[81]= {"NEVER"}, print_severity[81]= {"SORRY"};
data/libburn-1.5.2/cdrskin/cdrskin.c:2208:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char msg[BURN_MSGS_MESSAGE_LEN],msg_severity[81],filler[81];
data/libburn-1.5.2/cdrskin/cdrskin.c:2262:40:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int Cdrpreskin__allows_emulated_drives(char *device_adr, char reason[4096],
data/libburn-1.5.2/cdrskin/cdrskin.c:2262:58:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int Cdrpreskin__allows_emulated_drives(char *device_adr, char reason[4096],
data/libburn-1.5.2/cdrskin/cdrskin.c:2271:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
   strcat(reason,"File object is not /dev/null. ");
data/libburn-1.5.2/cdrskin/cdrskin.c:2275:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
   strcat(reason,"UID and EUID differ");
data/libburn-1.5.2/cdrskin/cdrskin.c:2281:2:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
 strcat(reason,"UID is 0. ");
data/libburn-1.5.2/cdrskin/cdrskin.c:2284:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
   strcat(reason, "No directory /root/cdrskin_permissions exists");
data/libburn-1.5.2/cdrskin/cdrskin.c:2288:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
   strcat(reason, "Directory /root/cdrskin_permissions not owned by UID 0");
data/libburn-1.5.2/cdrskin/cdrskin.c:2292:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
   strcat(reason,
data/libburn-1.5.2/cdrskin/cdrskin.c:2297:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
   strcat(reason,
data/libburn-1.5.2/cdrskin/cdrskin.c:2390:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int Cdrpreskin__cdrecord_to_dev(char *adr, char device_adr[Cdrskin_adrleN],
data/libburn-1.5.2/cdrskin/cdrskin.c:2390:44:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int Cdrpreskin__cdrecord_to_dev(char *adr, char device_adr[Cdrskin_adrleN],
data/libburn-1.5.2/cdrskin/cdrskin.c:2437:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
         sprintf(device_adr,"/dev/sg%d",*driveno);
data/libburn-1.5.2/cdrskin/cdrskin.c:2439:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
         sprintf(device_adr,"/dev/hd%c",'a'+(*driveno));
data/libburn-1.5.2/cdrskin/cdrskin.c:2462:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
         sprintf(device_adr,"/dev/hd%c",'a'+(2*busno)+(*driveno));
data/libburn-1.5.2/cdrskin/cdrskin.c:2540:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char *value_pt, reason[4096], *argpt;
data/libburn-1.5.2/cdrskin/cdrskin.c:2575:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy(o->fallback_program,"cdrecord");
data/libburn-1.5.2/cdrskin/cdrskin.c:2577:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy(o->fallback_program,"wodim");
data/libburn-1.5.2/cdrskin/cdrskin.c:3138:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
     strcpy(o->write_mode_name,"RAW/RAW96R");
data/libburn-1.5.2/cdrskin/cdrskin.c:3142:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
     strcpy(o->write_mode_name,"SAO");
data/libburn-1.5.2/cdrskin/cdrskin.c:3148:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
     strcpy(o->write_mode_name,"TAO");
data/libburn-1.5.2/cdrskin/cdrskin.c:3178:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
       char *hargv[2];
data/libburn-1.5.2/cdrskin/cdrskin.c:3240:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char *adr,buf[Cdrskin_adrleN];
data/libburn-1.5.2/cdrskin/cdrskin.c:3287:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
     char link_adr[Cdrskin_strleN+1];
data/libburn-1.5.2/cdrskin/cdrskin.c:3308:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(o->device_adr,"stdio:/dev/fd/%d",o->result_fd);
data/libburn-1.5.2/cdrskin/cdrskin.c:3408:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char msifile[Cdrskin_strleN];
data/libburn-1.5.2/cdrskin/cdrskin.c:3415:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char cdtext_to_textfile_path[Cdrskin_strleN];
data/libburn-1.5.2/cdrskin/cdrskin.c:3417:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char cdtext_to_vt07_path[Cdrskin_strleN];
data/libburn-1.5.2/cdrskin/cdrskin.c:3419:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char extract_audio_dir[Cdrskin_strleN];
data/libburn-1.5.2/cdrskin/cdrskin.c:3420:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char extract_basename[249];
data/libburn-1.5.2/cdrskin/cdrskin.c:3421:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char extract_audio_tracks[100];     /* if [i] > 0 : extract track i */
data/libburn-1.5.2/cdrskin/cdrskin.c:3507:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char eject_device[Cdrskin_strleN];
data/libburn-1.5.2/cdrskin/cdrskin.c:3514:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char source_path[Cdrskin_strleN];
data/libburn-1.5.2/cdrskin/cdrskin.c:3529:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char cuefile[Cdrskin_adrleN]; 
data/libburn-1.5.2/cdrskin/cdrskin.c:3537:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char sheet_v07t_paths[8][Cdrskin_adrleN];
data/libburn-1.5.2/cdrskin/cdrskin.c:3542:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char mcn[14];
data/libburn-1.5.2/cdrskin/cdrskin.c:3543:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char next_isrc[13];
data/libburn-1.5.2/cdrskin/cdrskin.c:3585:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char device_adr[Cdrskin_adrleN];
data/libburn-1.5.2/cdrskin/cdrskin.c:3633:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char overwriteable_iso_head[32*2048]; /* block  0 to 31 of target */
data/libburn-1.5.2/cdrskin/cdrskin.c:3917:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char profile_name[80];
data/libburn-1.5.2/cdrskin/cdrskin.c:4094:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char profile_name[80];
data/libburn-1.5.2/cdrskin/cdrskin.c:4336:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char adr[Cdrskin_adrleN];
data/libburn-1.5.2/cdrskin/cdrskin.c:4358:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char *adr,translated_adr[Cdrskin_adrleN],synthetic_adr[Cdrskin_adrleN];
data/libburn-1.5.2/cdrskin/cdrskin.c:4442:31:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                              char btldev[Cdrskin_adrleN], int flag)
data/libburn-1.5.2/cdrskin/cdrskin.c:4470:12:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
           sprintf(btldev,"%d,%d,0",bus_no,(loc[7]-'a')%2);
data/libburn-1.5.2/cdrskin/cdrskin.c:4475:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
     sprintf(btldev,"%d,%d,%d",bus_no,target_no,lun_no);
data/libburn-1.5.2/cdrskin/cdrskin.c:4498:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
       sprintf(btldev,"2,%d,0",loc[7]-'a');
data/libburn-1.5.2/cdrskin/cdrskin.c:4503:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(btldev,"0,%d,0",driveno);
data/libburn-1.5.2/cdrskin/cdrskin.c:4508:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
     sprintf(btldev,"%d",driveno);
data/libburn-1.5.2/cdrskin/cdrskin.c:4653:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char profile_name[80];
data/libburn-1.5.2/cdrskin/cdrskin.c:4683:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char shellsafe[5*Cdrskin_strleN+2],perms[40],btldev[Cdrskin_adrleN];
data/libburn-1.5.2/cdrskin/cdrskin.c:4684:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char adr[Cdrskin_adrleN],*raw_dev,*drives_shown= NULL;
data/libburn-1.5.2/cdrskin/cdrskin.c:4685:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char link_adr[BURN_DRIVE_ADR_LEN];
data/libburn-1.5.2/cdrskin/cdrskin.c:4723:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
       sprintf(perms,"errno=%d",errno);
data/libburn-1.5.2/cdrskin/cdrskin.c:4725:8:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
       strcpy(perms,"------");
data/libburn-1.5.2/cdrskin/cdrskin.c:4844:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char btldev[Cdrskin_adrleN];
data/libburn-1.5.2/cdrskin/cdrskin.c:5009:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char fake_head[4];
data/libburn-1.5.2/cdrskin/cdrskin.c:5015:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
 fp= fopen(path, "w");
data/libburn-1.5.2/cdrskin/cdrskin.c:5084:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
     fp = fopen(path, "w");
data/libburn-1.5.2/cdrskin/cdrskin.c:5144:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char profile_name[80];
data/libburn-1.5.2/cdrskin/cdrskin.c:5262:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy(profile_name, "media");
data/libburn-1.5.2/cdrskin/cdrskin.c:5306:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char profile_name[80];
data/libburn-1.5.2/cdrskin/cdrskin.c:5308:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char media_class[80];
data/libburn-1.5.2/cdrskin/cdrskin.c:5313:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char disc_type[80], bar_code[9], buf[2 * 2048], *type_text;
data/libburn-1.5.2/cdrskin/cdrskin.c:5329:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy(media_class, "CD");
data/libburn-1.5.2/cdrskin/cdrskin.c:5331:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy(media_class, "DVD");
data/libburn-1.5.2/cdrskin/cdrskin.c:5333:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy(media_class, "BD");
data/libburn-1.5.2/cdrskin/cdrskin.c:5335:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(media_class, "Unknown class (profile 0x%4.4X)", pno);
data/libburn-1.5.2/cdrskin/cdrskin.c:5561:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char is_current[64], profile_name[80];
data/libburn-1.5.2/cdrskin/cdrskin.c:5567:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
     strcpy(profile_name, "unknown");
data/libburn-1.5.2/cdrskin/cdrskin.c:5589:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char profile_name[80], *manuf= NULL, *media_code1= NULL, *media_code2= NULL;
data/libburn-1.5.2/cdrskin/cdrskin.c:5608:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy(profile_name, "-unidentified-");
data/libburn-1.5.2/cdrskin/cdrskin.c:5743:48:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
     printf("%2.2X", (unsigned int) ((unsigned char *) sno)[i]);
data/libburn-1.5.2/cdrskin/cdrskin.c:5787:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char status_text[80], profile_name[90];
data/libburn-1.5.2/cdrskin/cdrskin.c:5813:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(status_text, "unformatted, up to %.1f MiB",
data/libburn-1.5.2/cdrskin/cdrskin.c:5818:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
     sprintf(status_text, "formatted, with %.1f MiB",
data/libburn-1.5.2/cdrskin/cdrskin.c:5821:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
     sprintf(status_text, "written, with %.1f MiB",
data/libburn-1.5.2/cdrskin/cdrskin.c:5825:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
     sprintf(status_text, "intermediate or unknown");
data/libburn-1.5.2/cdrskin/cdrskin.c:5827:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
     sprintf(status_text, "no media or unknown media");
data/libburn-1.5.2/cdrskin/cdrskin.c:5829:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(status_text, "illegal status according to MMC-5");
data/libburn-1.5.2/cdrskin/cdrskin.c:5857:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char profile_name[90], *speed_unit= "D";
data/libburn-1.5.2/cdrskin/cdrskin.c:6111:34:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                 char *dir, char *basename,
data/libburn-1.5.2/cdrskin/cdrskin.c:6111:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                 char *dir, char *basename,
data/libburn-1.5.2/cdrskin/cdrskin.c:6112:34:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                 char print_tracks[100], int flag)
data/libburn-1.5.2/cdrskin/cdrskin.c:6124:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char profile_name[80], path[4096 + 256];
data/libburn-1.5.2/cdrskin/cdrskin.c:6272:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char speed_text[80];
data/libburn-1.5.2/cdrskin/cdrskin.c:6274:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
     strcpy(speed_text,"MAX");
data/libburn-1.5.2/cdrskin/cdrskin.c:6276:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
     strcpy(speed_text,"MIN");
data/libburn-1.5.2/cdrskin/cdrskin.c:6278:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
     sprintf(speed_text,"%.f",skin->x_speed);
data/libburn-1.5.2/cdrskin/cdrskin.c:6319:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char profile_name[80], progress_text[40];
data/libburn-1.5.2/cdrskin/cdrskin.c:6554:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(progress_text, "synchronous");
data/libburn-1.5.2/cdrskin/cdrskin.c:6563:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
         sprintf(progress_text, "done %.1f%%", percent);
data/libburn-1.5.2/cdrskin/cdrskin.c:6601:34:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                 char fifo_text[80], int flag)
data/libburn-1.5.2/cdrskin/cdrskin.c:6609:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy(fifo_text, "(fifo   0%) ");
data/libburn-1.5.2/cdrskin/cdrskin.c:6615:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(fifo_text, "(fifo %3d%%) ", fifo_percent);
data/libburn-1.5.2/cdrskin/cdrskin.c:6653:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char fifo_text[80],mb_text[40], pending[40];
data/libburn-1.5.2/cdrskin/cdrskin.c:6848:10:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
         strcpy(fifo_text, "(fifo 100%) ");
data/libburn-1.5.2/cdrskin/cdrskin.c:6873:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
         sprintf(fifo_text,"(fifo %3d%%) ",fifo_percent);
data/libburn-1.5.2/cdrskin/cdrskin.c:6896:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
       sprintf(mb_text,"%4d of %4d",(int) (written_total_bytes/1024.0/1024.0),
data/libburn-1.5.2/cdrskin/cdrskin.c:6901:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
       sprintf(mb_text,"%4d",(int) (written_total_bytes/1024.0/1024.0));
data/libburn-1.5.2/cdrskin/cdrskin.c:6979:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char profile_name[80], reasons[BURN_REASONS_LEN];
data/libburn-1.5.2/cdrskin/cdrskin.c:7002:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
     strcpy(skin->preskin->write_mode_name,"RAW/RAW96R");
data/libburn-1.5.2/cdrskin/cdrskin.c:7006:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
     strcpy(skin->preskin->write_mode_name,"TAO");
data/libburn-1.5.2/cdrskin/cdrskin.c:7008:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
     strcpy(skin->preskin->write_mode_name,"SAO");
data/libburn-1.5.2/cdrskin/cdrskin.c:7010:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
     sprintf(skin->preskin->write_mode_name,"LIBBURN/%d", (int) wt);
data/libburn-1.5.2/cdrskin/cdrskin.c:7026:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy(skin->preskin->write_mode_name,"SAO");
data/libburn-1.5.2/cdrskin/cdrskin.c:7185:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(amount_text,"%.fk",(double) (data_count/1024));
data/libburn-1.5.2/cdrskin/cdrskin.c:7187:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy(amount_text,"0=open_ended");
data/libburn-1.5.2/cdrskin/cdrskin.c:7288:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
 memcpy(md,track_descr,2048);
data/libburn-1.5.2/cdrskin/cdrskin.c:7302:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   if(((char *) td)[0] != md[0]) {
data/libburn-1.5.2/cdrskin/cdrskin.c:7308:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(md,td,2048);
data/libburn-1.5.2/cdrskin/cdrskin.c:7464:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char msg[80], profile_name[80];
data/libburn-1.5.2/cdrskin/cdrskin.c:7508:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy(skin->preskin->write_mode_name, "SAO");
data/libburn-1.5.2/cdrskin/cdrskin.c:7765:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(msg,"%d\n",(int) (free_space/(off_t) 2048));
data/libburn-1.5.2/cdrskin/cdrskin.c:8057:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char profile_name[80]; 
data/libburn-1.5.2/cdrskin/cdrskin.c:8090:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char msg[80];
data/libburn-1.5.2/cdrskin/cdrskin.c:8183:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
 sprintf(msg,"%d,%d\n",lba,nwa);
data/libburn-1.5.2/cdrskin/cdrskin.c:8189:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fp = fopen(skin->msifile, "w");
data/libburn-1.5.2/cdrskin/cdrskin.c:8263:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char *cpt,*value_pt,adr[Cdrskin_adrleN],*blank_mode= "", *argpt;
data/libburn-1.5.2/cdrskin/cdrskin.c:8951:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
     memcpy(skin->next_isrc, value_pt, 13);
data/libburn-1.5.2/cdrskin/cdrskin.c:9000:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
     memcpy(skin->mcn, value_pt, 14);
data/libburn-1.5.2/cdrskin/cdrskin.c:9494:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
       memcpy(skin->tracklist[skin->track_counter]->isrc, skin->next_isrc, 13);
data/libburn-1.5.2/cdrskin/cdrskin.c:9618:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char reason[4096];
data/libburn-1.5.2/cdrskin/cleanup.c:76:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char cleanup_msg[4096]= {""};
data/libburn-1.5.2/cdrskin/cleanup.c:120:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
 sprintf(cleanup_msg,"UNIX-SIGNAL caught:  %d  errno= %d",signum,errno);
data/libburn-1.5.2/libburn/async.c:441:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char msg[160];
data/libburn-1.5.2/libburn/async.c:443:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg, "Drive and media state unsuitable for blanking. (role= %d , profile= 0x%x , status= %d)",
data/libburn-1.5.2/libburn/async.c:495:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[40];
data/libburn-1.5.2/libburn/async.c:572:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg,"Will not format media type %4.4Xh",
data/libburn-1.5.2/libburn/async.c:592:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[80];
data/libburn-1.5.2/libburn/async.c:617:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(msg, "Write thread on drive %d ended", d->global_index);
data/libburn-1.5.2/libburn/async.c:704:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(reasons, "Write job parameters are unsuitable:\n");
data/libburn-1.5.2/libburn/cdtext.c:106:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char crc[2];
data/libburn-1.5.2/libburn/cdtext.c:199:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char payload[12];
data/libburn-1.5.2/libburn/cdtext.c:457:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[10], *cpt;
data/libburn-1.5.2/libburn/cdtext.c:508:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(msg, "Unknown v07t Text Code '%.80s'", payload);
data/libburn-1.5.2/libburn/cdtext.c:522:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char *languages[128] = {
data/libburn-1.5.2/libburn/cdtext.c:538:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(msg, "Unknown v07t Language Code '%.80s'", payload);
data/libburn-1.5.2/libburn/cdtext.c:552:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char *genres[BURN_CDTEXT_NUM_GENRES] = {
data/libburn-1.5.2/libburn/cdtext.c:565:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(msg, "Unknown v07t Genre Code '%.80s'", payload);
data/libburn-1.5.2/libburn/cdtext.c:696:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg, "Cannot open CD-TEXT input sheet v07t '%.4000s'",
data/libburn-1.5.2/libburn/cdtext.c:713:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen(path, "rb");
data/libburn-1.5.2/libburn/cdtext.c:721:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg,
data/libburn-1.5.2/libburn/cdtext.c:734:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg,
data/libburn-1.5.2/libburn/cdtext.c:854:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(session->mediacatalog, payload, 13);
data/libburn-1.5.2/libburn/cdtext.c:865:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(msg,
data/libburn-1.5.2/libburn/cdtext.c:912:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(msg,
data/libburn-1.5.2/libburn/cdtext.c:928:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(msg,
data/libburn-1.5.2/libburn/cdtext.c:964:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(msg,
data/libburn-1.5.2/libburn/cdtext.c:967:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(msg + strlen(msg),
data/libburn-1.5.2/libburn/cdtext.c:1047:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg,
data/libburn-1.5.2/libburn/cdtext.c:1083:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char head[4], tail[1];
data/libburn-1.5.2/libburn/cdtext.c:1091:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg, "Cannot open CD-TEXT pack file '%.4000s'", path);
data/libburn-1.5.2/libburn/cdtext.c:1102:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg,
data/libburn-1.5.2/libburn/cdtext.c:1113:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen(path, "rb");
data/libburn-1.5.2/libburn/cdtext.c:1120:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg,
data/libburn-1.5.2/libburn/cdtext.c:1135:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg,
data/libburn-1.5.2/libburn/cdtext.c:1143:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(msg,
data/libburn-1.5.2/libburn/cdtext.c:1220:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(*respt + strlen(*respt), value, vlen);
data/libburn-1.5.2/libburn/cdtext.c:1260:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(*payload + *payload_count, pack + 4, 12);
data/libburn-1.5.2/libburn/cdtext.c:1366:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[80];
data/libburn-1.5.2/libburn/cdtext.c:1401:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char *track_specs[6] = {
data/libburn-1.5.2/libburn/cdtext.c:1442:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[80];
data/libburn-1.5.2/libburn/cdtext.c:1448:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char *volume_specs[7] = {
data/libburn-1.5.2/libburn/cdtext.c:1452:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char *genres[BURN_CDTEXT_NUM_GENRES] = {
data/libburn-1.5.2/libburn/cdtext.c:1471:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(msg, "Libburn report of CD-TEXT Block %d", block);
data/libburn-1.5.2/libburn/cdtext.c:1493:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg, "CD-TEXT with unknown language code %2.2x",
data/libburn-1.5.2/libburn/cdtext.c:1519:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "0x%-4.4x", (unsigned int) genre);
data/libburn-1.5.2/libburn/cdtext.c:1543:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(msg, "OFF");
data/libburn-1.5.2/libburn/cdtext.c:1545:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(msg, "ON");
data/libburn-1.5.2/libburn/cdtext.c:1547:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg, "0x%2.2x", (unsigned int) pack[7]);
data/libburn-1.5.2/libburn/cdtext.c:1550:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(msg, "%d", first_tno);
data/libburn-1.5.2/libburn/cdtext.c:1553:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(msg, "%d", last_tno);
data/libburn-1.5.2/libburn/cdtext.c:1599:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[80];
data/libburn-1.5.2/libburn/cdtext.c:1615:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg, "CD-TEXT with unknown character code %2.2x",
data/libburn-1.5.2/libburn/cdtext.c:1630:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg,
data/libburn-1.5.2/libburn/cdtext.c:1657:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg,
data/libburn-1.5.2/libburn/cleanup.c:81:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char cleanup_msg[4096]= {""};
data/libburn-1.5.2/libburn/cleanup.c:125:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
 sprintf(cleanup_msg,"UNIX-SIGNAL caught:  %d  errno= %d",signum,errno);
data/libburn-1.5.2/libburn/crc.c:175:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char b[1];
data/libburn-1.5.2/libburn/crc.c:434:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static unsigned char mirr_tab[256];
data/libburn-1.5.2/libburn/crc.c:436:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char b[1];
data/libburn-1.5.2/libburn/crc.c:534:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char b[1];
data/libburn-1.5.2/libburn/drive.c:348:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			fd = atoi(adr + 8);
data/libburn-1.5.2/libburn/drive.c:403:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stbuf_ret, &stbuf, sizeof(struct stat));
data/libburn-1.5.2/libburn/drive.c:417:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fd_name[40], *name_pt = NULL;
data/libburn-1.5.2/libburn/drive.c:420:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(fd_name, "/dev/fd/%d", d->stdio_fd);
data/libburn-1.5.2/libburn/drive.c:576:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&drive_array[i], d, sizeof(struct burn_drive));
data/libburn-1.5.2/libburn/drive.c:587:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&drive_array[drivetop + 1], d, sizeof(struct burn_drive));
data/libburn-1.5.2/libburn/drive.c:953:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[80];
data/libburn-1.5.2/libburn/drive.c:1033:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg,
data/libburn-1.5.2/libburn/drive.c:1166:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(p, &(d->progress), sizeof(struct burn_progress));
data/libburn-1.5.2/libburn/drive.c:1274:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(out->vendor, id->vendor, sizeof(id->vendor));
data/libburn-1.5.2/libburn/drive.c:1276:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(out->product, id->product, sizeof(id->product));
data/libburn-1.5.2/libburn/drive.c:1278:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(out->revision, id->revision, sizeof(id->revision));
data/libburn-1.5.2/libburn/drive.c:1410:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char scanned[32];
data/libburn-1.5.2/libburn/drive.c:1672:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *enumeration_whitelist[BURN_DRIVE_WHITELIST_LEN];
data/libburn-1.5.2/libburn/drive.c:1738:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(fname, O_RDWR | O_LARGEFILE | O_BINARY);
data/libburn-1.5.2/libburn/drive.c:1743:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(fname, O_RDONLY | O_LARGEFILE | O_BINARY);
data/libburn-1.5.2/libburn/drive.c:1748:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(fname, O_WRONLY | O_LARGEFILE | O_BINARY);
data/libburn-1.5.2/libburn/drive.c:1857:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(d->current_profile_text,"stdio file");
data/libburn-1.5.2/libburn/drive.c:1878:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy((*drive_infos)[0].vendor,"YOYODYNE");
data/libburn-1.5.2/libburn/drive.c:1879:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy((*drive_infos)[0].product,"WARP DRIVE");
data/libburn-1.5.2/libburn/drive.c:1880:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy((*drive_infos)[0].revision,"FX01");
data/libburn-1.5.2/libburn/drive.c:1882:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy((*drive_infos)[0].vendor,"YOYODYNE");
data/libburn-1.5.2/libburn/drive.c:1883:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy((*drive_infos)[0].product,"BLACKHOLE");
data/libburn-1.5.2/libburn/drive.c:1884:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy((*drive_infos)[0].revision,"FX02");
data/libburn-1.5.2/libburn/drive.c:1886:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy((*drive_infos)[0].vendor,"YOYODYNE");
data/libburn-1.5.2/libburn/drive.c:1887:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy((*drive_infos)[0].product,"WARP DRIVE");
data/libburn-1.5.2/libburn/drive.c:1888:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy((*drive_infos)[0].revision,"FX03");
data/libburn-1.5.2/libburn/drive.c:1890:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy((*drive_infos)[0].vendor,"YOYODYNE");
data/libburn-1.5.2/libburn/drive.c:1891:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy((*drive_infos)[0].product,"WARP DRIVE");
data/libburn-1.5.2/libburn/drive.c:1892:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy((*drive_infos)[0].revision,"FX04");
data/libburn-1.5.2/libburn/drive.c:1894:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy((*drive_infos)[0].vendor,"FERENGI");
data/libburn-1.5.2/libburn/drive.c:1895:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy((*drive_infos)[0].product,"VAPORWARE");
data/libburn-1.5.2/libburn/drive.c:1896:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy((*drive_infos)[0].revision,"0000");
data/libburn-1.5.2/libburn/drive.c:2201:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(msg,"burn_drive_convert_scsi_adr( %d,%d,%d,%d,%d )",
data/libburn-1.5.2/libburn/drive.c:2247:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[4096];
data/libburn-1.5.2/libburn/drive.c:2337:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *default_ranks[5];
data/libburn-1.5.2/libburn/drive.c:2729:59:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int burn_disc_get_profile(struct burn_drive *d, int *pno, char name[80])
data/libburn-1.5.2/libburn/drive.c:2739:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				int profiles[64], char is_current[64])
data/libburn-1.5.2/libburn/drive.c:2754:50:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int burn_obtain_profile_name(int profile_number, char name[80])
data/libburn-1.5.2/libburn/drive.c:3438:49:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int burn_disc_get_cd_info(struct burn_drive *d, char disc_type[80],
data/libburn-1.5.2/libburn/drive.c:3439:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			unsigned int *disc_id, char bar_code[9], int *app_code,
data/libburn-1.5.2/libburn/drive.c:3443:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(disc_type, "CD-DA or CD-ROM");
data/libburn-1.5.2/libburn/drive.c:3445:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(disc_type, "CD-I");
data/libburn-1.5.2/libburn/drive.c:3447:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(disc_type, "CD-ROM XA");
data/libburn-1.5.2/libburn/drive.c:3449:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(disc_type, "undefined");
data/libburn-1.5.2/libburn/drive.c:3452:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(bar_code, d->disc_bar_code, 8);
data/libburn-1.5.2/libburn/drive.c:3547:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(o->data, descr + 4, o->data_lenght);
data/libburn-1.5.2/libburn/drive.c:3601:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(*sno, d->drive_serial_number, *sno_len);
data/libburn-1.5.2/libburn/drive.c:3647:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(*sno, d->media_serial_number, *sno_len);
data/libburn-1.5.2/libburn/ecma130ab.c:158:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char gfpow[509] = {
data/libburn-1.5.2/libburn/ecma130ab.c:213:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char gflog[256] = {
data/libburn-1.5.2/libburn/ecma130ab.c:259:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char h26[26] = {
data/libburn-1.5.2/libburn/ecma130ab.c:265:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char h45[45] = {
data/libburn-1.5.2/libburn/ecma130ab.c:280:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char ecma_130_annex_b[2340] = {
data/libburn-1.5.2/libburn/file.c:129:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd1 = open(path, O_RDONLY | O_BINARY);
data/libburn-1.5.2/libburn/file.c:133:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd2 = open(subpath, O_RDONLY | O_BINARY);
data/libburn-1.5.2/libburn/file.c:293:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(buffer, fs->buf+(size-todo)+rpos, diff);
data/libburn-1.5.2/libburn/file.c:472:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(fs->buf + wpos, bufpt, bufsize - wpos);
data/libburn-1.5.2/libburn/file.c:474:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(fs->buf, bufpt + (bufsize - wpos),
data/libburn-1.5.2/libburn/file.c:612:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char *(states[8]) = {
data/libburn-1.5.2/libburn/file.c:743:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(buf, fs->buf, bufsize);
data/libburn-1.5.2/libburn/file.c:994:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(target_path, O_WRONLY | O_CREAT | O_BINARY,
data/libburn-1.5.2/libburn/file.c:997:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg, "Cannot open disk file for writing: %.4000s",
data/libburn-1.5.2/libburn/file.c:1006:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(buf, "RIFF");
data/libburn-1.5.2/libburn/file.c:1009:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(buf + 8, "WAVE");
data/libburn-1.5.2/libburn/file.c:1010:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(buf + 12, "fmt ");
data/libburn-1.5.2/libburn/file.c:1022:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(buf + 36, "data");
data/libburn-1.5.2/libburn/file.c:1040:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Failure to read audio sectors");
data/libburn-1.5.2/libburn/file.c:1049:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg,
data/libburn-1.5.2/libburn/file.c:1064:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg,
data/libburn-1.5.2/libburn/file.c:1076:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg,
data/libburn-1.5.2/libburn/file.h:13:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char magic[4];
data/libburn-1.5.2/libburn/file.h:25:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char magic[4];
data/libburn-1.5.2/libburn/init.c:82:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char sg_initialize_msg[1024] = {""};
data/libburn-1.5.2/libburn/init.c:90:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char abort_message_prefix[81] = {"libburn : "};
data/libburn-1.5.2/libburn/init.c:368:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *burn_util_thread_id(pid_t pid, pthread_t tid, char text[80])
data/libburn-1.5.2/libburn/init.c:368:53:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *burn_util_thread_id(pid_t pid, pthread_t tid, char text[80])
data/libburn-1.5.2/libburn/init.c:372:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(text, "[%lu,", (unsigned long int) getpid());
data/libburn-1.5.2/libburn/init.c:375:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(text + l + 2 * i,
data/libburn-1.5.2/libburn/init.c:411:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char text[80];
data/libburn-1.5.2/libburn/init.c:536:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(abort_message_prefix, "libburn : ");
data/libburn-1.5.2/libburn/libburn.h:586:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char vendor[9];
data/libburn-1.5.2/libburn/libburn.h:588:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char product[17];
data/libburn-1.5.2/libburn/libburn.h:590:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char revision[5];
data/libburn-1.5.2/libburn/libburn.h:596:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char location[17];
data/libburn-1.5.2/libburn/libburn.h:735:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char profile_name[80];
data/libburn-1.5.2/libburn/libburn.h:1394:49:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int burn_disc_get_cd_info(struct burn_drive *d, char disc_type[80],
data/libburn-1.5.2/libburn/libburn.h:1395:48:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                        unsigned int *disc_id, char bar_code[9], int *app_code,
data/libburn-1.5.2/libburn/libburn.h:1584:59:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int burn_disc_get_profile(struct burn_drive *d, int *pno, char name[80]);
data/libburn-1.5.2/libburn/libburn.h:1829:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                        char reasons[BURN_REASONS_LEN], int silent);
data/libburn-1.5.2/libburn/libburn.h:2580:54:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int burn_track_set_isrc_string(struct burn_track *t, char isrc[13], int flag);
data/libburn-1.5.2/libburn/libburn.h:3106:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char reasons[BURN_REASONS_LEN], int flag);
data/libburn-1.5.2/libburn/libburn.h:3174:48:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                      unsigned char mediacatalog[13]);
data/libburn-1.5.2/libburn/libburn.h:3419:51:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                int profiles[64], char is_current[64]);
data/libburn-1.5.2/libburn/libburn.h:3429:48:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int burn_obtain_profile_name(int profile_code, char name[80]);
data/libburn-1.5.2/libburn/libdax_audioxtr.c:48:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
 strcpy(o->fmt,"unidentified");
data/libburn-1.5.2/libburn/libdax_audioxtr.c:93:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char msg[LIBDAX_AUDIOXTR_STRLEN+80];
data/libburn-1.5.2/libburn/libdax_audioxtr.c:98:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   o->fd= open(o->path, O_RDONLY | O_BINARY);
data/libburn-1.5.2/libburn/libdax_audioxtr.c:133:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 static char buf[256]; /* Thread safe because the content does not matter */
data/libburn-1.5.2/libburn/libdax_audioxtr.c:158:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char buf[16];
data/libburn-1.5.2/libburn/libdax_audioxtr.c:225:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
     sprintf(o->fmt_info,
data/libburn-1.5.2/libburn/libdax_audioxtr.c:237:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
     strcpy(o->fmt,".wav");
data/libburn-1.5.2/libburn/libdax_audioxtr.c:248:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char buf[24];
data/libburn-1.5.2/libburn/libdax_audioxtr.c:264:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
 strcpy(o->fmt,".au");
data/libburn-1.5.2/libburn/libdax_audioxtr.c:285:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
 sprintf(o->fmt_info,
data/libburn-1.5.2/libburn/libdax_audioxtr.h:146:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char path[LIBDAX_AUDIOXTR_STRLEN];
data/libburn-1.5.2/libburn/libdax_audioxtr.h:152:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char fmt[80];
data/libburn-1.5.2/libburn/libdax_audioxtr.h:155:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char fmt_info[LIBDAX_AUDIOXTR_STRLEN];
data/libburn-1.5.2/libburn/libdax_msgs.c:151:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
 strcpy(o->print_id,"libdax: ");
data/libburn-1.5.2/libburn/libdax_msgs.c:339:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char *textpt,*sev_name,sev_text[81];
data/libburn-1.5.2/libburn/libdax_msgs.h:54:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char print_id[81];
data/libburn-1.5.2/libburn/libdax_msgs.h:430:37:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
 0x00020001 (SORRY,LOW)    = Cannot open busy device
data/libburn-1.5.2/libburn/libdax_msgs.h:434:40:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
 0x00020005 (SORRY,HIGH)   = Failed to open device
data/libburn-1.5.2/libburn/libdax_msgs.h:443:40:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
 0x0002000e (NOTE,HIGH)    = Failed to open device during 
data/libburn-1.5.2/libburn/libdax_msgs.h:551:61:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
 0x00020169 (WARNING,HIGH) = Last session on media is still open
data/libburn-1.5.2/libburn/libdax_msgs.h:557:38:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
 0x00020170 (NOTE,HIGH)    = Closing open session before writing new one
data/libburn-1.5.2/libburn/libdax_msgs.h:558:60:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
 0x00020171 (NOTE,HIGH)    = Closing BD-R with accidentaly open session
data/libburn-1.5.2/libburn/libdax_msgs.h:576:40:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
 0x00020183 (WARNING,HIGH) = Failed to open device (a pseudo-drive) for reading
data/libburn-1.5.2/libburn/libdax_msgs.h:606:37:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
 0x000201a1 (FAILURE,HIGH) = Cannot open disk file for writing
data/libburn-1.5.2/libburn/libdax_msgs.h:622:37:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
 0x00020200 (SORRY,HIGH)   = Cannot open audio source file
data/libburn-1.5.2/libburn/libdax_msgs.h:649:40:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
 0x0003ff7f (FAILURE,HIGH) = Trying to open an already openned file
data/libburn-1.5.2/libburn/mmc.c:275:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char msg[4096];
data/libburn-1.5.2/libburn/mmc.c:350:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(c->page->data, s->data, c->page->bytes);
data/libburn-1.5.2/libburn/mmc.c:370:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[80];
data/libburn-1.5.2/libburn/mmc.c:385:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(msg, "reserving track of %d blocks", lba);
data/libburn-1.5.2/libburn/mmc.c:500:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg, "Track number %d: ", trackno);
data/libburn-1.5.2/libburn/mmc.c:502:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg, "Upcoming track: ");
data/libburn-1.5.2/libburn/mmc.c:511:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(msg, "Damaged, not closed and not writable");
data/libburn-1.5.2/libburn/mmc.c:515:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(msg, "Damaged and not closed");
data/libburn-1.5.2/libburn/mmc.c:527:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(msg, "No Next-Writable-Address");
data/libburn-1.5.2/libburn/mmc.c:606:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[256];
data/libburn-1.5.2/libburn/mmc.c:636:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg + strlen(msg), ". SCSI error : ");
data/libburn-1.5.2/libburn/mmc.c:758:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sleeplist[32768];
data/libburn-1.5.2/libburn/mmc.c:816:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
				strcat(sleeplist," ...");
data/libburn-1.5.2/libburn/mmc.c:817:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(sleeplist+strlen(sleeplist)," -> %d [%.6f]",
data/libburn-1.5.2/libburn/mmc.c:870:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(sleeplist+strlen(sleeplist)," %d", usec);
data/libburn-1.5.2/libburn/mmc.c:922:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&prev, &now, sizeof(struct timeval));
data/libburn-1.5.2/libburn/mmc.c:952:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		tee_fd= open("/tmp/libburn_sg_written",
data/libburn-1.5.2/libburn/mmc.c:970:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg,
data/libburn-1.5.2/libburn/mmc.c:977:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(msg, "CDB= ");
data/libburn-1.5.2/libburn/mmc.c:1045:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "SCSI error on write(%d,%d): ",
data/libburn-1.5.2/libburn/mmc.c:1072:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(msg, "CDB= ");
data/libburn-1.5.2/libburn/mmc.c:1149:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char *tdata, size_data[4], start_data[4], end_data[4];
data/libburn-1.5.2/libburn/mmc.c:1253:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(start_data, tdata + 4, 4);
data/libburn-1.5.2/libburn/mmc.c:1255:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(size_data, tdata + 8 + 4, 4);
data/libburn-1.5.2/libburn/mmc.c:1272:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(start_data, tdata + 4, 4);
data/libburn-1.5.2/libburn/mmc.c:1313:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char *tdata, size_data[4], start_data[4], end_data[4];
data/libburn-1.5.2/libburn/mmc.c:1339:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg,
data/libburn-1.5.2/libburn/mmc.c:1470:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(size_data, tdata + 24, 4);
data/libburn-1.5.2/libburn/mmc.c:1471:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(start_data, tdata + 8, 4);
data/libburn-1.5.2/libburn/mmc.c:1472:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(end_data, tdata + 28, 4);
data/libburn-1.5.2/libburn/mmc.c:1703:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg, "Session %d of %d encountered without leadout",
data/libburn-1.5.2/libburn/mmc.c:1715:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(d->toc_entry + t_idx,
data/libburn-1.5.2/libburn/mmc.c:1724:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg,
data/libburn-1.5.2/libburn/mmc.c:1870:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char *texts[0x53] = {NULL};
data/libburn-1.5.2/libburn/mmc.c:2023:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(d->disc_bar_code, data + 24, 8);
data/libburn-1.5.2/libburn/mmc.c:2284:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(*text_packs, data + 4, *alloc_len - 4);
data/libburn-1.5.2/libburn/mmc.c:2852:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(msg, "mmc_set_streaming: end_lba=%d ,  r=%d ,  w=%d",
data/libburn-1.5.2/libburn/mmc.c:2879:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg,
data/libburn-1.5.2/libburn/mmc.c:3080:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg, "Implausible length announcement from SCSI command GET CONFIGURATION: %d", *alloc_len);
data/libburn-1.5.2/libburn/mmc.c:3205:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(d->all_profiles, descr + 4,
data/libburn-1.5.2/libburn/mmc.c:3310:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(d->drive_serial_number, descr + 4,
data/libburn-1.5.2/libburn/mmc.c:3561:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg,
data/libburn-1.5.2/libburn/mmc.c:3576:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg, "Failed to synchronize drive cache");
data/libburn-1.5.2/libburn/mmc.c:3577:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg + strlen(msg), ". SCSI error : ");
data/libburn-1.5.2/libburn/mmc.c:3818:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(descr, "DVD+RW (fs=%d,rs=%d)",
data/libburn-1.5.2/libburn/mmc.c:3861:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(descr, "DVD-RW quick grow");
data/libburn-1.5.2/libburn/mmc.c:4266:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(msg, "CDB: ");
data/libburn-1.5.2/libburn/mmc.c:4268:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg + strlen(msg), "%2.2X ", c->opcode[i]);
data/libburn-1.5.2/libburn/mmc.c:4272:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(msg, "Format list: ");
data/libburn-1.5.2/libburn/mmc.c:4274:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg + strlen(msg), "%2.2X ", c->page->data[i]);
data/libburn-1.5.2/libburn/mmc.c:4608:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char isrc_text[13 + 21]; /* should suffice for 64 bit oversize */
data/libburn-1.5.2/libburn/mmc.c:4674:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char msg[80];
data/libburn-1.5.2/libburn/mmc.c:4676:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg,
data/libburn-1.5.2/libburn/mmc.c:4731:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(pd + 17, catalog, 13);
data/libburn-1.5.2/libburn/mmc.c:4746:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
					sprintf(isrc_text + 5, "%-2.2u",
data/libburn-1.5.2/libburn/mmc.c:4748:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
					sprintf(isrc_text + 7, "%-5.5u",
data/libburn-1.5.2/libburn/mmc.c:4759:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(pd + 33, isrc_text, 12);
data/libburn-1.5.2/libburn/mmc.c:4797:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg,
data/libburn-1.5.2/libburn/mmc.c:4866:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg,
data/libburn-1.5.2/libburn/mmc.c:4991:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(*reply, dpt, len - 2);
data/libburn-1.5.2/libburn/mmc.c:5005:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[80];
data/libburn-1.5.2/libburn/mmc.c:5021:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg,
data/libburn-1.5.2/libburn/mmc.c:5052:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "READ DISC STRUCTURE returns %d bytes of required %d\n", 
data/libburn-1.5.2/libburn/mmc.c:5086:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(*media_code1, "%.6s", reply + manuf_idx);
data/libburn-1.5.2/libburn/mmc.c:5088:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(*media_code1, "%.8s", reply + manuf_idx);
data/libburn-1.5.2/libburn/mmc.c:5100:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(*media_code2 + strlen(*media_code2) - 4, "/%d",
data/libburn-1.5.2/libburn/mmc.c:5101:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			(int) ((unsigned char *) reply)[rev_idx]);
data/libburn-1.5.2/libburn/mmc.c:5124:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char *books[16] = {
data/libburn-1.5.2/libburn/mmc.c:5149:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(*media_code1, "%2.2dm%2.2ds%2.2df", min, sec, fr);
data/libburn-1.5.2/libburn/mmc.c:5151:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(*media_code2, "%2.2dm%2.2ds%2.2df", min, sec, fr);
data/libburn-1.5.2/libburn/mmc.c:5177:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(*media_code1, reply + 17, 6);
data/libburn-1.5.2/libburn/mmc.c:5178:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(*media_code1 + 6, reply + 25, 6);
data/libburn-1.5.2/libburn/mmc.c:5487:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(text + l + 3 * i, " %2.2x", to_add[i]);
data/libburn-1.5.2/libburn/mmc.c:5496:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *feature_name, addon[320], *cpt;
data/libburn-1.5.2/libburn/mmc.c:5556:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char load_mech_names[8][40] = {
data/libburn-1.5.2/libburn/mmc.c:5587:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(addon, "%4.4x %c : ", feature_code,
data/libburn-1.5.2/libburn/mmc.c:5594:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(addon, " : %1.1x,%c :",
data/libburn-1.5.2/libburn/mmc.c:5638:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(addon, " BlockSize=%d , Blocking=%u",
data/libburn-1.5.2/libburn/mmc.c:5643:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(addon + strlen(addon), " , PP=%d", num & 1);
data/libburn-1.5.2/libburn/mmc.c:5648:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(addon, " DAP=%d , C2Flags=%d , CDText=%d",
data/libburn-1.5.2/libburn/mmc.c:5659:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(addon, " MULTI10=%d , DualR=%d",
data/libburn-1.5.2/libburn/mmc.c:5669:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(addon, " LastLBA=%d , BlockSize=%u",
data/libburn-1.5.2/libburn/mmc.c:5674:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(addon + strlen(addon), " , Blocking=%u", num);
data/libburn-1.5.2/libburn/mmc.c:5678:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(addon + strlen(addon), " , PP=%u", num);
data/libburn-1.5.2/libburn/mmc.c:5689:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(addon,
data/libburn-1.5.2/libburn/mmc.c:5696:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(addon + strlen(addon), " , NumLinkSizes=%d",
data/libburn-1.5.2/libburn/mmc.c:5703:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(addon,
data/libburn-1.5.2/libburn/mmc.c:5710:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(addon + strlen(addon), " , RRM=%d", num & 1);
data/libburn-1.5.2/libburn/mmc.c:5715:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(addon, " SSA=%d", (feature_data[0] >> 7) & 1);
data/libburn-1.5.2/libburn/mmc.c:5721:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(addon,
data/libburn-1.5.2/libburn/mmc.c:5731:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(addon,
data/libburn-1.5.2/libburn/mmc.c:5738:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(addon, " Write=%d", feature_data[0] & 1);
data/libburn-1.5.2/libburn/mmc.c:5744:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(addon,
data/libburn-1.5.2/libburn/mmc.c:5753:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(addon,
data/libburn-1.5.2/libburn/mmc.c:5761:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(addon + strlen(addon), " , DataTypeSupp=%4.4x",
data/libburn-1.5.2/libburn/mmc.c:5768:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(addon,
data/libburn-1.5.2/libburn/mmc.c:5777:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(addon + strlen(addon),
data/libburn-1.5.2/libburn/mmc.c:5784:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(addon,
data/libburn-1.5.2/libburn/mmc.c:5792:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(addon, " NumLinkSizes=%d", feature_data[3]);
data/libburn-1.5.2/libburn/mmc.c:5808:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(addon,
data/libburn-1.5.2/libburn/mmc.c:5817:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(addon, " Write=%d", feature_data[0] & 1);
data/libburn-1.5.2/libburn/mmc.c:5825:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(addon, " HDDVDR=%d , HDDVDRAM=%d",
data/libburn-1.5.2/libburn/mmc.c:5834:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(addon, " HDDVDR=%d , HDDVDRAM=%d",
data/libburn-1.5.2/libburn/mmc.c:5840:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(addon, " PP=%d", feature_data[0] & 1);
data/libburn-1.5.2/libburn/mmc.c:5848:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(addon, " SCC=%d , SDP=%d , HighestSlotNo=%u",
data/libburn-1.5.2/libburn/mmc.c:5858:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(addon, " Group3=%d , UnitLength=%u",
data/libburn-1.5.2/libburn/mmc.c:5864:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(addon, " CSSVersion=%d",
data/libburn-1.5.2/libburn/mmc.c:5871:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(addon,
data/libburn-1.5.2/libburn/mmc.c:5879:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(addon, " SerialNumber=");
data/libburn-1.5.2/libburn/mmc.c:5906:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(addon, " CPRMVersion=%d", feature_data[3]);
data/libburn-1.5.2/libburn/mmc.c:5911:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(addon, " Date=");
data/libburn-1.5.2/libburn/mmc.c:5913:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(addon + 6 + i, "%2.2d",
data/libburn-1.5.2/libburn/mmc.c:5920:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(addon,
data/libburn-1.5.2/libburn/options.c:98:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(*to, from, sizeof(struct burn_write_opts));
data/libburn-1.5.2/libburn/options.c:105:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((*to)->text_packs, from->text_packs,
data/libburn-1.5.2/libburn/options.c:175:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(opts->toc_entry, &toc_entries,
data/libburn-1.5.2/libburn/options.c:213:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				      unsigned char mediacatalog[13])
data/libburn-1.5.2/libburn/options.c:215:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(opts->mediacatalog, mediacatalog, 13);
data/libburn-1.5.2/libburn/options.c:289:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(pack_buffer, text_packs, num_packs * 18);
data/libburn-1.5.2/libburn/options.c:315:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char reasons[BURN_REASONS_LEN], int flag)
data/libburn-1.5.2/libburn/options.c:327:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(reasons,
data/libburn-1.5.2/libburn/options.c:334:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(reasons, "MEDIA: closed or not recordable, ");
data/libburn-1.5.2/libburn/options.c:336:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(reasons,"MEDIA: no writeable media detected, ");
data/libburn-1.5.2/libburn/options.c:347:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(reasons, "cannot recognize job demands, ");
data/libburn-1.5.2/libburn/options.c:352:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(reasons, "audio track prohibited by non-CD, ");
data/libburn-1.5.2/libburn/options.c:354:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(reasons, "exotic track prohibited by non-CD, ");
data/libburn-1.5.2/libburn/options.c:360:2:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	strcat(reasons, "SAO: ");
data/libburn-1.5.2/libburn/options.c:362:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(reasons, "write type SAO works only on blank media, ");
data/libburn-1.5.2/libburn/options.c:369:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(reasons, "cannot inquire write mode capabilities, ");
data/libburn-1.5.2/libburn/options.c:372:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(reasons, "no SAO offered by drive and media, ");
data/libburn-1.5.2/libburn/options.c:377:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(reasons, "multi session capability lacking, ");
data/libburn-1.5.2/libburn/options.c:379:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(reasons, "appended session capability lacking, ");
data/libburn-1.5.2/libburn/options.c:381:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(reasons, "multi track capability lacking, ");
data/libburn-1.5.2/libburn/options.c:384:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(reasons, "track size unpredictable, ");
data/libburn-1.5.2/libburn/options.c:386:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(reasons, "tracks of different modes mixed, ");
data/libburn-1.5.2/libburn/options.c:388:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(reasons, "non-data track on non-cd, ");
data/libburn-1.5.2/libburn/options.c:392:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(reasons, "drive dislikes block type, ");
data/libburn-1.5.2/libburn/options.c:394:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(reasons, "cd sao cannot do media fill up yet, ");
data/libburn-1.5.2/libburn/options.c:400:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(reasons, "would have to use default track sizes, ");
data/libburn-1.5.2/libburn/options.c:414:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(reasons, "CD-TEXT: write type SAO required, ");
data/libburn-1.5.2/libburn/options.c:420:2:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	strcat(reasons, "TAO: ");
data/libburn-1.5.2/libburn/options.c:426:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(reasons, "no TAO offered by drive and media, ");
data/libburn-1.5.2/libburn/options.c:430:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(reasons, "multi session capability lacking, ");
data/libburn-1.5.2/libburn/options.c:432:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(reasons, "multi track capability lacking, ");
data/libburn-1.5.2/libburn/options.c:434:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(reasons, "non-data track on non-cd, ");
data/libburn-1.5.2/libburn/options.c:438:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(reasons, "drive dislikes block type, ");
data/libburn-1.5.2/libburn/options.c:461:2:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	strcat(reasons, "RAW: ");
data/libburn-1.5.2/libburn/options.c:463:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(reasons, "write type RAW prohibited by non-cd, ");
data/libburn-1.5.2/libburn/options.c:465:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(reasons, "write type RAW works only on blank media, ");
data/libburn-1.5.2/libburn/options.c:468:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(reasons, "drive dislikes block type, ");
data/libburn-1.5.2/libburn/options.c:482:2:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	strcat(reasons,
data/libburn-1.5.2/libburn/options.h:81:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char mediacatalog[13];
data/libburn-1.5.2/libburn/os-libcdio.h:94:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char libcdio_name[4096]; /* The drive path as used by libcdio */ \
data/libburn-1.5.2/libburn/os-linux.h:80:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char sibling_fnames[BURN_OS_SG_MAX_SIBLINGS][BURN_OS_SG_MAX_NAMELEN];
data/libburn-1.5.2/libburn/read.c:62:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char fakesub[96];
data/libburn-1.5.2/libburn/read.c:212:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char sub[96];
data/libburn-1.5.2/libburn/read.c:323:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[80];
data/libburn-1.5.2/libburn/read.c:328:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg, "Cannot address start byte %.f",
data/libburn-1.5.2/libburn/read.c:402:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(*wpt, d->buffer->data, retry_size * 2048);
data/libburn-1.5.2/libburn/read.c:431:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(*wpt, d->buffer->data, to_read);
data/libburn-1.5.2/libburn/read.c:446:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[81], *wpt;
data/libburn-1.5.2/libburn/read.c:456:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		log_fp = fopen("/tmp/burn_read_data_log", "a");
data/libburn-1.5.2/libburn/read.c:486:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg,
data/libburn-1.5.2/libburn/read.c:498:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg,
data/libburn-1.5.2/libburn/read.c:529:5:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				open(d->devname,
data/libburn-1.5.2/libburn/read.c:613:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(wpt, d->buffer->data, cpy_size);
data/libburn-1.5.2/libburn/read.c:642:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[81], *wpt;
data/libburn-1.5.2/libburn/read.c:665:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg,
data/libburn-1.5.2/libburn/read.c:721:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(wpt, d->buffer->data, alignment);
data/libburn-1.5.2/libburn/read.c:728:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(wpt, d->buffer->data, cpy_size);
data/libburn-1.5.2/libburn/sector.c:115:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                tee_fd= open("/tmp/libburn_sg_readin",
data/libburn-1.5.2/libburn/sector.c:192:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char msg[80];
data/libburn-1.5.2/libburn/sector.c:198:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg,
data/libburn-1.5.2/libburn/sector.c:413:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(sector, subs + 12, 12);
data/libburn-1.5.2/libburn/sector.c:480:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char subs[96];
data/libburn-1.5.2/libburn/sector.c:501:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char subs[96];
data/libburn-1.5.2/libburn/sector.c:521:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char subs[96];
data/libburn-1.5.2/libburn/sector.c:706:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char subs[96];
data/libburn-1.5.2/libburn/sector.c:726:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char subs[96];
data/libburn-1.5.2/libburn/sector.c:893:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char i[5];
data/libburn-1.5.2/libburn/sg-dummy.c:67:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int sg_id_string(char msg[1024], int flag)
data/libburn-1.5.2/libburn/sg-dummy.c:69:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(msg, "internal X/Open adapter sg-dummy");
data/libburn-1.5.2/libburn/sg-dummy.c:81:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int sg_initialize(char msg[1024], int flag)
data/libburn-1.5.2/libburn/sg-dummy.c:285:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(path, open_mode | O_BINARY);
data/libburn-1.5.2/libburn/sg-dummy.c:338:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, open_flags | O_BINARY);
data/libburn-1.5.2/libburn/sg-freebsd.c:108:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int sg_id_string(char msg[1024], int flag)
data/libburn-1.5.2/libburn/sg-freebsd.c:110:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(msg, "internal FreeBSD CAM adapter sg-freebsd");
data/libburn-1.5.2/libburn/sg-freebsd.c:123:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int sg_initialize(char msg[1024], int flag)
data/libburn-1.5.2/libburn/sg-freebsd.c:172:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((idx->fd = open(XPT_DEVICE, O_RDWR)) == -1) {
data/libburn-1.5.2/libburn/sg-freebsd.c:336:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[64];
data/libburn-1.5.2/libburn/sg-freebsd.c:363:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[64];
data/libburn-1.5.2/libburn/sg-freebsd.c:411:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[64];
data/libburn-1.5.2/libburn/sg-freebsd.c:582:41:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static int freebsd_dev_lock(int dev_fd, char *devname,
data/libburn-1.5.2/libburn/sg-freebsd.c:583:50:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	 int *os_errno, int *pass_dev_no, int *lock_fd, char msg[4096],
data/libburn-1.5.2/libburn/sg-freebsd.c:589:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pass_name[16], *lock_name;
data/libburn-1.5.2/libburn/sg-freebsd.c:602:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(pass_name, "/dev/pass%d", i);
data/libburn-1.5.2/libburn/sg-freebsd.c:648:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		*lock_fd = open(devname, O_RDONLY);
data/libburn-1.5.2/libburn/sg-freebsd.c:718:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path_string[80];
data/libburn-1.5.2/libburn/sg-freebsd.c:795:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			fp= fopen("/tmp/libburn_sg_command_log", "a");
data/libburn-1.5.2/libburn/sg-freebsd.c:850:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&ccb->csio.cdb_io.cdb_bytes, &c->opcode, c->oplen);
data/libburn-1.5.2/libburn/sg-freebsd.c:897:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(c->sense, &ccb->csio.sense_data, sense_len);
data/libburn-1.5.2/libburn/sg-freebsd.c:1028:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, O_RDONLY);
data/libburn-1.5.2/libburn/sg-freebsd.c:1107:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(path, open_mode);
data/libburn-1.5.2/libburn/sg-freebsd.c:1120:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(path, O_RDONLY);
data/libburn-1.5.2/libburn/sg-freebsd.c:1160:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, open_flags);
data/libburn-1.5.2/libburn/sg-libcdio.c:341:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int sg_id_string(char msg[1024], int flag)
data/libburn-1.5.2/libburn/sg-libcdio.c:345:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(msg, "sg-libcdio h%d with libcdio ", LIBCDIO_VERSION_NUM);
data/libburn-1.5.2/libburn/sg-libcdio.c:368:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int sg_initialize(char msg[1024], int flag)
data/libburn-1.5.2/libburn/sg-libcdio.c:382:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(msg, " ---> ");
data/libburn-1.5.2/libburn/sg-libcdio.c:384:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg_pt,
data/libburn-1.5.2/libburn/sg-libcdio.c:643:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			fp= fopen("/tmp/libburn_sg_command_log", "a");
data/libburn-1.5.2/libburn/sg-libcdio.c:651:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cdb.field, c->opcode, c->oplen);
data/libburn-1.5.2/libburn/sg-libcdio.c:778:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[64];
data/libburn-1.5.2/libburn/sg-libcdio.c:912:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(path, open_mode);
data/libburn-1.5.2/libburn/sg-libcdio.c:928:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(path, O_RDONLY | O_BINARY);
data/libburn-1.5.2/libburn/sg-libcdio.c:944:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(path, open_mode);
data/libburn-1.5.2/libburn/sg-libcdio.c:998:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, open_flags | O_BINARY);
data/libburn-1.5.2/libburn/sg-linux.c:203:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char linux_sg_device_family[80] = {"/dev/sg%d"};
data/libburn-1.5.2/libburn/sg-linux.c:224:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char linux_ata_device_family[80] = {"/dev/hd%c"};
data/libburn-1.5.2/libburn/sg-linux.c:328:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(linux_sg_device_family, "/dev/sr%d");
data/libburn-1.5.2/libburn/sg-linux.c:330:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(linux_sg_device_family, "/dev/scd%d");
data/libburn-1.5.2/libburn/sg-linux.c:332:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(linux_sg_device_family, "/dev/st%d");
data/libburn-1.5.2/libburn/sg-linux.c:334:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(linux_sg_device_family, "/dev/sg%d");
data/libburn-1.5.2/libburn/sg-linux.c:338:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(linux_sg_device_family, "/dev/sr%d");
data/libburn-1.5.2/libburn/sg-linux.c:340:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(linux_sg_device_family, "/dev/sg%d");
data/libburn-1.5.2/libburn/sg-linux.c:354:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char scd[17], *msg = NULL;
data/libburn-1.5.2/libburn/sg-linux.c:365:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(scd, "/dev/scd");
data/libburn-1.5.2/libburn/sg-linux.c:394:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fp= fopen("/tmp/libburn_sg_command_log", "a");
data/libburn-1.5.2/libburn/sg-linux.c:410:36:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static int sgio_log_reply(unsigned char *opcode, int data_dir,
data/libburn-1.5.2/libburn/sg-linux.c:411:36:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                          unsigned char *data, int dxfer_len,
data/libburn-1.5.2/libburn/sg-linux.c:412:49:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                          void *fp_in, unsigned char sense[18], int sense_len,
data/libburn-1.5.2/libburn/sg-linux.c:499:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg + strlen(msg), " , sense data=");
data/libburn-1.5.2/libburn/sg-linux.c:502:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(msg_pt + i * 3, " %2.2X",
data/libburn-1.5.2/libburn/sg-linux.c:549:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg, "/proc/ide/hd%c/media", fname[7]);
data/libburn-1.5.2/libburn/sg-linux.c:550:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(msg, O_RDONLY);
data/libburn-1.5.2/libburn/sg-linux.c:619:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(msg, "ioctl(CDROM_MEDIA_CHANGED) == %d", ret);
data/libburn-1.5.2/libburn/sg-linux.c:625:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(msg, "ioctl(BLKFLSBUF) == %d", ret);
data/libburn-1.5.2/libburn/sg-linux.c:665:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[81];
data/libburn-1.5.2/libburn/sg-linux.c:710:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[81];
data/libburn-1.5.2/libburn/sg-linux.c:745:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(fname, open_mode);
data/libburn-1.5.2/libburn/sg-linux.c:801:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[81];
data/libburn-1.5.2/libburn/sg-linux.c:806:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg, "Closed %d O_EXCL scsi siblings", *sibling_count);
data/libburn-1.5.2/libburn/sg-linux.c:979:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	typedef char burn_sg_sibling_fname[BURN_OS_SG_MAX_NAMELEN];
data/libburn-1.5.2/libburn/sg-linux.c:1123:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fname[10];
data/libburn-1.5.2/libburn/sg-linux.c:1163:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fname[17];
data/libburn-1.5.2/libburn/sg-linux.c:1211:29:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static int fname_other_name(char *fname, char other_name[80], int flag)
data/libburn-1.5.2/libburn/sg-linux.c:1211:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static int fname_other_name(char *fname, char other_name[80], int flag)
data/libburn-1.5.2/libburn/sg-linux.c:1234:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char other_fname[80];
data/libburn-1.5.2/libburn/sg-linux.c:1353:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen("/proc/sys/dev/cdrom/info", "r");
data/libburn-1.5.2/libburn/sg-linux.c:1366:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(fname, "/dev/");
data/libburn-1.5.2/libburn/sg-linux.c:1503:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int sg_id_string(char msg[1024], int flag)
data/libburn-1.5.2/libburn/sg-linux.c:1505:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(msg, "internal GNU/Linux SG_IO adapter sg-linux");
data/libburn-1.5.2/libburn/sg-linux.c:1517:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int sg_initialize(char msg[1024], int flag)
data/libburn-1.5.2/libburn/sg-linux.c:1576:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char other_name[80];
data/libburn-1.5.2/libburn/sg-linux.c:1737:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char msg[120];
data/libburn-1.5.2/libburn/sg-linux.c:1759:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg,
data/libburn-1.5.2/libburn/sg-linux.c:1789:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(d->devname, open_mode);
data/libburn-1.5.2/libburn/sg-linux.c:1807:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg,
data/libburn-1.5.2/libburn/sg-linux.c:1814:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			fd = open(d->devname, open_mode);
data/libburn-1.5.2/libburn/sg-linux.c:1951:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg, "SCSI command %2.2Xh yielded host problem: ",
data/libburn-1.5.2/libburn/sg-linux.c:1960:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(msg, "Command: ");
data/libburn-1.5.2/libburn/sg-linux.c:2012:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg, "SCSI command %2.2Xh yielded driver problem: ",
data/libburn-1.5.2/libburn/sg-linux.c:2022:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(msg, "Command: ");
data/libburn-1.5.2/libburn/sg-linux.c:2081:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(msg, "sg_issue_command   d->fd= %d  d->released= %d\n",
data/libburn-1.5.2/libburn/sg-linux.c:2090:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			fp= fopen("/tmp/libburn_sg_command_log", "a");
data/libburn-1.5.2/libburn/sg-linux.c:2142:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		{ char text[1024], *content; int i = c->page->bytes;
data/libburn-1.5.2/libburn/sg-linux.c:2203:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char text[1024];
data/libburn-1.5.2/libburn/sg-linux.c:2204:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(text, "dxferp after  = %lx",
data/libburn-1.5.2/libburn/sg-linux.c:2219:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "--- SG_IO: return= -1 , ");
data/libburn-1.5.2/libburn/sg-linux.c:2220:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		        sprintf(msg + strlen(msg), "errno= %d , ", errno);
data/libburn-1.5.2/libburn/sg-linux.c:2221:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		        sprintf(msg + strlen(msg),
data/libburn-1.5.2/libburn/sg-linux.c:2231:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Attempted command: ");
data/libburn-1.5.2/libburn/sg-linux.c:2310:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(path, open_mode);
data/libburn-1.5.2/libburn/sg-linux.c:2438:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(path, open_mode);
data/libburn-1.5.2/libburn/sg-linux.c:2507:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, open_flags | O_DIRECT);
data/libburn-1.5.2/libburn/sg-linux.c:2509:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, open_flags);
data/libburn-1.5.2/libburn/sg-netbsd.c:245:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char suffix[2] = {'d', 'c'};
data/libburn-1.5.2/libburn/sg-netbsd.c:248:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[16];
data/libburn-1.5.2/libburn/sg-netbsd.c:253:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(path, "/dev/rcd%d%c", idx->cdno, suffix[i]);
data/libburn-1.5.2/libburn/sg-netbsd.c:275:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1];
data/libburn-1.5.2/libburn/sg-netbsd.c:315:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int sg_id_string(char msg[1024], int flag)
data/libburn-1.5.2/libburn/sg-netbsd.c:318:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(msg, "internal OpenBSD SCIOCCOMMAND adapter sg-netbsd");
data/libburn-1.5.2/libburn/sg-netbsd.c:320:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(msg, "internal NetBSD SCIOCCOMMAND adapter sg-netbsd");
data/libburn-1.5.2/libburn/sg-netbsd.c:333:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int sg_initialize(char msg[1024], int flag)
data/libburn-1.5.2/libburn/sg-netbsd.c:458:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	d->fd = open(d->devname, O_RDWR | O_NDELAY);
data/libburn-1.5.2/libburn/sg-netbsd.c:542:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[160];
data/libburn-1.5.2/libburn/sg-netbsd.c:552:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			fp= fopen("/tmp/libburn_sg_command_log", "a");
data/libburn-1.5.2/libburn/sg-netbsd.c:566:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(req.cmd, c->opcode, c->oplen);
data/libburn-1.5.2/libburn/sg-netbsd.c:619:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Failed to transfer command to drive. (ioctl(%d, SCIOCCOMMAND) = %d, scsireq_t.retsts = 0x%X, errno= %d)",
data/libburn-1.5.2/libburn/sg-netbsd.c:636:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(c->sense, req.sense, max_sl);
data/libburn-1.5.2/libburn/sg-netbsd.c:655:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Short reply from SCSI command %2.2X: expected: %d, got: %d, req.retsts: 0x%X",
data/libburn-1.5.2/libburn/sg-netbsd.c:691:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, O_RDWR | O_NDELAY);
data/libburn-1.5.2/libburn/sg-netbsd.c:731:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[64];
data/libburn-1.5.2/libburn/sg-netbsd.c:755:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char try[16];
data/libburn-1.5.2/libburn/sg-netbsd.c:782:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(try + tl, "%d", i);
data/libburn-1.5.2/libburn/sg-netbsd.c:841:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(path, open_mode);
data/libburn-1.5.2/libburn/sg-netbsd.c:895:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, open_flags);
data/libburn-1.5.2/libburn/sg-solaris.c:344:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(dev_to_open, O_RDONLY | O_NDELAY);
data/libburn-1.5.2/libburn/sg-solaris.c:479:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int sg_id_string(char msg[1024], int flag)
data/libburn-1.5.2/libburn/sg-solaris.c:481:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(msg, "internal Solaris uscsi adapter sg-solaris");
data/libburn-1.5.2/libburn/sg-solaris.c:493:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int sg_initialize(char msg[1024], int flag)
data/libburn-1.5.2/libburn/sg-solaris.c:623:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	d->fd = open(dev_to_open, O_RDONLY | O_NDELAY);
data/libburn-1.5.2/libburn/sg-solaris.c:707:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[80];
data/libburn-1.5.2/libburn/sg-solaris.c:718:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			fp= fopen("/tmp/libburn_sg_command_log", "a");
data/libburn-1.5.2/libburn/sg-solaris.c:776:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg,
data/libburn-1.5.2/libburn/sg-solaris.c:868:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[64];
data/libburn-1.5.2/libburn/sg-solaris.c:945:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(path, open_mode);
data/libburn-1.5.2/libburn/sg-solaris.c:997:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, open_flags);
data/libburn-1.5.2/libburn/sg.h:51:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int sg_id_string(char msg[1024], int flag);
data/libburn-1.5.2/libburn/sg.h:61:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int sg_initialize(char msg[1024], int flag);
data/libburn-1.5.2/libburn/spc.c:73:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(c->opcode, opcode, oplen);
data/libburn-1.5.2/libburn/spc.c:163:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char sense[14];
data/libburn-1.5.2/libburn/spc.c:309:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char sense[14];
data/libburn-1.5.2/libburn/spc.c:314:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(msg, "Asynchronous SCSI error : ");
data/libburn-1.5.2/libburn/spc.c:407:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(id->vendor, c->page->data + 8, 8);
data/libburn-1.5.2/libburn/spc.c:408:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(id->product, c->page->data + 16, 16);
data/libburn-1.5.2/libburn/spc.c:409:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(id->revision, c->page->data + 32, 4);
data/libburn-1.5.2/libburn/spc.c:633:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg, "Malformed capabilities page 2Ah received (len=%d, #speeds=%d)", page_length, num_write_speeds);
data/libburn-1.5.2/libburn/spc.c:1011:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(d->media_serial_number, data + 4,
data/libburn-1.5.2/libburn/spc.c:1267:61:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
enum response scsi_error_msg(struct burn_drive *d, unsigned char *sense,
data/libburn-1.5.2/libburn/spc.c:1268:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			     int senselen, char msg_data[161],
data/libburn-1.5.2/libburn/spc.c:1273:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char key_def[16][40] = {
data/libburn-1.5.2/libburn/spc.c:1299:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(msg, "[%X %2.2X %2.2X] ", *key, *asc, *ascq);
data/libburn-1.5.2/libburn/spc.c:1311:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg, "(No error reported by SCSI transaction)");
data/libburn-1.5.2/libburn/spc.c:1315:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg, "Not ready");
data/libburn-1.5.2/libburn/spc.c:1319:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg,
data/libburn-1.5.2/libburn/spc.c:1322:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Logical unit is not ready");
data/libburn-1.5.2/libburn/spc.c:1326:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "No reference position found");
data/libburn-1.5.2/libburn/spc.c:1332:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Logical unit communication failure");
data/libburn-1.5.2/libburn/spc.c:1334:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Logical unit communication timeout");
data/libburn-1.5.2/libburn/spc.c:1336:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Logical unit communication parity error");
data/libburn-1.5.2/libburn/spc.c:1338:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Logical unit communication crc error");
data/libburn-1.5.2/libburn/spc.c:1344:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Track following error");
data/libburn-1.5.2/libburn/spc.c:1346:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Tracking servo failure");
data/libburn-1.5.2/libburn/spc.c:1348:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Focus servo failure");
data/libburn-1.5.2/libburn/spc.c:1350:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Spindle servo failure");
data/libburn-1.5.2/libburn/spc.c:1352:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Head select fault");
data/libburn-1.5.2/libburn/spc.c:1358:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Write error");
data/libburn-1.5.2/libburn/spc.c:1360:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg,
data/libburn-1.5.2/libburn/spc.c:1363:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Write error, auto reallocation failed");
data/libburn-1.5.2/libburn/spc.c:1365:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Write error, recovery needed"); 
data/libburn-1.5.2/libburn/spc.c:1367:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Write error, recovery failed"); 
data/libburn-1.5.2/libburn/spc.c:1369:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Write error, loss of streaming");
data/libburn-1.5.2/libburn/spc.c:1371:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Defects in error window"); 
data/libburn-1.5.2/libburn/spc.c:1377:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Unrecovered read error");
data/libburn-1.5.2/libburn/spc.c:1379:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Read retries exhausted");
data/libburn-1.5.2/libburn/spc.c:1381:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Error too long to correct");
data/libburn-1.5.2/libburn/spc.c:1383:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "L-EC uncorrectable error");
data/libburn-1.5.2/libburn/spc.c:1385:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "CIRC uncorrectable error");
data/libburn-1.5.2/libburn/spc.c:1391:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Random positioning error");
data/libburn-1.5.2/libburn/spc.c:1393:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Mechanical positioning error");
data/libburn-1.5.2/libburn/spc.c:1399:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Parameter list length error");
data/libburn-1.5.2/libburn/spc.c:1405:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Synchronous data transfer error");
data/libburn-1.5.2/libburn/spc.c:1411:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Invalid command operation code");
data/libburn-1.5.2/libburn/spc.c:1417:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Lba out of range");
data/libburn-1.5.2/libburn/spc.c:1419:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Invalid element address");
data/libburn-1.5.2/libburn/spc.c:1421:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Invalid address for write");
data/libburn-1.5.2/libburn/spc.c:1423:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Invalid write crossing layer jump");
data/libburn-1.5.2/libburn/spc.c:1429:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Invalid field in cdb");
data/libburn-1.5.2/libburn/spc.c:1435:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Invalid field in parameter list");
data/libburn-1.5.2/libburn/spc.c:1437:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Parameter not supported");
data/libburn-1.5.2/libburn/spc.c:1439:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Parameter value invalid");
data/libburn-1.5.2/libburn/spc.c:1444:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg, "Write protected");
data/libburn-1.5.2/libburn/spc.c:1448:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Medium may have changed");
data/libburn-1.5.2/libburn/spc.c:1450:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Format layer may have changed");
data/libburn-1.5.2/libburn/spc.c:1456:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg,
data/libburn-1.5.2/libburn/spc.c:1459:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Power on occurred");
data/libburn-1.5.2/libburn/spc.c:1461:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Bus reset occurred");
data/libburn-1.5.2/libburn/spc.c:1463:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Bus device reset function occurred");
data/libburn-1.5.2/libburn/spc.c:1465:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Device internal reset");
data/libburn-1.5.2/libburn/spc.c:1471:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Command sequence error");
data/libburn-1.5.2/libburn/spc.c:1477:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Insufficient time for operation");
data/libburn-1.5.2/libburn/spc.c:1483:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Incompatible medium installed");
data/libburn-1.5.2/libburn/spc.c:1485:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Cannot read medium, unknown format");
data/libburn-1.5.2/libburn/spc.c:1487:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg,
data/libburn-1.5.2/libburn/spc.c:1490:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Cannot write medium, unknown format");
data/libburn-1.5.2/libburn/spc.c:1492:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg,
data/libburn-1.5.2/libburn/spc.c:1495:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg,
data/libburn-1.5.2/libburn/spc.c:1498:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Cleaning failure");
data/libburn-1.5.2/libburn/spc.c:1500:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg,
data/libburn-1.5.2/libburn/spc.c:1503:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Current session not fixated for append");
data/libburn-1.5.2/libburn/spc.c:1505:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Medium not formatted");
data/libburn-1.5.2/libburn/spc.c:1507:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg,
data/libburn-1.5.2/libburn/spc.c:1514:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Medium unformatted or format corrupted");
data/libburn-1.5.2/libburn/spc.c:1516:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Format command failed");
data/libburn-1.5.2/libburn/spc.c:1522:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "No defect spare location available");
data/libburn-1.5.2/libburn/spc.c:1528:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Medium not present");
data/libburn-1.5.2/libburn/spc.c:1530:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Medium not present, tray closed");
data/libburn-1.5.2/libburn/spc.c:1532:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Medium not present, tray open");
data/libburn-1.5.2/libburn/spc.c:1534:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Medium not present, loadable");
data/libburn-1.5.2/libburn/spc.c:1541:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Logical unit failure");
data/libburn-1.5.2/libburn/spc.c:1543:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Timeout on logical unit");
data/libburn-1.5.2/libburn/spc.c:1549:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Internal target failure");
data/libburn-1.5.2/libburn/spc.c:1555:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Erase failure");
data/libburn-1.5.2/libburn/spc.c:1557:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Erase failure. Incomplete erase operation");
data/libburn-1.5.2/libburn/spc.c:1563:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Unable to recover Table-of-Content");
data/libburn-1.5.2/libburn/spc.c:1569:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg,
data/libburn-1.5.2/libburn/spc.c:1572:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Packet does not fit in available space");
data/libburn-1.5.2/libburn/spc.c:1578:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Illegal mode for this track");
data/libburn-1.5.2/libburn/spc.c:1580:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Invalid packet size");
data/libburn-1.5.2/libburn/spc.c:1586:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Copy protection key exchange failure – Authentication failure");
data/libburn-1.5.2/libburn/spc.c:1588:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Copy protection key exchange failure – Key not present");
data/libburn-1.5.2/libburn/spc.c:1590:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Copy protection key exchange failure – Key not established");
data/libburn-1.5.2/libburn/spc.c:1592:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Read of scrambled sector without authentication");
data/libburn-1.5.2/libburn/spc.c:1594:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Media region code is mismatched to logical unit region");
data/libburn-1.5.2/libburn/spc.c:1596:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Logical unit region must be permanent / Region reset count error");
data/libburn-1.5.2/libburn/spc.c:1598:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Insufficient block count for binding nonce recording");
data/libburn-1.5.2/libburn/spc.c:1600:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Conflict in binding nonce recording");
data/libburn-1.5.2/libburn/spc.c:1602:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Insufficient permission");
data/libburn-1.5.2/libburn/spc.c:1608:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Session fixation error");
data/libburn-1.5.2/libburn/spc.c:1610:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Session fixation error writing lead-in");
data/libburn-1.5.2/libburn/spc.c:1612:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg,
data/libburn-1.5.2/libburn/spc.c:1615:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg,
data/libburn-1.5.2/libburn/spc.c:1618:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg,
data/libburn-1.5.2/libburn/spc.c:1621:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "No more track reservations allowed");
data/libburn-1.5.2/libburn/spc.c:1627:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "CD control error");
data/libburn-1.5.2/libburn/spc.c:1629:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Power calibration area almost full");
data/libburn-1.5.2/libburn/spc.c:1631:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Power calibration area is full");
data/libburn-1.5.2/libburn/spc.c:1633:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Power calibration area error");
data/libburn-1.5.2/libburn/spc.c:1635:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Program memory area update failure");
data/libburn-1.5.2/libburn/spc.c:1637:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Program memory area is full");
data/libburn-1.5.2/libburn/spc.c:1791:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg + strlen(msg), " #%d", c->retry_count + 1);
data/libburn-1.5.2/libburn/spc.c:1793:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(msg + strlen(msg), ",[%X %2.2X %2.2X]",
data/libburn-1.5.2/libburn/spc.c:1797:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(msg, " : ");
data/libburn-1.5.2/libburn/spc.c:1804:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(msg + strlen(msg), "... ");
data/libburn-1.5.2/libburn/spc.c:1808:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg + l, "%2.2x ", c->opcode[j]);
data/libburn-1.5.2/libburn/spc.c:1814:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg + l, " : dxfer_len= %d", c->dxfer_len);
data/libburn-1.5.2/libburn/spc.c:1859:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(msg, "CDB= ");
data/libburn-1.5.2/libburn/spc.c:2015:29:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int scsi_log_reply(unsigned char *opcode, int data_dir, unsigned char *data,
data/libburn-1.5.2/libburn/spc.c:2015:66:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int scsi_log_reply(unsigned char *opcode, int data_dir, unsigned char *data,
data/libburn-1.5.2/libburn/spc.c:2016:57:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                   int dxfer_len, void *fp_in, unsigned char sense[18],
data/libburn-1.5.2/libburn/spc.c:2064:40:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                 void *fp_in, unsigned char sense[18],
data/libburn-1.5.2/libburn/spc.c:2140:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg,
data/libburn-1.5.2/libburn/spc.c:2147:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(msg, "Command: ");
data/libburn-1.5.2/libburn/spc.h:63:61:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
enum response scsi_error_msg(struct burn_drive *d, unsigned char *sense,
data/libburn-1.5.2/libburn/spc.h:64:44:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                             int senselen, char msg[161],
data/libburn-1.5.2/libburn/spc.h:97:29:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int scsi_log_reply(unsigned char *opcode, int data_dir, unsigned char *data,
data/libburn-1.5.2/libburn/spc.h:97:66:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int scsi_log_reply(unsigned char *opcode, int data_dir, unsigned char *data,
data/libburn-1.5.2/libburn/spc.h:98:57:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                   int dxfer_len, void *fp_in, unsigned char sense[18],
data/libburn-1.5.2/libburn/spc.h:107:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                 void *fp, unsigned char sense[18], 
data/libburn-1.5.2/libburn/structure.c:295:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[40];
data/libburn-1.5.2/libburn/structure.c:297:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(msg, "This disc has %d sessions", d->sessions);
data/libburn-1.5.2/libburn/structure.c:308:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[40];
data/libburn-1.5.2/libburn/structure.c:310:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(msg, "    Session has %d tracks", s->tracks);
data/libburn-1.5.2/libburn/structure.c:320:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[80];
data/libburn-1.5.2/libburn/structure.c:322:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(msg, "        track size %d sectors",
data/libburn-1.5.2/libburn/structure.c:336:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[80];
data/libburn-1.5.2/libburn/structure.c:341:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg,
data/libburn-1.5.2/libburn/structure.c:439:54:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int burn_track_set_isrc_string(struct burn_track *t, char isrc[13], int flag)
data/libburn-1.5.2/libburn/structure.c:593:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[80];
data/libburn-1.5.2/libburn/structure.c:599:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg, "Setting total track size to %ds (payload %ds)\n",
data/libburn-1.5.2/libburn/structure.c:690:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(entry, t->entry, sizeof(struct burn_toc_entry));
data/libburn-1.5.2/libburn/structure.c:699:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(entry, s->leadout_entry, sizeof(struct burn_toc_entry));
data/libburn-1.5.2/libburn/structure.c:765:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(msg_data,
data/libburn-1.5.2/libburn/structure.c:767:2:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	strcat(msg_data, " In burn_disc_cd_toc_extensions: ");
data/libburn-1.5.2/libburn/structure.c:770:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(msg, "d->session == NULL");
data/libburn-1.5.2/libburn/structure.c:783:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "d->session[%d of %d] == NULL",
data/libburn-1.5.2/libburn/structure.c:788:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "d->session[%d of %d]->track == NULL",
data/libburn-1.5.2/libburn/structure.c:793:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg,
data/libburn-1.5.2/libburn/structure.c:801:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
					sprintf(msg,
data/libburn-1.5.2/libburn/structure.c:808:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
					sprintf(msg,
data/libburn-1.5.2/libburn/structure.c:975:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(t->payload[i], payload, length);
data/libburn-1.5.2/libburn/structure.c:1394:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg,
data/libburn-1.5.2/libburn/structure.c:1434:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg,
data/libburn-1.5.2/libburn/structure.c:1445:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg,
data/libburn-1.5.2/libburn/structure.c:1455:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg,
data/libburn-1.5.2/libburn/structure.c:1491:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(path, O_RDONLY | O_BINARY);
data/libburn-1.5.2/libburn/structure.c:1493:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg,
data/libburn-1.5.2/libburn/structure.c:1621:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(session->mediacatalog, apt, 13);
data/libburn-1.5.2/libburn/structure.c:1675:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg,
data/libburn-1.5.2/libburn/structure.c:1691:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg,
data/libburn-1.5.2/libburn/structure.c:1733:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(msg,
data/libburn-1.5.2/libburn/structure.c:1924:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg,
data/libburn-1.5.2/libburn/structure.c:1939:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg,
data/libburn-1.5.2/libburn/structure.c:1968:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg, "Unknown cue sheet file command '%.4000s'", line);
data/libburn-1.5.2/libburn/structure.c:2000:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static unsigned char dummy_cdtext[2] = {0, 0};
data/libburn-1.5.2/libburn/structure.c:2020:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg,
data/libburn-1.5.2/libburn/structure.c:2029:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg, "Cannot open cue sheet file '%.4000s'",
data/libburn-1.5.2/libburn/structure.c:2037:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg,
data/libburn-1.5.2/libburn/structure.c:2046:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen(path, "rb");
data/libburn-1.5.2/libburn/structure.c:2054:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg,
data/libburn-1.5.2/libburn/structure.c:2065:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg,
data/libburn-1.5.2/libburn/structure.h:13:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char country[2];	/* each must be 0-9, A-Z */
data/libburn-1.5.2/libburn/structure.h:14:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char owner[3];		/* each must be 0-9, A-Z */
data/libburn-1.5.2/libburn/structure.h:30:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char *(payload[Libburn_pack_num_typeS]);
data/libburn-1.5.2/libburn/structure.h:135:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char cdtext_char_code[8];
data/libburn-1.5.2/libburn/structure.h:136:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char cdtext_copyright[8];
data/libburn-1.5.2/libburn/structure.h:137:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char cdtext_language[8];
data/libburn-1.5.2/libburn/structure.h:140:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char mediacatalog[14]; /* overrideable by burn_write_opts */
data/libburn-1.5.2/libburn/transport.h:52:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char data[BUFFER_SIZE + 4096];
data/libburn-1.5.2/libburn/transport.h:59:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char opcode[16];
data/libburn-1.5.2/libburn/transport.h:63:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char sense[128];
data/libburn-1.5.2/libburn/transport.h:87:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char vendor[9];
data/libburn-1.5.2/libburn/transport.h:88:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char product[17];
data/libburn-1.5.2/libburn/transport.h:89:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char revision[5];
data/libburn-1.5.2/libburn/transport.h:189:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char phys_if_name[80];  /* MMC-5 5.3.2 table 91 , e.g. "SCSI Family" */ 
data/libburn-1.5.2/libburn/transport.h:209:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char current_profile_text[80];
data/libburn-1.5.2/libburn/transport.h:215:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char all_profiles[256];
data/libburn-1.5.2/libburn/transport.h:300:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char disc_bar_code[9];
data/libburn-1.5.2/libburn/util.c:109:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024];
data/libburn-1.5.2/libburn/util.c:124:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(buf, "Unknown CD manufacturer. Please report code '%2.2dm%2.2ds%2.2df/%2.2dm%2.2ds%2.2df', the human readable brand, size, and speed to scdbackup@gmx.net.", m_li, s_li, f_li, m_lo, s_lo, f_lo);
data/libburn-1.5.2/libburn/util.c:153:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024];
data/libburn-1.5.2/libburn/util.c:285:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(wpt, "%%%2.2X", 
data/libburn-1.5.2/libburn/write.c:212:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[81];
data/libburn-1.5.2/libburn/write.c:223:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg,"Padding up track to minimum size (+ %d sectors)",
data/libburn-1.5.2/libburn/write.c:256:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[81];
data/libburn-1.5.2/libburn/write.c:268:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(msg, "Closing track %2.2d", tnum+1);
data/libburn-1.5.2/libburn/write.c:420:62:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static int add_catalog_cue(struct cue_sheet *sheet, unsigned char catalog[13])
data/libburn-1.5.2/libburn/write.c:443:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char text[8 + 21]; /* should suffice for 64 bit oversize */
data/libburn-1.5.2/libburn/write.c:456:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(text, "%-2.2u%-5.5u", (unsigned int) isrc->year, isrc->serial);
data/libburn-1.5.2/libburn/write.c:457:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(text, "%-2.2u", (unsigned int) isrc->year);
data/libburn-1.5.2/libburn/write.c:458:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(text + 2, "%-5.5u", isrc->serial);
data/libburn-1.5.2/libburn/write.c:1005:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(buf->data + buf->bytes,
data/libburn-1.5.2/libburn/write.c:1114:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[160];
data/libburn-1.5.2/libburn/write.c:1179:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg, 
data/libburn-1.5.2/libburn/write.c:1306:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[80];
data/libburn-1.5.2/libburn/write.c:1315:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(msg, "Unsuitable track mode 0x%x in track %d of session %d",
data/libburn-1.5.2/libburn/write.c:1421:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				 char reasons[BURN_REASONS_LEN], int silent)
data/libburn-1.5.2/libburn/write.c:1433:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(reasons,
data/libburn-1.5.2/libburn/write.c:1436:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(reasons, "DRIVE: read-only pseudo drive");
data/libburn-1.5.2/libburn/write.c:1462:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
				strcat(reasons,
data/libburn-1.5.2/libburn/write.c:1465:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(reasons,
data/libburn-1.5.2/libburn/write.c:1474:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(reasons,
data/libburn-1.5.2/libburn/write.c:1479:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(reasons, "unsuitable track mode found, ");
data/libburn-1.5.2/libburn/write.c:1481:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(reasons, "write start address not supported, ");
data/libburn-1.5.2/libburn/write.c:1484:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
				strcat(reasons,
data/libburn-1.5.2/libburn/write.c:1487:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
				strcat(reasons,
data/libburn-1.5.2/libburn/write.c:1493:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(reasons,
data/libburn-1.5.2/libburn/write.c:1503:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(reasons, "write start address not supported, ");
data/libburn-1.5.2/libburn/write.c:1513:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(reasons,
data/libburn-1.5.2/libburn/write.c:1532:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(reasons, "no suitable media profile detected, ");
data/libburn-1.5.2/libburn/write.c:1568:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(msg, 
data/libburn-1.5.2/libburn/write.c:1601:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Cannot reserve track of %.f bytes",
data/libburn-1.5.2/libburn/write.c:1628:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(msg, 
data/libburn-1.5.2/libburn/write.c:1655:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Program error: encountered DVD+R without chunk padding");
data/libburn-1.5.2/libburn/write.c:1665:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Cannot reserve track of %.f bytes",
data/libburn-1.5.2/libburn/write.c:1685:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[80];
data/libburn-1.5.2/libburn/write.c:1691:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(msg, "Closing track %2.2d  (absolute track number %d)",
data/libburn-1.5.2/libburn/write.c:1709:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[40 + 80]; /* filltext + profile */
data/libburn-1.5.2/libburn/write.c:1742:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[80];
data/libburn-1.5.2/libburn/write.c:1744:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(msg,
data/libburn-1.5.2/libburn/write.c:1818:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		tee_fd= open("/tmp/libburn_sg_readin",
data/libburn-1.5.2/libburn/write.c:2226:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[60];
data/libburn-1.5.2/libburn/write.c:2233:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg, "Write start address is  %d * 32768", d->nwa);
data/libburn-1.5.2/libburn/write.c:2324:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg,
data/libburn-1.5.2/libburn/write.c:2335:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Write start address is  %d * 2048",
data/libburn-1.5.2/libburn/write.c:2357:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg,
data/libburn-1.5.2/libburn/write.c:2376:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Activated track default size %.f",
data/libburn-1.5.2/libburn/write.c:2389:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg,
data/libburn-1.5.2/libburn/write.c:2408:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Activated track default size %.f",
data/libburn-1.5.2/libburn/write.c:2454:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg, "Chosen write chunk size %d exceeds system dependent buffer size", o->obs);
data/libburn-1.5.2/libburn/write.c:2465:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg,
data/libburn-1.5.2/libburn/write.c:2473:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(msg, "dvd/bd Profile= %2.2Xh , obs= %d , obs_pad= %d",
data/libburn-1.5.2/libburn/write.c:2503:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg, "Sequential BD-R media now contains %d sessions. It is likely to soon fail writing.", d->complete_sessions);
data/libburn-1.5.2/libburn/write.c:2530:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[60];
data/libburn-1.5.2/libburn/write.c:2549:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(d->devname, mode | O_BINARY,
data/libburn-1.5.2/libburn/write.c:2564:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Cannot address start byte %.f",
data/libburn-1.5.2/libburn/write.c:2630:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg, "Cannot write desired amount of %d bytes.", count);
data/libburn-1.5.2/libburn/write.c:2632:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg + strlen(msg), " Did %d retries. Last",
data/libburn-1.5.2/libburn/write.c:2634:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg + strlen(msg), " write(2) returned %d.", ret);
data/libburn-1.5.2/libburn/write.c:2667:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char msg[80];
data/libburn-1.5.2/libburn/write.c:2672:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(msg, "Cannot address start byte %.f",
data/libburn-1.5.2/libburn/write.c:2740:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg,
data/libburn-1.5.2/libburn/write.c:2931:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[80];
data/libburn-1.5.2/libburn/write.c:3008:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(msg, "cd Profile= %2.2Xh , obs= %d , obs_pad= %d",
data/libburn-1.5.2/libburn/write.c:3019:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(msg,
data/libburn-1.5.2/libburn/write.c:3048:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg,
data/libburn-1.5.2/libburn/write.c:3107:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
						sprintf(msg, 
data/libburn-1.5.2/libburn/write.c:3199:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg, "WRITE command repetition happened %u times",
data/libburn-1.5.2/libburn/write.c:3215:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[81], *rpt;
data/libburn-1.5.2/libburn/write.c:3253:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg, "Write start address not supported");
data/libburn-1.5.2/libburn/write.c:3261:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg,
data/libburn-1.5.2/libburn/write.c:3271:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg,
data/libburn-1.5.2/libburn/write.c:3319:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(d->buffer->data, rpt, d->buffer->bytes);
data/libburn-1.5.2/test/dewav.c:62:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char buf[2048];
data/libburn-1.5.2/test/dewav.c:136:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   out_fd= open(out_path, O_WRONLY | O_CREAT | O_TRUNC, 
data/libburn-1.5.2/test/fake_au.c:41:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char buf[4];
data/libburn-1.5.2/test/fake_au.c:42:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char out_path[4096],in_path[4096];
data/libburn-1.5.2/test/fake_au.c:102:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fp_in= fopen(in_path,"r");
data/libburn-1.5.2/test/fake_au.c:119:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fp_out= fopen(out_path,"w");
data/libburn-1.5.2/test/libburner.c:103:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char current_profile_name[80]= {""};
data/libburn-1.5.2/test/libburner.c:150:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char libburn_drive_adr[BURN_DRIVE_ADR_LEN];
data/libburn-1.5.2/test/libburner.c:194:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char adr[BURN_DRIVE_ADR_LEN];
data/libburn-1.5.2/test/libburner.c:225:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(adr, "-get_adr_failed-");
data/libburn-1.5.2/test/libburner.c:455:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *adr, reasons[BURN_REASONS_LEN];
data/libburn-1.5.2/test/libburner.c:485:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(adr, O_RDONLY);
data/libburn-1.5.2/test/libburner.c:633:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char drive_adr[BURN_DRIVE_ADR_LEN] = {""};
data/libburn-1.5.2/test/libburner.c:636:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char source_adr[99][4096];
data/libburn-1.5.2/test/libburner.c:672:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                driveno = atoi(argv[i]);
data/libburn-1.5.2/test/offst_source.c:55:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[1];
data/libburn-1.5.2/test/telltoc.c:121:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char libburn_drive_adr[BURN_DRIVE_ADR_LEN];
data/libburn-1.5.2/test/telltoc.c:161:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char adr[BURN_DRIVE_ADR_LEN];
data/libburn-1.5.2/test/telltoc.c:177:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(adr, "-get_adr_failed-");
data/libburn-1.5.2/test/telltoc.c:245:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char is_current_profile[64];
data/libburn-1.5.2/test/telltoc.c:249:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char profile_name[80], speed_unit[40];
data/libburn-1.5.2/test/telltoc.c:265:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(speed_unit,"176.4 kB/s  (CD, data speed 150 KiB/s)");
data/libburn-1.5.2/test/telltoc.c:268:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(speed_unit,"1385.0 kB/s  (DVD)");
data/libburn-1.5.2/test/telltoc.c:271:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(speed_unit,"4495.625 kB/s  (BD)");
data/libburn-1.5.2/test/telltoc.c:281:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(profile_name,
data/libburn-1.5.2/test/telltoc.c:443:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char status_text[80], profile_name[90];
data/libburn-1.5.2/test/telltoc.c:452:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(status_text, "unformatted, up to %.1f MiB",
data/libburn-1.5.2/test/telltoc.c:455:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(status_text, "formatted, with %.1f MiB",
data/libburn-1.5.2/test/telltoc.c:460:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(status_text, "intermediate or unknown");
data/libburn-1.5.2/test/telltoc.c:462:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(status_text, "no media or unknown media");
data/libburn-1.5.2/test/telltoc.c:464:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(status_text, "illegal status according to MMC-5");
data/libburn-1.5.2/test/telltoc.c:483:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char profile_name[80];
data/libburn-1.5.2/test/telltoc.c:634:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[16 * 2048], line[81];
data/libburn-1.5.2/test/telltoc.c:663:26:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                raw_fp = fopen(raw_file,"w");
data/libburn-1.5.2/test/telltoc.c:729:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(line, "%8ds + %4d : ",
data/libburn-1.5.2/test/telltoc.c:737:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
					sprintf(line + lbas + 3 * j, " %c ",
data/libburn-1.5.2/test/telltoc.c:740:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
					sprintf(line + lbas + 3 * j, "%2.2X ",
data/libburn-1.5.2/test/telltoc.c:792:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char drive_adr[BURN_DRIVE_ADR_LEN] = {""};
data/libburn-1.5.2/test/telltoc.c:800:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char print_raw_file[4096] = {""};
data/libburn-1.5.2/test/telltoc.c:829:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                driveno = atoi(argv[i]);
data/libburn-1.5.2/cdrskin/cdrfifo.c:718:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
     ret= read(o->source_fd,o->buffer+o->write_idx,can_read);
data/libburn-1.5.2/cdrskin/cdrfifo.c:756:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
     ret= read(o->source_fd,o->buffer+o->write_idx,can_read);
data/libburn-1.5.2/cdrskin/cdrfifo.c:1049:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
 c= text[strlen(text)-1];
data/libburn-1.5.2/cdrskin/cdrfifo.c:1207:2:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
 strcpy(output_file,"-");
data/libburn-1.5.2/cdrskin/cdrskin.c:362:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
 l= strlen(in_text);
data/libburn-1.5.2/cdrskin/cdrskin.c:402:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
 c= text[strlen(text)-1];
data/libburn-1.5.2/cdrskin/cdrskin.c:431:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
 l= strlen(line);
data/libburn-1.5.2/cdrskin/cdrskin.c:494:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       maxl= strlen(progname)+1;
data/libburn-1.5.2/cdrskin/cdrskin.c:496:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      (*argv)[0]= (char *) calloc(1, strlen(progname)+1);
data/libburn-1.5.2/cdrskin/cdrskin.c:507:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     if(strlen(filenames[i])==0)
data/libburn-1.5.2/cdrskin/cdrskin.c:518:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       l= strlen(buf);
data/libburn-1.5.2/cdrskin/cdrskin.c:578:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
 if((int) (strlen(home) + strlen(filename) + 1) >= fa_size)
data/libburn-1.5.2/cdrskin/cdrskin.c:578:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
 if((int) (strlen(home) + strlen(filename) + 1) >= fa_size)
data/libburn-1.5.2/cdrskin/cdrskin.c:582:4:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
   strcat(fileadr,"/");
data/libburn-1.5.2/cdrskin/cdrskin.c:728:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if(strlen(from)>=sizeof(buf))
data/libburn-1.5.2/cdrskin/cdrskin.c:741:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
 if(strlen(from)>=Cdrskin_adrleN || strlen(to)>=Cdrskin_adrleN)
data/libburn-1.5.2/cdrskin/cdrskin.c:741:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
 if(strlen(from)>=Cdrskin_adrleN || strlen(to)>=Cdrskin_adrleN)
data/libburn-1.5.2/cdrskin/cdrskin.c:743:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
 trn->from_address[cnt]= calloc(1, strlen(from_pt)+1);
data/libburn-1.5.2/cdrskin/cdrskin.c:744:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
 trn->to_address[cnt]= calloc(1, strlen(to_pt)+1);
data/libburn-1.5.2/cdrskin/cdrskin.c:777:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            strlen(Cdrskin_no_transl_prefiX))==0) {
data/libburn-1.5.2/cdrskin/cdrskin.c:778:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   adr= adr+strlen(Cdrskin_no_transl_prefiX);
data/libburn-1.5.2/cdrskin/cdrskin.c:789:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
 if(strlen(adr)>=Cdrskin_adrleN)
data/libburn-1.5.2/cdrskin/cdrskin.c:795:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
 if(strlen(from)>=Cdrskin_adrleN)
data/libburn-1.5.2/cdrskin/cdrskin.c:801:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      strlen(trn->from_address[i])<Cdrskin_adrleN)
data/libburn-1.5.2/cdrskin/cdrskin.c:811:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     if(strlen(from)+strlen(Cdrskin_no_transl_prefiX)<Cdrskin_adrleN) {
data/libburn-1.5.2/cdrskin/cdrskin.c:811:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     if(strlen(from)+strlen(Cdrskin_no_transl_prefiX)<Cdrskin_adrleN) {
data/libburn-1.5.2/cdrskin/cdrskin.c:1186:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
 l= strlen(track->source_path);
data/libburn-1.5.2/cdrskin/cdrskin.c:1284:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
     ret= read(fd, secbuf+got, 2048-got);
data/libburn-1.5.2/cdrskin/cdrskin.c:1886:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
 ret= read(track->fifo_outlet_fd,buf,1);
data/libburn-1.5.2/cdrskin/cdrskin.c:2397:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
 if(strlen(adr)==0)
data/libburn-1.5.2/cdrskin/cdrskin.c:2404:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
 for(k= strlen(adr)-1;k>=0;k--) {
data/libburn-1.5.2/cdrskin/cdrskin.c:2416:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   k= strlen(adr)-1;
data/libburn-1.5.2/cdrskin/cdrskin.c:2582:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (strncmp(argpt, "--", 2) == 0 && strlen(argpt) > 3)
data/libburn-1.5.2/cdrskin/cdrskin.c:2759:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     if(strlen(value_pt)>=sizeof(o->raw_device_adr))
data/libburn-1.5.2/cdrskin/cdrskin.c:3113:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     if(strlen(argv[i] + 17) >= sizeof(o->fallback_program)) {
data/libburn-1.5.2/cdrskin/cdrskin.c:3169:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     (o->verbosity)+= strlen(argv[i])-1;
data/libburn-1.5.2/cdrskin/cdrskin.c:3238:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
 if(strlen(o->raw_device_adr)>0 && !o->no_whitelist) {
data/libburn-1.5.2/cdrskin/cdrskin.c:3264:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     if(strlen(adr)>=sizeof(o->device_adr)) {
data/libburn-1.5.2/cdrskin/cdrskin.c:3285:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if(strlen(o->device_adr)>0 && !o->no_convert_fs_adr) {
data/libburn-1.5.2/cdrskin/cdrskin.c:4150:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if(strlen(skin->preskin->device_adr)<=0) {
data/libburn-1.5.2/cdrskin/cdrskin.c:4290:4:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
   usleep(1000000);
data/libburn-1.5.2/cdrskin/cdrskin.c:4410:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
 if(strlen(synthetic_adr)>0) {
data/libburn-1.5.2/cdrskin/cdrskin.c:4706:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     if(strlen(adr)>=Cdrskin_strleN)
data/libburn-1.5.2/cdrskin/cdrskin.c:4710:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     if((int) strlen(shellsafe) > max_dev_len)
data/libburn-1.5.2/cdrskin/cdrskin.c:4711:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       max_dev_len= strlen(shellsafe);
data/libburn-1.5.2/cdrskin/cdrskin.c:4738:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     if(strlen(adr)>=Cdrskin_strleN)
data/libburn-1.5.2/cdrskin/cdrskin.c:4743:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     pad= max_dev_len - strlen(shellsafe);
data/libburn-1.5.2/cdrskin/cdrskin.c:5972:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
 lp= strlen(prefix);
data/libburn-1.5.2/cdrskin/cdrskin.c:5981:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
 while(lp * lp0 + strlen(tpt) >= 80) {
data/libburn-1.5.2/cdrskin/cdrskin.c:6289:4:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
   usleep(1000000);
data/libburn-1.5.2/cdrskin/cdrskin.c:7203:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
     ret= read(source_fd,buf+fill,chunksize-fill); 
data/libburn-1.5.2/cdrskin/cdrskin.c:7426:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
 ret= write(skin->preskin->result_fd, msg, strlen(msg));
data/libburn-1.5.2/cdrskin/cdrskin.c:7427:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
 if(ret != (int) strlen(msg))
data/libburn-1.5.2/cdrskin/cdrskin.c:7866:6:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
     usleep(20000);
data/libburn-1.5.2/cdrskin/cdrskin.c:7872:6:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
     usleep(20000);
data/libburn-1.5.2/cdrskin/cdrskin.c:7907:4:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
   usleep(20000);
data/libburn-1.5.2/cdrskin/cdrskin.c:8186:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
 if(strlen(skin->msifile)) {
data/libburn-1.5.2/cdrskin/cdrskin.c:8236:4:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
   usleep(1000000);
data/libburn-1.5.2/cdrskin/cdrskin.c:8315:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (strncmp(argpt, "--", 2) == 0 && strlen(argpt) > 3)
data/libburn-1.5.2/cdrskin/cdrskin.c:8323:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                          strlen(ignored_partial_options[k]))==0)
data/libburn-1.5.2/cdrskin/cdrskin.c:8326:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                      strlen(ignored_partial_options[k]))==0)
data/libburn-1.5.2/cdrskin/cdrskin.c:8399:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     l= strlen(value_pt);
data/libburn-1.5.2/cdrskin/cdrskin.c:8539:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     if(strlen(value_pt) >= sizeof(skin->cdtext_to_textfile_path)) {
data/libburn-1.5.2/cdrskin/cdrskin.c:8542:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    (int) sizeof(skin->cdtext_to_textfile_path)-1,(int) strlen(value_pt));
data/libburn-1.5.2/cdrskin/cdrskin.c:8554:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     if(strlen(value_pt) >= sizeof(skin->cdtext_to_vt07_path)) {
data/libburn-1.5.2/cdrskin/cdrskin.c:8557:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        (int) sizeof(skin->cdtext_to_vt07_path)-1,(int) strlen(value_pt));
data/libburn-1.5.2/cdrskin/cdrskin.c:8579:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     if(strlen(value_pt) >= sizeof(skin->cuefile)) {
data/libburn-1.5.2/cdrskin/cdrskin.c:8582:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          (int) sizeof(skin->cuefile) - 1, (int) strlen(value_pt));
data/libburn-1.5.2/cdrskin/cdrskin.c:8713:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     if(strlen(argv[i]+13)>=sizeof(skin->eject_device)) {
data/libburn-1.5.2/cdrskin/cdrskin.c:8716:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          (int) sizeof(skin->eject_device)-1,(int) strlen(argv[i]+13));
data/libburn-1.5.2/cdrskin/cdrskin.c:8730:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     if(strlen(value_pt) >= sizeof(skin->extract_audio_dir)) {
data/libburn-1.5.2/cdrskin/cdrskin.c:8776:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     if(strlen(value_pt) > 248) {
data/libburn-1.5.2/cdrskin/cdrskin.c:8925:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     if(strlen(argv[i] + 17) > Cdrskin_adrleN) {
data/libburn-1.5.2/cdrskin/cdrskin.c:8946:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     if(strlen(value_pt) != 12) {
data/libburn-1.5.2/cdrskin/cdrskin.c:8995:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     if(strlen(value_pt) != 13) {
data/libburn-1.5.2/cdrskin/cdrskin.c:9124:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     if(strlen(value_pt)>=sizeof(skin->msifile)) {
data/libburn-1.5.2/cdrskin/cdrskin.c:9127:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          (int) sizeof(skin->msifile)-1,(int) strlen(value_pt));
data/libburn-1.5.2/cdrskin/cdrskin.c:9442:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     if(strlen(argv[i])>=sizeof(skin->source_path)) {
data/libburn-1.5.2/cdrskin/cdrskin.c:9445:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               (int) sizeof(skin->source_path)-1,(int) strlen(argv[i]));
data/libburn-1.5.2/cdrskin/cdrskin.c:9556:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
 if(strlen(skin->preskin->raw_device_adr)>0 ||
data/libburn-1.5.2/cdrskin/cdrskin.c:9557:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    strlen(skin->preskin->device_adr)>0) {
data/libburn-1.5.2/cdrskin/cdrskin.c:9558:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if(strlen(skin->preskin->device_adr)>0)
data/libburn-1.5.2/cdrskin/cdrskin.c:9581:6:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
     usleep(1000000);
data/libburn-1.5.2/cdrskin/cdrskin.c:9623:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
 if(strlen((*preskin)->device_adr)>0) {       /* disable scan for all others */
data/libburn-1.5.2/cdrskin/cdrskin.c:9698:6:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
     usleep(20000);
data/libburn-1.5.2/libburn/async.c:705:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (burn_precheck_write(opts, disc, reasons + strlen(reasons), 1)
data/libburn-1.5.2/libburn/cdtext.c:265:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		length = strlen((char *) dummy) + 1;
data/libburn-1.5.2/libburn/cdtext.c:459:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	l = strlen(payload);
data/libburn-1.5.2/libburn/cdtext.c:464:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(payload) != 4)
data/libburn-1.5.2/libburn/cdtext.c:475:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(payload) == 6) {
data/libburn-1.5.2/libburn/cdtext.c:582:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	*length = strlen(payload) + 1 + *double_byte;
data/libburn-1.5.2/libburn/cdtext.c:642:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		length = 2 + strlen(line + 2) + 1;
data/libburn-1.5.2/libburn/cdtext.c:730:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(line) == 0)
data/libburn-1.5.2/libburn/cdtext.c:837:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(genre_text, payload, 159);
data/libburn-1.5.2/libburn/cdtext.c:967:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				sprintf(msg + strlen(msg),
data/libburn-1.5.2/libburn/cdtext.c:1209:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		vlen = strlen(value);
data/libburn-1.5.2/libburn/cdtext.c:1210:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(spec);
data/libburn-1.5.2/libburn/cdtext.c:1220:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		memcpy(*respt + strlen(*respt), value, vlen);
data/libburn-1.5.2/libburn/drive.c:1280:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(out->location, d->devname, 16);
data/libburn-1.5.2/libburn/drive.c:1685:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	new_item = calloc(1, strlen(device_address) + 1);
data/libburn-1.5.2/libburn/drive.c:1998:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(d->devname) >= BURN_DRIVE_ADR_LEN) {
data/libburn-1.5.2/libburn/drive.c:2129:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if(strlen(fname) >= BURN_DRIVE_ADR_LEN)
data/libburn-1.5.2/libburn/drive.c:2224:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if(strlen(fname) >= BURN_DRIVE_ADR_LEN)
data/libburn-1.5.2/libburn/drive.c:2278:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if(strlen(path) >= BURN_DRIVE_ADR_LEN)
data/libburn-1.5.2/libburn/drive.c:2346:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	dirlen= strlen(dir_adr) + 1;
data/libburn-1.5.2/libburn/drive.c:2347:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(dir_adr) + 1 >= BURN_DRIVE_ADR_LEN) {
data/libburn-1.5.2/libburn/drive.c:2360:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        strcat(adr, "/");
data/libburn-1.5.2/libburn/drive.c:2361:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	namept = adr + strlen(dir_adr) + 1;
data/libburn-1.5.2/libburn/drive.c:2366:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(entry->d_name) + dirlen >= BURN_DRIVE_ADR_LEN)
data/libburn-1.5.2/libburn/drive.c:2376:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					 strlen(ranks[name_rank])) == 0)
data/libburn-1.5.2/libburn/drive.c:2497:6:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
					usleep(1000000);
data/libburn-1.5.2/libburn/drive.c:2511:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(wait_grain);
data/libburn-1.5.2/libburn/drive.c:3259:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(adr2) >= BURN_DRIVE_ADR_LEN)
data/libburn-1.5.2/libburn/file.c:55:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ret = read(fd, buffer + summed_ret, size - summed_ret);
data/libburn-1.5.2/libburn/file.c:223:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(sleeptime);
data/libburn-1.5.2/libburn/file.c:342:4:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
			usleep(wait_usleep);
data/libburn-1.5.2/libburn/file.c:440:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if (fs->inp->read != NULL)
data/libburn-1.5.2/libburn/file.c:441:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			ret = fs->inp->read(fs->inp,
data/libburn-1.5.2/libburn/file.c:769:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(100000);
data/libburn-1.5.2/libburn/init.c:174:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(1000001);
data/libburn-1.5.2/libburn/init.c:287:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(msg_text, textpt, BURM_MSGS_MESSAGE_LEN-1);
data/libburn-1.5.2/libburn/init.c:288:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if(strlen(textpt) >= BURM_MSGS_MESSAGE_LEN)
data/libburn-1.5.2/libburn/init.c:373:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	l= strlen(text);
data/libburn-1.5.2/libburn/init.c:378:2:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
	sprintf(text + l + 2 * i, "]");
data/libburn-1.5.2/libburn/init.c:494:4:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
			usleep(1000000); /* calm down */
data/libburn-1.5.2/libburn/init.c:499:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(1000000); /* calm down */
data/libburn-1.5.2/libburn/init.c:539:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(abort_message_prefix, (char *) handle,
data/libburn-1.5.2/libburn/libburn.h:490:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	int (*read)(struct burn_source *, unsigned char *buffer, int size);
data/libburn-1.5.2/libburn/libburn.h:3007:53:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
void burn_drive_set_speed(struct burn_drive *d, int read, int write);
data/libburn-1.5.2/libburn/libdax_audioxtr.c:45:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
 strncpy(o->path,path,LIBDAX_AUDIOXTR_STRLEN-1);
data/libburn-1.5.2/libburn/libdax_audioxtr.c:140:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
     ret= read(o->fd, buf, to_read);
data/libburn-1.5.2/libburn/libdax_audioxtr.c:173:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   ret= read(o->fd, buf, 8);
data/libburn-1.5.2/libburn/libdax_audioxtr.c:192:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
 ret= read(o->fd, buf, 4);
data/libburn-1.5.2/libburn/libdax_audioxtr.c:206:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   ret= read(o->fd, buf, 8);
data/libburn-1.5.2/libburn/libdax_audioxtr.c:215:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
     ret= read(o->fd, buf, 16);
data/libburn-1.5.2/libburn/libdax_audioxtr.c:258:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
 ret= read(o->fd, buf, 24);
data/libburn-1.5.2/libburn/libdax_audioxtr.c:382:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
 ret= read(o->fd,buffer,buffer_size);
data/libburn-1.5.2/libburn/libdax_msgs.c:243:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
 strncpy(m->print_id,print_id,80);
data/libburn-1.5.2/libburn/libdax_msgs.c:378:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   item->msg_text= calloc(1, strlen(msg_text)+1);
data/libburn-1.5.2/libburn/libdax_msgs.h:461:41:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
 0x0002010e (FATAL,HIGH)   = Attempt to read ATIP from ungrabbed drive
data/libburn-1.5.2/libburn/libdax_msgs.h:474:41:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
 0x0002011b (FATAL,HIGH)   = Attempt to read track info from ungrabbed drive
data/libburn-1.5.2/libburn/libdax_msgs.h:475:41:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
 0x0002011c (FATAL,HIGH)   = Attempt to read track info from busy drive
data/libburn-1.5.2/libburn/libdax_msgs.h:515:44:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
 0x00020144 (SORRY,HIGH)   = SCSI error on read
data/libburn-1.5.2/libburn/libdax_msgs.h:516:58:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
 0x00020145 (FATAL,HIGH)   = Drive is busy on attempt to read data
data/libburn-1.5.2/libburn/libdax_msgs.h:521:37:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
 0x0002014a (SORRY,HIGH)   = Cannot read desired amount of data
data/libburn-1.5.2/libburn/libdax_msgs.h:561:68:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
 0x00020174 (SORRY,HIGH)   = Fifo alignment does not allow desired read size
data/libburn-1.5.2/libburn/libdax_msgs.h:588:47:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
 0x0002018f (FAILURE,HIGH) = CD-TEXT pack CRC mismatch
data/libburn-1.5.2/libburn/libdax_msgs.h:589:47:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
 0x00020190 (WARNING,HIGH) = CD-TEXT pack CRC mismatch had to be corrected
data/libburn-1.5.2/libburn/libdax_msgs.h:602:36:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
 0x0002019d (SORRY,HIGH)   = Audio read size not properly aligned
data/libburn-1.5.2/libburn/libdax_msgs.h:609:41:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
 0x000201a4 (FAILURE,HIGH) = Failure to read audio sectors
data/libburn-1.5.2/libburn/libdax_msgs.h:641:37:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
 0x0003fff5 (FAILURE,HIGH) = Buffer read error
data/libburn-1.5.2/libburn/libdax_msgs.h:653:40:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
 0x0003ff7b (FAILURE,HIGH) = Trying to read or close a file not openned
data/libburn-1.5.2/libburn/libdax_msgs.h:655:35:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
 0x0003ff79 (FAILURE,HIGH) = File read error
data/libburn-1.5.2/libburn/libdax_msgs.h:661:35:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
 0x0003ff73 (MISHAP,HIGH)  = File read error during image creation
data/libburn-1.5.2/libburn/libdax_msgs.h:687:39:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
X 0x00031001 (SORRY,HIGH)    = Cannot read file (ignored)
data/libburn-1.5.2/libburn/libdax_msgs.h:688:39:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
X 0x00031002 (FATAL,HIGH)    = Cannot read file (operation canceled)
data/libburn-1.5.2/libburn/libdax_msgs.h:692:39:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
X 0x00031003 (SORRY,HIGH)    = Cannot read previous image file
data/libburn-1.5.2/libburn/mmc.c:636:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		sprintf(msg + strlen(msg), ". SCSI error : ");
data/libburn-1.5.2/libburn/mmc.c:637:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		scsi_error_msg(d, c->sense, 14, msg + strlen(msg), 
data/libburn-1.5.2/libburn/mmc.c:803:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if(strlen(sleeplist) < sizeof(sleeplist) - 80)
data/libburn-1.5.2/libburn/mmc.c:804:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			sprintf(sleeplist+strlen(sleeplist)," (%d%s %d)",
data/libburn-1.5.2/libburn/mmc.c:815:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if(strlen(sleeplist) >= sizeof(sleeplist) - 80)
data/libburn-1.5.2/libburn/mmc.c:817:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			sprintf(sleeplist+strlen(sleeplist)," -> %d [%.6f]",
data/libburn-1.5.2/libburn/mmc.c:862:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(usec);
data/libburn-1.5.2/libburn/mmc.c:869:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if(strlen(sleeplist) < sizeof(sleeplist) - 80)
data/libburn-1.5.2/libburn/mmc.c:870:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			sprintf(sleeplist+strlen(sleeplist)," %d", usec);
data/libburn-1.5.2/libburn/mmc.c:978:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (spc_human_readable_cmd(c, msg + strlen(msg),
data/libburn-1.5.2/libburn/mmc.c:979:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					320 - strlen(msg), 1) > 0) {
data/libburn-1.5.2/libburn/mmc.c:1047:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			scsi_error_msg(d, c->sense, 14, msg + strlen(msg), 
data/libburn-1.5.2/libburn/mmc.c:1073:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (spc_human_readable_cmd(c, msg + strlen(msg),
data/libburn-1.5.2/libburn/mmc.c:1074:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					320 - strlen(msg), 0) > 0) {
data/libburn-1.5.2/libburn/mmc.c:2525:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		scsi_error_msg(d, c->sense, 14, msg + strlen(msg),
data/libburn-1.5.2/libburn/mmc.c:2881:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			scsi_error_msg(d, c->sense, 14, msg + strlen(msg), 
data/libburn-1.5.2/libburn/mmc.c:3577:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		sprintf(msg + strlen(msg), ". SCSI error : ");
data/libburn-1.5.2/libburn/mmc.c:3578:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		scsi_error_msg(d, c->sense, 14, msg + strlen(msg), 
data/libburn-1.5.2/libburn/mmc.c:4268:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		sprintf(msg + strlen(msg), "%2.2X ", c->opcode[i]);
data/libburn-1.5.2/libburn/mmc.c:4274:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		sprintf(msg + strlen(msg), "%2.2X ", c->page->data[i]);
data/libburn-1.5.2/libburn/mmc.c:4275:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat(msg, "\n");
data/libburn-1.5.2/libburn/mmc.c:4303:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			scsi_error_msg(d, c->sense, 14, msg + strlen(msg), 
data/libburn-1.5.2/libburn/mmc.c:4316:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(1000000); /* there seems to be a little race condition */
data/libburn-1.5.2/libburn/mmc.c:4318:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(50000);
data/libburn-1.5.2/libburn/mmc.c:4799:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			scsi_error_msg(d, c->sense, 14, msg + strlen(msg), 
data/libburn-1.5.2/libburn/mmc.c:4869:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			scsi_error_msg(d, c->sense, 14, msg + strlen(msg), 
data/libburn-1.5.2/libburn/mmc.c:5100:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		sprintf(*media_code2 + strlen(*media_code2) - 4, "/%d",
data/libburn-1.5.2/libburn/mmc.c:5257:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	*book_type = calloc(80 + strlen(books[bt]), 1);
data/libburn-1.5.2/libburn/mmc.c:5469:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	(*text_len) += strlen(to_add);
data/libburn-1.5.2/libburn/mmc.c:5485:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	l = strlen(text);
data/libburn-1.5.2/libburn/mmc.c:5643:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			sprintf(addon + strlen(addon), " , PP=%d", num & 1);
data/libburn-1.5.2/libburn/mmc.c:5674:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			sprintf(addon + strlen(addon), " , Blocking=%u", num);
data/libburn-1.5.2/libburn/mmc.c:5678:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			sprintf(addon + strlen(addon), " , PP=%u", num);
data/libburn-1.5.2/libburn/mmc.c:5696:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			sprintf(addon + strlen(addon), " , NumLinkSizes=%d",
data/libburn-1.5.2/libburn/mmc.c:5710:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			sprintf(addon + strlen(addon), " , RRM=%d", num & 1);
data/libburn-1.5.2/libburn/mmc.c:5761:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			sprintf(addon + strlen(addon), " , DataTypeSupp=%4.4x",
data/libburn-1.5.2/libburn/mmc.c:5777:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			sprintf(addon + strlen(addon),
data/libburn-1.5.2/libburn/mmc.c:5799:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				sprintf(addon + strlen(addon),
data/libburn-1.5.2/libburn/mmc.c:5894:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				sprintf(addon + strlen(addon),
data/libburn-1.5.2/libburn/options.c:359:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	reason_pt = reasons + strlen(reasons);
data/libburn-1.5.2/libburn/options.c:419:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	reason_pt = reasons + strlen(reasons);
data/libburn-1.5.2/libburn/options.c:460:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	reason_pt = reasons + strlen(reasons);
data/libburn-1.5.2/libburn/read.c:350:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		count = read(fd, buf + (bufsize - todo), todo);
data/libburn-1.5.2/libburn/sector.c:144:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if (track->source->read != NULL)
data/libburn-1.5.2/libburn/sector.c:145:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			valid = track->source->read(track->source,
data/libburn-1.5.2/libburn/sector.c:217:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		valid = src->read(src, data + curr, shortage);
data/libburn-1.5.2/libburn/sg-dummy.c:271:4:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
			strcpy(testpath, ".");
data/libburn-1.5.2/libburn/sg-freebsd.c:625:5:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
				usleep(2000000);
data/libburn-1.5.2/libburn/sg-freebsd.c:630:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			    strlen(lock_name) > 2000 || *pass_dev_no < 0 ?
data/libburn-1.5.2/libburn/sg-freebsd.c:632:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			    strlen(devname) > 2000 ? "drive" : devname);
data/libburn-1.5.2/libburn/sg-freebsd.c:665:7:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
						usleep(2000000);
data/libburn-1.5.2/libburn/sg-freebsd.c:672:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				 strlen(devname) > 4000 ? "drive" : devname);
data/libburn-1.5.2/libburn/sg-freebsd.c:1043:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	e = strlen(spt);
data/libburn-1.5.2/libburn/sg-freebsd.c:1044:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	for (i = strlen(spt) - 1; i > 0; i--)
data/libburn-1.5.2/libburn/sg-freebsd.c:1090:4:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
			strcpy(testpath, ".");
data/libburn-1.5.2/libburn/sg-libcdio.c:270:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ((ssize_t) strlen(*(idx->pos)) >= adr_size)
data/libburn-1.5.2/libburn/sg-libcdio.c:312:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(cdio_name) < sizeof(out.libcdio_name))
data/libburn-1.5.2/libburn/sg-libcdio.c:356:2:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
	strncat(msg, version_text, 800);
data/libburn-1.5.2/libburn/sg-libcdio.c:383:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		msg_pt = msg + strlen(msg);
data/libburn-1.5.2/libburn/sg-libcdio.c:451:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ((ssize_t) strlen(adr) >= path_size)
data/libburn-1.5.2/libburn/sg-libcdio.c:456:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	l = strlen(adr);
data/libburn-1.5.2/libburn/sg-libcdio.c:464:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if(ret > 0 && (ssize_t) strlen(path) < adr_size)
data/libburn-1.5.2/libburn/sg-libcdio.c:499:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		l = strlen(buf);
data/libburn-1.5.2/libburn/sg-libcdio.c:825:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	e = strlen(spt);
data/libburn-1.5.2/libburn/sg-libcdio.c:826:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	for (i = strlen(spt) - 1; i > 0; i--)
data/libburn-1.5.2/libburn/sg-libcdio.c:896:4:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
			strcpy(testpath, ".");
data/libburn-1.5.2/libburn/sg-linux.c:357:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    strlen(fname)>9 || strlen(fname)<8)
data/libburn-1.5.2/libburn/sg-linux.c:357:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    strlen(fname)>9 || strlen(fname)<8)
data/libburn-1.5.2/libburn/sg-linux.c:369:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	msg = calloc(strlen(scd) + strlen(fname) + 80, 1);
data/libburn-1.5.2/libburn/sg-linux.c:369:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	msg = calloc(strlen(scd) + strlen(fname) + 80, 1);
data/libburn-1.5.2/libburn/sg-linux.c:462:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	BURN_ALLOC_MEM(msg, char, strlen(fname) + 1024);
data/libburn-1.5.2/libburn/sg-linux.c:499:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			sprintf(msg + strlen(msg), " , sense data=");
data/libburn-1.5.2/libburn/sg-linux.c:500:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			msg_pt = msg + strlen(msg);
data/libburn-1.5.2/libburn/sg-linux.c:552:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			ret = read(fd, msg, 10);
data/libburn-1.5.2/libburn/sg-linux.c:761:5:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
				usleep(2000000);
data/libburn-1.5.2/libburn/sg-linux.c:845:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(path) > BURN_MSGS_MESSAGE_LEN - 160)
data/libburn-1.5.2/libburn/sg-linux.c:1375:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if ((int) strlen(fname) > maxl)
data/libburn-1.5.2/libburn/sg-linux.c:1376:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				maxl = strlen(fname);
data/libburn-1.5.2/libburn/sg-linux.c:1624:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (adr_size < (int) strlen((idx->info_list)[i]) + 1)
data/libburn-1.5.2/libburn/sg-linux.c:1765:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(Libburn_udev_wait_useC);
data/libburn-1.5.2/libburn/sg-linux.c:1813:4:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
			usleep(Libburn_udev_wait_useC);
data/libburn-1.5.2/libburn/sg-linux.c:1846:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(2000000);
data/libburn-1.5.2/libburn/sg-linux.c:1953:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		sprintf(msg+strlen(msg), "0x%x %s",
data/libburn-1.5.2/libburn/sg-linux.c:1961:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (spc_human_readable_cmd(c, msg + strlen(msg),
data/libburn-1.5.2/libburn/sg-linux.c:1962:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					   160 - strlen(msg), 0) > 0)
data/libburn-1.5.2/libburn/sg-linux.c:2014:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		sprintf(msg+strlen(msg), "driver_status= 0x%x %s / %s",
data/libburn-1.5.2/libburn/sg-linux.c:2023:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (spc_human_readable_cmd(c, msg + strlen(msg),
data/libburn-1.5.2/libburn/sg-linux.c:2024:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					   160 - strlen(msg), 0) > 0)
data/libburn-1.5.2/libburn/sg-linux.c:2220:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		        sprintf(msg + strlen(msg), "errno= %d , ", errno);
data/libburn-1.5.2/libburn/sg-linux.c:2221:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		        sprintf(msg + strlen(msg),
data/libburn-1.5.2/libburn/sg-linux.c:2232:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			spc_human_readable_cmd(c, msg + strlen(msg),
data/libburn-1.5.2/libburn/sg-linux.c:2233:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					       160 - strlen(msg), 0);
data/libburn-1.5.2/libburn/sg-linux.c:2292:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	l = strlen(linux_ata_device_family) - 2;
data/libburn-1.5.2/libburn/sg-linux.c:2430:4:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
			strcpy(testpath, ".");
data/libburn-1.5.2/libburn/sg-netbsd.c:259:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if ((int) strlen(path) >= adr_size)
data/libburn-1.5.2/libburn/sg-netbsd.c:287:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ret = read(fd, buf, 1);
data/libburn-1.5.2/libburn/sg-netbsd.c:774:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	l = strlen(path);
data/libburn-1.5.2/libburn/sg-netbsd.c:777:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		tl = strlen(try);
data/libburn-1.5.2/libburn/sg-netbsd.c:783:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (strncmp(path, try, strlen(try)) == 0)
data/libburn-1.5.2/libburn/sg-netbsd.c:788:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		tl += strlen(try + tl);
data/libburn-1.5.2/libburn/sg-netbsd.c:830:4:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
			strcpy(testpath, ".");
data/libburn-1.5.2/libburn/sg-solaris.c:291:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	BURN_ALLOC_MEM(*dev_to_open, char, strlen(curr_name) + 1);
data/libburn-1.5.2/libburn/sg-solaris.c:331:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(entry->d_name) > (size_t) (volpath_size - 11))
data/libburn-1.5.2/libburn/sg-solaris.c:380:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (adr_size <= (int) strlen(volpath)) {
data/libburn-1.5.2/libburn/sg-solaris.c:629:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			sprintf(msg + strlen(msg), " via '%s'", dev_to_open);
data/libburn-1.5.2/libburn/sg-solaris.c:934:4:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
			strcpy(testpath, ".");
data/libburn-1.5.2/libburn/source.c:71:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (src->read != NULL)
data/libburn-1.5.2/libburn/source.c:72:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		 ret = src->read(src, buffer, size);
data/libburn-1.5.2/libburn/spc.c:177:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(sleep_usecs);
data/libburn-1.5.2/libburn/spc.c:210:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			scsi_error_msg(d, sense, 14, msg + strlen(msg),
data/libburn-1.5.2/libburn/spc.c:254:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(sleep_usecs);
data/libburn-1.5.2/libburn/spc.c:319:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	scsi_error_msg(d, sense, 14, msg + strlen(msg), &key, &asc, &ascq);
data/libburn-1.5.2/libburn/spc.c:1300:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	msg= msg + strlen(msg);
data/libburn-1.5.2/libburn/spc.c:1304:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		msg= msg + strlen(msg);
data/libburn-1.5.2/libburn/spc.c:1648:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat(msg, ".");
data/libburn-1.5.2/libburn/spc.c:1654:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat(msg, ".");
data/libburn-1.5.2/libburn/spc.c:1791:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			sprintf(msg + strlen(msg), " #%d", c->retry_count + 1);
data/libburn-1.5.2/libburn/spc.c:1793:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				sprintf(msg + strlen(msg), ",[%X %2.2X %2.2X]",
data/libburn-1.5.2/libburn/spc.c:1799:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	lname = l = strlen(msg);
data/libburn-1.5.2/libburn/spc.c:1804:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				sprintf(msg + strlen(msg), "... ");
data/libburn-1.5.2/libburn/spc.c:1815:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		l = strlen(msg);
data/libburn-1.5.2/libburn/spc.c:1860:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (spc_human_readable_cmd(c, msg + strlen(msg), 320 - strlen(msg), 1)
data/libburn-1.5.2/libburn/spc.c:1860:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (spc_human_readable_cmd(c, msg + strlen(msg), 320 - strlen(msg), 1)
data/libburn-1.5.2/libburn/spc.c:2148:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (spc_human_readable_cmd(c, msg + strlen(msg),
data/libburn-1.5.2/libburn/spc.c:2149:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						   320 - strlen(msg), 0) > 0)
data/libburn-1.5.2/libburn/spc.c:2159:4:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
			usleep(usleep_time);
data/libburn-1.5.2/libburn/spc.c:2186:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	BURN_ALLOC_MEM(msg, char, strlen(d->devname) + 1024); 
data/libburn-1.5.2/libburn/structure.c:444:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(isrc) != 12 ||
data/libburn-1.5.2/libburn/structure.c:768:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        msg = msg_data + strlen(msg_data);
data/libburn-1.5.2/libburn/structure.c:1267:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	for (ept = text + strlen(text); ept > text; ept--)
data/libburn-1.5.2/libburn/structure.c:1314:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					strlen(payload) + 1, 0);
data/libburn-1.5.2/libburn/structure.c:1318:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					strlen(payload) + 1, 0);
data/libburn-1.5.2/libburn/structure.c:1521:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(apt) < 8) {
data/libburn-1.5.2/libburn/structure.c:1536:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(msf, apt, 2);
data/libburn-1.5.2/libburn/structure.c:1540:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(msf, apt + 3, 2);
data/libburn-1.5.2/libburn/structure.c:1544:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(msf, apt + 6, 2);
data/libburn-1.5.2/libburn/structure.c:1655:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		for (cpt = apt + (strlen(apt) - 1);
data/libburn-1.5.2/libburn/util.c:211:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(media_code2) == 9 && media_code1[0] == '9' &&
data/libburn-1.5.2/libburn/util.c:274:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		new_text = calloc(strlen(*text) + esc_add + 1, 1);
data/libburn-1.5.2/libburn/util.c:315:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	l = strlen(line);
data/libburn-1.5.2/libburn/write.c:1450:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	reason_pt= reasons + strlen(reasons);
data/libburn-1.5.2/libburn/write.c:1831:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			if (track->source->read != NULL)
data/libburn-1.5.2/libburn/write.c:1832:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				valid = track->source->read(track->source,
data/libburn-1.5.2/libburn/write.c:1851:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		valid = track->source->read(track->source, data, opts->obs);
data/libburn-1.5.2/libburn/write.c:2587:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if(source->read!=NULL)
data/libburn-1.5.2/libburn/write.c:2588:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			count = source->read(source,
data/libburn-1.5.2/libburn/write.c:2632:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			sprintf(msg + strlen(msg), " Did %d retries. Last",
data/libburn-1.5.2/libburn/write.c:2634:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		sprintf(msg + strlen(msg), " write(2) returned %d.", ret);
data/libburn-1.5.2/libburn/write.c:2786:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep((int) (to_wait * 1000000.0));
data/libburn-1.5.2/libburn/write.c:3182:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(500001); /* ts A61222: to avoid a warning from remove_worker()*/
data/libburn-1.5.2/test/dewav.c:177:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
     buf_count= read(xtr_fd, buf, sizeof(buf));
data/libburn-1.5.2/test/fake_au.c:45:2:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
 strcpy(out_path,"-");
data/libburn-1.5.2/test/fake_au.c:46:2:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
 strcpy(in_path,"");
data/libburn-1.5.2/test/fake_au.c:52:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if(strlen(argv[i]) >= 4096) {
data/libburn-1.5.2/test/libburner.c:199:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(100002);
data/libburn-1.5.2/test/libburner.c:569:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(100002);
data/libburn-1.5.2/test/libburner.c:674:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                if(strlen(argv[i]) >= BURN_DRIVE_ADR_LEN) {
data/libburn-1.5.2/test/libburner.c:701:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if(strlen(argv[i]) >= 4096) {
data/libburn-1.5.2/test/poll.c:33:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(1000);
data/libburn-1.5.2/test/poll.c:36:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(1000);
data/libburn-1.5.2/test/telltoc.c:166:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(100002);
data/libburn-1.5.2/test/telltoc.c:732:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				lbas = strlen(line);
data/libburn-1.5.2/test/telltoc.c:812:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(argv[i]) >= 4096) {
data/libburn-1.5.2/test/telltoc.c:831:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                if(strlen(argv[i]) >= BURN_DRIVE_ADR_LEN) {

ANALYSIS SUMMARY:

Hits = 1510
Lines analyzed = 57179 in approximately 2.12 seconds (26913 lines/second)
Physical Source Lines of Code (SLOC) = 37886
Hits@level = [0] 1369 [1] 321 [2] 963 [3]   3 [4] 222 [5]   1
Hits@level+ = [0+] 2879 [1+] 1510 [2+] 1189 [3+] 226 [4+] 223 [5+]   1
Hits/KSLOC@level+ = [0+] 75.9911 [1+] 39.8564 [2+] 31.3836 [3+] 5.96526 [4+] 5.88608 [5+] 0.026395
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.