Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/tinydyndns-0.4.2.debian1/alloc.c
Examining data/tinydyndns-0.4.2.debian1/alloc.h
Examining data/tinydyndns-0.4.2.debian1/alloc_re.c
Examining data/tinydyndns-0.4.2.debian1/auto-str.c
Examining data/tinydyndns-0.4.2.debian1/auto_home.h
Examining data/tinydyndns-0.4.2.debian1/axfr-get.c
Examining data/tinydyndns-0.4.2.debian1/axfrdns-conf.c
Examining data/tinydyndns-0.4.2.debian1/axfrdns.c
Examining data/tinydyndns-0.4.2.debian1/buffer.c
Examining data/tinydyndns-0.4.2.debian1/buffer.h
Examining data/tinydyndns-0.4.2.debian1/buffer_1.c
Examining data/tinydyndns-0.4.2.debian1/buffer_2.c
Examining data/tinydyndns-0.4.2.debian1/buffer_copy.c
Examining data/tinydyndns-0.4.2.debian1/buffer_get.c
Examining data/tinydyndns-0.4.2.debian1/buffer_put.c
Examining data/tinydyndns-0.4.2.debian1/buffer_read.c
Examining data/tinydyndns-0.4.2.debian1/buffer_write.c
Examining data/tinydyndns-0.4.2.debian1/byte.h
Examining data/tinydyndns-0.4.2.debian1/byte_chr.c
Examining data/tinydyndns-0.4.2.debian1/byte_copy.c
Examining data/tinydyndns-0.4.2.debian1/byte_cr.c
Examining data/tinydyndns-0.4.2.debian1/byte_diff.c
Examining data/tinydyndns-0.4.2.debian1/byte_zero.c
Examining data/tinydyndns-0.4.2.debian1/cache.c
Examining data/tinydyndns-0.4.2.debian1/cache.h
Examining data/tinydyndns-0.4.2.debian1/cachetest.c
Examining data/tinydyndns-0.4.2.debian1/case.h
Examining data/tinydyndns-0.4.2.debian1/case_diffb.c
Examining data/tinydyndns-0.4.2.debian1/case_diffs.c
Examining data/tinydyndns-0.4.2.debian1/case_lowerb.c
Examining data/tinydyndns-0.4.2.debian1/cdb.c
Examining data/tinydyndns-0.4.2.debian1/cdb.h
Examining data/tinydyndns-0.4.2.debian1/cdb_hash.c
Examining data/tinydyndns-0.4.2.debian1/cdb_make.c
Examining data/tinydyndns-0.4.2.debian1/cdb_make.h
Examining data/tinydyndns-0.4.2.debian1/chkshsgr.c
Examining data/tinydyndns-0.4.2.debian1/dd.c
Examining data/tinydyndns-0.4.2.debian1/dd.h
Examining data/tinydyndns-0.4.2.debian1/dns.h
Examining data/tinydyndns-0.4.2.debian1/dns_dfd.c
Examining data/tinydyndns-0.4.2.debian1/dns_domain.c
Examining data/tinydyndns-0.4.2.debian1/dns_dtda.c
Examining data/tinydyndns-0.4.2.debian1/dns_ip.c
Examining data/tinydyndns-0.4.2.debian1/dns_ipq.c
Examining data/tinydyndns-0.4.2.debian1/dns_mx.c
Examining data/tinydyndns-0.4.2.debian1/dns_name.c
Examining data/tinydyndns-0.4.2.debian1/dns_nd.c
Examining data/tinydyndns-0.4.2.debian1/dns_packet.c
Examining data/tinydyndns-0.4.2.debian1/dns_random.c
Examining data/tinydyndns-0.4.2.debian1/dns_rcip.c
Examining data/tinydyndns-0.4.2.debian1/dns_rcrw.c
Examining data/tinydyndns-0.4.2.debian1/dns_resolve.c
Examining data/tinydyndns-0.4.2.debian1/dns_sortip.c
Examining data/tinydyndns-0.4.2.debian1/dns_transmit.c
Examining data/tinydyndns-0.4.2.debian1/dns_txt.c
Examining data/tinydyndns-0.4.2.debian1/dnscache-conf.c
Examining data/tinydyndns-0.4.2.debian1/dnscache.c
Examining data/tinydyndns-0.4.2.debian1/dnsfilter.c
Examining data/tinydyndns-0.4.2.debian1/dnsip.c
Examining data/tinydyndns-0.4.2.debian1/dnsipq.c
Examining data/tinydyndns-0.4.2.debian1/dnsmx.c
Examining data/tinydyndns-0.4.2.debian1/dnsname.c
Examining data/tinydyndns-0.4.2.debian1/dnsq.c
Examining data/tinydyndns-0.4.2.debian1/dnsqr.c
Examining data/tinydyndns-0.4.2.debian1/dnstrace.c
Examining data/tinydyndns-0.4.2.debian1/dnstxt.c
Examining data/tinydyndns-0.4.2.debian1/droproot.c
Examining data/tinydyndns-0.4.2.debian1/droproot.h
Examining data/tinydyndns-0.4.2.debian1/env.c
Examining data/tinydyndns-0.4.2.debian1/env.h
Examining data/tinydyndns-0.4.2.debian1/error.c
Examining data/tinydyndns-0.4.2.debian1/error.h
Examining data/tinydyndns-0.4.2.debian1/error_str.c
Examining data/tinydyndns-0.4.2.debian1/exit.h
Examining data/tinydyndns-0.4.2.debian1/fmt.h
Examining data/tinydyndns-0.4.2.debian1/fmt_ulong.c
Examining data/tinydyndns-0.4.2.debian1/gen_alloc.h
Examining data/tinydyndns-0.4.2.debian1/gen_allocdefs.h
Examining data/tinydyndns-0.4.2.debian1/generic-conf.c
Examining data/tinydyndns-0.4.2.debian1/generic-conf.h
Examining data/tinydyndns-0.4.2.debian1/getln.c
Examining data/tinydyndns-0.4.2.debian1/getln.h
Examining data/tinydyndns-0.4.2.debian1/getln2.c
Examining data/tinydyndns-0.4.2.debian1/hier.c
Examining data/tinydyndns-0.4.2.debian1/install.c
Examining data/tinydyndns-0.4.2.debian1/instcheck.c
Examining data/tinydyndns-0.4.2.debian1/iopause.c
Examining data/tinydyndns-0.4.2.debian1/ip4.h
Examining data/tinydyndns-0.4.2.debian1/ip4_fmt.c
Examining data/tinydyndns-0.4.2.debian1/ip4_scan.c
Examining data/tinydyndns-0.4.2.debian1/log.c
Examining data/tinydyndns-0.4.2.debian1/log.h
Examining data/tinydyndns-0.4.2.debian1/ndelay.h
Examining data/tinydyndns-0.4.2.debian1/ndelay_off.c
Examining data/tinydyndns-0.4.2.debian1/ndelay_on.c
Examining data/tinydyndns-0.4.2.debian1/okclient.c
Examining data/tinydyndns-0.4.2.debian1/okclient.h
Examining data/tinydyndns-0.4.2.debian1/open.h
Examining data/tinydyndns-0.4.2.debian1/open_read.c
Examining data/tinydyndns-0.4.2.debian1/open_trunc.c
Examining data/tinydyndns-0.4.2.debian1/openreadclose.c
Examining data/tinydyndns-0.4.2.debian1/openreadclose.h
Examining data/tinydyndns-0.4.2.debian1/parsetype.c
Examining data/tinydyndns-0.4.2.debian1/parsetype.h
Examining data/tinydyndns-0.4.2.debian1/pickdns-conf.c
Examining data/tinydyndns-0.4.2.debian1/pickdns-data.c
Examining data/tinydyndns-0.4.2.debian1/pickdns.c
Examining data/tinydyndns-0.4.2.debian1/printpacket.c
Examining data/tinydyndns-0.4.2.debian1/printpacket.h
Examining data/tinydyndns-0.4.2.debian1/printrecord.c
Examining data/tinydyndns-0.4.2.debian1/printrecord.h
Examining data/tinydyndns-0.4.2.debian1/prot.c
Examining data/tinydyndns-0.4.2.debian1/prot.h
Examining data/tinydyndns-0.4.2.debian1/qlog.c
Examining data/tinydyndns-0.4.2.debian1/qlog.h
Examining data/tinydyndns-0.4.2.debian1/query.c
Examining data/tinydyndns-0.4.2.debian1/query.h
Examining data/tinydyndns-0.4.2.debian1/random-ip.c
Examining data/tinydyndns-0.4.2.debian1/rbldns-conf.c
Examining data/tinydyndns-0.4.2.debian1/rbldns-data.c
Examining data/tinydyndns-0.4.2.debian1/rbldns.c
Examining data/tinydyndns-0.4.2.debian1/readclose.c
Examining data/tinydyndns-0.4.2.debian1/readclose.h
Examining data/tinydyndns-0.4.2.debian1/response.c
Examining data/tinydyndns-0.4.2.debian1/response.h
Examining data/tinydyndns-0.4.2.debian1/roots.c
Examining data/tinydyndns-0.4.2.debian1/roots.h
Examining data/tinydyndns-0.4.2.debian1/scan.h
Examining data/tinydyndns-0.4.2.debian1/scan_ulong.c
Examining data/tinydyndns-0.4.2.debian1/seek.h
Examining data/tinydyndns-0.4.2.debian1/seek_set.c
Examining data/tinydyndns-0.4.2.debian1/server.c
Examining data/tinydyndns-0.4.2.debian1/sgetopt.c
Examining data/tinydyndns-0.4.2.debian1/sgetopt.h
Examining data/tinydyndns-0.4.2.debian1/socket.h
Examining data/tinydyndns-0.4.2.debian1/socket_accept.c
Examining data/tinydyndns-0.4.2.debian1/socket_bind.c
Examining data/tinydyndns-0.4.2.debian1/socket_conn.c
Examining data/tinydyndns-0.4.2.debian1/socket_listen.c
Examining data/tinydyndns-0.4.2.debian1/socket_recv.c
Examining data/tinydyndns-0.4.2.debian1/socket_send.c
Examining data/tinydyndns-0.4.2.debian1/socket_tcp.c
Examining data/tinydyndns-0.4.2.debian1/socket_udp.c
Examining data/tinydyndns-0.4.2.debian1/str.h
Examining data/tinydyndns-0.4.2.debian1/str_chr.c
Examining data/tinydyndns-0.4.2.debian1/str_diff.c
Examining data/tinydyndns-0.4.2.debian1/str_len.c
Examining data/tinydyndns-0.4.2.debian1/str_rchr.c
Examining data/tinydyndns-0.4.2.debian1/str_start.c
Examining data/tinydyndns-0.4.2.debian1/stralloc.h
Examining data/tinydyndns-0.4.2.debian1/stralloc_cat.c
Examining data/tinydyndns-0.4.2.debian1/stralloc_catb.c
Examining data/tinydyndns-0.4.2.debian1/stralloc_cats.c
Examining data/tinydyndns-0.4.2.debian1/stralloc_copy.c
Examining data/tinydyndns-0.4.2.debian1/stralloc_eady.c
Examining data/tinydyndns-0.4.2.debian1/stralloc_num.c
Examining data/tinydyndns-0.4.2.debian1/stralloc_opyb.c
Examining data/tinydyndns-0.4.2.debian1/stralloc_opys.c
Examining data/tinydyndns-0.4.2.debian1/stralloc_pend.c
Examining data/tinydyndns-0.4.2.debian1/strerr.h
Examining data/tinydyndns-0.4.2.debian1/strerr_die.c
Examining data/tinydyndns-0.4.2.debian1/strerr_sys.c
Examining data/tinydyndns-0.4.2.debian1/subgetopt.c
Examining data/tinydyndns-0.4.2.debian1/subgetopt.h
Examining data/tinydyndns-0.4.2.debian1/tai.h
Examining data/tinydyndns-0.4.2.debian1/tai_add.c
Examining data/tinydyndns-0.4.2.debian1/tai_now.c
Examining data/tinydyndns-0.4.2.debian1/tai_pack.c
Examining data/tinydyndns-0.4.2.debian1/tai_sub.c
Examining data/tinydyndns-0.4.2.debian1/tai_uint.c
Examining data/tinydyndns-0.4.2.debian1/tai_unpack.c
Examining data/tinydyndns-0.4.2.debian1/taia.h
Examining data/tinydyndns-0.4.2.debian1/taia_add.c
Examining data/tinydyndns-0.4.2.debian1/taia_approx.c
Examining data/tinydyndns-0.4.2.debian1/taia_frac.c
Examining data/tinydyndns-0.4.2.debian1/taia_less.c
Examining data/tinydyndns-0.4.2.debian1/taia_now.c
Examining data/tinydyndns-0.4.2.debian1/taia_pack.c
Examining data/tinydyndns-0.4.2.debian1/taia_sub.c
Examining data/tinydyndns-0.4.2.debian1/taia_tai.c
Examining data/tinydyndns-0.4.2.debian1/taia_uint.c
Examining data/tinydyndns-0.4.2.debian1/tdlookup.c
Examining data/tinydyndns-0.4.2.debian1/timeoutread.c
Examining data/tinydyndns-0.4.2.debian1/timeoutread.h
Examining data/tinydyndns-0.4.2.debian1/timeoutwrite.c
Examining data/tinydyndns-0.4.2.debian1/timeoutwrite.h
Examining data/tinydyndns-0.4.2.debian1/tinydns-conf.c
Examining data/tinydyndns-0.4.2.debian1/tinydns-data.c
Examining data/tinydyndns-0.4.2.debian1/tinydns-edit.c
Examining data/tinydyndns-0.4.2.debian1/tinydns-get.c
Examining data/tinydyndns-0.4.2.debian1/tinydns.c
Examining data/tinydyndns-0.4.2.debian1/tinydyndns-data.c
Examining data/tinydyndns-0.4.2.debian1/tinydyndns-update.c
Examining data/tinydyndns-0.4.2.debian1/trycpp.c
Examining data/tinydyndns-0.4.2.debian1/trydrent.c
Examining data/tinydyndns-0.4.2.debian1/trylsock.c
Examining data/tinydyndns-0.4.2.debian1/trypoll.c
Examining data/tinydyndns-0.4.2.debian1/tryshsgr.c
Examining data/tinydyndns-0.4.2.debian1/trysysel.c
Examining data/tinydyndns-0.4.2.debian1/tryulong32.c
Examining data/tinydyndns-0.4.2.debian1/tryulong64.c
Examining data/tinydyndns-0.4.2.debian1/uint16.h
Examining data/tinydyndns-0.4.2.debian1/uint16_pack.c
Examining data/tinydyndns-0.4.2.debian1/uint16_unpack.c
Examining data/tinydyndns-0.4.2.debian1/uint32_pack.c
Examining data/tinydyndns-0.4.2.debian1/uint32_unpack.c
Examining data/tinydyndns-0.4.2.debian1/utime.c
Examining data/tinydyndns-0.4.2.debian1/walldns-conf.c
Examining data/tinydyndns-0.4.2.debian1/walldns.c
Examining data/tinydyndns-0.4.2.debian1/x86cpuid.c

FINAL RESULTS:

data/tinydyndns-0.4.2.debian1/generic-conf.c:24:7:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
  if (chmod(dir,03755) == -1)
data/tinydyndns-0.4.2.debian1/generic-conf.c:73:7:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
  if (chmod(fn,mode) == -1) fail();
data/tinydyndns-0.4.2.debian1/generic-conf.c:78:7:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
  if (chown(fn,uid,gid) == -1) fail();
data/tinydyndns-0.4.2.debian1/install.c:25:7:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
  if (chown(home,uid,gid) == -1)
data/tinydyndns-0.4.2.debian1/install.c:27:7:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
  if (chmod(home,mode) == -1)
data/tinydyndns-0.4.2.debian1/install.c:43:7:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
  if (chown(subdir,uid,gid) == -1)
data/tinydyndns-0.4.2.debian1/install.c:45:7:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
  if (chmod(subdir,mode) == -1)
data/tinydyndns-0.4.2.debian1/install.c:98:7:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
  if (chown(file,uid,gid) == -1)
data/tinydyndns-0.4.2.debian1/install.c:100:7:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
  if (chmod(file,mode) == -1)
data/tinydyndns-0.4.2.debian1/install.c:136:7:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
  if (chown(file,uid,gid) == -1)
data/tinydyndns-0.4.2.debian1/install.c:138:7:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
  if (chmod(file,mode) == -1)
data/tinydyndns-0.4.2.debian1/dnsfilter.c:72:17:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  while ((opt = getopt(argc,argv,"c:l:")) != opteof)
data/tinydyndns-0.4.2.debian1/droproot.c:17:7:  [3] (misc) chroot:
  chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22).
  Make sure the program immediately chdir("/"), closes file descriptors, and
  drops root privileges, and that all necessary files (and no more!) are in
  the new root.
  if (chroot(".") == -1)
data/tinydyndns-0.4.2.debian1/sgetopt.c:19:9:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
#define getopt sgetoptmine
data/tinydyndns-0.4.2.debian1/sgetopt.c:28:5:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
int getopt(int argc,char **argv,const char *opts)
data/tinydyndns-0.4.2.debian1/sgetopt.h:5:9:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
#define getopt sgetoptmine
data/tinydyndns-0.4.2.debian1/alloc.c:8:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef union { char irrelevant[ALIGNMENT]; double d; } aligned;
data/tinydyndns-0.4.2.debian1/auto-str.c:4:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char bspace[256];
data/tinydyndns-0.4.2.debian1/auto-str.c:17:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char octal[4];
data/tinydyndns-0.4.2.debian1/axfr-get.c:90:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char netreadspace[1024];
data/tinydyndns-0.4.2.debian1/axfr-get.c:92:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char netwritespace[1024];
data/tinydyndns-0.4.2.debian1/axfr-get.c:107:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char bspace[1024];
data/tinydyndns-0.4.2.debian1/axfr-get.c:135:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char data[20];
data/tinydyndns-0.4.2.debian1/axfr-get.c:213:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ipstr[IP4_FMT];
data/tinydyndns-0.4.2.debian1/axfr-get.c:257:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char out[20];
data/tinydyndns-0.4.2.debian1/axfrdns.c:67:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char netwritespace[1024];
data/tinydyndns-0.4.2.debian1/axfrdns.c:72:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tcpheader[2];
data/tinydyndns-0.4.2.debian1/axfrdns.c:107:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char typeclass[4];
data/tinydyndns-0.4.2.debian1/axfrdns.c:111:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char bcdbspace[1024];
data/tinydyndns-0.4.2.debian1/axfrdns.c:126:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char ip[4];
data/tinydyndns-0.4.2.debian1/axfrdns.c:128:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char clientloc[2];
data/tinydyndns-0.4.2.debian1/axfrdns.c:131:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char data[32767];
data/tinydyndns-0.4.2.debian1/axfrdns.c:149:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int build(stralloc *sa,char *q,int flagsoa,char id[2])
data/tinydyndns-0.4.2.debian1/axfrdns.c:149:44:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int build(stralloc *sa,char *q,int flagsoa,char id[2])
data/tinydyndns-0.4.2.debian1/axfrdns.c:152:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char misc[20];
data/tinydyndns-0.4.2.debian1/axfrdns.c:153:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char type[2];
data/tinydyndns-0.4.2.debian1/axfrdns.c:154:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char recordloc[2];
data/tinydyndns-0.4.2.debian1/axfrdns.c:155:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ttl[4];
data/tinydyndns-0.4.2.debian1/axfrdns.c:156:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ttd[8];
data/tinydyndns-0.4.2.debian1/axfrdns.c:223:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void doaxfr(char id[2])
data/tinydyndns-0.4.2.debian1/axfrdns.c:225:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key[512];
data/tinydyndns-0.4.2.debian1/axfrdns.c:227:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char num[4];
data/tinydyndns-0.4.2.debian1/axfrdns.c:311:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char tcpheader[2];
data/tinydyndns-0.4.2.debian1/axfrdns.c:312:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char buf[512];
data/tinydyndns-0.4.2.debian1/axfrdns.c:315:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char seed[128];
data/tinydyndns-0.4.2.debian1/axfrdns.c:320:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char header[12];
data/tinydyndns-0.4.2.debian1/axfrdns.c:321:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char qtype[2];
data/tinydyndns-0.4.2.debian1/axfrdns.c:322:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char qclass[2];
data/tinydyndns-0.4.2.debian1/buffer_1.c:3:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char buffer_1_space[BUFFER_OUTSIZE];
data/tinydyndns-0.4.2.debian1/buffer_2.c:3:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char buffer_2_space[256];
data/tinydyndns-0.4.2.debian1/cdb.c:72:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[32];
data/tinydyndns-0.4.2.debian1/cdb.c:89:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[8];
data/tinydyndns-0.4.2.debian1/cdb_make.c:53:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[8];
data/tinydyndns-0.4.2.debian1/cdb_make.c:74:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[8];
data/tinydyndns-0.4.2.debian1/cdb_make.h:20:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char bspace[8192];
data/tinydyndns-0.4.2.debian1/cdb_make.h:21:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char final[2048];
data/tinydyndns-0.4.2.debian1/dd.c:4:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int dd(const char *q,const char *base,char ip[4])
data/tinydyndns-0.4.2.debian1/dd.c:4:28:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int dd(const char *q,const char *base,char ip[4])
data/tinydyndns-0.4.2.debian1/dd.c:4:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int dd(const char *q,const char *base,char ip[4])
data/tinydyndns-0.4.2.debian1/dns.h:38:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char localip[4];
data/tinydyndns-0.4.2.debian1/dns.h:39:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char qtype[2];
data/tinydyndns-0.4.2.debian1/dns_dfd.c:8:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char label[63];
data/tinydyndns-0.4.2.debian1/dns_dfd.c:10:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name[255];
data/tinydyndns-0.4.2.debian1/dns_dtda.c:9:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[4];
data/tinydyndns-0.4.2.debian1/dns_ip.c:9:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char header[12];
data/tinydyndns-0.4.2.debian1/dns_mx.c:11:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char header[12];
data/tinydyndns-0.4.2.debian1/dns_mx.c:12:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pref[2];
data/tinydyndns-0.4.2.debian1/dns_name.c:11:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char header[12];
data/tinydyndns-0.4.2.debian1/dns_name.c:38:35:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int dns_name4(stralloc *out,const char ip[4])
data/tinydyndns-0.4.2.debian1/dns_name.c:40:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name[DNS_NAME4_DOMAIN];
data/tinydyndns-0.4.2.debian1/dns_nd.c:5:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void dns_name4_domain(char name[DNS_NAME4_DOMAIN],const char ip[4])
data/tinydyndns-0.4.2.debian1/dns_nd.c:5:57:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void dns_name4_domain(char name[DNS_NAME4_DOMAIN],const char ip[4])
data/tinydyndns-0.4.2.debian1/dns_packet.c:42:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name[255];
data/tinydyndns-0.4.2.debian1/dns_random.c:33:28:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void dns_random_init(const char data[128])
data/tinydyndns-0.4.2.debian1/dns_random.c:37:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tpack[16];
data/tinydyndns-0.4.2.debian1/dns_rcip.c:10:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static int init(char ip[64])
data/tinydyndns-0.4.2.debian1/dns_rcip.c:65:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char ip[64]; /* defined if ok */
data/tinydyndns-0.4.2.debian1/dns_rcip.c:67:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int dns_resolvconfip(char s[64])
data/tinydyndns-0.4.2.debian1/dns_rcrw.c:13:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char host[256];
data/tinydyndns-0.4.2.debian1/dns_resolve.c:8:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int dns_resolve(const char *q,const char qtype[2])
data/tinydyndns-0.4.2.debian1/dns_resolve.c:8:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int dns_resolve(const char *q,const char qtype[2])
data/tinydyndns-0.4.2.debian1/dns_resolve.c:12:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char servers[64];
data/tinydyndns-0.4.2.debian1/dns_sortip.c:10:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[4];
data/tinydyndns-0.4.2.debian1/dns_transmit.c:13:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char out[12];
data/tinydyndns-0.4.2.debian1/dns_transmit.c:22:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char out[12];
data/tinydyndns-0.4.2.debian1/dns_transmit.c:34:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char out[12];
data/tinydyndns-0.4.2.debian1/dns_transmit.c:196:53:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int dns_transmit_start(struct dns_transmit *d,const char servers[64],int flagrecursive,const char *q,const char qtype[2],const char localip[4])
data/tinydyndns-0.4.2.debian1/dns_transmit.c:196:94:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int dns_transmit_start(struct dns_transmit *d,const char servers[64],int flagrecursive,const char *q,const char qtype[2],const char localip[4])
data/tinydyndns-0.4.2.debian1/dns_transmit.c:196:108:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int dns_transmit_start(struct dns_transmit *d,const char servers[64],int flagrecursive,const char *q,const char qtype[2],const char localip[4])
data/tinydyndns-0.4.2.debian1/dns_transmit.c:196:128:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int dns_transmit_start(struct dns_transmit *d,const char servers[64],int flagrecursive,const char *q,const char qtype[2],const char localip[4])
data/tinydyndns-0.4.2.debian1/dns_transmit.c:243:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char udpbuf[513];
data/tinydyndns-0.4.2.debian1/dns_txt.c:9:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char header[12];
data/tinydyndns-0.4.2.debian1/dnscache-conf.c:28:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char rootserversbuf[64];
data/tinydyndns-0.4.2.debian1/dnscache-conf.c:57:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tpack[TAIA_PACK];
data/tinydyndns-0.4.2.debian1/dnscache.c:26:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static int packetquery(char *buf,unsigned int len,char **q,char qtype[2],char qclass[2],char id[2])
data/tinydyndns-0.4.2.debian1/dnscache.c:26:51:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static int packetquery(char *buf,unsigned int len,char **q,char qtype[2],char qclass[2],char id[2])
data/tinydyndns-0.4.2.debian1/dnscache.c:26:60:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static int packetquery(char *buf,unsigned int len,char **q,char qtype[2],char qclass[2],char id[2])
data/tinydyndns-0.4.2.debian1/dnscache.c:26:74:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static int packetquery(char *buf,unsigned int len,char **q,char qtype[2],char qclass[2],char id[2])
data/tinydyndns-0.4.2.debian1/dnscache.c:26:89:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static int packetquery(char *buf,unsigned int len,char **q,char qtype[2],char qclass[2],char id[2])
data/tinydyndns-0.4.2.debian1/dnscache.c:29:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char header[12];
data/tinydyndns-0.4.2.debian1/dnscache.c:49:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char myipoutgoing[4];
data/tinydyndns-0.4.2.debian1/dnscache.c:50:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char myipincoming[4];
data/tinydyndns-0.4.2.debian1/dnscache.c:51:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char buf[1024];
data/tinydyndns-0.4.2.debian1/dnscache.c:63:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ip[4];
data/tinydyndns-0.4.2.debian1/dnscache.c:65:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char id[2];
data/tinydyndns-0.4.2.debian1/dnscache.c:93:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char qtype[2];
data/tinydyndns-0.4.2.debian1/dnscache.c:94:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char qclass[2];
data/tinydyndns-0.4.2.debian1/dnscache.c:141:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ip[4]; /* send response to this address */
data/tinydyndns-0.4.2.debian1/dnscache.c:143:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char id[2];
data/tinydyndns-0.4.2.debian1/dnscache.c:212:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char qtype[2];
data/tinydyndns-0.4.2.debian1/dnscache.c:213:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char qclass[2];
data/tinydyndns-0.4.2.debian1/dnscache.c:387:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char seed[128];
data/tinydyndns-0.4.2.debian1/dnsfilter.c:39:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char inbuf[1024];
data/tinydyndns-0.4.2.debian1/dnsfilter.c:47:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char servers[64];
data/tinydyndns-0.4.2.debian1/dnsfilter.c:48:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char ip[4];
data/tinydyndns-0.4.2.debian1/dnsfilter.c:49:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char name[DNS_NAME4_DOMAIN];
data/tinydyndns-0.4.2.debian1/dnsip.c:9:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char seed[128];
data/tinydyndns-0.4.2.debian1/dnsip.c:13:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char str[IP4_FMT];
data/tinydyndns-0.4.2.debian1/dnsipq.c:9:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char seed[128];
data/tinydyndns-0.4.2.debian1/dnsipq.c:14:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char str[IP4_FMT];
data/tinydyndns-0.4.2.debian1/dnsmx.c:17:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char seed[128];
data/tinydyndns-0.4.2.debian1/dnsmx.c:22:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char strnum[FMT_ULONG];
data/tinydyndns-0.4.2.debian1/dnsname.c:9:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char seed[128];
data/tinydyndns-0.4.2.debian1/dnsname.c:11:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char ip[4];
data/tinydyndns-0.4.2.debian1/dnsq.c:27:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int resolve(char *q,char qtype[2],char servers[64])
data/tinydyndns-0.4.2.debian1/dnsq.c:27:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int resolve(char *q,char qtype[2],char servers[64])
data/tinydyndns-0.4.2.debian1/dnsq.c:27:35:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int resolve(char *q,char qtype[2],char servers[64])
data/tinydyndns-0.4.2.debian1/dnsq.c:50:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char servers[64];
data/tinydyndns-0.4.2.debian1/dnsq.c:54:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char type[2];
data/tinydyndns-0.4.2.debian1/dnsq.c:59:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char seed[128];
data/tinydyndns-0.4.2.debian1/dnsqr.c:24:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char type[2];
data/tinydyndns-0.4.2.debian1/dnsqr.c:29:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char seed[128];
data/tinydyndns-0.4.2.debian1/dnstrace.c:33:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char ipstr[IP4_FMT];
data/tinydyndns-0.4.2.debian1/dnstrace.c:45:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int resolve(char *q,char qtype[2],char ip[4])
data/tinydyndns-0.4.2.debian1/dnstrace.c:45:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int resolve(char *q,char qtype[2],char ip[4])
data/tinydyndns-0.4.2.debian1/dnstrace.c:45:35:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int resolve(char *q,char qtype[2],char ip[4])
data/tinydyndns-0.4.2.debian1/dnstrace.c:50:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char servers[64];
data/tinydyndns-0.4.2.debian1/dnstrace.c:85:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ip[4];
data/tinydyndns-0.4.2.debian1/dnstrace.c:107:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char type[2];
data/tinydyndns-0.4.2.debian1/dnstrace.c:118:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char type[2];
data/tinydyndns-0.4.2.debian1/dnstrace.c:120:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ip[4];
data/tinydyndns-0.4.2.debian1/dnstrace.c:129:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void qt_add(const char *q,const char type[2],const char *control,const char ip[4])
data/tinydyndns-0.4.2.debian1/dnstrace.c:129:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void qt_add(const char *q,const char type[2],const char *control,const char ip[4])
data/tinydyndns-0.4.2.debian1/dnstrace.c:129:52:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void qt_add(const char *q,const char type[2],const char *control,const char ip[4])
data/tinydyndns-0.4.2.debian1/dnstrace.c:129:72:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void qt_add(const char *q,const char type[2],const char *control,const char ip[4])
data/tinydyndns-0.4.2.debian1/dnstrace.c:151:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void query_add(const char *owner,const char type[2])
data/tinydyndns-0.4.2.debian1/dnstrace.c:151:40:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void query_add(const char *owner,const char type[2])
data/tinydyndns-0.4.2.debian1/dnstrace.c:206:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void address_add(const char *owner,const char ip[4])
data/tinydyndns-0.4.2.debian1/dnstrace.c:206:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void address_add(const char *owner,const char ip[4])
data/tinydyndns-0.4.2.debian1/dnstrace.c:236:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char seed[128];
data/tinydyndns-0.4.2.debian1/dnstrace.c:243:28:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static int typematch(const char rtype[2],const char qtype[2])
data/tinydyndns-0.4.2.debian1/dnstrace.c:243:48:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static int typematch(const char rtype[2],const char qtype[2])
data/tinydyndns-0.4.2.debian1/dnstrace.c:248:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void parsepacket(const char *buf,unsigned int len,const char *d,const char dtype[2],const char *control)
data/tinydyndns-0.4.2.debian1/dnstrace.c:248:57:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void parsepacket(const char *buf,unsigned int len,const char *d,const char dtype[2],const char *control)
data/tinydyndns-0.4.2.debian1/dnstrace.c:248:71:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void parsepacket(const char *buf,unsigned int len,const char *d,const char dtype[2],const char *control)
data/tinydyndns-0.4.2.debian1/dnstrace.c:250:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char misc[20];
data/tinydyndns-0.4.2.debian1/dnstrace.c:251:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char header[12];
data/tinydyndns-0.4.2.debian1/dnstrace.c:396:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char type[2];
data/tinydyndns-0.4.2.debian1/dnstrace.c:397:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ip[64];
data/tinydyndns-0.4.2.debian1/dnstxt.c:8:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char seed[128];
data/tinydyndns-0.4.2.debian1/generic-conf.c:14:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char buf[1024];
data/tinydyndns-0.4.2.debian1/install.c:49:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char inbuf[BUFFER_INSIZE];
data/tinydyndns-0.4.2.debian1/install.c:50:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char outbuf[BUFFER_OUTSIZE];
data/tinydyndns-0.4.2.debian1/ip4_fmt.c:4:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
unsigned int ip4_fmt(char *s,const char ip[4])
data/tinydyndns-0.4.2.debian1/ip4_fmt.c:4:36:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
unsigned int ip4_fmt(char *s,const char ip[4])
data/tinydyndns-0.4.2.debian1/ip4_scan.c:4:29:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
unsigned int ip4_scan(const char *s,char ip[4])
data/tinydyndns-0.4.2.debian1/ip4_scan.c:4:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
unsigned int ip4_scan(const char *s,char ip[4])
data/tinydyndns-0.4.2.debian1/log.c:13:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[20];
data/tinydyndns-0.4.2.debian1/log.c:48:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static void ip(const char i[4])
data/tinydyndns-0.4.2.debian1/log.c:56:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static void logid(const char id[2])
data/tinydyndns-0.4.2.debian1/log.c:62:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static void logtype(const char type[2])
data/tinydyndns-0.4.2.debian1/log.c:97:35:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void log_query(uint64 *qnum,const char client[4],unsigned int port,const char id[2],const char *q,const char qtype[2])
data/tinydyndns-0.4.2.debian1/log.c:97:74:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void log_query(uint64 *qnum,const char client[4],unsigned int port,const char id[2],const char *q,const char qtype[2])
data/tinydyndns-0.4.2.debian1/log.c:97:91:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void log_query(uint64 *qnum,const char client[4],unsigned int port,const char id[2],const char *q,const char qtype[2])
data/tinydyndns-0.4.2.debian1/log.c:97:105:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void log_query(uint64 *qnum,const char client[4],unsigned int port,const char id[2],const char *q,const char qtype[2])
data/tinydyndns-0.4.2.debian1/log.c:122:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void log_tcpopen(const char client[4],unsigned int port)
data/tinydyndns-0.4.2.debian1/log.c:129:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void log_tcpclose(const char client[4],unsigned int port)
data/tinydyndns-0.4.2.debian1/log.c:138:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void log_tx(const char *q,const char qtype[2],const char *control,const char servers[64],unsigned int gluelessness)
data/tinydyndns-0.4.2.debian1/log.c:138:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void log_tx(const char *q,const char qtype[2],const char *control,const char servers[64],unsigned int gluelessness)
data/tinydyndns-0.4.2.debian1/log.c:138:53:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void log_tx(const char *q,const char qtype[2],const char *control,const char servers[64],unsigned int gluelessness)
data/tinydyndns-0.4.2.debian1/log.c:138:73:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void log_tx(const char *q,const char qtype[2],const char *control,const char servers[64],unsigned int gluelessness)
data/tinydyndns-0.4.2.debian1/log.c:153:29:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void log_cachedanswer(const char *q,const char type[2])
data/tinydyndns-0.4.2.debian1/log.c:153:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void log_cachedanswer(const char *q,const char type[2])
data/tinydyndns-0.4.2.debian1/log.c:178:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void log_nxdomain(const char server[4],const char *q,unsigned int ttl)
data/tinydyndns-0.4.2.debian1/log.c:185:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void log_nodata(const char server[4],const char *q,const char qtype[2],unsigned int ttl)
data/tinydyndns-0.4.2.debian1/log.c:185:44:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void log_nodata(const char server[4],const char *q,const char qtype[2],unsigned int ttl)
data/tinydyndns-0.4.2.debian1/log.c:185:58:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void log_nodata(const char server[4],const char *q,const char qtype[2],unsigned int ttl)
data/tinydyndns-0.4.2.debian1/log.c:192:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void log_lame(const char server[4],const char *control,const char *referral)
data/tinydyndns-0.4.2.debian1/log.c:208:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void log_rr(const char server[4],const char *q,const char type[2],const char *buf,unsigned int len,unsigned int ttl)
data/tinydyndns-0.4.2.debian1/log.c:208:40:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void log_rr(const char server[4],const char *q,const char type[2],const char *buf,unsigned int len,unsigned int ttl)
data/tinydyndns-0.4.2.debian1/log.c:208:54:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void log_rr(const char server[4],const char *q,const char type[2],const char *buf,unsigned int len,unsigned int ttl)
data/tinydyndns-0.4.2.debian1/log.c:225:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void log_rrns(const char server[4],const char *q,const char *data,unsigned int ttl)
data/tinydyndns-0.4.2.debian1/log.c:233:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void log_rrcname(const char server[4],const char *q,const char *data,unsigned int ttl)
data/tinydyndns-0.4.2.debian1/log.c:241:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void log_rrptr(const char server[4],const char *q,const char *data,unsigned int ttl)
data/tinydyndns-0.4.2.debian1/log.c:249:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void log_rrmx(const char server[4],const char *q,const char *mx,const char pref[2],unsigned int ttl)
data/tinydyndns-0.4.2.debian1/log.c:249:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void log_rrmx(const char server[4],const char *q,const char *mx,const char pref[2],unsigned int ttl)
data/tinydyndns-0.4.2.debian1/log.c:249:56:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void log_rrmx(const char server[4],const char *q,const char *mx,const char pref[2],unsigned int ttl)
data/tinydyndns-0.4.2.debian1/log.c:249:71:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void log_rrmx(const char server[4],const char *q,const char *mx,const char pref[2],unsigned int ttl)
data/tinydyndns-0.4.2.debian1/log.c:260:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void log_rrsoa(const char server[4],const char *q,const char *n1,const char *n2,const char misc[20],unsigned int ttl)
data/tinydyndns-0.4.2.debian1/log.c:260:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void log_rrsoa(const char server[4],const char *q,const char *n1,const char *n2,const char misc[20],unsigned int ttl)
data/tinydyndns-0.4.2.debian1/log.c:260:57:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void log_rrsoa(const char server[4],const char *q,const char *n1,const char *n2,const char misc[20],unsigned int ttl)
data/tinydyndns-0.4.2.debian1/log.c:260:72:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void log_rrsoa(const char server[4],const char *q,const char *n1,const char *n2,const char misc[20],unsigned int ttl)
data/tinydyndns-0.4.2.debian1/log.c:260:87:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void log_rrsoa(const char server[4],const char *q,const char *n1,const char *n2,const char misc[20],unsigned int ttl)
data/tinydyndns-0.4.2.debian1/okclient.c:7:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char fn[3 + IP4_FMT];
data/tinydyndns-0.4.2.debian1/okclient.c:9:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int okclient(char ip[4])
data/tinydyndns-0.4.2.debian1/open_read.c:6:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
{ return open(fn,O_RDONLY | O_NDELAY); }
data/tinydyndns-0.4.2.debian1/open_trunc.c:6:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
{ return open(fn,O_WRONLY | O_NDELAY | O_TRUNC | O_CREAT,0644); }
data/tinydyndns-0.4.2.debian1/parsetype.c:8:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int parsetype(char *s,char type[2])
data/tinydyndns-0.4.2.debian1/parsetype.c:8:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int parsetype(char *s,char type[2])
data/tinydyndns-0.4.2.debian1/pickdns-data.c:50:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ip[4];
data/tinydyndns-0.4.2.debian1/pickdns-data.c:51:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char location[2];
data/tinydyndns-0.4.2.debian1/pickdns-data.c:103:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char bspace[1024];
data/tinydyndns-0.4.2.debian1/pickdns-data.c:117:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char strnum[FMT_ULONG];
data/tinydyndns-0.4.2.debian1/pickdns.c:12:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char seed[128];
data/tinydyndns-0.4.2.debian1/pickdns.c:20:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char key[258];
data/tinydyndns-0.4.2.debian1/pickdns.c:21:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char data[512];
data/tinydyndns-0.4.2.debian1/pickdns.c:23:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static int doit(char *q,char qtype[2],char ip[4])
data/tinydyndns-0.4.2.debian1/pickdns.c:23:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static int doit(char *q,char qtype[2],char ip[4])
data/tinydyndns-0.4.2.debian1/pickdns.c:23:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static int doit(char *q,char qtype[2],char ip[4])
data/tinydyndns-0.4.2.debian1/pickdns.c:89:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int respond(char *q,char qtype[2],char ip[4])
data/tinydyndns-0.4.2.debian1/pickdns.c:89:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int respond(char *q,char qtype[2],char ip[4])
data/tinydyndns-0.4.2.debian1/pickdns.c:89:35:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int respond(char *q,char qtype[2],char ip[4])
data/tinydyndns-0.4.2.debian1/printpacket.c:21:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char data[12];
data/tinydyndns-0.4.2.debian1/printrecord.c:10:50:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
unsigned int printrecord_cat(stralloc *out,const char *buf,unsigned int len,unsigned int pos,const char *q,const char qtype[2])
data/tinydyndns-0.4.2.debian1/printrecord.c:10:100:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
unsigned int printrecord_cat(stralloc *out,const char *buf,unsigned int len,unsigned int pos,const char *q,const char qtype[2])
data/tinydyndns-0.4.2.debian1/printrecord.c:10:114:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
unsigned int printrecord_cat(stralloc *out,const char *buf,unsigned int len,unsigned int pos,const char *q,const char qtype[2])
data/tinydyndns-0.4.2.debian1/printrecord.c:13:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char misc[20];
data/tinydyndns-0.4.2.debian1/printrecord.c:111:46:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
unsigned int printrecord(stralloc *out,const char *buf,unsigned int len,unsigned int pos,const char *q,const char qtype[2])
data/tinydyndns-0.4.2.debian1/printrecord.c:111:96:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
unsigned int printrecord(stralloc *out,const char *buf,unsigned int len,unsigned int pos,const char *q,const char qtype[2])
data/tinydyndns-0.4.2.debian1/printrecord.c:111:110:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
unsigned int printrecord(stralloc *out,const char *buf,unsigned int len,unsigned int pos,const char *q,const char qtype[2])
data/tinydyndns-0.4.2.debian1/qlog.c:23:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void qlog(const char ip[4],uint16 port,const char id[2],const char *q,const char qtype[2],const char *result)
data/tinydyndns-0.4.2.debian1/qlog.c:23:46:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void qlog(const char ip[4],uint16 port,const char id[2],const char *q,const char qtype[2],const char *result)
data/tinydyndns-0.4.2.debian1/qlog.c:23:63:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void qlog(const char ip[4],uint16 port,const char id[2],const char *q,const char qtype[2],const char *result)
data/tinydyndns-0.4.2.debian1/qlog.c:23:77:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void qlog(const char ip[4],uint16 port,const char id[2],const char *q,const char qtype[2],const char *result)
data/tinydyndns-0.4.2.debian1/query.c:23:32:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static void cachegeneric(const char type[2],const char *d,const char *data,unsigned int datalen,uint32 ttl)
data/tinydyndns-0.4.2.debian1/query.c:26:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key[257];
data/tinydyndns-0.4.2.debian1/query.c:38:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char save_buf[8192];
data/tinydyndns-0.4.2.debian1/query.c:56:31:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static void save_finish(const char type[2],const char *d,uint32 ttl)
data/tinydyndns-0.4.2.debian1/query.c:63:28:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static int typematch(const char rtype[2],const char qtype[2])
data/tinydyndns-0.4.2.debian1/query.c:63:48:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static int typematch(const char rtype[2],const char qtype[2])
data/tinydyndns-0.4.2.debian1/query.c:68:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static uint32 ttlget(char buf[4])
data/tinydyndns-0.4.2.debian1/query.c:113:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static int globalip(char *d,char ip[4])
data/tinydyndns-0.4.2.debian1/query.c:113:29:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static int globalip(char *d,char ip[4])
data/tinydyndns-0.4.2.debian1/query.c:132:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char header1[12];
data/tinydyndns-0.4.2.debian1/query.c:133:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char header2[12];
data/tinydyndns-0.4.2.debian1/query.c:162:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key[257];
data/tinydyndns-0.4.2.debian1/query.c:168:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char header[12];
data/tinydyndns-0.4.2.debian1/query.c:169:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char misc[20];
data/tinydyndns-0.4.2.debian1/query.c:563:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char type[2];
data/tinydyndns-0.4.2.debian1/query.c:821:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int query_start(struct query *z,char *dn,char type[2],char class[2],char localip[4])
data/tinydyndns-0.4.2.debian1/query.c:821:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int query_start(struct query *z,char *dn,char type[2],char class[2],char localip[4])
data/tinydyndns-0.4.2.debian1/query.c:821:55:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int query_start(struct query *z,char *dn,char type[2],char class[2],char localip[4])
data/tinydyndns-0.4.2.debian1/query.c:821:69:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int query_start(struct query *z,char *dn,char type[2],char class[2],char localip[4])
data/tinydyndns-0.4.2.debian1/query.h:14:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *name[QUERY_MAXLEVEL];
data/tinydyndns-0.4.2.debian1/query.h:15:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *control[QUERY_MAXLEVEL]; /* pointing inside name */
data/tinydyndns-0.4.2.debian1/query.h:16:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *ns[QUERY_MAXLEVEL][QUERY_MAXNS];
data/tinydyndns-0.4.2.debian1/query.h:17:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char servers[QUERY_MAXLEVEL][64];
data/tinydyndns-0.4.2.debian1/query.h:18:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *alias[QUERY_MAXALIAS];
data/tinydyndns-0.4.2.debian1/query.h:20:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char localip[4];
data/tinydyndns-0.4.2.debian1/query.h:21:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char type[2];
data/tinydyndns-0.4.2.debian1/query.h:22:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char class[2];
data/tinydyndns-0.4.2.debian1/random-ip.c:7:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char ip[4];
data/tinydyndns-0.4.2.debian1/random-ip.c:10:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
unsigned char tab[256];
data/tinydyndns-0.4.2.debian1/random-ip.c:12:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char strnum[FMT_ULONG];
data/tinydyndns-0.4.2.debian1/random-ip.c:14:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char seed[128];
data/tinydyndns-0.4.2.debian1/rbldns-data.c:26:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char bspace[1024];
data/tinydyndns-0.4.2.debian1/rbldns-data.c:36:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char strnum[FMT_ULONG];
data/tinydyndns-0.4.2.debian1/rbldns-data.c:50:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ip[4];
data/tinydyndns-0.4.2.debian1/rbldns.c:16:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char key[5];
data/tinydyndns-0.4.2.debian1/rbldns.c:17:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char data[100 + IP4_FMT];
data/tinydyndns-0.4.2.debian1/rbldns.c:19:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static int doit(char *q,char qtype[2])
data/tinydyndns-0.4.2.debian1/rbldns.c:19:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static int doit(char *q,char qtype[2])
data/tinydyndns-0.4.2.debian1/rbldns.c:24:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char reverseip[4];
data/tinydyndns-0.4.2.debian1/rbldns.c:25:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ip[4];
data/tinydyndns-0.4.2.debian1/rbldns.c:90:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int respond(char *q,char qtype[2],char ip[4])
data/tinydyndns-0.4.2.debian1/rbldns.c:90:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int respond(char *q,char qtype[2],char ip[4])
data/tinydyndns-0.4.2.debian1/rbldns.c:90:35:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int respond(char *q,char qtype[2],char ip[4])
data/tinydyndns-0.4.2.debian1/response.c:6:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char response[65535];
data/tinydyndns-0.4.2.debian1/response.c:11:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char name[NAMES][128];
data/tinydyndns-0.4.2.debian1/response.c:27:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[2];
data/tinydyndns-0.4.2.debian1/response.c:52:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int response_query(const char *q,const char qtype[2],const char qclass[2])
data/tinydyndns-0.4.2.debian1/response.c:52:40:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int response_query(const char *q,const char qtype[2],const char qclass[2])
data/tinydyndns-0.4.2.debian1/response.c:52:60:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int response_query(const char *q,const char qtype[2],const char qclass[2])
data/tinydyndns-0.4.2.debian1/response.c:73:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int response_rstart(const char *d,const char type[2],uint32 ttl)
data/tinydyndns-0.4.2.debian1/response.c:73:41:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int response_rstart(const char *d,const char type[2],uint32 ttl)
data/tinydyndns-0.4.2.debian1/response.c:75:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ttlstr[4];
data/tinydyndns-0.4.2.debian1/response.c:112:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void response_id(const char id[2])
data/tinydyndns-0.4.2.debian1/roots.c:43:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int roots(char servers[64],char *q)
data/tinydyndns-0.4.2.debian1/roots.c:63:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char servers[64];
data/tinydyndns-0.4.2.debian1/server.c:20:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char ip[4];
data/tinydyndns-0.4.2.debian1/server.c:23:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char buf[513];
data/tinydyndns-0.4.2.debian1/server.c:31:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char header[12];
data/tinydyndns-0.4.2.debian1/server.c:32:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char qtype[2];
data/tinydyndns-0.4.2.debian1/server.c:33:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char qclass[2];
data/tinydyndns-0.4.2.debian1/sgetopt.c:41:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char chp[2]; chp[0] = optproblem; chp[1] = '\n';
data/tinydyndns-0.4.2.debian1/socket_accept.c:8:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int socket_accept4(int s,char ip[4],uint16 *port)
data/tinydyndns-0.4.2.debian1/socket_bind.c:8:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int socket_bind4(int s,char ip[4],uint16 port)
data/tinydyndns-0.4.2.debian1/socket_bind.c:20:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int socket_bind4_reuse(int s,char ip[4],uint16 port)
data/tinydyndns-0.4.2.debian1/socket_conn.c:9:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int socket_connect4(int s,const char ip[4],uint16 port)
data/tinydyndns-0.4.2.debian1/socket_recv.c:8:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int socket_recv4(int s,char *buf,int len,char ip[4],uint16 *port)
data/tinydyndns-0.4.2.debian1/socket_recv.c:8:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int socket_recv4(int s,char *buf,int len,char ip[4],uint16 *port)
data/tinydyndns-0.4.2.debian1/socket_send.c:8:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int socket_send4(int s,const char *buf,int len,const char ip[4],uint16 port)
data/tinydyndns-0.4.2.debian1/socket_send.c:8:54:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int socket_send4(int s,const char *buf,int len,const char ip[4],uint16 port)
data/tinydyndns-0.4.2.debian1/tdlookup.c:12:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static int want(const char *owner,const char type[2])
data/tinydyndns-0.4.2.debian1/tdlookup.c:12:41:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static int want(const char *owner,const char type[2])
data/tinydyndns-0.4.2.debian1/tdlookup.c:16:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char x[10];
data/tinydyndns-0.4.2.debian1/tdlookup.c:36:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char clientloc[2];
data/tinydyndns-0.4.2.debian1/tdlookup.c:40:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char data[32767];
data/tinydyndns-0.4.2.debian1/tdlookup.c:43:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char type[2];
data/tinydyndns-0.4.2.debian1/tdlookup.c:51:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ttd[8];
data/tinydyndns-0.4.2.debian1/tdlookup.c:52:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ttlstr[4];
data/tinydyndns-0.4.2.debian1/tdlookup.c:53:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char recordloc[2];
data/tinydyndns-0.4.2.debian1/tdlookup.c:92:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[20];
data/tinydyndns-0.4.2.debian1/tdlookup.c:106:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static int doit(char *q,char qtype[2])
data/tinydyndns-0.4.2.debian1/tdlookup.c:106:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static int doit(char *q,char qtype[2])
data/tinydyndns-0.4.2.debian1/tdlookup.c:119:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char x[20];
data/tinydyndns-0.4.2.debian1/tdlookup.c:121:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char addr[8][4];
data/tinydyndns-0.4.2.debian1/tdlookup.c:281:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int respond(char *q,char qtype[2],char ip[4])
data/tinydyndns-0.4.2.debian1/tdlookup.c:281:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int respond(char *q,char qtype[2],char ip[4])
data/tinydyndns-0.4.2.debian1/tdlookup.c:281:35:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int respond(char *q,char qtype[2],char ip[4])
data/tinydyndns-0.4.2.debian1/tdlookup.c:285:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key[6];
data/tinydyndns-0.4.2.debian1/tinydns-data.c:37:28:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void ttdparse(stralloc *sa,char ttd[8])
data/tinydyndns-0.4.2.debian1/tinydns-data.c:56:28:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void locparse(stralloc *sa,char loc[2])
data/tinydyndns-0.4.2.debian1/tinydns-data.c:110:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char defaultsoa[20];
data/tinydyndns-0.4.2.debian1/tinydns-data.c:136:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void rr_start(const char type[2],unsigned long ttl,const char ttd[8],const char loc[2])
data/tinydyndns-0.4.2.debian1/tinydns-data.c:136:58:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void rr_start(const char type[2],unsigned long ttl,const char ttd[8],const char loc[2])
data/tinydyndns-0.4.2.debian1/tinydns-data.c:136:76:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void rr_start(const char type[2],unsigned long ttl,const char ttd[8],const char loc[2])
data/tinydyndns-0.4.2.debian1/tinydns-data.c:138:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[4];
data/tinydyndns-0.4.2.debian1/tinydns-data.c:163:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char bspace[1024];
data/tinydyndns-0.4.2.debian1/tinydns-data.c:174:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char dptr[DNS_NAME4_DOMAIN];
data/tinydyndns-0.4.2.debian1/tinydns-data.c:176:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char strnum[FMT_ULONG];
data/tinydyndns-0.4.2.debian1/tinydns-data.c:192:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ttd[8];
data/tinydyndns-0.4.2.debian1/tinydns-data.c:193:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char loc[2];
data/tinydyndns-0.4.2.debian1/tinydns-data.c:195:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ip[4];
data/tinydyndns-0.4.2.debian1/tinydns-data.c:196:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char type[2];
data/tinydyndns-0.4.2.debian1/tinydns-data.c:197:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char soa[20];
data/tinydyndns-0.4.2.debian1/tinydns-data.c:198:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[4];
data/tinydyndns-0.4.2.debian1/tinydns-edit.c:45:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char targetip[4];
data/tinydyndns-0.4.2.debian1/tinydns-edit.c:49:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char bspace[1024];
data/tinydyndns-0.4.2.debian1/tinydns-edit.c:53:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char bnewspace[1024];
data/tinydyndns-0.4.2.debian1/tinydns-edit.c:63:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char ip[4];
data/tinydyndns-0.4.2.debian1/tinydns-edit.c:64:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char ipstr[IP4_FMT];
data/tinydyndns-0.4.2.debian1/tinydns-edit.c:65:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char strnum[FMT_ULONG];
data/tinydyndns-0.4.2.debian1/tinydns-edit.c:67:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *names[26];
data/tinydyndns-0.4.2.debian1/tinydns-get.c:29:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char ip[4];
data/tinydyndns-0.4.2.debian1/tinydns-get.c:30:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char type[2];
data/tinydyndns-0.4.2.debian1/tinydns.c:6:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char seed[128];
data/tinydyndns-0.4.2.debian1/tinydyndns-data.c:74:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char bcdbspace[4096];
data/tinydyndns-0.4.2.debian1/tinydyndns-data.c:75:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[8];
data/tinydyndns-0.4.2.debian1/tinydyndns-data.c:76:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ipbuf[4];
data/tinydyndns-0.4.2.debian1/tinydyndns-update.c:35:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char ip[4];
data/tinydyndns-0.4.2.debian1/tinydyndns-update.c:36:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char data[21];
data/tinydyndns-0.4.2.debian1/tinydyndns-update.c:48:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char bcdbspace[4096];
data/tinydyndns-0.4.2.debian1/tinydyndns-update.c:50:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char btmpspace[4096];
data/tinydyndns-0.4.2.debian1/trypoll.c:9:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  x.fd = open("trypoll.c",O_RDONLY);
data/tinydyndns-0.4.2.debian1/uint16_pack.c:3:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void uint16_pack(char s[2],uint16 u)
data/tinydyndns-0.4.2.debian1/uint16_pack.c:9:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void uint16_pack_big(char s[2],uint16 u)
data/tinydyndns-0.4.2.debian1/uint16_unpack.c:3:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void uint16_unpack(const char s[2],uint16 *u)
data/tinydyndns-0.4.2.debian1/uint16_unpack.c:14:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void uint16_unpack_big(const char s[2],uint16 *u)
data/tinydyndns-0.4.2.debian1/uint32_pack.c:3:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void uint32_pack(char s[4],uint32 u)
data/tinydyndns-0.4.2.debian1/uint32_pack.c:13:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void uint32_pack_big(char s[4],uint32 u)
data/tinydyndns-0.4.2.debian1/uint32_unpack.c:3:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void uint32_unpack(const char s[4],uint32 *u)
data/tinydyndns-0.4.2.debian1/uint32_unpack.c:18:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void uint32_unpack_big(const char s[4],uint32 *u)
data/tinydyndns-0.4.2.debian1/walldns.c:14:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int respond(char *q,char qtype[2])
data/tinydyndns-0.4.2.debian1/walldns.c:14:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int respond(char *q,char qtype[2])
data/tinydyndns-0.4.2.debian1/walldns.c:18:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ip[4];
data/tinydyndns-0.4.2.debian1/buffer_read.c:6:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  return read(fd,buf,len);
data/tinydyndns-0.4.2.debian1/cdb.c:55:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        r = read(c->fd,buf,len);
data/tinydyndns-0.4.2.debian1/dns_transmit.c:320:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    r = read(fd,&ch,1);
data/tinydyndns-0.4.2.debian1/dns_transmit.c:333:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    r = read(fd,&ch,1);
data/tinydyndns-0.4.2.debian1/dns_transmit.c:351:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    r = read(fd,d->packet + d->pos,d->packetlen - d->pos);
data/tinydyndns-0.4.2.debian1/dnscache-conf.c:160:3:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
  umask(000);
data/tinydyndns-0.4.2.debian1/dnscache-conf.c:165:3:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
  umask(022);
data/tinydyndns-0.4.2.debian1/dnscache.c:228:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  r = read(x->tcp,&ch,1);
data/tinydyndns-0.4.2.debian1/dnscache.c:417:3:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  read(0,seed,sizeof seed);
data/tinydyndns-0.4.2.debian1/dnsfilter.c:125:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	  r = read(0,inbuf + inbuflen,(sizeof inbuf) - inbuflen);
data/tinydyndns-0.4.2.debian1/generic-conf.c:21:3:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
  umask(022);
data/tinydyndns-0.4.2.debian1/install.c:148:3:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
  umask(077);
data/tinydyndns-0.4.2.debian1/pickdns-data.c:137:3:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
  umask(022);
data/tinydyndns-0.4.2.debian1/rbldns-data.c:56:3:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
  umask(022);
data/tinydyndns-0.4.2.debian1/readclose.c:10:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    r = read(fd,sa->s + sa->len,bufsize);
data/tinydyndns-0.4.2.debian1/socket_conn.c:29:5:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    read(s,&ch,1); /* sets errno */
data/tinydyndns-0.4.2.debian1/timeoutread.c:27:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  return read(fd,buf,len);
data/tinydyndns-0.4.2.debian1/tinydns-data.c:200:3:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
  umask(022);
data/tinydyndns-0.4.2.debian1/tinydns-edit.c:109:3:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
  umask(077);

ANALYSIS SUMMARY:

Hits = 385
Lines analyzed = 12102 in approximately 0.37 seconds (32520 lines/second)
Physical Source Lines of Code (SLOC) = 10245
Hits@level = [0]   5 [1]  19 [2] 350 [3]   5 [4]   0 [5]  11
Hits@level+ = [0+] 390 [1+] 385 [2+] 366 [3+]  16 [4+]  11 [5+]  11
Hits/KSLOC@level+ = [0+] 38.0673 [1+] 37.5793 [2+] 35.7247 [3+] 1.56174 [4+] 1.07369 [5+] 1.07369
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.